Compliance & Trust Center

Understanding how MeshPrivacy operates, our legal framework, and your responsibilities as a user.

How MeshPrivacy Works

01

Your Request

You submit a task specifying the target URL and service type

02

MeshPrivacy Processing

We execute the technical challenge resolution on your behalf

03

Your Response

You receive valid session tokens to use with your requests

Conduit Model: MeshPrivacy operates as a specialized Connectivity API and technical conduit service. We provide the interoperability layer for your requests. You retain full control over what URLs you access and how you use the tokens we generate. We do not initiate requests to third parties on our own behalf.

Liability Framework

Principal-Agent Model

You (the Principal) direct the actions. MeshPrivacy (the Agent) executes technical tasks on your behalf. Liability for the purpose and use of the service rests with the Principal.

  • You determine the target URLs
  • You decide how to use returned tokens
  • You are responsible for compliance with target site ToS
Analogy: The Range

Consider a shooting range: the range provides the facility and equipment, but the shooter is responsible for their actions and targets. Similarly, MeshPrivacy provides technical infrastructure, while you remain responsible for your use of that infrastructure and your compliance with applicable laws and terms.

Compliance

SOC 2

SOC 2 Type II

Security, availability, and confidentiality controls audited annually

GDPR

GDPR Compliant

EU data protection requirements with DPA available

CCPA

CCPA Compliant

California consumer privacy rights respected

Your Responsibilities

By using MeshPrivacy, you agree to use the service responsibly and in compliance with all applicable laws. Please review our Terms of Service and Acceptable Use Policy carefully.

Questions about compliance?

Contact our compliance team for enterprise requirements, DPAs, or security questionnaires.

Contact Us