Terms of Service

Simple, transparent terms for our privacy-first service

Last updated: 6/30/2025

1. Service Description

This application provides secure authentication services using Google OAuth with a privacy-first, zero-storage architecture. We process your authentication data in memory only during your active session.

2. Privacy-First Data Processing

By using this service, you acknowledge our innovative privacy-first architecture that protects your personal information:

Hash-Based Storage System

We process your email address and basic profile information temporarily in memory for authentication purposes only. For subscription management, we convert your email to an irreversible cryptographic hash (SHA-256) that cannot be used to identify you personally. This hash is stored in our database instead of your actual email address.

What This Means for You

  • • Your personal data cannot be stolen because it's not stored in our database
  • • We cannot see your email address in our systems after hashing
  • • Even our administrators cannot access your personal information
  • • Your privacy is protected by mathematical impossibility, not just policies

All personal data is completely destroyed when you log out or your session expires. Only the anonymous hash remains for subscription management purposes.

3. User Responsibilities

  • Use the service only for legitimate authentication purposes
  • Log out when finished to ensure complete data destruction
  • Report any security concerns immediately

4. Service Availability

We strive to maintain high availability but cannot guarantee uninterrupted service. Sessions may be terminated for security or maintenance purposes.

5. Privacy Commitment

We are committed to protecting your privacy through our zero-storage architecture. See our Privacy Policy for detailed information about our data handling practices.

6. Data Security Guarantee

Our hash-based architecture provides security guarantees that traditional services cannot offer:

🔐 Technical Protection

SHA-256 hashing with unique salts makes it mathematically impossible to recover your original email address from our database, even with unlimited computing power.

🛡️ Breach Protection

In the unlikely event of a data breach, attackers would only find meaningless hash values that cannot be used to identify you or compromise your accounts elsewhere.

This represents a fundamental shift from traditional "trust us with your data" models to "we can't access your data even if we wanted to" architecture.

7. Limitation of Liability

SCOPIQO provides this service "as is" without warranties of any kind. We are not liable for any damages arising from the use of our service, except as required by applicable law.

8. Changes to Terms

We may update these terms from time to time. We will notify users of any material changes through our service or via email. Continued use of the service constitutes acceptance of updated terms.

9. Contact Information

If you have any questions about these Terms of Service, please contact us through our support channels or visit our Privacy Policy for more information about our data practices.