Trust & Security
Your legacy content is among the most personal information you'll ever create. We treat it with the security and respect it deserves.
Our Iron-Clad Promise
We will NEVER sell, rent, trade, or share your personal information with third parties for marketing, advertising, or any commercial purposes.
Your data is used exclusively to provide the Legacy Plans service at legacyplans.ai. We have no hidden revenue streams involving your data. We do not partner with data brokers. We do not sell "anonymized" data. Your trust is the foundation of our business.
What We Will NEVER Do
These aren't just policies—they're promises we'll never break.
- Sell your personal information to any third party
- Rent or lease your data to marketers or advertisers
- Trade your information with other companies
- Use your data for advertising or marketing profiles
- Share your content with AI training services
- Monetize your personal information in any way
- Allow third parties to access your data for their own purposes
Enterprise-Grade Security
We implement multiple layers of security to protect your most sensitive information.
AES-256 Encryption at Rest
All your sensitive data is encrypted using military-grade AES-256 encryption while stored in our databases.
TLS 1.3 Encryption in Transit
Every connection to Legacy Plans uses the latest TLS 1.3 protocol to protect your data during transmission.
Row-Level Security
Database policies ensure you can only access your own data. No user can ever see another user's information.
Two-Factor Authentication
Optional TOTP-based 2FA with backup recovery codes adds an extra layer of protection to your account.
Multi-Party Verification
Our death verification requires confirmation from multiple trusted contacts you designate, with configurable waiting periods.
Content Sanitization
All user-generated content is sanitized using DOMPurify to prevent injection attacks and malicious code.
Built on SOC 2 Certified Infrastructure
Hosted on enterprise-grade cloud infrastructure built on SOC 2 certified providers with regular security audits.
Secure Token Generation
Verification and portal access tokens are cryptographically generated using secure random algorithms.
Data Protection Commitments
Your rights and control over your personal information are paramount.
Transparency
We clearly explain what data we collect, why we collect it, and exactly how it's used. No hidden practices.
No Data Sales
We have zero revenue streams from your personal data. Your information is never sold, rented, or traded.
Your Control
Access, export, correct, or delete your data at any time through your account settings.
GDPR Compliant
We implement appropriate safeguards for international data transfers and respect your privacy rights.
Verification Process Security
Our multi-layer verification ensures your content is only delivered when truly needed.
Multi-Party Confirmation Required
Verification requires confirmation from multiple trusted contacts you designate (1-5 people).
Configurable Waiting Periods
A safety waiting period (1-90 days) applies before any content is delivered.
Secure Token-Based Verification
Each verification contact receives a unique, cryptographically secure token.
Cancel Anytime
You can cancel any initiated verification simply by checking in to your account.
Audit Trail
All verification responses are logged for transparency and accountability.
Service Provider Transparency
We work with a minimal set of trusted providers, all bound by strict contracts.
Email Delivery
Transactional emails for notifications and message delivery. Providers cannot use your data for their own purposes.
SMS & WhatsApp
Check-in reminders and alerts via your preferred channels. Message content is not retained by providers.
Cloud Infrastructure
Enterprise-grade hosting built on SOC 2 certified infrastructure. All data encrypted at rest and in transit.
Authentication
Secure identity verification and session management. Credentials are never shared with third parties.
Report a Security Concern
If you discover a security vulnerability or have concerns about your account security, please contact us immediately. We take all reports seriously and will respond promptly.
Contact Our Security Team →For complete details on our data practices, please review our legal documents: