IP & ID Collection Policy
SecurePoint USA Visitor Management — Compliance & Security
This page explains how SecurePoint USA collects and uses network IP addresses and government ID images to operate a compliant Visitor Management System. Our goals are security, fraud prevention, sanctions geofencing, and immutable auditability. We apply strict purpose limitation, retention controls, and tenant isolation.
What we collect
- IP address & user agent on key actions (host pre-registration, visitor registration completion, screening, check-in). Stored in organization-scoped audit logs.
- Visitor ID image (if provided by the visitor) stored in a private storage bucket with signed URL access only.
Why we collect it
- Security & abuse mitigation (rate limiting, anomaly detection).
- Sanctions geofence signals and compliance investigations.
- Immutable audit trails for regulated environments.
How we protect it
- Row Level Security (RLS) — data is scoped by
organization_id. - Encryption at rest and in transit; signed URLs for access to ID images.
- Access is least-privilege and audited.
Retention
- IP addresses: raw IPs are retained for up to 180 days, then replaced by a salted hash used for trend/audit. A nightly job enforces this rotation.
- ID images: retained for legitimate compliance and security purposes and accessible only via signed URLs. Tenants may request deletion/export subject to regulatory obligations.
Your choices
- Organizations can request exports for regulators or incident response.
- Visitors may request information via the organization’s privacy contact.
For details on our general privacy practices, see Privacy.