Legal
Data Handling Policy
Last updated: May 2026 · BlastFront Technologies LLC
Data Lifecycle at a Glance
Intake data used to generate risk score and summary. Temporarily held pending payment.
Stripe confirms payment. Form data used to run infrastructure query, generate maps, and compile PDF.
Signed download URL issued. Intake form data is permanently deleted from our systems.
Download link expires. PDF is removed from storage. No intake data remains.
Payment metadata (report ID, amount, status) deleted for billing reconciliation purposes.
What Data Is Collected
When you generate a report, the following information is submitted:
- Event name and dates
- Venue name and address
- GPS coordinates (if provided)
- Expected attendance count
- Venue type and configuration
- Threat vector selections
- VIP count and role descriptions (no names or PII)
- Prior incident and known threat descriptions (text you provide)
We strongly advise against including personally identifiable information (names, titles, organizations) about VIP principals in any intake field. Use roles only (e.g., "CEO," "Senator," "Artist").
Where Data Is Stored
Intake data is temporarily stored in Google Firestore (encrypted at rest) in the United States region during the generation window only.
Generated PDFs are stored in Google Firebase Storage (encrypted at rest, private access only) until the download link is used or expires (24 hours), whichever comes first.
No data is stored on third-party analytics platforms, advertising networks, or data brokers.
Data Transmitted to Third Parties
The following data is transmitted to third parties solely to fulfill the service:
What We Never Store
- Payment card numbers or banking information
- Names of VIP principals or protected persons
- Personally identifiable information about event attendees
- Law enforcement or classified intelligence information
- User accounts, passwords, or login credentials (no accounts required)
Security Measures
- All data in transit is encrypted via TLS 1.3
- All data at rest is encrypted via AES-256
- PDF files are stored as private objects — no public URL access
- Downloads are delivered via cryptographically signed, time-limited URLs
- API endpoints are rate-limited to prevent abuse
- No API keys are exposed in client-side code
Data Deletion Requests
Because intake data is deleted within 24 hours of report delivery by default, most deletion requests are satisfied automatically before they can be made.
If you have a specific concern about data associated with a report, contact us with your Report ID and we will confirm deletion status.