Collection Model
Least Needed
Core verification flows are available without mandatory account identity.
Trust baseline
Data handling baseline with lawful basis mapping, rights workflow, retention controls, and transfer safeguards.
Collection Model
Core verification flows are available without mandatory account identity.
Response Timing
Verified privacy-rights requests target initial response within 30 days.
Subprocessor Notice
Material additions target publication at least 15 days before effective date, except emergency/legal changes.
Like most internet services, basic operational logs may be generated by hosting providers and infrastructure vendors to keep the service running and secure. These logs may include request timestamps, routes, response codes, device/browser metadata, IP address, and latency/security signals.
These logs are used for abuse prevention, service reliability, and incident response. They are not used to sell personal data or create cross-site advertising profiles.
If you sign in for plan features, we may process:
If you contact support, we process the content you submit and associated communication metadata to respond and resolve service issues.
Where applicable law requires legal-basis mapping, Receiz relies on one or more of the following:
Material subprocessor additions are published on the canonical subprocessor page with scope details and effective date.
support@receiz.com with subject Subprocessor Review.| Data Type | Typical Retention | Purpose |
|---|---|---|
| Security and operational logs | Up to 12 months | Abuse prevention, security, and reliability investigations |
| Account profile and authentication data | While account remains active; deletion workflow on verified request | Identity, access continuity, and security |
| Billing and transaction records | Up to 7 years where legally required | Accounting, tax, legal, and audit obligations |
| Support communications | Up to 24 months after closure | Issue resolution, service quality, and legal defensibility |
Subject to applicable law, you may request access, correction, deletion, restriction, portability, or objection related to personal data handled by Receiz.
support@receiz.com with subject Privacy Review.Where personal data is transferred internationally, Receiz applies legally recognized transfer mechanisms and contractual safeguards appropriate to applicable law, including SCC- and UK-transfer-compatible mechanisms where required.
Receiz is not directed to children under applicable digital consent age. If Receiz learns personal data from a child was submitted without appropriate authorization, Receiz will take steps to delete it in accordance with applicable law.
Receiz applies technical and organizational measures designed to protect personal data against unauthorized access, alteration, disclosure, or destruction. No system can be guaranteed perfectly secure, and users remain responsible for safeguarding shared links and distributed artifacts.
Receiz may update this Privacy Policy to reflect security improvements, legal requirements, or product changes. Material privacy changes are posted on this route with an updated effective date and, where commercially reasonable, advance notice through account or support channels.
Questions: support@receiz.com
For institutions, including risk, compliance, and audits, include Privacy Review in the subject line.