Privacy Policy
How Age Verify handles data across verification and billing workflows
Effective date: March 13, 2026. This policy summarizes processing behavior for platform operations, API and SDK usage, onboarding, billing, and support workflows.
1. Scope and roles
This Privacy Policy describes how Age Verify processes data for its platform, APIs, SDK, integrator portal, onboarding, lead capture, and demo workflows. Depending on your implementation, Age Verify may act as a processor or controller under applicable privacy law.
Processing description
Age Verify is designed to support age-assurance decisions, including implementations that use facial age estimation where legally appropriate. The standard flow is intended to minimize collection and retention of personal data and is not designed for identity-document collection or biometric template storage. The default product goal is to answer the age-threshold question, not to identify the person.
2. Data we process
We process account and contact data (such as name, company, email), integrator authentication data (including password reset request/complete events), merchant billing metadata, API credential and usage metadata, verification session metadata, webhook and audit metadata, and lead/demo/resource-request inquiry data. We process only data needed to execute verification workflows and return signed outcomes.
3. How we use data
We use data to provide and secure verification services, create and finalize verification sessions, prevent abuse and fraud, support idempotent and replay-safe operations, operate billing and reconciliation, issue and protect API keys, support integrator account authentication, and provide customer support. If a client opts in, Age Verify may reuse prior verification outcomes or tokens across participating client properties to reduce repeat checks, subject to applicable law and configured controls.
4. Billing and payment data
Billing is merchant-level. We use secure hosted checkout during onboarding to collect and store a default payment method, then process usage-based billing events and invoice lifecycle updates through billing webhooks.
5. Website forms, resources, and demo access
When you submit forms on sales, API key onboarding, blog/resource downloads, demo pages, or exit-intent prompts, we process submitted contact details and source metadata (for example path, topic, and campaign context) to respond, deliver requested resources, onboard accounts, and improve support operations. Demo verification access uses short-lived controls and is intentionally separate from billable verification flows.
6. Verification and biometric processing constraints
Verification workflows are designed to use only what is needed, with privacy controls described in our product documentation. We also block verification outcomes when required model or verification prerequisites are unavailable.
7. Security controls
We apply technical and organizational controls including access restrictions, secret management, transport protections, audit logging, and monitoring for abnormal activity. You remain responsible for securing your own implementation and key handling.
8. Data sharing
We share data with subprocessors and service providers only as needed to operate the service, including infrastructure, payments, delivery, and security providers, and where required with legal or regulatory authorities. We do not sell personal information.
9. Retention and deletion
We retain data for the period necessary to provide services, maintain security and auditability, comply with law, and resolve disputes. Retention periods differ by data class and legal requirement.
10. International transfers
Where data is transferred internationally, we apply transfer safeguards consistent with applicable law and our contractual obligations.
11. Rights and requests
Depending on your jurisdiction, individuals may have rights to access, correction, deletion, portability, or objection. Requests can be submitted through your organization account channel or designated support contact.
12. Children and age-gated services
The platform is designed to support age-gated product experiences. We do not provide general-audience child-directed services without required safeguards and legal basis.
13. Policy changes
We may update this Privacy Policy to reflect legal, operational, or product changes. Material changes will include an updated effective date.
Operational interpretation notes
This policy is written to align legal requirements with real implementation behavior. Teams can map each section to controls such as key management ownership, webhook verification, retention automation, and support response steps.
For production programs, review policy language alongside technical runbooks. A mismatch between written commitments and system behavior is a common source of compliance risk during audits and incidents.
If your organization deploys in multiple regions, use this policy as a baseline and add jurisdiction-specific controls on top. Region-level exceptions should be documented with owners and review cadence.
Policy reminders
- Review this policy during major product changes that affect data flows, verification outcomes, or third-party processing boundaries.
- Keep policy owners and engineering owners synchronized so privacy commitments remain enforceable in system behavior.
- Document exceptions and temporary controls explicitly to avoid long-lived compliance drift.