Privacy Policy

Last Updated: 25 December 2025

This Privacy Policy explains how PYRAM handles information in connection with use of the Platform. PYRAM is built on privacy-by-design, data minimisation, and user control.

1. Scope & Compliance

This Policy is intended to comply with applicable global data-protection laws, including GDPR, UK GDPR, CCPA/CPRA, and equivalent frameworks worldwide. Where local law imposes additional requirements, those requirements apply.

2. Information We Do Not Collect

PYRAM does not knowingly collect or store:

  • Real-world identities
  • Email addresses or phone numbers
  • Biometric identifiers
  • Persistent IP address logs linked to accounts
  • Continuous GPS or live location data
  • Private encryption keys
  • Readable private messages or media
  • Metadata intended to identify users

3. Minimal Information We May Process

To operate the Platform, PYRAM may process limited non-identifying or user-submitted information, including:

  • Encrypted content required for message delivery
  • Non-identifying interaction signals (e.g., profile score events)
  • Optional advertising identifiers only if explicitly enabled by the user

4. Messaging & Content Data

  • Messages are stored locally on the user's device.
  • Messages are temporarily stored on servers only until delivery and are deleted once read.
  • All message data is encrypted at all stages.
  • Media is encrypted in transit and not linked to real-world identities.

5. Location & IP Data

  • IP addresses and precise location data are not stored.
  • Location features are optional and user-controlled.

6. Advertising Identifiers

Advertising identifiers are accessed only with explicit user opt-in and used solely for optional personalised features.

7. Data Retention

Data is retained only for as long as necessary to deliver the service. Self-destruct accounts and message deletion permanently remove associated data.

8. User Rights

Depending on jurisdiction, users may have rights to:

  • Access or delete locally stored data
  • Withdraw consent for optional features
  • Restrict or object to certain processing

Due to the self-custodial and anonymous design, PYRAM may be technically unable to identify or recover specific user data once access credentials are lost.

9. Security Measures

PYRAM implements technical and organisational safeguards aligned with industry best practices, including encryption, access controls, and system isolation.

10. International Operation

PYRAM operates globally using distributed infrastructure. Some systems may be hosted in jurisdictions with strong data-protection standards, including Switzerland.

11. Third-Party Services

Third-party infrastructure providers may process encrypted data strictly to deliver technical services. They do not receive unencrypted user content.

12. Changes to This Policy

This Policy may be updated to reflect legal, technical, or operational changes. Continued use of PYRAM constitutes acceptance of the updated Policy.

13. Contact

Due to PYRAM's anonymous, self-custodial design, direct identification-based contact may not be possible. Platform notices and updates are delivered in-app.

By using PYRAM, you acknowledge and accept this Privacy Policy in full.

globe_icon_img

You were never meant to be tracked or controlled. Welcome to the other side.

PRODUCTTerms and conditionsFAQsPrivacy policy
ABOUTOur ContactOur AppAbout Us
CONTACT@pyram.online

©2025 PYRAM | All right reserved