Operational transparency • Minimal collection • No ad-tech nonsense
This document explains what data is collected, how it is used, how long it may be retained, and how the system is secured. This is not a marketing document. It is an operational transparency document.
This document explains:
When you use | base |, the system may collect the following categories of data:
“Collect” in this context includes data created as part of normal system operation (authentication logs, network logs, storage records).
RG Herd does NOT collect, use or sell data for advertising or monetization.
| base | supports end-to-end encrypted (E2EE) rooms. Room type determines what is visible to the server. Users are responsible for choosing the appropriate room type for their needs.
Data is used for authentication and session management, preventing abuse, maintaining service stability, security monitoring, investigating violations of Terms of Service, and infrastructure troubleshooting.
The platform uses standard infrastructure logging and security monitoring practices to detect abuse, prevent unauthorized access, maintain service integrity, and mitigate denial-of-service or exploit attempts.
Monitoring is conducted strictly for operational and security purposes. The system does not engage in commercial surveillance or data monetization.
Retention varies depending on data type. Some data is retained only as long as necessary for operations and security. Some data persists by design unless deleted or configured with retention windows.
Retained while the account is active. May be retained for a limited period after deactivation for administrative or legal purposes.
Retained for a reasonable operational period to investigate abuse and maintain security.
System backups may exist for disaster recovery purposes. Backups are not guaranteed to be permanent archives.
Server administrators may access unencrypted room content, account status, session metadata, and IP/login logs for operational and moderation purposes. Administrators do not have access to the contents of properly encrypted messages.
Administrative access is limited to operational and moderation purposes.
Data may be disclosed only when required by valid legal process, necessary to prevent imminent harm, or necessary to protect system integrity. Requests for user data must comply with applicable law.
The platform uses layered security practices. No system is immune to compromise. Users are responsible for securing their own devices and encryption keys.
Loss of encryption keys may result in permanent loss of access to encrypted messages.
The platform may be hosted in specific jurisdictions. Data may be stored in those jurisdictions. Users are responsible for complying with laws applicable to their location.
This policy may be updated at any time. Continued use of | base | constitutes acceptance of any changes.
For privacy-related questions: