Data retention policy

What Zoza Vault stores. What we never see. How long we keep metadata. The sub-processor list. The DPA template.

✓ Zero-plaintext guarantee

Zoza Vault never sees plaintext field values. Our backend receives only ciphertext sealed to your app's public key. We cannot decrypt payloads we route, log, or back up. This is enforced by cryptography, not policy.

What we store

Data classPurposeRetention
App metadata
id, name, api_key_hash, public_key, private_key, active flag, created_at, decrypt count
Authenticate API calls; rate-limit; serve public-key lookups to browsersFor the life of the account + 90 days after deletion request
Application queue
company, email, website, use_case, use_case_details, volume_tier, plan_requested, status, submitter_ip, created_at
B2B apply workflow; admin approve/reject; abuse rate-limiting12 months after approval/rejection decision
Request logs
timestamp, app_id, endpoint, status code, bytes in/out, response time, Fly-Client-IP
Incident response, billing usage metering, abuse detection30 days rolling; aggregated metrics retained indefinitely
Audit log (planned v0.2)
hash-chained entries: app register, app rotate, application approve/reject, admin token use
Transparency; tamper-evident record of admin actionsIndefinite — append-only, cannot be deleted

What we never store

Zero-knowledge mode (planned v0.2)

Enterprise customers can opt into zero-knowledge mode at registration: we generate your keypair, hand you the private key once, and destroy our copy. After that, the server-side /v1/decrypt endpoint returns 422 for all of your ciphertext — we literally cannot decrypt. Only local decrypt (with your retained private key) works.

This removes Zoza from your compliance scope entirely: we store ciphertext you can't match to plaintext. Trade-off: if you lose your private key, every app's ciphertext is permanently unrecoverable. By design. We cannot help.

Data deletion

Customers can delete their account at any time via hello@zoza.world. Within 7 business days:

Sub-processors

We route traffic and store data through the minimum number of third parties. Each is listed with its function and jurisdiction. We notify customers 30 days in advance of any change.

ProcessorFunctionJurisdiction
Fly.ioApplication hosting (Singapore + Ashburn VA), managed PostgresUSA (Delaware)
CloudflareDNS for zoza.world zone (no proxy; DNS-only for vault-api)USA (California)
ImmunefiBug bounty platform (scope docs only, no customer data)Netherlands

That's it — we don't use third-party analytics, APM, email marketing platforms, or CRM for Vault customers. Billing uses Stripe (when activated); Stripe sees your billing info, not your Vault usage.

Regulatory alignment

FrameworkZoza's roleStatus
HIPAA (US)Business AssociateBAA available after external audit closes (Q2 2026)
PCI-DSS v4.0 (global)Service provider, scope reducerAttestation queued with QSA
SOC 2 Type II (US)Service organization6-month observation active; report expected 2026-10-15
GDPR (EU)Data ProcessorDPA template available; sub-processor list above
DPDP 2023 (India)Data Processor / Data Fiduciary (tbd by customer)Grievance officer designated; consent integration on roadmap
CCPA / CPRA (California)Service ProviderService-provider agreement template aligned with §1798.140(v)

Data Processing Agreement template

Our standard DPA (GDPR Art. 28 + CCPA Service-Provider clauses) is available as a PDF on request. Non-standard terms require Enterprise contracts — email hello@zoza.world. Key provisions:

  1. Subject matter: ciphertext storage and public-key lookup services for your customer's form fields.
  2. Processor obligations: confidentiality, security (encryption in transit + at rest), audit cooperation, breach notification within 72 hours.
  3. Customer rights: list of sub-processors, right to object to new sub-processors, deletion on termination.
  4. International transfers: Standard Contractual Clauses (SCCs) with EU customers; UK IDTA addendum for UK customers; DPDP-aligned cross-border provisions for India customers.
  5. Liability: capped at 12 months of fees paid; uncapped for deliberate breach or gross negligence.

Changes to this policy

Changes to this policy are committed to frontend-web/public/about/vault-retention.html in the Zoza products repo. Customers can git log the file for a full history. Material changes trigger email notification to all active customer contacts 30 days in advance.

ℹ Contact

Questions about this policy: hello@zoza.world

Data deletion requests: hello@zoza.world

GDPR rights (access, portability, erasure): your end-users should contact you, since you're the controller; we route requests you make to us about your account.

Last updated 2026-04-17. © 2026 Zoza. Source code copyright LD-16949/2026-CO.