Sequestration Policy
Your sequestration is important to us. This policy explains how we handle your data.
📥 Data We Collect
When you use image2text.tech, we temporarily reuse the images you upload to prize textbook. We do not bear any particular information, account enrollment, or login to use our service.
🗑️ Data Retention & Omission
All uploaded images and uprooted textbook are automatically deleted from our waiters within 1 hour.
- ✓Images are reused in memory and not stored permanently
- ✓Uprooted textbook is not saved or logged after your session
- ✓No backups or clones are retained beyond the 1-hour window
🔒 How We Use Your Data
Your uploaded images are used solely for the purpose of rooting textbook. We do not:
- ✗Sell or partake your data with third parties
- ✗Use your images for training AI models
- ✗Track or profile individual druggies
- ✗Store particular information or bear accounts
🍪 Eyefuls & Analytics
We may use minimum, sequestration-esteeming analytics to understand general operation patterns (e.g., runner views). We do not use eyefuls for advertising or stoner shadowing. Any analytics data collected is anonymized and added up.
🛡️ Security
We use assiduity-standard security measures including HTTPS encryption for all data transfers. Our waiters are configured to automatically purify temporary lines, icing your data does not persist beyond the processing window.
🔗 Third-Party Services
We use Cloudflare for security and performance optimization. Cloudflare may reuse certain specialized data (IP addresses, cybersurfer information) according to their own sequestration policy. We also use AI services for textbook birth, which process images transiently without long-term storehouse.
📝 Changes to This Policy
We may modernize this sequestration policy from time to time. Any changes will be reflected on this runner with an streamlined effective date.
📧 Communicate Us
If you have any questions about this sequestration policy or how we handle your data, please communicate us:
Last streamlined: November 2025