EmailVeritas Logo EmailVeritas Logo

Produkte

URL-Prüfer

Scannen Sie Phishing oder verdächtige URLs in Echtzeit ab und erfassen Sie sie

Datei-Prüfer

Analysieren Sie hochgeladene Dateien, um potenzielle Bedrohungen sofort zu erkennen

Phish Guard API-Zugang

Automatisieren Sie das Link- und Dateiscannen über unsere sichere API

Integrationen

ChatGPT – URL-Prüfer

Scannen Sie URLs mit einem einfachen Befehl innerhalb von ChatGPT

Outlook-Add-in

Scannen Sie Links in Ihren E -Mails, ohne Outlook zu verlassen

Google Workspace

Überprüfen Sie die Links in Google Mail und Dokument mit unserem Arbeitsbereich Add-On

Mobile App

Verwenden Sie unsere Schutzwerkzeuge direkt auf Ihrem Smartphone

WhatsApp – URL-Prüfer

Überprüfen Sie verdächtige Links direkt aus WhatsApp -Chats

Copilot – URL-Prüfer

Scan URLs with a simple command inside Microsoft Copilot

Hilfezentrum

API-Dokumentation

Alles, was Sie brauchen, um unsere API zu implementieren

FAQs

Schnelle Antworten auf gemeinsame Fragen

Installationsanleitungen

Schritt-für-Schritt-Setup-Anweisungen für alle Tools

Loslegen

Global Privacy Policy of
Email Veritas Security Technologies Ltd.

Effective Date: January 3, 2020  ·  Last Revised: October 9, 2025

1. Welcome

This Privacy Policy explains how Email Veritas Security Technologies Ltd. ("Email Veritas," "we," "us," or "our") collects, uses, and protects information when you use our cybersecurity products — including the Phishing Detector, URL Checker, and File Scanner, as well as their extensions for Google Workspace and Microsoft Outlook.

We may update this Policy periodically to reflect legal, regulatory, or technological changes. Updates will be published on this page, and we encourage users to review it regularly.

Email Veritas complies with Google's Limited Use Requirements for Gmail API data and with Microsoft Graph API data handling guidelines.


2. Information We Collect

2.1 Phishing Detector

  • Analyzes incoming and outgoing email metadata to identify potential phishing or scam patterns.
  • Requires only your name and email address for registration.
  • Processes messages to extract lexical, syntactic, and structural attributes needed for detection.
  • The actual content of emails is not stored and is immediately discarded after automated analysis.

2.2 URL Checker

  • Enables users to inspect URLs for phishing, malware, and unsafe domains.
  • When a URL is analyzed, its content (such as HTML source, redirects, SSL data, and domain reputation) is retrieved for classification and securely stored to improve detection accuracy and maintain transparency.
  • No personal or unrelated data from these pages is collected.

2.2.1 Google Workspace Extension

  • Operates in read-only mode to extract URLs for user inspection.
  • Does not modify, store, or share email data.

2.2.2 Microsoft Outlook Extension

  • Uses Microsoft Graph API permissions for secure authentication and URL extraction.
  • Does not store or alter the email body or attachments.

2.3 File Scanner

  • Analyzes uploaded files to detect malware or malicious patterns.
  • The uploaded file is processed in real time and permanently discarded after scanning.
  • Only the technical result and metadata (file hash, MIME type, detection status, and timestamp) are retained.

We do not collect sensitive personal data revealing racial or ethnic origin, political opinions, religious beliefs, health information, or sexual orientation.


3. Information We Store

3.1 Phishing Detector

  • Retains user names, email addresses, and encrypted sender/recipient metadata needed for service operation.
  • All data is encrypted in transit and at rest.

3.2 URL Checker

  • Stores the submitted URL, its associated content (HTML snapshot, redirect chain, SSL certificate data, domain reputation), and the resulting classification (legitimate, suspicious, phishing, or malicious).
  • This data supports result verification, accuracy tracking, and threat intelligence correlation.
  • No personal identifiers of the submitting user are stored.

3.3 File Scanner

  • Discards all uploaded file content after scanning.
  • Retains only scan results (hash, status, and technical metadata) for auditing and reliability purposes.

4. How We Use the Information

4.1 Phishing Detector

  • Classifies messages automatically as legitimate or phishing without human review.
  • Results are used solely to protect users and enhance detection algorithms.

4.2 URL Checker

  • Performs real-time link analysis through our AI-powered API to classify URLs as safe, suspicious, or malicious.
  • Stores the analyzed page content and risk indicators to support transparency, reproducibility, and continuous learning of detection logic.

4.3 File Scanner

  • Evaluates uploaded files to identify threats or malicious behavior patterns.
  • Keeps only non-personal technical data for reporting and statistical monitoring.

4.4 Use of Data for AI and ML Models

  • Data obtained via Google Workspace APIs and Microsoft Graph APIs is never used to train general-purpose AI or machine learning models.
  • All processing is performed in real time and limited to security analysis within the scope of each product.

5. Information Sharing

Email Veritas does not sell, rent, or disclose user data to third parties. Information is processed within our secured infrastructure and may be shared only:

  • when required by law or valid legal process,
  • to enforce our terms and protect our rights, or
  • to safeguard system integrity and the public interest.

6. Security

We implement administrative, technical, and physical safeguards — including encryption, restricted access, monitoring, and regular security reviews — to protect data from unauthorized access, alteration, or destruction. Nevertheless, no system is entirely immune to Internet-based risks.


7. Data Retention and Deletion

7.1 Retention Period

  • Files: discarded immediately after scanning; only non-personal metadata and results are stored.
  • URLs: retained with their associated content and classification results to maintain detection accuracy, audit trails, and threat intelligence.
  • Data from Google Workspace and Microsoft Graph APIs is not cached or reused beyond what is necessary for active scanning.

We comply with Google's Limited Use Requirements, Microsoft data handling policies, and international standards under GDPR and LGPD. For detailed information, refer to our Data Protection Policy.

7.2 User-Initiated Deletion

Users may request deletion of their personal data at any time. Upon verification, all data linked to the user will be permanently erased unless legal obligations require retention.

7.3 Access and Correction

Users may request access to or correction of personal data through our support channels.

7.4 Data Portability

Users may request a copy of their personal data in a structured, machine-readable format when applicable.


8. Changes to This Policy

We may revise this Privacy Policy periodically. Updates will appear on this page, and significant changes may be communicated by email or within the app.


9. Contact Us

For questions or requests related to this Privacy Policy, please contact:

  • Email: info@emailveritas.com
  • Mail: 4217 Kincaid Street, Victoria, BC V8X 4K7, Canada
  • Company: Email Veritas Security Technologies Ltd.

Legal

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
e.Veritas

© 2026 e.Veritas. Alle Rechte vorbehalten.

Download on the App Store Get it on Google Play

Produkte

URL-PrüferDatei-PrüferPhish Guard API-Zugang

Integrationen

  • ChatGPT – URL-Prüfer
  • Outlook-Add-in
  • Google Workspace
  • Mobile App
  • WhatsApp – URL-Prüfer
  • Copilot – URL-Prüfer

Kostenlose Tools

  • URL-Prüfer
  • Datei-Prüfer

Ressourcen

Hilfezentrum

  • API-Dokumentation
  • FAQs
  • Installationsanleitungen

Unternehmen

Über uns

  • Unternehmensübersicht
  • Presse & Medien

Kontakt

  • Kontakt & Support

English Português Español Français Deutsch Italiano
Nutzungsbedingungen Datenschutzrichtlinie Datenschutz Cookie-Richtlinie