Trust & Safety

EchoVault is built around a simple standard: family stories should be handled with consent, clear access, and no surprises. This page explains how we think about privacy, security, and boundaries today, and what is still in progress.

What we optimize for

Consent first

The person being recorded should always understand what is happening, what is being captured, and what they can skip. We design the experience to avoid pressure and surprise.

Private by default

Family stories are not content. Our goal is a private space where access is intentionally granted, not something that leaks into feeds, search results, or public demos.

Clarity over fine print

We aim to explain what happens to recordings, transcripts, and Echo data in plain language. If you want the technical detail, we'll share it directly.

Access and sharing

EchoVault is designed around invited access. You decide who can listen, who can read transcripts, and who can interact with the Echo. The goal is a controlled family space, not a public profile.

What we won't do

No ads, no engagement tricks

We're not building a social network around your family's memories. The experience should feel calm and respectful, not optimized for clicks.

No misleading framing

EchoVault is about preserving stories in their own words, not pretending someone is still here. We keep boundaries explicit and avoid mystical or misleading claims.

No surprise use

If we ever introduce new features that change what is stored or how it is used, we will explain it plainly. Families should not need a lawyer to understand the basics.

Security and infrastructure

We are designing around standard safeguards including encryption in transit, encryption at rest, and least-privilege access. If you have specific requirements, such as retention windows, export formats, or where data is hosted, email us and we'll tell you what is live today and what is still in progress.

Retention and deletion

Families should stay in control. Our goal is to provide clear options for pausing access, revoking invitations, exporting materials, and deleting recordings and derived data when requested. If you're evaluating EchoVault for a real project, we'll walk through what that means today.