Privacy Policy

Effective date: October 19, 2025

Operated by: Loop Technologies, Inc. ("Loop", "we", "our")

Jurisdiction: State of Wyoming, USA

1. Overview

  • You control your data. Credentials and attestations are stored under your private key on-chain. We never hold private keys or raw credential data.
  • We facilitate, not control. id.cantonloop.com helps issue, verify, and route credentials — users decide what to share.
  • Minimal data collection. We collect only what's needed for operations, security, and compliance.
  • Privacy-first. Loop is structured under Wyoming law to preserve digital sovereignty and individual data rights.

2. Who we are

Loop Technologies, Inc.
A Wyoming corporation operating id.cantonloop.com and related services.
Contact: privacy@cantonloop.com | legal@cantonloop.com
Mailing Address: Loop Technologies, Inc., 1309 Coffeen Avenue STE 18197, Sheridan, Wyoming 82801 USA

3. Scope

This Policy covers all products, APIs, and interfaces under id.cantonloop.com.
It does not apply to third-party verifiers or institutions once you authorize data sharing with them.

4. Key definitions

  • Credential: Any verified claim, attestation, or proof issued by a third party.
  • Verifier: An entity that requests credential verification.
  • On-chain storage: Credential data or references recorded under your key on the Canton blockchain.
  • Private key: Your cryptographic key controlling credential access and signing authority.

5. What we collect

A. You provide — registration details (email, display name), verification inputs, and audit logs (approvals/rejections).
B. Automatically collected — IP, device info, timestamps, and transaction metadata (never credential contents).
C. Third-party data — attestations or validation results from issuers/verifiers you interact with.

We never store raw credential content unless you explicitly upload it to our optional encrypted storage.

6. Storage and control

  • Credentials are stored on-chain under your key.
  • Optional off-chain storage is encrypted client-side — Loop cannot decrypt it.
  • Data sharing occurs only after your explicit consent.

7. How we use your data

  • Operate verification and consent management.
  • Secure infrastructure and prevent abuse.
  • Perform anonymized analytics to improve the system.
  • Meet applicable legal or regulatory obligations.

8. Data sharing

Loop does not sell user data.
We may share data only:

  • With issuers/verifiers you authorize.
  • With service providers under NDA (hosting, analytics, legal).
  • With authorities if legally required under Wyoming or U.S. law (we'll notify you when possible).

We may share aggregate, non-identifiable metrics.

9. Your rights

  • Access/export: Retrieve your stored data and credentials.
  • Delete: Remove off-chain data (on-chain entries can be revoked but not deleted).
  • Opt-out: Decline optional communications.

10. Security

Loop uses industry-standard encryption, network isolation, and monitoring.
You are responsible for securing your private keys and devices — lost keys cannot be recovered.

11. Children

Not directed to users under 13, or under the applicable age of digital consent in your jurisdiction.

12. International transfers

Data may be processed globally under contractual and technical safeguards.

13. Updates

Material changes will be announced in-app or via email. Continued use after the effective date means acceptance.

14. Contact

Privacy inquiries: privacy@cantonloop.com
Legal inquiries: legal@cantonloop.com
Mail: Loop Technologies, Inc., 1309 Coffeen Avenue STE 18197, Sheridan, Wyoming 82801 USA