Trust Center

PRIVACY & DATA SOVEREIGNTY

How UserMint handles data in a deterministic, zero-trust processing environment. Our privacy framework is built on the principle of absolute data ownership.

1. Deterministic Privacy Model

UserMint operates on a zero-knowledge architectural pattern. We prioritize the privacy of your digital assets by ensuring that sensitive payloads never leave your perimeter.

  • Zero-Knowledge Hashes: UserMint only ingests and logs SHA-256 strings. We never view, cache, or store the underlying data payloads.
  • Restricted Data Use: No customer data is ever used for advertising, profiling, or training third-party AI models.
  • Auditability: Administrative logs are immutable and non-repudiable, supporting strict privacy oversight and continuous monitoring.

2. Sovereign Infrastructure

Infrastructure is hosted on enterprise-grade Google Cloud environments, aligned with federal privacy and security controls.

  • Isolated processing boundaries: All computations occur within hardened, containerized environments.
  • Google Cloud CDPA: Formally governed by the Google Cloud Data Processing Addendum (CDPA).
  • BYOB Governance: Our model ensures that your data remains in your sovereign storage vectors (GCS/S3).

Corporate Entity & Registration

UserMint Incorporated is a Wyoming C-Corp currently in the registration process within the System for Award Management (SAM.gov).

Privacy & Security Office UserMint Incorporated 30 N Gould St Ste R Sheridan, WY 82801 USA
privacy@usermintnetwork.com