Trust Center
PRIVACY & DATA SOVEREIGNTY
How UserMint handles data in a deterministic, zero-trust processing environment.
Our privacy framework is built on the principle of absolute data ownership.
1. Deterministic Privacy Model
UserMint operates on a zero-knowledge architectural pattern. We prioritize the privacy
of your digital assets by ensuring that sensitive payloads never leave your perimeter.
- Zero-Knowledge Hashes: UserMint only ingests and logs SHA-256 strings. We never view, cache, or store the underlying data payloads.
- Restricted Data Use: No customer data is ever used for advertising, profiling, or training third-party AI models.
- Auditability: Administrative logs are immutable and non-repudiable, supporting strict privacy oversight and continuous monitoring.
2. Sovereign Infrastructure
Infrastructure is hosted on enterprise-grade Google Cloud environments, aligned with federal privacy and security controls.
- Isolated processing boundaries: All computations occur within hardened, containerized environments.
- Google Cloud CDPA: Formally governed by the Google Cloud Data Processing Addendum (CDPA).
- BYOB Governance: Our model ensures that your data remains in your sovereign storage vectors (GCS/S3).
Corporate Entity & Registration
UserMint Incorporated is a Wyoming C-Corp currently in the registration process within the System for Award Management (SAM.gov).
Privacy & Security Office
UserMint Incorporated
30 N Gould St Ste R
Sheridan, WY 82801
USA