[ < RETURN TO SECURE TERMINAL ]

Privacy Protocol

Last Updated: May 2026

1. The "Zero-Access" Architecture

Shadow IT Guard utilizes external forensic analysis and public-facing APIs. We do not require, store, or request administrative credentials for your domain.

2. Data Handling

All forensic audits are conducted using publicly accessible node endpoints and third-party validation tools (e.g., Google PageSpeed Insights). We do not install tracking scripts on your server to generate our diagnostic reports.

3. Email Telemetry

Email addresses provided for payload decryption are secured and used exclusively for the delivery of technical documentation and critical infrastructure updates regarding your domain.