Privacy Policy

How KeyShare collects, uses, and protects your personal information.

Effective Date: March 1, 2026  |  Last Updated: March 13, 2026

1. Overview

KeyShare, Inc. ("KeyShare," "we," "us," or "our") provides an identity verification and credential delivery platform used across hospitality, physical access control, visitor management, and government digital identity ecosystems.

This Privacy Policy describes how we collect, use, store, and protect personal information when you:

  • Visit our website (keyshare.id)
  • Interact with our hardware (the KeyShare Puck)
  • Use our software platforms (Guest Experience Platform, KeyShare Connect, Visitor Experience Platform, Digital ID Platform)
  • Communicate with us through any channel

By using our services, you acknowledge that you have read and understood this Privacy Policy. If you are a deploying organization (hotel, building, government), you are the data controller for personal data processed through our platform in your deployment; KeyShare acts as the data processor.

2. Information We Collect

2.1 Information You Provide
CategoryExamples
Contact informationName, email address, company name, phone number — when you submit a form or contact us
Account informationLogin credentials, role, organization — when you access a KeyShare platform
Communication contentMessages, inquiries, feedback you send us
2.2 Information Collected Automatically
CategoryExamples
Device & browser dataIP address, browser type, operating system, device identifiers
Usage dataPages visited, time spent, referral source, click patterns
Cookies & trackingSession cookies, analytics cookies (see Section 9)
2.3 Information Collected Through Our Platform
CategoryExamplesRetention
Identity verification dataDocument type, issuing authority, verification result, credential claims presentedPer deployment configuration
Biometric identifiersFace geometry for 1:1 matching (see Section 4)Zero retention — processed in RAM, immediately discarded
Access eventsDoor ID, credential match, grant/deny, timestampPer deploying organization's policy
Credential delivery dataCredential type, delivery method, recipient devicePer deployment configuration

3. How We Use Information

We process personal information for the following purposes:

Service Delivery

To operate our identity verification, credential delivery, and access control platforms on behalf of deploying organizations.

Communication

To respond to your inquiries, provide support, and send service-related communications.

Improvement

To improve our products, services, and user experience through aggregated analytics.

Security & Compliance

To protect our platform, prevent fraud, and comply with legal obligations.

4. Biometric Data

KeyShare's Puck hardware performs 1:1 face matching (document photo vs. live face) as part of the identity verification process. This section describes how biometric data is handled.

PropertyImplementation
Matching type1:1 only — document photo vs. live face. Not 1:N gallery matching. Not surveillance.
Processing locationOn-device (Puck CPU/RAM). No cloud processing. No server transmission. No transmission to deploying organization.
RetentionZero. Face data processed in RAM for the duration of the match (under one second), then immediately discarded. Never written to disk.
Liveness detectionPrevents spoofing via printed photos, screens, or masks. Built for ISO 30107-3 compliance.
ConsentJurisdiction-aware: BIPA written release (Illinois), GDPR Article 9 explicit consent (EU), CUBI informed consent (Texas), HB 1493 notice and consent (Washington), HB 1202 consent (Maryland). Consent obtained before any face data is captured.
Opt-outUsers who decline biometric consent check in via document-only verification. No features withheld.
Sale / sharingNever. Biometric data is never sold, shared, leased, or traded.

Compliance position: We obtain consent before capture. Face data is processed in memory and immediately discarded. There is no retention period because there is no storage. This exceeds the requirements of BIPA, GDPR Article 9, Texas CUBI, Washington HB 1493, and Maryland HB 1202.

5. Data Sharing & Disclosure

We do not sell personal information. We share personal information only in the following circumstances:

RecipientPurposeData Shared
Deploying organizationsService delivery as contractedVerification results, access events, credential delivery confirmations — as configured by the deploying organization
Service providersInfrastructure and operationsCloud hosting (AWS), analytics, email delivery — under data processing agreements
Legal authoritiesLegal obligationWhen required by law, subpoena, court order, or to protect rights and safety
Corporate transactionsMerger, acquisition, restructuringSubject to the same privacy commitments described in this policy

6. Data Retention

Data CategoryRetention Period
Biometric face dataZero retention — processed in RAM and immediately discarded
Identity verification resultsConfigurable per deployment — typically 30–90 days
Access event logsConfigurable per deploying organization's policy
Website analytics26 months (aggregated and anonymized)
Contact submissionsDuration of business relationship + 2 years
Account dataDuration of account + 30 days post-deletion

For government deployments, retention periods are determined by the deploying government's data governance policies.

7. Data Security

We implement technical and organizational measures to protect personal information:

  • Encryption in transit: TLS 1.3 for all data in transit. Mutual TLS (mTLS) between internal services.
  • Encryption at rest: AES-256 for all data at rest.
  • Key management: HSM-based key management (PKCS#11) for cryptographic operations. Keys never exist outside the secure element unencrypted.
  • Access control: Role-based access control (RBAC) with multi-factor authentication for all administrative access.
  • Monitoring: Comprehensive audit logging with SIEM integration. Tamper-resistant, append-only logs.
  • Penetration testing: Regular third-party penetration testing. Reports available under NDA.

For our full technical security architecture, see our Security & Trust Center.

8. Your Rights

Depending on your jurisdiction, you may have some or all of the following rights:

Right to Access

Request a copy of the personal information we hold about you.

Right to Rectification

Request correction of inaccurate or incomplete personal information.

Right to Erasure

Request deletion of your personal information, subject to legal retention obligations.

Right to Portability

Receive your personal information in a structured, machine-readable format.

Right to Object

Object to processing of your personal information for specific purposes.

Right to Opt Out

Opt out of the sale or sharing of personal information. Note: KeyShare does not sell personal information.

To exercise any of these rights, contact . We will respond within 30 days (or as required by applicable law).

9. Cookies & Tracking Technologies

TypePurposeDuration
Essential cookiesRequired for site functionality (session management, security tokens)Session
Analytics cookiesHelp us understand how visitors use our website (page views, navigation patterns)Up to 26 months
Preference cookiesRemember your settings and choicesUp to 12 months

You can manage cookie preferences through your browser settings. Disabling essential cookies may affect site functionality.

10. International Data Transfers

KeyShare is headquartered in the United States. Data residency is configurable per deployment:

DeploymentData Location
Website (keyshare.id)United States (AWS)
Hotel deployments (GEP)Configurable: US, EU, or regional
Building access (Connect)Configurable: US, EU, UK
Visitor management (VEP)Configurable: US, EU, UK, other on request. Biometric data never leaves device.
Government (DPI)Sovereign in-country deployment. No cross-border transfer without explicit configuration.

Where personal information is transferred internationally, we rely on Standard Contractual Clauses (SCCs) or other lawful transfer mechanisms as required under GDPR and applicable law.

11. Children's Privacy

Our services are not directed to children under the age of 16. We do not knowingly collect personal information from children under 16. If you believe we have inadvertently collected such information, please contact us at and we will promptly delete it.

12. Changes to This Policy

We may update this Privacy Policy from time to time. Material changes will be posted on this page with an updated "Last Updated" date. If changes are significant, we will provide additional notice through our platform or by email. Your continued use of our services after changes take effect constitutes acceptance of the updated policy.

13. Contact Us

For privacy-related questions, data subject requests, or to exercise your rights under applicable law:

Privacy inquiries:
Security concerns:
Mailing address: KeyShare, Inc., Attn: Privacy, United States