How we protect reporters

We keep your identity private unless you choose to share it. This page summarizes how privacy, anonymity, and retention work on the reporting portal.

What we collect and what we do not

  • Report details you provide such as descriptions, attachments, and optional contact info.
  • Optional follow-up contact if you choose to share your email or phone.
  • We do not require names or personal identifiers to submit a report.
  • No tracking cookies or analytics on reporting and follow-up pages.

How anonymity works

  • You can submit anonymously; leave contact fields blank to stay anonymous.
  • If you share contact details, they are only used for follow-up about your report.
  • Voice recordings can be anonymized to disguise your voice.
  • Internal audit logs are limited to authorized reviewers and administrators.

How voice and attachments are stored

Files are stored securely with access limited to authorized reviewers. Sensitive audio is queued for anonymization, and all downloads are signed to prevent public access.

Data retention and deletion

Reports and files are retained only as long as required by your organization policies. Deletion requests can be made through your administrator. When the ultra-private mode is enabled, IP and device details are suppressed on intake.

Questions?

Contact info@asylon.cc or support@asylon.cc.