Access controls
- Public search reveals limited details only.
- QR access is scoped to emergency friendly data.
- Private records require explicit sharing.
Security protocol
Security is designed around least access, verified identity, and clear visibility controls so critical information is revealed only when required.
Verified identifiers and trusted contacts are used to reduce false access. Security events are monitored to protect accounts.
We monitor platform activity and review suspicious events. If you believe an issue exists, report it and we will investigate.
If you need more detail on the security protocol, contact support.
Create account