WRPD Privacy Policy
Effective Date: November 20, 2025
Last Updated: November 20, 2025
Version: 1.1
Table of Contents
Click a section to jump directly to it.
- 1. Introduction
- 2. Information We Collect
- 3. How We Use This Information
- 4. How We Protect Your Data
- 5. Who Has Access to Data
- 6. Data Sharing and Third Parties
- 7. Parental Rights and Controls
- 8. Children’s Privacy (COPPA)
- 9. Mobile Device Management (MDM)
- 10. Data Retention
- 11. Your Rights
- 12. International Data Transfers
- 13. California Privacy Rights (CCPA/CPRA)
- 14. Security Breach Notification
- 15. Third-Party Services and Links
- 16. Changes to This Policy
- 17. Children’s Online Privacy Protection
- 18. Biometric Data
- 19. Marketing and Communications
- 20. Data Accuracy
- 21. Law Enforcement and Legal Requests
- 22. Contact Information
- 23. Dispute Resolution
- 24. Miscellaneous
- 25. Acknowledgment and Consent
1. Introduction
WRPD (“we,” “our,” or “us”) provides parental control and child safety monitoring services through our mobile application and associated services (including Mobile Device Management (MDM) and monitoring extensions).
This Privacy Policy explains how we collect, use, protect, and share information when parents use our service to monitor their children’s devices for safety purposes.
By using WRPD, you agree to the collection and use of information in accordance with this policy. If you do not agree with this policy, please do not use our service.
WRPD is intended only for parents and legal guardians to monitor devices they own or are responsible for (such as a child’s device), and not for covert monitoring of another adult.
2. Information We Collect
When a parent installs WRPD on their child’s device with proper parental consent, we collect the following types of information, subject to device/OS permissions and platform limitations:
2.1 Communication Content
Where technically permitted and enabled by the parent, we may collect:
- Text messages (SMS/MMS)
- Instant messages from social media and messaging applications
- Voice messages and audio content, where technically supported (for example, when transcribed for safety analysis)
- Email communications
- Social media posts, comments, and direct messages
- On-screen text and content captured via screenshots or screen recording extensions, which may include content from any app currently visible on the screen
2.2 App Usage Data
- Applications installed and accessed on the device
- Time spent in each application
- Frequency of app usage
- Timestamps of app opens and closes
- In-app activity where accessible via OS/MDM permissions
2.3 Web Browsing Data
- Websites visited
- Search queries entered
- Browsing history and timestamps
- Bookmarks and saved pages (where accessible)
2.4 Contact Information
- We may collect limited contact information (such as names and phone numbers) if and when we introduce features that rely on contact lists for safety (for example, to flag unknown or high-risk contacts). Any such features will be clearly disclosed in-app.
2.5 Device Information
- Device type, model, and manufacturer
- Operating system and version
- Device identifiers (such as device ID, push token, advertising ID where available)
- IP address and network information
- Device settings and configurations relevant to monitoring
- Battery status and storage capacity (for diagnostics)
2.6 Location Data
When location monitoring is enabled by the parent and permitted by the OS, we may collect:
- GPS coordinates
- Location history and timestamps
- Frequently visited locations
- Wi-Fi network information and approximate location based on network data
2.7 Behavioral Metadata
We collect metadata that describes how the device and apps are used, including:
- Typing patterns and stylometric data
- Communication frequency patterns
- Response time patterns
- Interaction sequences across platforms
- Behavioral fingerprints used for threat detection
In some jurisdictions, this type of behavioral data may be considered a form of “behavioral biometric data.” We treat it as sensitive and use it solely for safety-related purposes and device/user identification within the WRPD ecosystem, not for authentication, advertising, or unrelated profiling.
2.8 Media Content
We may collect media content only when it is part of monitored activity, visible on the device screen, or accessible through permissions granted by the parent. This can include:
- Images and photos sent, received, or displayed inside monitored apps (for example, messaging, social media, or email) where our monitoring tools have access
- Videos sent, received, or viewed in monitored apps, or visible on-screen during monitoring
- Screenshots and/or screen recordings captured by WRPD’s monitoring extensions are locally processed and only the text is sent to to our servers for automated analysis (e.g., OCR and safety classification)
- Files and documents downloaded or opened in monitored apps or browsers where the operating system and permissions allow our service to access them for safety scanning
WRPD does not continuously index or copy the device’s entire photo library, video library, or file system by default. Media is processed in connection with monitored activity for child safety purposes, consistent with parental configuration and platform limits.
2.9 Account Information
- Parent account email and password (stored using strong one-way hashing)
- Child’s name and age (as provided by parent)
- Parent contact information
- Subscription and billing information (processed by third-party payment processors; we do not store full payment card numbers)
2.10 Log and Diagnostic Data
- App and server logs (timestamps, device identifiers, IP address)
- Error reports and crash diagnostics
- API usage and performance metrics
- Security logs (e.g., login attempts, access logs, alert delivery status)
This information is used for security, troubleshooting, abuse prevention, and service improvement.
3. How We Use This Information
WRPD uses collected data exclusively for child safety, parental monitoring, and operation of the service:
3.1 Threat Detection and Prevention
- Analyzing communication patterns using AI models trained on verified harmful and predatory behaviors
- Identifying potential grooming, exploitation, cyberbullying, self-harm, hate speech, or other harmful content
- Detecting suspicious contact patterns or behavioral changes
- Flagging potentially dangerous situations for parental review
- Cross-platform behavioral fingerprinting to identify threats across multiple channels and apps
- Reducing false positives and false negatives through continual model refinement
3.2 Parental Monitoring and Alerts
- Providing parents access to their child’s monitored activity via the parent dashboard
- Sending alerts when potential threats are detected
- Creating activity reports and summaries for parental review
- Enabling parents to set monitoring preferences, alert thresholds, and sensitivity levels
3.3 Service Operation and Improvement
- Operating, maintaining, and securing our servers and infrastructure
- Improving threat detection algorithms using anonymized and/or aggregated data wherever possible
- Enhancing user interface and user experience
- Debugging issues and ensuring reliability and performance
- Conducting internal research on child safety threats and patterns
We do not share raw monitored content with third-party AI providers for training their models. Any model training or tuning is done using our own infrastructure or under strict contractual safeguards that limit data use to WRPD’s safety purposes.
3.4 Legal Compliance and Safety
- Cooperating with law enforcement investigations when legally required
- Responding to valid legal requests and court orders
- Preventing imminent harm to children
- Complying with mandatory child safety reporting obligations
3.5 Communication
- Sending service updates and security alerts
- Providing customer support
- Responding to parent inquiries
- Notifying about policy or terms changes
4. How We Protect Your Data
WRPD implements technical and organizational security measures to protect collected data.
4.1 Encryption
- Data transmitted between devices and our servers is encrypted using modern TLS (such as TLS 1.2+ / TLS 1.3)
- Stored data is encrypted at rest using industry-standard encryption (such as AES-256)
- Encrypted database backups for disaster recovery
- Encryption keys stored and managed securely
4.2 Access Controls
- Authentication required for all parent accounts; multi-factor authentication (MFA) strongly encouraged and may be required
- Role-based access control for internal systems
- Strict employee access limitations with detailed audit logging
- Regular access reviews and permission audits
- Principle of least privilege for all data access
4.3 Infrastructure Security
- Data hosted on reputable cloud infrastructure providers that maintain industry certifications (e.g., ISO 27001, SOC 2) at the platform level
- Network-level protections, firewalls, and monitoring
- Security patches and updates applied regularly
- Segregated production environments
- From time to time, third-party security testing or assessments may be performed
4.4 Operational Security
- Background checks for employees with access to sensitive data where permitted by law
- Mandatory security and privacy training for staff
- Confidentiality agreements for employees and contractors
- Documented incident response plan and procedures
- Data loss prevention practices where feasible
4.5 Data Minimization
- Collection limited to data necessary for safety monitoring and service operation
- Automated deletion of data beyond retention periods (see Section 10)
- Regular data audits to ensure minimal and appropriate collection
- Privacy-by-design approach to new features
4.6 Application Security
- Secure coding practices and peer code reviews
- Regular vulnerability scanning
- Security testing before major feature releases
- Coordinated vulnerability disclosure process; a public bug bounty program may be launched as the service matures
5. Who Has Access to Data
Access to collected data is strictly limited to what is needed to operate the service and protect children.
5.1 Parent/Guardian Account Holders
- Full access to monitored data from devices under their account
- Ability to view real-time (or near real-time) activity and historical data
- Access to alerts, threat notifications, and summaries
- Control over monitoring settings and preferences
5.2 Automated AI Systems
- Machine learning models analyze data for threat patterns and risk indicators
- Automated pattern recognition and behavioral analysis
- No human review unless data is surfaced as potentially concerning
- Models are continuously updated to improve accuracy and reduce noise
5.3 WRPD Safety and Security Team
- Limited access only when AI or systems flag potential serious threats, abuse, or anomalies
- Human review conducted by trained safety specialists under strict protocols
- All access is logged and audited
- Access limited to minimum necessary personnel and scope
5.4 Technical Support Staff
- Access only when necessary to resolve technical or account-related issues
- Where possible, support uses metadata and technical information rather than full content
- All access is logged and monitored
- Staff bound by confidentiality agreements
5.5 Law Enforcement
- Access only when legally required by valid court order, warrant, subpoena, or similar legal process
- In emergencies involving imminent risk of serious harm to a child, we may disclose limited information without prior legal process, consistent with applicable law
- All requests reviewed by legal counsel before disclosure where feasible
- Parents notified of law enforcement requests except where legally prohibited
5.6 Third-Party Service Providers
- Cloud infrastructure providers (data hosting and compute)
- Payment processors (billing information only; we do not see full payment details)
- Customer support or email delivery platforms (limited account/contact data)
- Analytics strictly limited to service operation, not behavioral advertising
All providers are bound by contractual confidentiality and data protection obligations and may only process data as instructed by WRPD.
6. Data Sharing and Third Parties
6.1 What We DO NOT Do
We do not:
- Sell your data to anyone
- Share data with advertisers or ad networks for targeted advertising
- Share monitored content with social media platforms or data brokers
- Use child data for advertising or marketing
- License or rent your data
- Share monitored content for unrelated analytics or commercial purposes
6.2 When We May Share Data
We may share data only in these strictly limited circumstances:
Legal Requirements:
- To comply with valid legal processes (subpoenas, court orders, search warrants)
- To respond to lawful government or regulatory requests
- To protect our legal rights and enforce our terms of service
- To comply with mandatory child safety reporting laws
Emergency Situations:
- To prevent imminent physical harm to a child
- To report suspected child abuse or exploitation
- To assist in missing child investigations
- When immediate action is necessary to protect safety
Service Providers:
- Cloud infrastructure providers who host or process data for us
- Payment processors who handle billing
- Customer support platforms that help us manage support requests
These providers are contractually required to maintain confidentiality and security, and may only use data to provide services to WRPD.
Business Transfers:
- In the event of a merger, acquisition, reorganization, or sale of assets involving WRPD, user data may be transferred as part of the transaction
- We will provide notice and, where appropriate, options to delete data before transfer, subject to legal and operational constraints
- Any acquiring entity must commit to privacy protections at least as protective as those in this Policy (or seek fresh consent)
With Your Consent:
- We may share data when you explicitly authorize us to do so
- You may withdraw consent at any time, but this will not affect prior lawful processing
7. Parental Rights and Controls
Parents have comprehensive control over WRPD monitoring:
7.1 Access Rights
- View collected data through the parent dashboard
- Download copies of monitored data (where technically feasible)
- Review threat alerts and AI analysis results
- Access activity reports and summaries
7.2 Control Rights
- Modify monitoring settings and sensitivity levels
- Enable or disable specific monitoring features (subject to core safety constraints)
- Adjust alert preferences and thresholds
- Add or remove monitored devices
- Pause monitoring temporarily
7.3 Deletion Rights
- Request deletion of all collected data associated with your account at any time (subject to legal retention obligations)
- Delete specific data items from the dashboard where provided
- Automatic deletion of monitoring data when the account is closed
- Confirm deletion completion within applicable timeframes
7.4 Consent Withdrawal
- Uninstall WRPD from the child’s device at any time
- Cancel service subscription
- Remove MDM supervision and configuration profiles from the device
- Upon termination, WRPD will cease further data collection from that device
7.5 Export Rights
- Download collected data in machine-readable format where feasible
- Export activity reports and alert history
- Obtain copies of your account information
7.6 How to Exercise Rights
Contact us at [email protected] or through your parent dashboard. We will respond within 30 days, or a longer period if allowed by law for complex requests.
8. Children’s Privacy (COPPA Compliance)
WRPD is a parental control tool used under parental consent and is designed to comply with COPPA and similar child privacy laws.
8.1 Parental Consent
- Parents must create an account and provide verifiable consent before monitoring begins
- The consent process may include email verification, payment method verification, or other methods
- Parents explicitly authorize collection of child’s data for safety purposes
- Consent can be withdrawn at any time by uninstalling WRPD or removing supervision
8.2 Information from Children
We collect information from devices used by children, including children under 13, only under parental direction and consent. Information is used exclusively for child safety monitoring and service operation. No information is collected for targeted marketing or unrelated commercial purposes.
8.3 Parental Review and Control
- Parents can review all information collected from their child’s device
- Parents can request deletion of the child’s information
- Parents can refuse further collection by removing the app and/or MDM profile
- Parents can control what categories of information are collected, where technically possible
8.4 No Direct Child Interaction
- Children do not create accounts or provide information directly to WRPD
- All account management is handled by the parent or legal guardian
- No marketing or communications are directed at children
- Children cannot modify or disable monitoring without parental credentials
8.5 Parental Requests
Parents may exercise rights regarding their child’s data by contacting [email protected]. We respond within 30 days, or as required by law.
9. Mobile Device Management (MDM)
WRPD utilizes supervised MDM technology (where supported by the platform, such as iOS/macOS) to provide comprehensive child safety monitoring.
9.1 MDM Capabilities
Depending on platform and configuration, our MDM implementation enables:
Communication Monitoring:
- Monitoring of communications visible on the device or captured by permitted monitoring extensions
- Monitoring of SMS, MMS, and internet-based messaging platforms where accessible
- Access to social media communications and posts visible on screen
- Email monitoring across accounts where technically supported
App Activity Tracking:
- Monitoring which applications are installed and used
- Tracking time spent in each application
- Recording app open and close events
- Monitoring certain app-related settings or restrictions (e.g., blocked apps, age ratings)
Content Analysis:
- Scanning communications for predatory patterns and concerning behavior
- Image and video content analysis for inappropriate or explicit material
- URL and website content monitoring
- Monitoring of downloaded files where accessible
Web Browsing Monitoring:
- Browsing history across supported browsers
- Search query monitoring
- Website content analysis where technically feasible
Device Control (Parent-Configured):
- Ability to restrict or block specific applications
- Content filtering capabilities (e.g., by category or rating)
- Screen time management and scheduling
- Location tracking and geofencing where permitted by OS
WRPD does not use MDM to secretly monitor employees, partners, or other adults, and does not provide “stealth” or undetectable monitoring.
9.2 Why MDM Is Required
- Monitor communications across multiple apps and channels, not just a limited set of integrations
- Detect cross-platform predatory behavior patterns and risk indicators
- Identify threats that span multiple communication channels
- Provide deeper protection as harmful actors shift between platforms
- Enable behavioral fingerprinting across different apps and contexts, within legal and technical limits
9.3 MDM Installation and Removal
Installation:
- Requires physical access to the child’s device
- Parent must explicitly authorize installation of MDM profiles and certificates
- Device may require the parent’s passcode or authentication
- The device clearly displays that it is supervised/managed
Removal:
- Parents can remove MDM supervision at any time using device settings, WRPD tools (where available), or both
- Removal requires appropriate authentication
- The device immediately returns to an unsupervised state
- WRPD immediately ceases data collection from the device once supervision is removed
9.4 Transparency
- MDM supervision is visible to the device user
- Devices display notices such as “This iPhone is supervised and managed”
- Monitoring cannot be made invisible or completely hidden from the device user
- Parents are encouraged to have age-appropriate conversations with their child about monitoring and safety
10. Data Retention
10.1 Active Monitoring Data
While monitoring is active (retention periods may vary by data type and jurisdiction):
- Communication content: retained for up to 60 days
- App usage data: retained for up to 90 days
- Location history: retained for up to 30 days
- Behavioral metadata: retained for up to 180 days
- Flagged or high-risk content may be retained longer as described below
These periods may be adjusted over time to balance safety, privacy, and storage considerations. Any material changes will be reflected in an updated Policy.
10.2 Flagged Content
- Flagged communications are retained until the parent reviews, dismisses, or resolves them
- Verified threats may be retained for up to 1 year after resolution for safety, audit, and legal purposes
- Content involved in law enforcement investigations is retained as legally required
- Parents can request deletion after a threat is resolved, subject to legal constraints
10.3 Account Information
- Account details retained while the account is active
- Billing and transaction records retained for up to 7 years (or as otherwise required by tax and accounting laws)
- Support communications retained for approximately 3 years, or longer where needed for dispute resolution
10.4 Upon Account Termination
- Monitored data deleted within approximately 30 days, subject to legal holds
- Account information deleted or anonymized within approximately 90 days
- Backups containing your data are overwritten or purged within approximately 120 days
- Data involved in legal matters or law enforcement requests is retained only as long as legally required
10.5 Legal Retention
- Required by valid legal hold, court order, or regulatory requirement
- Necessary for pending or reasonably anticipated litigation
- Required by law enforcement investigations
- Mandated by child safety reporting laws
10.6 Automated Deletion
- Automated systems track data age and delete data once retention periods expire
- Deletion events are logged for audit purposes
- Parents can request confirmation that specific data has been deleted
11. Your Rights
Depending on your location and applicable law (e.g., GDPR, CCPA), you may have specific privacy rights.
11.1 Right to Access
- Request confirmation of whether we process your personal data
- Obtain a copy of your personal data, subject to security and legal limitations
- Learn how we use and share your information
11.2 Right to Correction
- Request correction of inaccurate data
- Update incomplete information
- Modify account details via the parent dashboard
11.3 Right to Deletion
- Request deletion of your personal data (“right to be forgotten”)
- Legal or safety obligations may require limited retention of some information
- Deletion will be confirmed within applicable timeframes
11.4 Right to Data Portability
- Receive your data in a structured, commonly used, machine-readable format where technically feasible
- Request that we transmit data to another controller where legally required and technically feasible
11.5 Right to Restrict Processing
- Request that we limit processing of your data in certain circumstances
- Pause certain monitoring features (where technically possible without undermining core safety features)
11.6 Right to Opt-Out
- Opt out of certain types of non-essential data processing (where available)
- Unsubscribe from any marketing communications (if we introduce them)
- Withdraw consent at any time, without affecting prior lawful processing
11.7 Right to Non-Discrimination
- We will not discriminate against you for exercising privacy rights
- You will not be denied the service solely for exercising rights, except where certain data is strictly necessary for core safety functions
11.8 How to Exercise Rights
To exercise any rights, email [email protected] and include your account email and a clear description of your request. We may ask for additional information to verify your identity. We will respond within 30 days, or as otherwise permitted by law (up to 45 days for complex requests).
11.9 Right to Complain
If you believe we have violated your privacy rights, you may:
- Contact us first at [email protected]
- File a complaint with your local data protection authority
- US users may contact the Federal Trade Commission (FTC); EU/UK users may contact their supervisory authority
12. International Data Transfers
12.1 Data Location
Data is primarily stored on cloud servers located in the United States. Redundant backups or failover systems may use other geographic regions.
12.2 Cross-Border Transfers
If you are located outside the United States, your data may be transferred to, stored in, and processed in the US and other countries. These countries may have different data protection laws than your country. We take steps to ensure appropriate safeguards, such as contractual protections.
12.3 EU/UK Users
For users in the EEA or UK, data transfers to the US or other non-EEA countries are made under appropriate safeguards (e.g., Standard Contractual Clauses), where required. You retain all rights under GDPR/UK GDPR as described in Section 11. You may contact us at [email protected] for more information.
13. California Privacy Rights (CCPA/CPRA)
13.1 Right to Know
California residents may request information about:
- Categories of personal information collected, used, or disclosed
- Sources of personal information
- Business or commercial purposes for collection
- Categories of third parties with whom data is shared
13.2 Right to Delete
You may request deletion of personal information, subject to exemptions (e.g., security, legal obligations, child safety).
13.3 Right to Opt-Out of Sale/Sharing
We do not sell personal information as defined by CCPA/CPRA. We do not share personal information for cross-context behavioral advertising.
13.4 Right to Non-Discrimination
We will not discriminate against you for exercising your CCPA/CPRA rights.
13.5 Authorized Agent
You may designate an authorized agent to make CCPA requests on your behalf. The agent must provide proof of authorization, and we may require you to verify your identity directly.
13.6 CCPA Requests
California residents may exercise their rights by emailing [email protected]. We will verify your identity before processing requests.
14. Security Breach Notification
14.1 Our Commitment
In the event of a data breach involving personal information:
- We will investigate promptly
- We will notify affected users without undue delay and in accordance with applicable law
- Notification will include the nature of the breach, data affected, and mitigation steps
- We will notify regulators where legally required
14.2 What We Will Tell You
Breach notifications will typically include:
- What happened and when
- What information may have been involved
- Steps we are taking to address and mitigate the breach
- Steps you can take to help protect yourself
- How to contact us with questions
14.3 Our Response
- We will contain and remediate the incident
- We may engage external security and forensic experts
- We will notify law enforcement if appropriate
- We will improve controls to prevent similar incidents
- We will provide affected users with information and support
15. Third-Party Services and Links
15.1 Third-Party Platforms
WRPD monitors communications on third-party platforms (e.g., social media, messaging apps) through device-level access and screen/OCR capture, where permitted, but:
- We do not control how those platforms collect or use data
- Those platforms have their own privacy policies you should review
- We collect only data available via the device, OS, and permissions granted
15.2 Links to Other Sites
Our website or app may contain links to third-party websites or resources:
- We are not responsible for the privacy practices of those sites
- We recommend reviewing their privacy policies before providing information
- Links do not imply endorsement of those sites or practices
15.3 Payment Processing
Payments are processed through a third-party payment processor. We do not store full credit or debit card numbers. The payment processor is responsible for PCI DSS compliance. You should review the payment processor’s privacy policy for details.
16. Changes to This Policy
16.1 Updates
We may update this Privacy Policy periodically to:
- Reflect changes in our services or practices
- Comply with legal and regulatory requirements
- Improve clarity and transparency
- Introduce new features or capabilities
16.2 Notification of Changes
For material changes, we may:
- Email account holders
- Display in-app notifications
- Post a prominent notice on our website
- Provide a reasonable notice period before changes take effect where required
For non-material changes, we will update the “Last Updated” date. Continued use of WRPD after changes constitutes acceptance of the updated Policy.
16.3 Review History
Previous versions of this Policy are available upon request at [email protected].
16.4 Your Options
If you disagree with any material changes, you may stop using WRPD and uninstall monitoring components, request deletion of your data, or contact us to discuss your concerns.
17. Children’s Online Privacy Protection
17.1 No Direct Collection from Children
Children do not sign up directly with WRPD. All data collection is initiated and controlled by parents or legal guardians. We do not knowingly collect information directly from children via our website or apps.
17.2 Parental Control
- Parents control monitoring settings
- Parents may access, modify, or delete child data at any time (subject to legal obligations)
- Children cannot disable or circumvent monitoring without parental credentials
17.3 Limited Use
- Child data is used only for safety monitoring, service operation, and security
- No targeted advertising or marketing to children
- No sale or profiling of children for unrelated commercial purposes
17.4 Age Verification
During signup, parents are required to confirm they are the legal guardian with authority to consent. If we learn that data was collected from a child without parental consent, we will delete it as soon as reasonably possible.
18. Biometric Data
18.1 Behavioral and Incidental Biometric Data
We do not use facial recognition, fingerprint matching, or voiceprint recognition systems. Photos and videos may incidentally contain facial images, which we store and process as regular media content for safety analysis, not for biometric identification. We collect behavioral metadata such as typing patterns and stylometric data for safety and identity consistency; in some jurisdictions this may be considered “behavioral biometric” data.
18.2 No Biometric Authentication
- We do not provide biometric authentication services
- We do not maintain dedicated biometric identity databases
- We do not sell or share biometric data
18.3 State Law Compliance
Where laws like Illinois BIPA or similar state laws apply, we will obtain any additional required consent and follow statutory requirements for retention and destruction. If we ever introduce features that rely more directly on biometric identifiers, we will update this Policy and seek explicit, informed consent.
19. Marketing and Communications
19.1 Service Communications
We send transactional emails (e.g., account creation, password resets, alerts, billing notices). These communications are necessary for service operation and security. You cannot opt out of essential service communications.
19.2 Marketing Communications
We do not currently send marketing emails or newsletters. If we introduce marketing communications in the future, we will obtain your opt-in consent where required and provide an easy unsubscribe mechanism in each message.
19.3 No Third-Party Marketing
We do not share your contact information with third parties for their own marketing. You will not receive third-party marketing messages because of WRPD.
20. Data Accuracy
20.1 Our Efforts
We strive to maintain accurate and up-to-date information. AI models may generate false positives or false negatives; we provide tools for parental review and override. We refine models using feedback and aggregated data to improve accuracy.
20.2 Your Responsibility
- Keep account information (such as email and contact details) current and accurate
- Review monitored data and alerts regularly
- Report inaccuracies or issues to [email protected] or via support
20.3 Corrections
We will correct inaccurate data when notified, where feasible. You may update most account information directly through the dashboard.
21. Law Enforcement and Legal Requests
21.1 Our Policy
We cooperate with valid and properly scoped legal requests. All requests are reviewed by legal or appropriate internal personnel. We seek to narrow overbroad or improper requests where possible.
21.2 Emergency Requests
In emergencies involving imminent risk to a child or others, we may disclose limited data without formal legal process if permitted by law. Such disclosures are documented and reviewed after the fact.
21.3 Transparency
Where allowed by law, we will notify the parent/account holder of law enforcement requests that involve their data or their child’s data. We provide the minimum information reasonably necessary to comply.
21.4 Government Requests
We do not provide bulk or “backdoor” access to any government. We do not participate in mass surveillance programs. Each request is evaluated individually on its legal merits and scope.
22. Contact Information
22.1 Privacy Questions
For privacy-related questions, concerns, or requests:
Email: [email protected]
Typical Response Time: Within 48 hours for inquiries; up to 30 days for formal rights requests.
22.2 General Support
For technical support or account questions:
Email: [email protected]
Typical Response Time: Within 24–48 hours.
22.3 Legal and Law Enforcement
For law enforcement or legal requests:
Email: [email protected]
Additional secure contact methods may be provided upon request.
22.4 Data Protection Officer
Where required (e.g., for GDPR), a Data Protection Officer (or equivalent contact) may be reached at:
Email: [email protected]
22.5 Mailing Address
WRPD
Street Address: 251 Little Falls Dr
City: Wilmington
State: DE
Zip: 19808
USA
Legal Structure: Corporation
22.6 Phone
+1 (650) 480-0288
Hours: 09:00-17:00 ET
23. Dispute Resolution
23.1 Informal Resolution
Contact [email protected] first with any concerns or complaints. We will work in good faith to investigate and resolve issues, usually within 30 days.
23.2 Formal Complaints
If informal resolution fails, you may submit a formal written complaint. We will provide a written response within a reasonable time.
23.3 Regulatory Complaints
You may file a complaint with your local data protection authority or consumer protection agency at any time. EU/UK users may contact their supervisory authority; US users may contact the FTC or state attorney general.
23.4 Arbitration and Terms
Certain disputes may be governed by arbitration or venue provisions in our Terms of Service. Nothing in this Policy limits rights you may have under applicable law.
24. Miscellaneous
24.1 Entire Agreement
This Privacy Policy and our Terms of Service together govern how we handle personal information in connection with WRPD. They supersede prior versions of this Privacy Policy.
24.2 Severability
If any provision of this Policy is found invalid or unenforceable, the remaining provisions remain in full force. Where possible, invalid provisions will be modified to reflect the original intent.
24.3 No Waiver
Failure to enforce any provision does not constitute a waiver of that provision or any other provision. We may enforce our rights at any time.
24.4 Language
This Policy is written in English. Translations may be provided for convenience; in case of conflict, the English version controls.
24.5 Assignment
You may not assign your rights or obligations under this Policy without our prior written consent. We may assign our rights and obligations in connection with a merger, acquisition, reorganization, or sale of assets, consistent with Section 6.2.
25. Acknowledgment and Consent
By using WRPD, you acknowledge that:
- You have read and understood this Privacy Policy
- You consent to the collection, use, and sharing of information as described
- You are the parent or legal guardian of the child(ren) whose device(s) you monitor, or otherwise have lawful authority to install WRPD on the device
- You understand the monitoring capabilities and limitations of WRPD and MDM supervision
- You understand that you can withdraw consent, uninstall WRPD, remove supervision, and request deletion of data at any time, subject to legal obligations
WRPD
Effective Date: November 20, 2025
Version: 1.1