Legal

Privacy
Policy.

How we process, protect, and minimize your data.

Last Updated: March 2026

QikChek (“we,” “us,” or “our”) is a privacy-first verification service built to minimize data collection and provide zero retention of personal identity data after verification is complete.

Our systems are designed so that identity data is used only when necessary, processed securely, and not retained beyond the verification process. This Privacy Policy explains how information is processed when you use a QikChek-powered verification flow.


We are operated in the United States and provides an end-to-end age verification solution for websites and online platforms that must comply with applicable legal and regulatory requirements.

We are integrated into third-party websites and applications to verify whether users meet required age thresholds before accessing certain content or services. We act solely as a verification service provider and does not operate or control the platforms that request verification. Our role is limited to processing verification requests and returning a result (such as pass/fail or a verification token) without returning any personal information.

We are designed to reduce friction for users while minimizing the amount of personal data shared between users and platforms.


a. Information Provided During Verification

During a verification session, We may process:

  • Government-issued identification (if required)
  • Selfie or facial image (if required)
  • Personal data contained within identification documents (e.g., date of birth)

This information is used solely to determine whether a user meets applicable verification requirements.

b. Technical and Session Data

We process limited technical data necessary to operate the service, including:

  • Timestamp of verification
  • Verification result (pass/fail)
  • Session or request identifiers
  • IP address (used for fraud prevention and abuse detection)
  • General location data derived from IP (e.g., country or region)

This data is not shared with the requesting platform and is used only for internal service operation, security, and billing.


We process information strictly for the following purposes:

  • To verify whether a user meets applicable age or identity requirements
  • To return a verification result (e.g., pass/fail or token) to the requesting platform
  • To maintain system integrity and prevent fraud or abuse
  • To generate limited operational and billing records

We do not use personal data for advertising, profiling, or resale.


We are designed using a data minimization and zero-retention model for personal identity data.

  • Personal identity data (such as ID images or facial images) is processed only for the duration necessary to complete verification.
  • We do not retain identity documents, facial images, or extracted personal identity data after a verification result is produced.
  • We do not store biometric templates or facial recognition profiles.

We retain only limited, non-identifying records, including:

  • Verification outcome (pass/fail)
  • Timestamp
  • Session-related identifiers
  • IP address for security and abuse prevention

These records are not used to build user profiles or track individuals across services.


We do not share personal identity information with the requesting platform.

When verification is completed, only:

  • A pass/fail result, and/or
  • A non-identifying verification token

is returned. No identifying information (such as name, ID number, or images) is transmitted to the requesting platform.


We implement appropriate technical and organizational measures to protect data during processing, including:

  • Encrypted data transmission
  • Access controls and system isolation
  • Secure, enterprise-grade infrastructure

Our architecture is designed to reduce risk by minimizing both the amount of data processed and the duration for which it exists.


We are not directed to individuals under the age of 13 and does not knowingly collect personal information from children. Our services are designed to prevent access by minors where required by law.


For users in applicable jurisdictions, We processes data in accordance with principles including:

  • Data minimization
  • Purpose limitation
  • Limited retention

Because we do not retain personal identity data after verification, there is typically no persistent personal data held that can be accessed, corrected, or deleted after the session has ended.


We may update this Privacy Policy from time to time to reflect changes in our services or legal requirements. Updates will be posted with a revised “Last Updated” date.