ISecure Privacy Policy

LookMeUp Logo

ISecure is a security guard mobile application that allows guards to perform patrol duties, scan checkpoint QR codes, and report security incidents. This privacy policy explains how we handle your data when you use our app.

The privacy policy for ISecure app is simple: no personal data shared with us will be given to any third party, under any circumstances. Your data will also never be used by us for any purpose without specific permission.

The app engages in no ad targeting, data mining, or other activities that may compromise your privacy, and we do not affiliate ourselves with any third parties that do so.

1. Information We Process

Authentication Data: User credentials, two-factor authentication codes, and secure session tokens

Guard Profile Information: Name, phone number, employee ID, assigned locations, and profile photos

Location Data: GPS coordinates during checkpoint scans and patrol route verification

Checkpoint Activities: QR code scans, visit timestamps, and patrol completion status

Incident Documentation: Photos and descriptions of security incidents reported during patrols

Device Information: Device type and push notification tokens for operational alerts

2. How We Use Your Information

Security Operations: To manage guard schedules, track patrol activities, and verify checkpoint visits

Location Verification: To ensure guards are present at designated checkpoints during scheduled patrols

Incident Management: To document and track security incidents with photos and detailed reports

Real-time Monitoring: To provide live updates on guard activities and checkpoint status

Operational Alerts: To send checkpoint reminders, emergency notifications, and schedule updates

3. Location Data Processing

Checkpoint Verification Functionality

  • Guards scan QR codes at designated checkpoints during scheduled patrols
  • GPS location is captured temporarily to verify presence at correct checkpoint
  • Location data is processed in real-time for operational verification only
  • No location tracking occurs outside of scheduled work hours or patrol activities

Location Data Flow Process

  1. Guard arrives at checkpoint and scans QR code
  2. GPS coordinates captured to verify correct location
  3. Distance validation ensures guard is within checkpoint radius
  4. Checkpoint completion recorded with timestamp
  5. Location data used solely for verification and operational reporting

Key Point: ISecure uses GPS location data exclusively for checkpoint verification during scheduled security patrols. Location tracking is only active during work hours and patrol activities. We do not track personal movements, off-duty activities, or use location data for any purpose beyond operational security verification and compliance reporting.

4. Data Sharing

No Third-Party Sharing: We do not share your personal data, location information, or security patrol data with any third parties under any circumstances.

Operational Purpose Only: Your data is processed solely for security operations and guard management functionality.

No Commercial Use: No advertising, analytics, or commercial use of guard data occurs beyond operational requirements.

5. Data Retention and Security

Operational Data

  • Checkpoint records: Retained for compliance and operational reporting purposes
  • Incident photos: Stored securely for security documentation and follow-up
  • Location data: Retained only for patrol verification and audit requirements
  • Authentication tokens: Automatically expired and refreshed for security

Local Device Data

  • Schedule cache: Stored locally for offline functionality and deleted when updated
  • User preferences: Stored locally until you uninstall the app

6. Data Security

Encryption: All data transmission uses HTTPS encryption and secure authentication protocols

Secure Storage: Server processing occurs in secure, encrypted environments with access controls

Authentication Security: Two-factor authentication and JWT token management protect user accounts

Data Access Controls: Role-based access ensures only authorized personnel can view guard data

7. Your Rights

Data Control: You control what incident photos you capture and what information you report

Profile Management: You can update your profile information and preferences within the app

Access Rights: You can request access to your personal data stored in our systems

Data Deletion: You can request deletion of your personal data when your employment ends

8. Contact Information

For privacy questions or data requests, contact us at: [email protected]

Last updated: 5/20/2026