Legal
This policy explains what SeetYah processes to run agentic storage workflows, protect shared files and review links, and operate the public API and dashboard.
Last updated March 5, 2026
SeetYah processes account information such as email address, authentication identifiers, billing-related account metadata, API key metadata, and the files, filenames, review records, and comments you choose to upload or create through the product.
The service also processes operational data such as IP address, user agent, request timestamps, audit events, rate-limit counters, and basic diagnostics needed to secure the platform, prevent abuse, and keep uploads and downloads functioning correctly.
We use information to provide the storage service, issue signed URLs, authenticate users and API clients, enforce access controls, support human review workflows, measure usage, prevent abuse, troubleshoot failures, and improve product reliability.
We may also use account and usage information to comply with legal obligations, investigate suspected violations of the terms, and protect the service, its operators, and other users.
Files and related metadata are shared only as needed to operate the service and the workflows you trigger. That can include infrastructure providers, authentication providers, billing providers, and service processors used for storage, delivery, logging, and fraud prevention.
If you create a share link, review link, signed URL, or other externally accessible artifact, the people or systems that receive that link may access the associated file or review data according to the permissions of that artifact.
Authenticated account uploads are intended to remain private to the owning account unless you explicitly publish or share them through a review or other product feature. Anonymous uploads are designed for short-lived public access and should not be used for sensitive data unless you fully understand that access model.
No internet-facing share mechanism should be treated as a substitute for regulated data handling requirements. If you need tighter controls, use private account storage and authenticated access flows rather than bearer-style links.
We keep data for as long as needed to provide the service, honor the retention model of the relevant workflow, enforce security controls, resolve disputes, and meet legal obligations. Some logs and abuse-prevention records may persist longer than end-user file content.
Deleting a file, review, or account may not immediately remove all related backups, logs, or processor-side replicas, but those remnants are retained only for operational, security, or legal reasons and are eventually purged under normal lifecycle controls.
SeetYah uses technical and organizational measures intended to protect stored files and account data, including authentication controls, signed URL workflows, scoped private access for account files, and abuse prevention mechanisms such as rate limiting.
No system can guarantee perfect security. You remain responsible for protecting your credentials, limiting who receives share links, and deciding what content is appropriate to upload.
You can control much of the data you expose by choosing whether to upload anonymously, use authenticated storage, create review links, or delete files and credentials when they are no longer needed. Depending on your jurisdiction, you may also have rights relating to access, correction, deletion, or objection.
If you need to exercise a privacy-related request, use the support or contact path made available for the service and include enough detail for the request to be evaluated and authenticated.
This policy may change as the product evolves or as legal and infrastructure requirements change. When material changes are made, the updated policy will be posted here with a revised effective date.