LeakTrace Inc. collects and processes personal information to provide identity exposure monitoring and protection services. This policy describes what we collect, how we use it, and your rights under Canadian and US privacy law.
Effective date: March 2026 · Applies to all LeakTrace services
We collect personal information at various stages of your interaction with LeakTrace. The following describes what we gather and how.
LeakTrace monitors a range of data points, beginning with anchor points (full name, email address, phone number) cross-referenced with compromised credential databases and criminal-targeting sources. Depending on breach findings, we may identify additional data points including:
The availability of these data points depends on breach findings and is not guaranteed. See our Pricing page for the full monitored data list.
We use your personal information to provide and improve our services. Specifically:
LeakTrace uses proprietary analysis tools to enhance our services. These tools process data starting with three consent-based identifiers — full name, email address, phone number — to cross-reference with compromised credential databases and criminal-targeting sources, potentially identifying additional data points (e.g., credit card numbers, Social Security Numbers) if present in breaches.
To protect your privacy, all data is anonymised and stripped of personal identifiers before processing. All data — both anchor points and potential findings — is encrypted using AES-256 for data at rest and TLS 1.3 for data in transit, in alignment with our Security Standards.
While we utilise automated tools for initial detection, all critical security reports and breach severity assessments undergo manual review by human security analysts before a client is notified.
LeakTrace conducts security notifications in compliance with CASL (Canada) and TCPA/CAN-SPAM (US):
We limit sharing and disclose information only as follows:
You have full control over your data. You may request deletion of your information at any time by contacting [email protected]. We will permanently remove your data at your request, except where legally required to retain it.
LeakTrace practises data minimisation. We only retain the specific anchor points necessary to monitor for threats. We do not build permanent profiles on users who have not enrolled in our active monitoring service. Unused or non-consented data is purged from our temporary cache every 30 days.
We use industry-standard measures to protect your personal information:
By interacting with LeakTrace, users acknowledge:
Our services are not directed to children under the age of 13, and we do not knowingly collect personal information from children under 13. If we learn that we have collected personal information from a child under 13, we will take steps to delete such information promptly. If you believe we have collected information from a child under 13, please contact us at [email protected].
If you are a California resident, you have rights under the California Consumer Privacy Act (CCPA) as amended by the California Privacy Rights Act (CPRA):
We do not sell personal information as defined under the CCPA/CPRA. To exercise your rights, contact us at [email protected].
If you are a Canadian resident, you have rights under the Personal Information Protection and Electronic Documents Act (PIPEDA):
To exercise your rights, contact us at [email protected].
We use cookies and tracking technologies to enhance your experience, manage sessions, and analyse usage — for example, tracking link clicks from outreach emails or website interactions post-signup.
You may disable cookies through your browser settings. Disabling session cookies may affect platform functionality. Disabling analytics cookies does not affect your use of the platform.
We do not use cookies for advertising or share cookie data with advertising networks.
For credibility and audit purposes, we provide verifiable evidence (e.g., anonymised text extracts or logs from the Compliance Audit Trail) post-consent and post-payment. Specific sources are withheld to protect proprietary methods. If requested, we share anonymised examples without visual reproduction of original breach material.
For privacy enquiries, reach us at: