Law Enforcement Request Guide
This Guide explains how police, government agencies, and investigative authorities may request user information from Vexor, operated by Nexa Group. Vexor cooperates with lawful investigations while protecting user privacy, due process, and global human-rights standards.
1. Introduction
Vexor follows strict internal and legal procedures before disclosing any user data. We only provide information when requests are lawful, properly scoped, and compliant with privacy and human-rights frameworks such as GDPR, the Norwegian Personal Data Act, and applicable international treaties.
Vexor does not provide backdoor access, mass surveillance capabilities, or unrestricted data feeds to any government or third party.
2. Types of Requests We Accept
Vexor accepts the following legally valid requests:
- Subpoenas – basic subscriber information (where legally allowed)
- Court Orders – metadata, logs, or non-content data
- Search Warrants – required for access to content data
- Emergency Disclosure Requests – imminent threat to life or safety
- Preservation Requests – hold user data for 90 days
- MLAT Requests – Mutual Legal Assistance Treaties
Requests must be accurate, narrowly tailored, and relevant to an active lawful investigation.
3. Information Vexor May Provide
3.1 Basic Subscriber Information
- Username and display name
- Email address or phone number
- Account creation date
- Approximate signup IP address
3.2 Metadata & Non-Content Data
- Login timestamps
- IP login history
- Device identifiers
- Follower or following lists
- Public interactions (likes, comments, shares)
3.3 Content Data (Requires Search Warrant)
- Uploaded videos and images
- Messages or chat logs (if stored)
- Server-synced drafts
- Deleted content still preserved in backup retention windows
Vexor does not collect microphone recordings, continuous location history, or unsynced local drafts.
4. Information We Cannot Provide
- Data we do not store
- Encrypted data we technically cannot decrypt
- Speculative conclusions or behavioral predictions
- Real-time monitoring or wiretap access
- Account access without legal authority
5. Emergency Disclosure Requests
In cases of imminent danger (self-harm, threats of violence, abductions, terrorism), Vexor may disclose limited data without standard legal process if:
- The threat is credible and immediate
- The request is from a verified officer
- The data requested is strictly necessary to prevent harm
Emergency Contact (24/7): emergency@vexor.to
6. Preservation Requests
Vexor may preserve account data for 90 days (extendable once) to allow time for formal legal process. Requests must clearly identify:
- The accounts involved
- Exact data categories requested
- The active investigation and legal authority
7. How Requests Must Be Submitted
All law enforcement requests must include:
- Officer's name, title, badge/ID number
- Official agency email and phone
- Case number and legal authority
- Specific data requested
- Scope, relevance, and justification
Official Submission Email: legalrequests@vexor.to
Secure Portal (if available): https://vexor.to/law-enforcement
8. International Requests
Non-EU and non-Norwegian agencies must use proper treaty channels:
- MLAT mechanisms
- Letters Rogatory
- Requests via EU/Norwegian authorities
- Emergency exceptions only for immediate threats
Vexor cannot act on foreign requests lacking lawful international authority.
9. User Notification
When legally permitted, Vexor notifies affected users before disclosing data. Exceptions include:
- Court-ordered confidentiality
- Ongoing investigations
- Risk to life, child safety, or public safety
- Interference with legal processes
10. Data Retention Limits
Vexor retains data only as long as necessary for operations, investigations, or compliance. Some deleted content may remain temporarily in backups but cannot always be restored.
11. Child Safety & Mandatory Reporting
Vexor strictly complies with mandatory reporting laws. All suspected CSAM or child exploitation:
- Is removed immediately
- Is reported to authorities
- Is preserved securely as evidence
12. Cost Reimbursement
In certain jurisdictions, Vexor may charge administrative costs for complex searches, engineering time, or large-volume evidentiary compilations.
13. Verification of Law Enforcement Identity
- Agency email validation
- Badge or ID verification
- Court document authenticity review
- Cross-checking jurisdictional authority
Fraudulent law enforcement requests will be reported to authorities.
14. Transparency Reports
Vexor publishes periodic transparency reports including:
- Total number of legal data requests
- Breakdown by request type
- Fulfillment and rejection rates
- Emergency disclosures
15. Contact Information
Law Enforcement Compliance: legalrequests@vexor.to
Emergency Threats: emergency@vexor.to
General Legal Inquiries: legal@vexor.to
16. Updates to This Guide
Vexor may update this Guide as laws change or operational processes evolve. Updated versions will be published with revised timestamps.