Law Enforcement Request Guide

This Guide explains how police, government agencies, and investigative authorities may request user information from Vexor, operated by Nexa Group. Vexor cooperates with lawful investigations while protecting user privacy, due process, and global human-rights standards.

1. Introduction

Vexor follows strict internal and legal procedures before disclosing any user data. We only provide information when requests are lawful, properly scoped, and compliant with privacy and human-rights frameworks such as GDPR, the Norwegian Personal Data Act, and applicable international treaties.

Vexor does not provide backdoor access, mass surveillance capabilities, or unrestricted data feeds to any government or third party.

2. Types of Requests We Accept

Vexor accepts the following legally valid requests:

  • Subpoenas – basic subscriber information (where legally allowed)
  • Court Orders – metadata, logs, or non-content data
  • Search Warrants – required for access to content data
  • Emergency Disclosure Requests – imminent threat to life or safety
  • Preservation Requests – hold user data for 90 days
  • MLAT Requests – Mutual Legal Assistance Treaties

Requests must be accurate, narrowly tailored, and relevant to an active lawful investigation.

3. Information Vexor May Provide

3.1 Basic Subscriber Information
  • Username and display name
  • Email address or phone number
  • Account creation date
  • Approximate signup IP address
3.2 Metadata & Non-Content Data
  • Login timestamps
  • IP login history
  • Device identifiers
  • Follower or following lists
  • Public interactions (likes, comments, shares)
3.3 Content Data (Requires Search Warrant)
  • Uploaded videos and images
  • Messages or chat logs (if stored)
  • Server-synced drafts
  • Deleted content still preserved in backup retention windows

Vexor does not collect microphone recordings, continuous location history, or unsynced local drafts.

4. Information We Cannot Provide

  • Data we do not store
  • Encrypted data we technically cannot decrypt
  • Speculative conclusions or behavioral predictions
  • Real-time monitoring or wiretap access
  • Account access without legal authority

5. Emergency Disclosure Requests

In cases of imminent danger (self-harm, threats of violence, abductions, terrorism), Vexor may disclose limited data without standard legal process if:

  • The threat is credible and immediate
  • The request is from a verified officer
  • The data requested is strictly necessary to prevent harm

Emergency Contact (24/7): emergency@vexor.to

6. Preservation Requests

Vexor may preserve account data for 90 days (extendable once) to allow time for formal legal process. Requests must clearly identify:

  • The accounts involved
  • Exact data categories requested
  • The active investigation and legal authority

7. How Requests Must Be Submitted

All law enforcement requests must include:

  • Officer's name, title, badge/ID number
  • Official agency email and phone
  • Case number and legal authority
  • Specific data requested
  • Scope, relevance, and justification

Official Submission Email: legalrequests@vexor.to
Secure Portal (if available): https://vexor.to/law-enforcement

8. International Requests

Non-EU and non-Norwegian agencies must use proper treaty channels:

  • MLAT mechanisms
  • Letters Rogatory
  • Requests via EU/Norwegian authorities
  • Emergency exceptions only for immediate threats

Vexor cannot act on foreign requests lacking lawful international authority.

9. User Notification

When legally permitted, Vexor notifies affected users before disclosing data. Exceptions include:

  • Court-ordered confidentiality
  • Ongoing investigations
  • Risk to life, child safety, or public safety
  • Interference with legal processes

10. Data Retention Limits

Vexor retains data only as long as necessary for operations, investigations, or compliance. Some deleted content may remain temporarily in backups but cannot always be restored.

11. Child Safety & Mandatory Reporting

Vexor strictly complies with mandatory reporting laws. All suspected CSAM or child exploitation:

  • Is removed immediately
  • Is reported to authorities
  • Is preserved securely as evidence

12. Cost Reimbursement

In certain jurisdictions, Vexor may charge administrative costs for complex searches, engineering time, or large-volume evidentiary compilations.

13. Verification of Law Enforcement Identity

  • Agency email validation
  • Badge or ID verification
  • Court document authenticity review
  • Cross-checking jurisdictional authority

Fraudulent law enforcement requests will be reported to authorities.

14. Transparency Reports

Vexor publishes periodic transparency reports including:

  • Total number of legal data requests
  • Breakdown by request type
  • Fulfillment and rejection rates
  • Emergency disclosures

15. Contact Information

Law Enforcement Compliance: legalrequests@vexor.to
Emergency Threats: emergency@vexor.to
General Legal Inquiries: legal@vexor.to

16. Updates to This Guide

Vexor may update this Guide as laws change or operational processes evolve. Updated versions will be published with revised timestamps.

?האם התשובה שקיבלתם הייתה מועילה 0 משתמשים שמצאו מאמר זה מועיל (0 הצבעות)