⚠️ DEMO ENVIRONMENT — All data shown is simulated. Not affiliated with any municipality.

Last Updated: March 7, 2026

1. Information We Collect

Enforcement Code collects:

2. How We Use Data

3. Data Security

Enforcement Code implements industry-standard security measures including: encryption of data in transit (TLS 1.3) and at rest (AES-256), role-based access controls (RBAC), regular security audits, and compliance with CJIS Security Policy where applicable. All data is stored in enterprise-grade data centers within the United States.

4. Data Sharing

We do not sell, trade, or transfer personal data to third parties. Data may be shared only with: the client government agency for enforcement operations, service providers under strict confidentiality agreements, and legal authorities when required by law.

5. Data Processing

Photos and case information may be processed by classification technology for violation classification and notice generation. Processing occurs on secure infrastructure. No customer data is used to train general-purpose classification models. All system-generated content is subject to human review.

6. Data Retention

Case data is retained per the government agency's record retention requirements (typically 3-7 years). Resident data associated with anonymous reports is deleted after case closure. Data may be deleted or exported at the request of the agency administrator.

7. Your Rights

8. Compliance

Enforcement Code complies with: Texas Identity Theft Enforcement and Protection Act, Texas Privacy Protection Act, Section 508 of the Rehabilitation Act, ADA Title II for government services, and applicable CJIS requirements.

Privacy Officer: Fernando@TailoredLending.com