1. The short version
iCallU is built so that most sensitive data does not exist on our servers. When communication content is end-to-end encrypted and not stored, there is usually nothing meaningful to hand over. We comply with valid legal process, but our responses are limited by what our architecture and retention practices create.
2. What we cannot provide
iCallU generally cannot provide the following because we do not store it:
- Call recordings
- Message content
- Decryption keys
- Conversation history or transcripts
- Long-term call logs (who called whom, when, or for how long)
3. What we may be able to provide
If it exists at the time of request, we may be able to provide limited, account-level information such as:
- Basic account identifiers and status
- Subscription state (if applicable)
- Minimal security or abuse-related technical records, if any are temporarily retained
Note: iCallU deletes inactive accounts after 90 days, further limiting retained data. See the Logging policy for definitions and retention details.
4. Why iCallU is subpoena-resistant by design
- E2EE: encryption keys are controlled by participants, not iCallU.online
- Ephemerality: sessions are designed to end cleanly without retained content
- Data minimization: we avoid creating data that could later be demanded
5. Handling legal requests
iCallU will review valid legal requests and respond as required by applicable law. However, our responses are limited by our architecture and retention practices. For security assumptions and threat boundaries, see the Security Hub.
6. User controls
- Users can delete their account at any time
- Passwords are not recoverable - even for paid accounts
- Unused plan minutes do not roll over on upgrade (use them before upgrading)
This page is informational and does not constitute legal advice. For broader data-handling commitments, see the Privacy Policy.