Asylon

Privacy & Anonymity

We protect reporters by default. Your identity stays private unless you choose to share it. Below is a plain-language summary of what we collect, how anonymity works, and how long we retain data.

What we collect — and what we don’t

  • Report details you provide (description, attachments, optional contact info).
  • Optional follow-up contact if you choose to share your email/phone.
  • We do not require names, sign-ins, or personal identifiers to submit.
  • No tracking cookies or analytics on the reporting and follow-up pages.

How anonymity works

  • You can submit entirely anonymous reports—leave contact fields blank to stay anonymous.
  • If you share contact info, it’s only used for follow-up about your report.
  • Voice recordings can be automatically anonymized to disguise your voice.
  • Internal audit logs are limited to authorized reviewers and administrators.

How voice and attachments are stored

Files are stored securely with access limited to authorized reviewers. Sensitive audio is queued for anonymization, and all downloads are signed to prevent public access.

Data retention & deletion

Reports and files are retained only as long as required by your organization’s policies. Deletion requests can be made through your administrator. When the “ultra-private” mode is enabled, IP and device details are suppressed on intake.

Questions?

Contact info@asylon.cc or support@asylon.cc.