Privacy Protocol
Your data is a sovereign asset. Our protocols ensure zero-harvesting architecture and encrypted delivery.
Zero Data Harvesting
We do not scrape, archive, or harvest the internal content of your website. Our protocol is strictly limited to metadata discovery and bot-triggering.
Data Isolation
Your target URLs are stored in an encrypted vault accessible only by our Python-indexing core. Once a crawl is confirmed, data is purged from active states.
1. Operational Transparency
Apex Indexer functions as an **Intelligence Proxy**. When you submit a URL, we do not visit your website to "read" its contents. Instead, we send high-level cryptographic "pings" to search engine crawler nodes (Googlebot, Bingbot, etc.), requesting *them* to visit your public URL.
Every request initiated by our infrastructure follows standard web protocols. We act as a signal booster; the actual indexing and data processing are performed by the search engines themselves, outside of our infrastructure.
2. Scope of Access
We only require access to public URLs. We do not require, nor will we ever request, access to your:
- Internal Databases or Server File Systems
- CMS Admin Credentials (WordPress, Shopify, etc.)
- Client PII (Personally Identifiable Information)
- Proprietary Source Code not visible to search engines
Disclaimer: Access to deeper systems is only requested during custom advanced consultations managed under separate, rigorous NDAs.
Legal Liability & Indemnification
Third-Party Actions
We hold no liability for how third-party search engines (Google, Bing, etc.) choose to index, rank, or de-list your content. Their algorithms are external and independent of our bot-triggering protocols.
Content Responsibility
You agree to indemnify Apex Indexer against any legal claims arising from the content found on the URLs you submit. We do not endorse the content of any website processed through our grid.
3. Zero-Log Performance
To maintain maximum cryptographic security, our logs are cycled every 72 hours. While we maintain a record of your credit usage for accounting, the specific URL paths submitted are archived and then permanently purged from our active processing memory.
4. Cryptographic Payment Privacy
We utilize decentralized payment protocols (BTC, ETH, USDT) to ensure your financial footprint remains private. We do not store credit card data, bank details, or KYC information unless required by specific Tier-1 jurisdictional regulations.
5. Right to Erasure (Account Deletion)
In compliance with GDPR and global privacy standards, users maintain absolute sovereignty over their data. You may request permanent account deletion at any time through your dashboard or by contacting our support node.
Upon confirmation, Apex Indexer will:
- Permanently purge your email and authentication credentials.
- Wipe all URL submission history from secondary archival storage.
- Invalidate any remaining credit balances (non-refundable).
Note: Some transaction metadata may be retained for the minimum period required by financial regulatory frameworks.
Last Protocol Update: January 26, 2026
Apex Indexer reserves the right to modify these privacy protocols to adapt to emerging search engine discoverability standards and global legal frameworks.