Security & Compliance

Data Control, Privacy, and Government-Ready Deployment

ThruTracker is designed for scientific, conservation, and regulatory workflows that require strict control over data, software behavior, and system access.

Overview

ThruTracker is designed for scientific, conservation, and regulatory workflows that require strict control over data, software behavior, and system access. The software prioritizes local execution, user control, and minimal external dependencies.

Download PDF Version ↓

Data Storage and Processing

ThruTracker is a locally installed desktop application.

All data processed by ThruTracker—including:

  • Video files
  • Extracted detections
  • Tracking results
  • Derived analytics and metadata

remain on the user's local machine or user-managed storage.

ThruTracker does not store user data on external servers.

Network Communication

ThruTracker does not transmit user data outside of the local system.

  • No cloud uploads
  • No telemetry or analytics collection
  • No third-party data sharing

Optional network communication may occur only for:

  • License validation
  • Software update checks

These processes do not include user data, video files, or analysis results.

Data Residency

Because all data remain on the user's local system, data residency is determined entirely by the location of the user's computer or storage environment.

ThruTracker does not relocate, mirror, or back up data to external or international servers.

Artificial Intelligence and Machine Learning

The base version of ThruTracker does not include artificial intelligence, machine learning, or neural network–based algorithms.

Optional, separately licensed add-on modules may include machine learning–based functionality.

Such modules are:

  • Not installed by default
  • Not enabled unless explicitly licensed
  • Fully local in execution (no cloud inference)

User Data Ownership

Users retain full ownership and control of all data processed using ThruTracker.

ThruTracker Analytics does not claim ownership of user data or analysis outputs.

Users are responsible for managing data retention, backup, and access policies consistent with their institutional requirements.

Software Updates

Updates are provided periodically to address bugs, performance improvements, and feature enhancements.

Updates are user-initiated and not automatically installed without user action.

No user data is transmitted during the update process.

Licensing and Access Control

ThruTracker uses license keys to enable software access.

Licensing does not grant ThruTracker Analytics access to user data or systems.

License validation does not transmit user content or analysis information.

Intended Use Environment

ThruTracker is suitable for deployment on:

  • State agency computers
  • Federal agency computers
  • University and research institution systems
  • Offline or restricted-network environments

The software does not require administrative privileges beyond standard installation requirements.

Contact for Compliance Questions

For security, privacy, or compliance documentation requests, please contact:

ThruTracker Analytics, LLC
Email: aaron@thrutrackeranalytics.com

Contact Us