top of page
  • Facebook
  • Twitter
  • Instagram
protalkie_white.png

Law Enforcement Guidelines

Effective Date: 1 January 2025
Last Updated: 27 November 2025

These guidelines explain how PPLST Tech Private Limited (“we,” “our,” “us”) handles requests from law enforcement agencies worldwide in relation to ProTalkie (“the App”).

We support the legitimate needs of law enforcement while protecting the privacy and security of our users. ProTalkie is built on end-to-end encryption (E2EE), meaning we cannot access message content under any circumstances.

These guidelines do not waive any legal objections and do not create any commitment to comply beyond what the law mandates.

 

1. About ProTalkie and End-to-End Encryption

ProTalkie uses end-to-end encryption for all messages, including:

  • Voice messages (Talkies)

  • Photos, videos, and files

  • Text messages

  • Group messages

This means:

  • Content is encrypted on the sender’s device

  • Only the intended recipient(s) can decrypt it

  • We do not hold decryption keys

  • We cannot access, read, or listen to message content

Even with a lawful order, we cannot provide message content.

2. What Data We Can Provide

While message content is not accessible, we may provide certain limited metadata if required by applicable law and supported by valid legal process.

Possible data types (if available):

  • Account information: phone number used for registration

  • Account creation date and time

  • Last seen (if developed later)

  • Device information: OS, model, crash logs

  • Push notification tokens

  • Contact-sync metadata: hashed numbers or uploaded phone numbers (not names)

  • Message metadata:

    • Timestamps (sent/received)

    • Message ID

    • File size

    • Type of media (voice, video, photo)
      (Content itself is always encrypted.)

  • IP address and general connection logs (if stored by infrastructure)

Data we cannot access:

  • Message content

  • Voice recordings

  • Media files in decrypted form

  • Group chat content

  • Deleted messages

  • User passwords (not stored)

  • Encryption keys

3. Legal Requirements for Requests

We only respond to valid, legally binding requests, such as:

  • Court orders

  • Legal warrants

  • Government demands permitted by applicable law

  • Emergency disclosure requests (specific, imminent threat)

We do not respond to:

  • Informal requests

  • Requests without proper legal authority

  • Broad / bulk surveillance requests

  • Requests violating user privacy laws

All requests must comply with:

  • Local laws of the requesting country

  • Laws of India (where the company is based)

  • International privacy frameworks (GDPR, DPDP, etc.)

4. User Notification Policy

Whenever legally possible, we notify users if law enforcement requests information about them.

We may not notify users when:

  • Disclosure is prohibited by law

  • There is an immediate risk of harm

  • Notification would compromise an investigation

5. Emergency Disclosure Requests

Emergency requests must meet strict criteria:

  • Immediate threat of death or serious physical harm

  • Specific details identifying the risk

  • Sufficient context to justify urgency

We evaluate emergency requests on a case-by-case basis.

Emergency requests should include:

  • Full agency details

  • Official email from agency domain

  • Description of the emergency

  • Applicable legal grounds

  • Identity of the user(s) involved

  • Requested information

  • Contact details of the requesting officer

We still cannot provide message content under any circumstances.

6. International Requests

Law enforcement agencies outside India must follow one of the below:

6.1 Mutual Legal Assistance Treaty (MLAT) Process

Requests must be submitted through a government-to-government MLAT channel.

6.2 Letters Rogatory

Where MLATs are not available, letters rogatory may be used.

We do not respond directly to foreign law enforcement requests unless:

  • They comply with Indian law

  • They follow proper international cooperation frameworks

7. Serving Legal Requests

All legal requests must be addressed to:

PPLST Tech Private Limited
Email (for official requests only): admin@pplsttech.com

Requests must include:

  • Full name and title of requesting officer

  • Agency/organization name

  • Contact email and phone number

  • Details of the legal authority under which the request is made

  • Precise identifiers (phone number, device ID, etc.)

  • Specific data being requested

  • Date range for the data

  • Copy of the warrant, order, or legal document

We may request additional verification before responding.

8. Data Retention Policy (Relevant to Requests)

  • Messages & media: deleted immediately when user deletes them

  • Account data: deleted within 30 days of account deletion

  • Metadata: retained only as long as necessary for security, diagnostics, or operational purposes

  • No undeleted backups of content exist (E2EE)

If data is deleted by the user before receiving a legal request, it cannot be recovered.

9. Transparency Reporting

We may publish anonymized transparency reports containing:

  • Number of law enforcement requests

  • Number of emergency requests

  • Response categories

  • Rejection statistics

No personal information will be included.

10. No Backdoors, No Special Access

ProTalkie does not build backdoors or special access mechanisms for any government or organization.

We do not weaken encryption for any jurisdiction.

11. Modifications to These Guidelines

We may update these guidelines to comply with:

  • Changes in law

  • Evolving safety standards

  • Platform requirements

Updates will be posted with a new "Last Updated" date.

12. Contact for Legal Inquiries

For law enforcement and legal requests only:

PPLST Tech Private Limited
Email: admin@pplsttech.com

Requests from non-official parties or generic emails will be ignored.

CONTACT

Address: 500 Terry Francine St. SF, CA 94158

Tel: 123-456-7890

You can also contact us by using this form:

JOIN THE MAILING LIST

© 2035 by Site Name. Powered and secured by Wix

bottom of page