How we handle legal requests

Our policies for responding to government and legal demands for user data.

What we can and cannot provide

Our encryption architecture limits what we can disclose, even when legally compelled.

What we can provide

  • Account email address

    The email used to create the account

  • Account creation date

    When the account was first registered

  • Last login timestamp

    When the account was last accessed

  • Device information

    Basic device identifiers used for sync

  • Encrypted data blobs

    The encrypted content we store (unreadable without keys)

What we cannot provide

  • Decrypted journal entries

    We do not have the encryption keys

  • Plaintext check-in content

    All content is encrypted before storage

  • AI conversation transcripts

    Processing is ephemeral, not stored

  • Mood or emotional data in readable form

    Encrypted like all other content

Our process for legal requests

We take every legal request seriously and follow a careful process to protect your rights.

01

Verify validity

We verify that any legal request is valid, properly served, and legally enforceable in our jurisdiction.

02

Evaluate scope

We push back on overly broad requests and work to narrow the scope to what is legally required.

03

Notify user

Unless legally prohibited, we notify affected users before disclosing any information so they can seek legal counsel.

04

Provide minimum required

We provide only what is legally compelled, nothing more. Due to encryption, this is often limited to metadata.

Transparency reporting

We believe in accountability. Here is what we commit to publishing.

Annual reports

Published yearly with total number of requests received

Request types

Breakdown by type: subpoenas, court orders, national security

Compliance rate

How many requests we complied with, challenged, or rejected

Warrant Canary

As of January 17, 2026, we have not received any National Security Letters, FISA court orders, gag orders preventing disclosure of legal requests, or any request to insert backdoors into our encryption.

This statement is updated with each transparency report. If this statement is removed or not updated, users should assume we may have received such a request.

Our encryption is not a policy. It is mathematics.

We could not decrypt your content even under court order.

Your own protection

While we protect your data on our end, here is what you can do to strengthen your security.

Use a strong, unique password

A compromised password elsewhere should not affect your Daylogue account.

Keep your devices secure

Your encryption keys live on your devices. Device security is key security.

Store your recovery phrase safely

If you use device key backup, store recovery information securely offline.

Enable two-factor authentication

Add an extra layer of protection to your account access.

Privacy you can trust

Your journal is protected by mathematics, not just policy.