Frequently Asked Questions

Clear answers about your data, your consent, how information is shared, and how you stay in control.

📝

What data do you store — and why?

We store only what is necessary to provide the Afterwords service securely. This includes account details (name and email), your written content, and limited technical logs. Your content is stored so you can manage your wishes and securely share them with nominated contacts when conditions you define are met.

How does data consent work?

If you choose to include sensitive personal information in your written/spoken content, you provide explicit consent for us to securely store and process that information for the purpose of delivering the service. You may withdraw consent at any time by deleting content or your account.

👥

How is my data shared?

Your data is never sold. It is only shared in three situations: with trusted infrastructure providers operating under strict agreements, if legally required, or with nominated contacts that you personally authorise. You control who is nominated and when access is granted.

🔄

How does sharing with nominated contacts work?

You can nominate trusted individuals within your account. Access to your stored content will only occur according to the conditions you configure. We do not grant access automatically or without those conditions being satisfied.

🗑️

How do I delete my data?

You can delete individual content directly within your dashboard. You can also request full account deletion via your account settings. Once requested, your account is deactivated immediately and all personal data will be fully removed within 30 days.

What happens to inactive accounts?

If your account remains inactive for 12 months, we may contact you to confirm whether you would like to keep it active. If we receive no response within 3 months of contacting you, your account may be securely deleted. Any deleted accounts follow our standard deletion process, and all personal data will be fully removed within 30 days.

🔐

How is my data protected?

We use encryption in transit and at rest, application-level encryption for written content, strict role-based access controls, and ongoing security monitoring. Security is embedded into the architecture of the platform from the ground up.

Still have questions?

If there is anything you would like clarified about your data, your rights, or how sharing works, our support team is here to help.