Trace Intercept

See what's really down there.

Transform wastewater asset inspection with rapid 3D reality capture—complete visual intelligence captured safely in minutes, accessible across your organisation, revealing what traditional inspections miss.

Navigate Regulatory Compliance and Environmental Pressures
with Visual Intelligence

2025 brings unprecedented pressure on UK water utilities: discharge reductions, regulatory requirements for asset health transparency, environmental enforcement action, and AMP8's tightest-ever price controls.

You need rapid asset intelligence to identify compliance risks, prioritise capital efficiently, and demonstrate progress to regulators—all while controlling Totex.
Trace Intercept delivers: Complete 3D visual reality of wastewater infrastructure captured in minutes during routine operator visits, revealing the undocumented assets, infiltration risks, and structural issues traditional inspections miss. Collaborative desktop risk assessment replaces multiple site visits. Engineers design with confidence. Regulators see visual proof of conditions and actions taken.

The Reality of Traditional Inspections

When you need to know what's actually down there, you've typically got outdated drawings, a few words of description in a spreadsheet, a location that might or might not be right, and maybe some photos that don't tell you much. Add to that concerns about health and safety, confined space entries, and traffic management. Not to mention weather-related delays, and fitting the work around emergencies.
An asset that appeared fine one week might fail the next, leaving both operations and management frustrated: "But it was inspected—how could this happen?"

A Better Way Forward

Trace Intercept helps you use economical, commercial off the shelf 360-degree cameras and drones to capture complete visual intelligence of your underground assets. We transform that imagery into 3D reality experiences you can navigate interactively in a web browser or on your smart device. For the majority of assets, without the need for confined space entry or experts to be on-site.
Operators capture assets as part of their regular inspection visits. Sit at your desk, launch Teams, and virtually walk through any site with your colleagues. See what's actually there. See what you have to deal with. Ask your most experienced person what they recommend. Show your whole team before they go out.
Instead of one person with a torch making a rushed judgment in a hazardous space, your entire team examines the asset in high-resolution 3D—zooming, annotating, consulting experts—before anyone descends. 

Simple and Economical to Use

The capture takes about 5-10 minutes per asset. Operators upload it through the capture app and access through any web browser. 

Our design of the method of data capture has focused on keeping the capture kit simple and inexpensive, with simple procedures that require minimal training and can be rippled through teams by operators training operators. No special software to install on laptops. No complex training courses. Just point and click.

Once your teams get used to the cameras, they can update the data every time they visit. So you always know what the last inspection revealed. 

Who Benefits

Compelling visual proof of risks and needs, backed by evidence instead of subjective judgment.

OPERATIONS TEAMS

...can look at a site before they turn up with the wrong equipment.

ASSET MANAGERS

...can assess condition without booking a site visit.

ENGINEERS

... can see what they're actually designing for instead of having to schedule an actual site visit.

SAFETY OFFICERS

... can assess confined space risks remotely, plan safe entries based on actual conditions.

LEADERS 

.. can review and discuss actual reality of specific assets.

FINANCE

... see the before and after views associated with capital investment and critical maintenance.

REGULATORS

... can be provided with Asset health transparency, with evidence of the real condition of assets and proof of capital investment improvements.

LOCAL AUTHORITIES

... experience less traffic disruption and preventable pollution incidents.

Better data. Visual data. Real evidence.

Better decisions. Fewer surprises.

Real Impact

In a recent implementation for a major utility:

Better Understanding

10% of overflows were misidentified or not wholly understood by operators.

Preventing Pollution

20% of sites had issues that could have caused pollution incidents.

Compliance Checks

12% of assets had compliance risks including gross infiltration, tangled sensors, and damaged screens.

Look What We Found!

25% of sites revealed screening devices that weren't recorded in corporate systems.

"This gives us insight we've never had before."

Operations Team Lead

How Reality Capture Works 

Virtualising what used to require confined space entry. Without entering the chamber, operators can now clearly see structural condition issues, fat and rag build-up, debris, and how equipment is positioned.

Trace Intercept transforms asset inspection by making what previously couldn't be seen... visible. We provide a "lab-like" view of each asset, dramatically improving inspection efficacy. This means that not-so-obvious issues that might have been missed with single operator torch inspections become comprehensively visible, and can be examined in detail from the desktop by anyone in the organisation.

Technology

The Trace Intercept application turns simple, cost-effective hardware into powerful 3D reality capture. We handle the complexity—enterprise security, data management, annotations, high-resolution processing and alignment—to produce detailed digital environments that any stakeholder can examine, share securely across your enterprise, and collaborate with partners.

360-Degree Cameras

The kind you can buy online. We take the footage and turn it into something you can navigate interactively through any web browser or smartphone.

Drones

Aerial site context and GPS coordinates to record access and accessibility for future reference.

High-Res Capture

Imagery at ground level and key descent distances. Larger chambers may need multiple deployments for adequate image capture of key equipment.

Intuitive Browser App

Built on the Microsoft Azure platform, the TRACE application runs in any modern browser with simple click and drag functionality to allow anyone in the enterprise to get a direct look at key assets.

Virtualizing Confined Space Entry

TRACE: Three-dimensional Reality Asset Collaboration Environment

Data Capture

Data captured by your operators or service providers goes into a secure critical infrastructure certified Cloud for processing and analysis.

Asset Digitisation

Our proprietary pipeline transforms raw data into high-resolution, navigable, AI-ready 3D experiences that expose the true condition of an asset for expert assessment and triage.

Collaboration

Your team securely view, co-navigate and annotate 3D experiences and other outputs through their web browsers, evaluating and assessing book value and investment requirements, with the ability to action immediate repairs.

"Operators are now acting as first-line assessors of asset condition. They know what to look for, what assessments are required, and can visually share this with team leadership and management."

Asset Manager

Process

Three basic steps

Desktop Preparation

  • Compile site lists including corporate system references, asset, and performance information
  • Prepare local GIS annotated plans to identify key assets for survey deployment
  • Joint review of pre-survey data to agree and finalize survey scope
  • Determine need for pre-survey cleansing of pumping stations or attenuation tanks

On-Site Capture

  • Drone survey of the site and immediate surroundings
  • Remote internal inspection of storm overflow chambers and assets (screens, etc.)
  • Remote inspection of ancillary structures (bifurcation, flow control devices, screens, outfalls, penstocks)
  • Remote inspection of pumping stations focusing on key assets
  • Remote inspection of storm storage facilities

Post-Capture

  • Automated upload (with local storage for data awaiting connection) and processing
  • Access/share through any web browser
  • No special desktop software required
  • No complex training courses
  • Just point and click

Key Characteristics

Designed to be deployed alongside existing IT systems.

Visual Capabilities

  • Complete chamber views in high resolution
  • Structural condition assessment without confined space entry
  • Visual confirmation of layout, connectivity, and condition
  • Equipment positioning and status verification
  • Identify defects obscured by shadows/darkness during traditional inspections

Light Integration with IT Systems

  • Fully referenced to your corporate systems through deep links
  • Geo-referenced and connected with GIS records
  • Structured for AI-ready analysis
  • Compatible with existing asset management platforms
  • Maintained as one version of the truth about real asset condition

Technical

  • Deployment time: 5-10 minutes per asset
  • 11904 x 5952 pixels 360 imagery
  • 8064 x 6048 pixels Drone imagery
  • Microsoft Azure Platform
  • Microsoft Entra ID Single Sign On
  • GDPR compliant
  • Access method: Any web browser, mobile compatible

Benefits

Communicating Reality: From Front-line Operations to the Boardroom

Operations

  • No More Arriving Blind An operator called out at 3 AM can review the chamber on their tablet before leaving—no more arriving to equipment failures or blockages without preparation.
  • Instant Visual Evidence During emergencies, visual evidence shared instantly with managers and contractors speeds up response coordination.
  • Remote Risk Assessment Teams can assess confined space risks remotely, planning safe entries based on actual conditions rather than outdated records.
  • Evidence-Based Decisions Operators now have the evidence to justify interventions or inform capital requests, backed by visual proof instead of subjective judgment.
  • Enhanced Health & Safety Reduced need for confined space entry

Asset Management

  • Better Visibility High-quality visualization of underground asset status and condition, displayed within an easy-to-navigate application.
  • Early Risk Detection From the very first site inspection, identify asset failure risks which compromise service performance—many of which are not readily discoverable using traditional inspection methods.
  • Sharper Investment Prioritization Enhanced asset knowledge enables improved maintenance and investment decisions, with desktop risk triage using reality capture to make more informed and effective capital investment decisions.
  • Proof of "Know Your Asset": Demonstrable, visual evidence of asset condition in meetings with Regulators
  • A shared representation of asset reality that enables better dialogue with Operations and Capital Projects.

Capital Projects

  • Removing Design Uncertainty The challenge isn't the quality of design work—it's the quality of information designers have to work with. Project teams often inherit incomplete data, abstract diagrams, or aged as-built drawings.
  • Visual Context Without Site Visits Engineers and designers can now access immersive visualizations of entire sites, seeing the interconnections between chambers and understanding real-world conditions before they even step on site.
  • Validation of design option viability Building confidence in the viability of design concepts.
  • Elimination of schedule delays associated with planning site visits.
  • Reduction of survey costs.

Regulatory & Compliance

  • Environment Act 2021 Storm Overflow Compliance: Visual evidence supports Section 82 monitoring obligations and SODRP submissions as utilities face 2035 improvement targets and near real-time public reporting requirements.
  • AMP8 Capital Investment Justification: High-resolution documentation strengthens business cases for £88 billion enhancement programme, demonstrating genuine asset need against Ofwat's intensified efficiency challenges and cost benchmarking.
  • ODI Penalty Risk Mitigation: Comprehensive condition documentation enables early intervention and provides auditable evidence, reducing exposure to £400 million estimated annual sector penalties under AMP8's strengthened performance incentives.
  • Price Control Deliverables Protection: Visual validation of delivery milestones protects against non-delivery penalties across enhancement expenditure subject to staged PCD gate approvals.
  • Defensible Regulatory Audit Trail: Timestamped, immutable visual records create robust evidence chains for Ofwat inquiries, demonstrating systematic due diligence as regulatory scrutiny and enforcement intensify.
  • Environmental Permit Compliance: Asset condition documentation supports EA permit compliance demonstrations and defends against enforcement actions with fixed monetary penalties.
  • DM & Confined Space Regulation Adherence: Pre-entry visual assessment enables compliant risk assessments without physical entry, demonstrating adherence to mandatory safety requirements and reducing HSE liability exposure. RetryClaude can make mistakes. Please double-check responses.

"We will now know when we are or are not compliant, and we are able to visually demonstrate compliance to stakeholders and regulators."

Regulatory Affairs Manager

About Trace Intercept

Delivering essential asset insights to accelerate decisions for maximum impact at the lowest cost.

Just-in-time digital twins for enhanced coordination of action.

Our Promise

Just-in-time digital twins for enhanced coordination of action.

Our Promise

Trace Intercept provides high-resolution 3D reality capture solutions for water and wastewater utilities, transforming how organizations inspect, maintain, and invest in critical underground infrastructure.

What We Do  The Trace Intercept application empowers utility operators to use 360-degree cameras—the kind you can buy for a few hundred pounds on Amazon—and transform the resulting imagery into something you can navigate interactively in a web browser and on your phone. It's better information, delivered in a high-resolution visual experience that's better and more revealing than actually being on-site.  The complexity of the technology needed to do this is hidden behind the scenes.

The Problem We Solve When you need to know what's actually down there, you've typically got outdated drawings, a few words of description in a spreadsheet, a location that might or might not be right, and maybe some photos that don't tell you much. The traditional inspection toolkit—a torch, a visual assessment, and a condition score—has its limits. Some defects hide in shadows. Others develop between visits. An asset that appeared fine one week might fail the next.

Our Solution We virtualize what used to require confined space entry, making what previously couldn't be seen... visible. Without entering the chamber, operators can now clearly see structural condition issues, fat and rag build-up, debris accumulation, equipment positioning, and hidden defects. And they can share that information with anyone in the enterprise simply by sending a link.

Team

We've built our team with one focus: delivering practical technology solutions that work in the operational reality of UK water utilities. Our leadership combines proven utility sector transformation experience, advanced 3D visualization expertise, and front-line understanding of capital project and infrastructure operations challenges. We know regulatory pressures, operational constraints, and what it takes to get front-line teams to adopt new capabilities—because we've done it before.

Chris Wiesinger | CEO

Chris leads transformation initiatives in UK water utilities, delivering operational efficiency projects that significantly reduced costs and improved performance. Previously CEO of GeoSim Cities, developing large-scale digital twins for transportation and civic infrastructure. With 25+ years across national security, public safety, and infrastructure sectors through firms like VISION Consulting and major enterprise firms CSC and EDS, his focus remains constant: practical solutions that improve front-line operations and management decision-making.

Ian Cander | Operations

Ian brings 30+ years driving operational excellence across utilities, manufacturing, and construction, with 15 years as an entrepreneur introducing practical innovations to complex operational challenges. At Trace Intercept, he ensures capture protocols, training programs, and quality standards deliver reliable intelligence operations teams can trust. He focuses on the critical gap between technology capability and field adoption—designing workflows that fit real constraints and training that sticks. Experience spans manufacturing, IT, financial services, utilities, construction, and recruitment.

David Clement | CTO

David architects Trace Intercept's 3D processing pipeline and cloud infrastructure. His 30+ year career spans groundbreaking visual systems at the BBC, founding a startup acquired by Discreet Logic, and designing the largest law enforcement data-sharing network in the US. BSc in Optical Physics and Computer Graphics. Recent focus: AI, immersive technologies, and perceptual systems for critical infrastructure.

Richard Flinn | Sales

Former Deloitte UK consulting partner specializing in utility operations. Richard's work with UK gas and water companies delivered measurable transformation: 80% productivity increase for repair teams, 50% improvement for emergency call-outs. Previously Director at VISION Consulting UK, leading business performance breakthroughs through operational redesign and behavioral change methodology.

Michael Barnard | Chief Product Strategist

Michael advises executives, boards, and investors on infrastructure adaptation and long-term capital allocation decisions. With technical architecture background from IBM and Rational, he projects scenarios 40-80 years forward, helping utilities navigate decarbonization requirements while maintaining service delivery. His work spans grid infrastructure, transportation systems, and energy transition—informing strategic positioning for climate-resilient utilities.

Karl Hylands | Commercial

Chartered Environmentalist with deep utilities sector experience spanning water, industrial, oil and gas, and waste management. Karl led commercial development and sale of a clean energy project to a major UK fuel company. Former director in leading UK environmental firms focusing on waste value recovery. Industrial Founding Partner of Envirolink Northwest's R&D Network and member of the UK's Jet Zero Council.

Your critical infrastructure 
digital twin insights partner

FAQ

Question icon

What exactly is TRACE Reality Capture?

We use affordable 360-degree cameras and drones to capture high-resolution imagery of underground infrastructure. That footage is processed into interactive visualizations you can navigate in any web browser or mobile device. Think of it as creating a virtual, detailed replica of your infrastructure that anyone in your organisation can access and explore.

Question icon

Is this really better than being on-site?

For many purposes, yes. The high-resolution imagery often reveals details better than being physically present, especially in dark, confined spaces. You can zoom, annotate, and consult experts remotely, and review conditions multiple times. That said, you'll still need physical site visits for certain work—this helps you know what you're dealing with before you get there.

Question icon

Do we need special software?

No. Access is through any standard web browser—Chrome, Safari, Edge, Firefox. It works on desktops, laptops, tablets, and smartphones. No downloads, no special installations, no complex training.

Question icon

Who actually does the site capture?

Your operational teams. We train your staff to capture the data as part of their normal inspection and maintenance routines. This isn't outsourced to specialists—it's a capability you own.

Question icon

How is this different from traditional site inspections?

Traditional inspections rely on someone physically entering a confined space with a torch, making subjective assessments, and maybe taking a few photos. Our approach captures complete, high-resolution imagery without confined space entry, creates a permanent visual record accessible to everyone, and reveals details that often hide in shadows or get missed during quick physical inspections.

Question icon

What equipment is required?

Prosumer-grade 360-degree cameras, standard drones for aerial context, and existing tablets or mobile devices your teams already use. We're not talking about exotic, expensive specialised equipment.

Question icon

How long does it take to capture a site?

Typically 5-10 minutes per asset. Simple overflow chambers might take 5 minutes. Complex pumping stations with multiple chambers might take 15 minutes. It's quick.

Question icon

How much training is required?

Typically 1-2 hours of hands-on training per team lead. The technology is straightforward—if someone can use a smartphone, they can use this. Most operators pick it up quickly and enjoy using it.

Contact us

Trace Intercept Limited | Registered in Northern Ireland: NI724285


The best way to understand what we do is to show you. We can demonstrate the platform, walk through real examples, discuss your specific challenges, and explore how this makes sense for your organization.

Connect with us:

Privacy policy

Last update: October 14, 2025

1. Introduction

Trace Intercept provides an enterprise-grade 3D reality asset collaboration platform designed for organizations requiring reality-based understanding of their diverse assets. The Trace Intercept Android app enables field teams to capture 360° images and drone imagery using consumer devices (Insta360 cameras and DJI drones) and seamlessly integrate them into the Trace Intercept SaaS platform. This Privacy Policy explains how we collect, use, store, and protect information when you use the Trace Intercept Android application.

2. What information do we collect?

2.1 Photos and Images What: 360° photos captured from Insta360 cameras and images transferred from DJI drones via WiFi How: Captured through the app's camera control interface Storage: Initially stored locally on your Android device, then uploaded to your organization's segregated data store within the Trace Intercept SaaS platform Purpose: To enable enterprise asset documentation, collaboration, and management workflows
2.2 Network Connectivity Information What: WiFi and internet connection status How: Monitored automatically by the app Storage: Not stored or transmitted; used only for real-time functionality Purpose: To manage connections to cameras/drones and coordinate uploads to the cloud platform 2.3 Device Information
What: Android version, device model (for compatibility) How: Collected automatically when the app runs Storage: Not persistently stored; used transiently for functionality
Purpose: To ensure proper camera connectivity and app performance 2.4 Information We DO NOT Collect We do NOT collect: - Personal names, email addresses, or phone numbers - Precise location data (GPS coordinates) - Contacts, calendar, or other personal information - Usage analytics or behavioural tracking data - Advertising identifiers

3. How do we use your information?

We process your information for purposes based on legitimate business interests, the fulfillment of our contract with you, compliance with our legal obligations, and/or your consent. We use personal information collected via our Website for a variety of business purposes described below. We use the information we collect or receive:


3.1 Primary Use - Enterprise Workflows Photos and images captured through the app are used exclusively for: - Uploading to your organization's designated data store in the Trace Intercept SaaS platform - Integration with your organization's asset management workflows - Collaboration among authorized team members within your organization - AI-assisted analysis and documentation as configured by your enterprise administrator 3.2 We Do Not Use Your Data For: - Advertising or marketing purposes - Analytics or user behavior tracking - Selling or sharing with third-party data brokers - Training AI models outside your organization's designated use - Any purpose not explicitly related to your enterprise workflow

4. How we share your information

4.1 Customer-Segregated Storage - All photos and images are uploaded to **your organization's segregated data store** within the Trace Intercept SaaS platform - Data is logically separated from other customers using **multi-tenant architecture** - Your organization's data is **not accessible** to other Trace Intercept customers - Access is controlled by your enterprise administrator using **Microsoft ENTRA** (formerly Azure Active Directory) 4.2 No Third-Party Sharing We do NOT share, sell, or transfer your photos or images to: - Advertisers or marketing companies - Data brokers or analytics platforms - Social media networks - Any third party outside your organization's authorized users 4.3 Service Infrastructure - Photos are stored on Microsoft Azure cloud infrastructure - Microsoft acts as a service provider and does not access your content - All data transmission and storage complies with enterprise security standards 4.4 Legal Requirements We may disclose information only if required by law, such as: - Valid court orders or subpoenas - Legal processes requiring disclosure - Protection of Trace Intercept's legal rights In such cases, we will notify your organisation unless legally prohibited.

5. Data Security

5.1 Encryption In Transit: All data transmitted between the app and Trace Intercept SaaS uses HTTPS/TLS encryption At Rest: Photos stored on your Android device are protected by Android's file system encryption In Cloud: Photos in Trace Intercept SaaS are encrypted using Microsoft Azure's encryption standards 5.2 Access Controls - Access to your organization's data is controlled via Microsoft ENTRA identity management - Role-based access control (RBAC) ensures only authorized personnel can view your organization's photos - Multi-factor authentication (MFA) can be enforced by your enterprise administrator 5.3 Infrastructure Security - Hosted on Microsoft Azure with industry-leading security certifications (SOC 2, ISO 27001, etc.) - Regular security audits and vulnerability assessments - Network isolation and firewall protection 5.4 Data Isolation - Multi-tenant architecture with logical data segregation per customer - Your organization's photos are not accessible to other Trace Intercept customers - Database-level isolation prevents cross-customer data leakage

6. Data Retention and Deletion

6.1 Local Device Storage - Photos are stored on your Android tablet until uploaded to the Trace Intercept SaaS platform - You can delete local photos at any time through the app or by uninstalling the app - Uninstalling the app removes all locally stored photos 6.2 Cloud Storage Retention - Photos uploaded to Trace Intercept SaaS are retained according to your organization's data retention policy - Your enterprise administrator controls retention periods and deletion schedules - Contact your enterprise administrator to request deletion of cloud-stored photos 6.3 Account Closure - If your organization terminates its Trace Intercept subscription, data retention follows your enterprise agreement terms - Typically, data is retained for a grace period (e.g., 30-90 days) to allow data export, then permanently deleted

7. Your Rights and Choices

7.1 Access and Control Access: Request access to your photos through your enterprise administrator Deletion: Delete local photos on your device at any time; request cloud deletion through your administrator Export: Request data export through your enterprise administrator Correction: Update or correct photo metadata through the Trace Intercept web interface 7.2 Enterprise Administrator Control - Your organization's IT administrator has primary control over your enterprise data - Administrators can manage user access, retention policies, and data exports - Contact your administrator for data access requests related to cloud-stored photos 7.3 App Permissions You can control app permissions through your Android device settings: Camera: Required for camera connectivity (can be revoked; app won't function without it) Storage: Required to save photos locally Network: Required to upload photos and load the web interface

8. Children's Privacy

The Trace Intercept Android app is designed exclusively for enterprise and business use. It is NOT intended for use by individuals under 13 years of age. We do not knowingly collect personal information from children. If you believe a child under 13 has used the app, please contact us immediately at support@traceintercept.ai.

9. International Data Transfers

9.1 Data Location - Trace Intercept SaaS is hosted on Microsoft Azure data centers - Your organization's data is stored in Azure regions as specified in your enterprise agreement - Data may be transferred internationally depending on your Azure region selection 9.2 Compliance - Data transfers comply with applicable regulations (GDPR, CCPA, etc.) - Microsoft Azure maintains compliance certifications for international data protection standards - Customer-segregated architecture ensures data sovereignty requirements can be met

10. California Privacy Rights

f you are a California resident using this app through your employer, you may have certain rights under the California Consumer Privacy Act (CCPA): **Right to Know**: Request information about data collection and use **Right to Delete**: Request deletion of your personal information **Right to Opt-Out**: We do not sell personal information, so opt-out does not apply **Right to Non-Discrimination**: We do not discriminate based on privacy rights exercise Note: Since this app is designed for enterprise use, your employer (the enterprise customer) may be the "business" under CCPA, and Trace Intercept may be a "service provider." Please consult your employer's privacy policy for complete information.

11. European Privacy Rights (GDPR)

If you are in the European Economic Area (EEA), United Kingdom, or Switzerland, you have rights under the General Data Protection Regulation (GDPR): **Right of Access**: Request a copy of your personal data **Right to Rectification**: Request correction of inaccurate data **Right to Erasure**: Request deletion of your data ("right to be forgotten") **Right to Restriction**: Request limitation of data processing **Right to Data Portability**: Request data in a machine-readable format **Right to Object**: Object to certain types of processing Legal Basis for Processing: We process your data based on: - Legitimate Interests: Providing enterprise asset management services - Contractual Necessity: Fulfilling services under your organization's enterprise agreement To exercise these rights, contact your enterprise administrator or reach out to support@traceintercept.ai.

12. Changes to this Privacy Policy

We may update this Privacy Policy from time to time to reflect: - Changes in our data practices - New features or functionality - Legal or regulatory requirements - Industry best practices Notification: When we make material changes, we will: - Update the "Last Updated" date at the top of this policy - Notify enterprise administrators via email - Post a notice in the Trace Intercept web interface (if applicable) Your Continued Use: Continued use of the app after changes constitutes acceptance of the updated policy.

13. Third Party Services

3.1 Microsoft Azure The Trace Intercept SaaS platform uses Microsoft Azure for cloud infrastructure: Purpose: Cloud storage, compute, and security services Data Processed: Photos, images, and associated metadata Privacy Policy: https://privacy.microsoft.com/en-us/privacystatement Security Standards: SOC 2, ISO 27001, GDPR-compliant 13.2 Camera and Drone Manufacturers The app connects to Insta360 cameras and DJI drones via WiFi: Direct Connection: Communication is direct between your device and camera/drone No Data Sharing: Trace Intercept does not share data with camera/drone manufacturers Manufacturer Policies: Refer to Insta360 and DJI privacy policies for their device-level data practices

14. Enterprise Administrator Responsibilities

Your enterprise administrator is responsible for: - Managing user access and permissions within your organization - Configuring data retention and deletion policies - Ensuring compliance with your organization's internal policies - Handling data access requests from authorized users - Training users on appropriate use of the app and platform If you have questions about your organization's data practices, contact your IT administrator.

15. Contact Information

For Privacy Questions or Data Requests Email: support@traceintercept.ai Website: https://traceintercept.ai Subject Line: "Privacy Policy Inquiry - Android App" For Enterprise Account Management Contact your organization's Trace Intercept administrator or account manager. Response Time We aim to respond to privacy inquiries within **10 business days**. For urgent matters, please indicate "Urgent" in the subject line.

Privacy policy (continued)

16. Governing Law

This Privacy Policy is governed by the laws of **United Kingdom**, without regard to conflict of law principles. Disputes related to this policy will be subject to the exclusive jurisdiction of the courts in Belfast, United Kingdom, unless otherwise specified in your enterprise agreement.

17. Data Protection Officer

For organizations requiring a designated Data Protection Officer under GDPR or other regulations: **DPO Contact**: dpo@traceintercept.ai **Subject Line**: "DPO Inquiry - [Your Organization Name]"

18. Summary - Quick Reference

| **What We Collect** | **How We Use It** | **How We Protect It** | |---------------------|-------------------|----------------------| | Photos from cameras/drones | Enterprise asset management workflows | HTTPS encryption, Azure security, MS ENTRA access control | | Network status | Real-time connection management | Not stored; used transiently | | Device info | App compatibility | Not persistently stored | | **What We DON'T Collect** | **No personal names, emails, location, analytics, or advertising data** | | **Key Points**: ✅ Customer-segregated cloud storage ✅ Multi-tenant architecture with data isolation ✅ Microsoft Azure hosting with enterprise security ✅ No third-party data sharing or selling ✅ No advertising or behavioral tracking ✅ Enterprise administrator controls access and retention ✅ GDPR and CCPA rights available

© All Rights Reserved. Trace Intercept Limited 2024