Responsible Use Policy

AI Photo Geolocation & Evidence Reporting

Last updated: February 5, 2026

GeoEvident provides AI-powered photo geolocation and evidence reporting for legitimate investigative, verification, and security workflows. This page explains who can access the service, how we vet customers, how we prevent abuse, and what we prohibit.

In short: GeoEvident is not a public "anyone can upload" geolocation tool. We provide access only to verified organizations and vetted professionals after strict due diligence (KYB/KYC), and we actively monitor, audit, and enforce responsible usage.

What GeoEvident Does (and What It Doesn't)

What we do

GeoEvident helps authorized users perform image geolocation and location verification from photos by matching visual signals against reference data to produce report-ready outputs.

Typical use cases include:

  • • OSINT verification and investigative journalism
  • • Corporate security and risk investigations
  • • Fraud detection and insurance investigations
  • • Due diligence and threat intelligence
  • • Public-sector investigations (where legally permitted)
  • • Humanitarian / crisis response verification

What we do NOT do

GeoEvident is not intended for:

  • • "Find a person's home from a photo"
  • • Real-time tracking or surveillance of individuals
  • • Doxxing, harassment, stalking, intimidation, or blackmail
  • • Targeting protected groups or enabling violence
  • • Any use that violates applicable laws or regulations

If your intended use case resembles the above, we will not provide access.

Access Model: Not Public, Approval-Only

GeoEvident is an approval-only service. We do not offer open public self-serve access. We provide access only to customers who pass verification and agree to enforceable contractual obligations.

We do not onboard "people from the street." Access requires:

  • A verified organization or professional practice
  • A validated identity and role
  • A legitimate use case aligned with responsible investigation
  • Acceptance of our contractual terms

Customer Verification: Detailed Due Diligence (KYB / KYC)

Because AI photo geolocation can be abused, our onboarding process is intentionally strict. We use a Know Your Business (KYB) / Know Your Customer (KYC) approach appropriate for investigative tooling.

Organization & identity checks

  • • Legal entity verification
  • • Business website and footprint review
  • • Business email verification
  • • Role and authority confirmation

Ownership & control checks

  • • Beneficial ownership (UBO) review
  • • Sanctions and watchlist screening
  • • Adverse media screening (risk-based)

Use-case and workflow checks

  • • Intended use case alignment
  • • Data handling practices review
  • • Internal governance assessment

Contractual acceptance

  • • Responsible Use policy acceptance
  • • Access control enforcement agreement
  • • Local law compliance commitment

We reserve the right to refuse onboarding for any reason, including elevated misuse risk, insufficient transparency, inability to verify identity/organization, or unclear lawful basis.

Who We Serve

We typically support vetted organizations and professionals in legitimate verification contexts:

  • OSINT analysts within verified organizations
  • Investigative journalists at recognized outlets
  • Corporate security teams and consultancies
  • Fraud and insurance investigations units
  • Compliance and risk teams
  • Public sector agencies (where lawful)

Who We Do NOT Serve

We do not provide service where risk of misuse is elevated:

  • Personal curiosity or "people searching"
  • Harassment, stalking, or doxxing
  • Surveillance or coercion services
  • Parties evading verification
  • Any unlawful use

If we cannot validate legitimate use, we will not provide access.

Prohibited Uses (Zero-Tolerance)

GeoEvident prohibits, and will enforce against, any attempt to use the service for:

Stalking or harassment
Doxxing
Locating individuals without lawful basis
Intimidation, coercion, or blackmail
Targeted abuse based on protected characteristics
Any unlawful surveillance or monitoring

Violations lead to immediate suspension or termination, and may result in additional actions consistent with applicable law.

Safety Controls and Abuse Prevention

We implement technical and procedural controls designed for responsible AI geolocation:

1

Case-based workflows

Customers are encouraged to use case-based tracking, linking analysis to legitimate investigation workflows.

2

Audit logs and monitoring

We maintain audit logs and apply monitoring for abuse signals, including unusual volume and suspicious patterns.

3

Rate limits and anomaly detection

We apply rate limiting and automated detection to reduce the risk of systematic misuse.

4

Confidence thresholds and "refuse-by-default"

When confidence is insufficient, the system prefers "Insufficient evidence" or broader-area results. We do not optimize to "always guess."

5

Access controls and RBAC

We support role-based access controls and recommend internal governance (least privilege, named users, periodic reviews).

6

Enforcement and kill switch

We reserve the right to suspend access, disable accounts, or terminate service for misuse or risk escalation.

Privacy, Data Protection, and Security

GeoEvident is designed to support privacy-aware investigative workflows:

  • Data minimization: collect and retain only what is necessary for service operation and auditability.
  • Security controls: appropriate safeguards for confidentiality and integrity (encryption in transit, access control, operational security).
  • Customer responsibility: customers must ensure lawful basis for their processing of images and personal data, including compliance with applicable privacy laws.

GeoEvident does not provide legal advice. Customers remain responsible for lawful use, consent requirements (where applicable), and compliance with local regulations. For more details, see our Privacy Policy.

Transparency: Evidence-First Outputs

GeoEvident is built around verification and evidence reporting, not "magic answers." Outputs are intended to be:

Reviewable
Explainable at a workflow level
Suitable for documentation
Subject to human oversight

We encourage customers to corroborate results with additional sources and to treat outputs as decision support, not sole proof.

Reporting Misuse

If you believe GeoEvident is being used to enable harassment, stalking, or other wrongdoing, we want to know. Please report concerns through our official contact channels with:

  • • Relevant timestamps (if available)
  • • Any case identifiers (if available)
  • • A short description of suspected misuse

We investigate credible reports and take enforcement action where warranted.

Frequently Asked Questions

Is GeoEvident a public photo geolocation tool?

No. GeoEvident is an approval-only service with KYB/KYC due diligence. We do not offer open public self-serve access.

Do you sell access to individuals?

Generally no. We primarily onboard verified organizations and vetted professionals operating under organizational governance. Exceptions (if any) require enhanced verification and risk review.

Do you perform due diligence on customers?

Yes. We conduct detailed customer due diligence (KYB/KYC), including identity and organization checks, and may review beneficial ownership, sanctions screening, and adverse media where applicable.

Can GeoEvident be used for stalking or doxxing?

No. Those uses are explicitly prohibited and result in immediate termination.

Does GeoEvident guarantee an exact location?

No. AI geolocation involves uncertainty. We emphasize confidence thresholds, refuse-by-default when evidence is insufficient, and recommend corroboration.

Is this OSINT software?

GeoEvident can support OSINT verification workflows, but we are not a "public OSINT toy." We provide enterprise-grade investigative tooling with safeguards, governance, and auditability.

Glossary

AI-powered photo geolocation
Using machine learning and visual matching to estimate where a photo was taken.
Image geolocation / photo location verification
Validating or inferring location signals from imagery.
Evidence reporting
Producing a documented output suitable for audits, investigations, and verification records.
OSINT
Open Source Intelligence — analysis and verification using publicly available information.
KYB / KYC
Know Your Business / Know Your Customer — verification and due diligence processes to reduce risk and prevent misuse.

Summary

GeoEvident is designed for responsible, evidence-first AI photo geolocation. We restrict access to verified customers, conduct strict due diligence, and enforce prohibited-use rules with technical safeguards and monitoring.

If you represent an organization that needs photo geolocation, image-based location verification, or evidence reporting for legitimate investigative workflows, contact us to begin verification.