Responsible Use Policy
AI Photo Geolocation & Evidence Reporting
Last updated: February 5, 2026
GeoEvident provides AI-powered photo geolocation and evidence reporting for legitimate investigative, verification, and security workflows. This page explains who can access the service, how we vet customers, how we prevent abuse, and what we prohibit.
In short: GeoEvident is not a public "anyone can upload" geolocation tool. We provide access only to verified organizations and vetted professionals after strict due diligence (KYB/KYC), and we actively monitor, audit, and enforce responsible usage.
What GeoEvident Does (and What It Doesn't)
What we do
GeoEvident helps authorized users perform image geolocation and location verification from photos by matching visual signals against reference data to produce report-ready outputs.
Typical use cases include:
- • OSINT verification and investigative journalism
- • Corporate security and risk investigations
- • Fraud detection and insurance investigations
- • Due diligence and threat intelligence
- • Public-sector investigations (where legally permitted)
- • Humanitarian / crisis response verification
What we do NOT do
GeoEvident is not intended for:
- • "Find a person's home from a photo"
- • Real-time tracking or surveillance of individuals
- • Doxxing, harassment, stalking, intimidation, or blackmail
- • Targeting protected groups or enabling violence
- • Any use that violates applicable laws or regulations
If your intended use case resembles the above, we will not provide access.
Access Model: Not Public, Approval-Only
GeoEvident is an approval-only service. We do not offer open public self-serve access. We provide access only to customers who pass verification and agree to enforceable contractual obligations.
We do not onboard "people from the street." Access requires:
- A verified organization or professional practice
- A validated identity and role
- A legitimate use case aligned with responsible investigation
- Acceptance of our contractual terms
Customer Verification: Detailed Due Diligence (KYB / KYC)
Because AI photo geolocation can be abused, our onboarding process is intentionally strict. We use a Know Your Business (KYB) / Know Your Customer (KYC) approach appropriate for investigative tooling.
Organization & identity checks
- • Legal entity verification
- • Business website and footprint review
- • Business email verification
- • Role and authority confirmation
Ownership & control checks
- • Beneficial ownership (UBO) review
- • Sanctions and watchlist screening
- • Adverse media screening (risk-based)
Use-case and workflow checks
- • Intended use case alignment
- • Data handling practices review
- • Internal governance assessment
Contractual acceptance
- • Responsible Use policy acceptance
- • Access control enforcement agreement
- • Local law compliance commitment
We reserve the right to refuse onboarding for any reason, including elevated misuse risk, insufficient transparency, inability to verify identity/organization, or unclear lawful basis.
Who We Serve
We typically support vetted organizations and professionals in legitimate verification contexts:
- OSINT analysts within verified organizations
- Investigative journalists at recognized outlets
- Corporate security teams and consultancies
- Fraud and insurance investigations units
- Compliance and risk teams
- Public sector agencies (where lawful)
Who We Do NOT Serve
We do not provide service where risk of misuse is elevated:
- Personal curiosity or "people searching"
- Harassment, stalking, or doxxing
- Surveillance or coercion services
- Parties evading verification
- Any unlawful use
If we cannot validate legitimate use, we will not provide access.
Prohibited Uses (Zero-Tolerance)
GeoEvident prohibits, and will enforce against, any attempt to use the service for:
Violations lead to immediate suspension or termination, and may result in additional actions consistent with applicable law.
Safety Controls and Abuse Prevention
We implement technical and procedural controls designed for responsible AI geolocation:
Case-based workflows
Customers are encouraged to use case-based tracking, linking analysis to legitimate investigation workflows.
Audit logs and monitoring
We maintain audit logs and apply monitoring for abuse signals, including unusual volume and suspicious patterns.
Rate limits and anomaly detection
We apply rate limiting and automated detection to reduce the risk of systematic misuse.
Confidence thresholds and "refuse-by-default"
When confidence is insufficient, the system prefers "Insufficient evidence" or broader-area results. We do not optimize to "always guess."
Access controls and RBAC
We support role-based access controls and recommend internal governance (least privilege, named users, periodic reviews).
Enforcement and kill switch
We reserve the right to suspend access, disable accounts, or terminate service for misuse or risk escalation.
Privacy, Data Protection, and Security
GeoEvident is designed to support privacy-aware investigative workflows:
- Data minimization: collect and retain only what is necessary for service operation and auditability.
- Security controls: appropriate safeguards for confidentiality and integrity (encryption in transit, access control, operational security).
- Customer responsibility: customers must ensure lawful basis for their processing of images and personal data, including compliance with applicable privacy laws.
GeoEvident does not provide legal advice. Customers remain responsible for lawful use, consent requirements (where applicable), and compliance with local regulations. For more details, see our Privacy Policy.
Transparency: Evidence-First Outputs
GeoEvident is built around verification and evidence reporting, not "magic answers." Outputs are intended to be:
We encourage customers to corroborate results with additional sources and to treat outputs as decision support, not sole proof.
Reporting Misuse
If you believe GeoEvident is being used to enable harassment, stalking, or other wrongdoing, we want to know. Please report concerns through our official contact channels with:
- • Relevant timestamps (if available)
- • Any case identifiers (if available)
- • A short description of suspected misuse
We investigate credible reports and take enforcement action where warranted.
Frequently Asked Questions
Is GeoEvident a public photo geolocation tool?
No. GeoEvident is an approval-only service with KYB/KYC due diligence. We do not offer open public self-serve access.
Do you sell access to individuals?
Generally no. We primarily onboard verified organizations and vetted professionals operating under organizational governance. Exceptions (if any) require enhanced verification and risk review.
Do you perform due diligence on customers?
Yes. We conduct detailed customer due diligence (KYB/KYC), including identity and organization checks, and may review beneficial ownership, sanctions screening, and adverse media where applicable.
Can GeoEvident be used for stalking or doxxing?
No. Those uses are explicitly prohibited and result in immediate termination.
Does GeoEvident guarantee an exact location?
No. AI geolocation involves uncertainty. We emphasize confidence thresholds, refuse-by-default when evidence is insufficient, and recommend corroboration.
Is this OSINT software?
GeoEvident can support OSINT verification workflows, but we are not a "public OSINT toy." We provide enterprise-grade investigative tooling with safeguards, governance, and auditability.
Glossary
- AI-powered photo geolocation
- Using machine learning and visual matching to estimate where a photo was taken.
- Image geolocation / photo location verification
- Validating or inferring location signals from imagery.
- Evidence reporting
- Producing a documented output suitable for audits, investigations, and verification records.
- OSINT
- Open Source Intelligence — analysis and verification using publicly available information.
- KYB / KYC
- Know Your Business / Know Your Customer — verification and due diligence processes to reduce risk and prevent misuse.
Summary
GeoEvident is designed for responsible, evidence-first AI photo geolocation. We restrict access to verified customers, conduct strict due diligence, and enforce prohibited-use rules with technical safeguards and monitoring.
If you represent an organization that needs photo geolocation, image-based location verification, or evidence reporting for legitimate investigative workflows, contact us to begin verification.