PRIVACY

Privacy policy

Last updated 2026-03-12.

Trades Backer is a secure application intake and management web application built specifically for skilled trades hiring. It was designed and built by people with trades and workforce-process experience from the ground up without a CMS, a database-backed content system, or third-party plugins. Our default posture is to minimize what the server can see: sensitive content is encrypted in your browser before upload, and decryption happens locally.

Scope and roles

This policy describes how Trades Backer handles information across the public site, the encrypted application intake, the Employer Dashboard, and the Staff Portal.

What we store

Trades Backer is designed so that sensitive payloads are encrypted before upload. The server stores:

What we do not store in plaintext

We do not store application answers, uploaded documents, or message bodies in plaintext on the server. Your identifying and contact information provided on an application form is included inside the encrypted payload. Decryption happens locally in the browser using a private key provided by the employer (or by staff for staff-only streams).

Contact messages

Messages submitted through the Contact page are encrypted to the staff key and appear in the Staff Portal “Messages” inbox. Staff may add internal notes and a status label to help route and respond. Those staff notes are stored as part of the staff manifest.

How we use information

Public pages, referrals, and basic analytics signals

Public pages on this site may generate standard web-server request logs and may receive first-party source tags in the URL (for example, ?src= parameters or UTM values) when an employer shares a listing across job boards, social media, QR materials, dispatch updates, or website links. We use those signals to help identify where traffic and applications came from.

Cookies and authentication

The dashboard uses short-lived session cookies to validate access after you authenticate with your key. We may also accept signed-request headers as a sessionless fallback for authorized dashboard actions. We do not use third-party tracking scripts. We may use first-party, strictly necessary browser storage (such as session storage and limited localStorage metadata) for non-sensitive UI state, remembered routing preferences, and source attribution for listings. Source labels are intended to identify channels, not to create third-party behavioral profiles.

Sharing and access

Trades Backer cannot decrypt employer-encrypted application payloads. Only the holder of the matching private key can decrypt those submissions. Staff can decrypt staff-encrypted inbox items (for example, listing requests and contact messages) in order to coordinate publishing and support. We do not sell personal information.

Security practices

Data retention and deletion

Ciphertext is retained to support ongoing reviews and exports, but the operator may configure automatic ciphertext purging. The default retention window is typically 180 days (see storageRetentionDays), after which encrypted blobs may be removed server-side while keeping a minimal “purged” manifest row for basic history.

Operational logging

Trades Backer keeps narrow operational and abuse-prevention logs to protect the service and troubleshoot failures. These logs are intended to capture metadata such as timestamp, outcome, route, project, key identifier, and hashed request fingerprints. They are not intended to store decrypted application answers, uploaded document contents, private keys, or message bodies.

Your choices

Employer-controlled data after decryption

Once an employer or organization decrypts and exports applicant information, that copied data is controlled by that employer or organization under its own internal practices, systems, and legal obligations. Trades Backer does not control how a recipient stores, shares, or deletes data after it has been decrypted or exported from the dashboard.

Contact and requests

Questions about this policy, project-level deletion requests, or privacy-related requests should be sent through the Contact form on this site. Include the listing name and an approximate submission date or time when possible so staff can identify the correct project stream.

Changes to this policy

We may update this policy as the platform evolves. The “Last updated” date reflects the most recent revision.