FAQ
Common questions about governance, privacy enforcement, and how PresidiumIQ is scoped at launch.
Questions
Is this just broker removal?
No. Broker removal is the first enforcement primitive in Phase 1. PresidiumIQ is a broader governance platform for identity, presence, and access control.
The long-term value is ongoing decisions, not one-time cleanup.
How is this different from DeleteMe-style services?
Traditional services outsource periodic removal work and send status reports. PresidiumIQ adds a decision layer with explicit policy, consent controls, and a persistent audit trail.
You get visibility into what changed, why it changed, and what happens next.
Do you bypass CAPTCHAs or scrape gated sites?
No. PresidiumIQ does not bypass CAPTCHAs, does not scrape behind logins or paywalls, and does not circumvent technical restrictions. It operates through official broker channels and lawful workflows.
Do you access my accounts or scan my devices?
No. PresidiumIQ does not require account passwords and does not scan your devices. It uses only the minimum data required to run approved privacy workflows.
Are you doing PR or sentiment manipulation?
No. PresidiumIQ does not manipulate sentiment, push content, or run reputation PR campaigns. It focuses on verifiable governance actions and traceable outcomes.
What do you mean by front door?
A front door is a controlled point of entry to your identity and presence. It defines what can reach you, through which channels, under which policies.
What happens after removal is done?
Removal is followed by monitoring and re-enforcement. If exposure returns, it re-enters your decision feed as action. The goal is durable control over time.
What does audit trail mean for me?
Every meaningful action is recorded with status and timestamp, including approvals, interventions, and outcomes. You can review history and export records without exposing unnecessary personal data.
What is available now versus later phases?
Phase 1 is live at launch and centers on privacy enforcement. Phase 2, coming next, expands into presence, reputation, and security context. Phase 3, later, adds intent and availability controls for inbound governance.
All phases share one identity graph, one decision feed, and one audit trail.
