Compliance & Privacy FAQ
Answers to the questions legal and compliance teams ask when evaluating AIR Kit. If your question isn’t covered here, reach out at support@moca.network.Data Storage & PII
Does AIR Kit store our customers’ personal data? No. AIR Kit stores only cryptographic credential hashes on Moca Chain — the proof that a credential exists and is valid. The underlying personal data (name, passport number, date of birth, address) never leaves your systems or your KYC provider’s systems. What does a credential actually contain? Only the attributes you define when you create the credential schema. Best practice — and what every AIR Kit integration guide enforces — is to store only derived facts:isOver18: true, kycLevel: "enhanced", tier: "Gold". Not the raw data those facts were derived from.
Can AIR Kit or Moca Network read our customers’ credential data?
The credential attributes you define are visible to issuers and authorised verifiers. Moca Network does not access credential content for commercial purposes. The cryptographic design means even if the chain data were inspected, it reveals only hashes without the signing keys.
Where is data stored geographically?
Moca Chain is an EVM-compatible L1. Credential hashes are stored on-chain. For data residency requirements (EU, Australia, etc.), the critical question is whether personal data is stored — and it is not. Credential hashes are not personal data under GDPR Recital 26 as they cannot reasonably be used to identify a natural person without the corresponding keys.
GDPR
Is this compliant with GDPR Article 5(1)(c) — data minimisation? Yes. The credential contains only the minimum necessary attestation. This is enforced at schema design time — our integration guides explicitly prohibit including raw PII fields incredentialSubject.
How do we handle Article 17 data subject deletion requests?
Revoke the credential via one API call. Revocation is instant and on-chain. The credential becomes unverifiable immediately. The hash on-chain remains (the chain is immutable) but contains no personal data and is cryptographically inert.
Does issuing credentials constitute international data transfer under GDPR Chapter V?
No personal data is transferred during credential issuance or verification. The ZK proof flow means verifiers receive only boolean results, not personal data. There are no SCCs or adequacy decision requirements.
Who is the data controller?
You are the data controller for your customers’ personal data. AIR Kit acts as a data processor in the narrow sense that it processes the credential hash. The personal data underlying the credential remains within your data controller boundary.
Does consent need to be obtained to issue credentials?
You are issuing credentials based on business events within your existing relationship with the user (loyalty programme membership, KYC completion, subscription activation). This typically falls within the legitimate interest or contractual necessity lawful basis. Review with your DPO for your specific context.
CCPA / CPRA
Does issuing AIR Kit credentials constitute “selling” personal information under CCPA? No personal information is transferred to AIR Kit or Moca Network. Credential verification by a partner transmits only boolean results — not personal information as defined under CCPA 1798.140. How do we handle opt-out requests? Revoke the user’s credentials. They become unverifiable across the ecosystem immediately.Security & Breach Liability
What is the breach liability for verifiers accepting AIR Kit credentials? Verifiers hold no personal data — they receive only COMPLIANT / NON_COMPLIANT signals. A breach of a verifier’s systems exposes nothing about the credential holder’s identity. What is the breach liability for issuers? As issuer, you hold the credential schema and the signed credential hashes. The underlying personal data (passport, KYC documents) remains with your KYC provider. A breach of AIR Kit’s credential infrastructure would expose only hashes, which are computationally infeasible to reverse without the corresponding ZK keys. Is there an audit trail for credential issuance and verification? Yes. Every issuance and verification event is recorded on Moca Chain with a timestamp and participant identifiers. The chain provides an immutable audit log.Credentials & Revocation
How quickly does credential revocation take effect? Revocation is on-chain and propagates within one block (~1 second on Moca Chain). Any verifier calling the SDK after that point will receive a NON_COMPLIANT result. What happens to credentials if a user closes their account? Revoke all credentials associated with the user via the API. They become unverifiable immediately. If the user later re-onboards, new credentials are issued fresh. Can a user hold credentials from multiple issuers in one AIR Account? Yes. An AIR Account can hold credentials from any number of issuers. The user controls which credentials to present at any given verifier. Can credentials expire? Yes. You set anexpirationDate in the credential subject. After expiry, the credential returns NON_COMPLIANT. You can re-issue with a new expiry at any time.