Security principles
Least exposure
Least exposure
Limit distribution of sensitive search context and share only what collaborators need.
Controlled access
Controlled access
Use team roles (owner/admin/editor/viewer) to limit sensitive actions to authorized users.
Traceable workflows
Traceable workflows
Keep investigations inside projects and history so actions and findings remain auditable.
Data handling in investigations
Compliance checklist
Use this checklist before formal reporting:- Lawful basis and internal authorization confirmed
- Scope and purpose documented
- Critical findings cross-verified
- False-positive risk assessed
- Share/export audience validated
Product boundaries
- What Osintly provides
- What Osintly does not provide
Search launch and streaming UI, result history, monitoring workflows, collaboration features, and export options exposed by the interface.
For plan features and limits related to monitoring or collaboration, refer to osint.ly/pricing.