Security & Data Handling
MemoryJar is built local-first for analysts who work with sensitive data — investigations, case files, source material, evidence. Everything below is what the product actually does. We don't overclaim on certifications and we don't ship telemetry you didn't agree to.
Your data lives in a database on your machine. MemoryJar runs as a desktop application with no cloud dependency. You can use it fully offline, on an air-gapped workstation, or on a USB portable install — with identical functionality.
There is no vendor lock-in. Export your entire workspace to JSON at any time and the file contains every node, edge, note, attribute, and attachment metadata record. Move between machines, back up to cold storage, or archive a closed case — all with a single file.
Solo mode sends zero telemetry. Team mode sends data only to the Shelf (team server) that you host or join — not to us. The update notification pings our server for a version string; that check can be disabled from the app's top bar.
Built-in support for evidence handling, chain of custody, and admissibility.
Every file attachment is hashed with SHA-256 at the moment of attachment using the Web Crypto API. The hash is stored alongside the file in the database and included in exported reports, providing evidence that the file has not been altered since it was attached. Hashes are recomputed and verified on demand.
Each attachment supports structured forensic fields: exhibit ID, case number, collected-by, collected-at timestamp (ISO 8601), collection method, and custody notes. These fields appear in the HTML and DOCX report appendices.
Workspaces and individual entities support configurable sensitivity labels — e.g. Public, Internal, Confidential, Restricted. Markings render on-screen and embed in every exported report. Use the built-in tiered scheme or define your own labels to match your organization's policy. Not a certification — a workflow feature that lets teams who work with sensitive material carry their existing marking conventions into the tool.
A one-click export produces a ZIP bundle containing: the full workspace as JSON, every attached file in an exhibits/ directory, HTML and DOCX reports, a manifest.json listing every artifact with its SHA-256, and chain-of-custody metadata. Designed to be handed off to a court, a supervisor, or long-term evidence storage without modification.
Reports (Analytical, Hierarchical, Evidence Package) are generated from the live workspace state. No AI-generated content, no hallucinated narrative — every sentence traces back to a specific node, edge, or attribute the analyst recorded. This is deliberate: courtroom admissibility (FRE 901) requires provenance for every claim in a report.
How MemoryJar maps to the compliance frameworks enterprise and regulated-industry buyers ask about. Precise language, honest limits.
Local-first storage eliminates cloud-transit and residency concerns up front. Role-based access and activity logging support the access-control and audit requirements common to regulated industries (healthcare, financial services, legal, insurance). We don't claim HIPAA / PCI / GDPR certification — those attestations attach to deployed systems, not client-side software — but the architecture removes the common failure modes that trip audits.
MemoryJar uses the browser and OS-level cryptographic routines of the host platform (Windows CNG, macOS CommonCrypto, Node.js OpenSSL). On systems configured for FIPS 140 compliance, those routines inherit that posture. No bespoke crypto, no rolled-our-own algorithms.
MemoryJar runs fully offline — no internet required for installation, operation, or data portability. This includes Team mode: the Shelf can run on a LAN with no WAN connectivity. For customers with air-gap requirements, no further configuration is necessary.
To be transparent: MemoryJar is not SOC 2, FedRAMP, StateRAMP, or HIPAA certified. These certifications require formal audit by an accredited third party and are generally awarded to hosted services, not desktop software. We are open to pursuing formal attestations where a customer's procurement process requires them.
If you discover a vulnerability or have a security concern, please email security@memoryjarsoftware.com. We respond within two business days.
We prefer coordinated disclosure. Please give us a reasonable window to ship a fix before public release.
We'll fill out your security questionnaire, vendor review form, or RFP. Send it to dustin@memoryjarsoftware.com.
See pricing