10 Total
1 High severity
7 Medium severity
2 Low severity
Summary

This is Bluesky's privacy policy explaining what data the social media platform collects about you, how it uses that data, and who it shares it with. The most important thing to know is that your direct messages on Bluesky are not encrypted and can be read by Bluesky staff for safety purposes, and your public posts, likes, follows, and profile are visible to the entire decentralized network including third-party servers outside Bluesky's control. You can request access to, correction of, or deletion of your personal data by contacting Bluesky's privacy team at privacy@bsky.app.

Technical / Legal Breakdown

This document is Bluesky Social, PBC's privacy policy governing the collection, use, and sharing of personal data by the Bluesky microblogging application and website, with Bluesky acting as data controller as explicitly stated in the policy. The policy states that Bluesky collects account data (email, phone, birth date, images), usage data (IP address, device identifiers, browsing behavior within the app), direct messages (described as unencrypted and accessible for Trust and Safety purposes), and may collect biometric-adjacent data through third-party age verification services including facial age estimation and government ID verification. A structurally notable provision is the explicit statement that direct messages are unencrypted and can be accessed for Trust and Safety purposes, which diverges from the end-to-end encryption practices offered by some messaging platforms and creates a meaningful distinction users should understand; the policy also acknowledges the decentralized AT Protocol architecture means public posts are distributed across the network, potentially beyond Bluesky's direct control. The policy engages GDPR (referencing Standard Contractual Clauses for EEA transfers), UK data protection law, Brazil's LGPD, CCPA and other US state privacy laws, and COPPA-adjacent age verification obligations; the policy includes supplemental jurisdiction-specific notices and articulates legal bases for processing for jurisdictions that require such disclosure. Compliance teams should note the intersection of the AT Protocol's decentralized architecture with data deletion rights, as the practical enforceability of deletion requests against third-party nodes hosting federated content is not fully addressed in the document.

Institutional Analysis

Institutional analysis available with Professional

Regulatory exposure by statute, material risk assessment, vendor due diligence action items, and enforcement precedent. Available on Professional.

Start Professional free trial
High — 1 provision
Medium — 7 provisions
Low — 2 provisions

Monitoring

Bluesky has updated this document before.

Watcher includes same-day alerts, structured change summaries, and monitoring for up to 10 platforms.

Start Watcher free trial Or create a free account →

Professional Governance Intelligence

Need provision-level monitoring and regulatory mapping?

Professional includes governance timelines, compliance memos, audit-ready analysis, and full provision tracking.

Start Professional free trial

Cross-platform context

See how other platforms handle Public-by-Design Decentralized Content and similar clauses.

Compare across platforms →

Mapped Governance Frameworks

CCPA/CPRA
California, USA
View official text ↗
Connecticut Data Privacy Act Amendments
US-CT
View official text ↗
CAN-SPAM
United States Federal
View official text ↗
DMA
European Union
View official text ↗
FTC Act Section 5
United States Federal
View official text ↗
GDPR
European Union
View official text ↗
Indiana Consumer Data Protection Act
US-IN
View official text ↗
Kentucky Consumer Data Protection Act
US-KY
View official text ↗
Universal Opt-Out Mechanism Expansion 2026
US
View official text ↗
VPPA
United States Federal
View official text ↗
Archival ProvenanceSource & Archival Record
Last Captured May 5, 2026 06:17 UTC
Capture Method Automated scheduled archival capture
Document ID CA-D-000540
Version ID CA-V-001245
SHA-256 51663972bd8dfd348606bf98fdef52ccb08dcbef868cd8dfa4bca13b12cc0b4e
✓ Snapshot stored ✓ Text extracted ✓ Change verified ✓ Hash verified

Governance Monitoring

Monitor governance changes across the platforms you rely on.

Structured alerts for policy changes, governance events, and provision updates across 318+ platforms.

Create free account Compare plans