TraceLink connects missing persons reports, public sightings, and unidentified hospital patients — with privacy-first matching, careful handling of sensitive media, and secure communication.
“Behind every report is a family waiting. Every sighting, a thread worth pulling.”
TraceLink was built on a simple belief: safe, coordinated information-sharing can reunite families and bring dignity to the unidentified. The platform operates with protective defaults — blurred images, optional anonymity, and human review at every critical step.
A simple, respectful flow designed for speed, clarity, and the protection of everyone involved.
Create a report — missing person, sighting, hospital, or morgue. Anonymous if needed. You receive a reference code.
TraceLink structures details into a person profile, ready for careful matching and investigator review.
Rules-based similarity scoring surfaces match candidates. A designated investigator confirms or rejects — always human-led.
Secure, alias-based messaging enables coordination without forcing identity exposure until both parties are ready.
Every feature exists because someone, somewhere, needed it.
Submit sightings with location, time, and description. Your identity stays optional. You get a reference code regardless.
Hospitals and morgues report through verified accounts, with role permissions and full audit trails.
Similarity scoring ranks candidates — reviewed by investigators, never auto-confirmed.
Uploads are blurred by default. Clear viewing requires permissions and (where configured) an access code.
Actions like image access, status changes, and match decisions are logged with user, timestamp, and reason.
Alias-based conversations by default; identity reveal only when both parties explicitly consent.
Every entry in the system is someone’s person — someone’s reason to keep searching.
All images are representational. TraceLink handles real cases with complete privacy and care.
Every design decision in TraceLink asks: what could go wrong, and how do we prevent it? From blurred images to anonymous aliases, protection is not an add-on — it’s the foundation.
Verified institutional access with role-based permissions — so the right people see only what they need to.
Hospitals and morgues onboard with verified accounts. Role-based permissions control what staff can access, view, or modify.
Review match candidates, update case status, document decisions, and communicate securely — in an auditable workflow.
Every sensitive action generates an audit log entry. Governance oversight is built in from day one.