We understand that your private and personal information, both that can identify you and that is somewhat anonymized are things you hold dear and want to understand fully what happens to this information while in our hands. So lets unpack the story for you.
The short answer is no, we do not use cookies or trackers. That's why there was no annoying popup when you arrived. There are no analytics systems running anywhere on this website, there are no cookies stored on your browser either. Feel free to check.
Nothing at all, enough companies track you all across the web, we have no interest in being one of them. You should know and understand however that your IP address is recorded in the logs of the server to indicate who or what requested this page or any other on this website or other web based services provided by WeNough.
Data systems built by us however keep track of user sessions through disk persistent session identifiers which are generated on our side, these do not make use of any personal information, they are completely random but tied to the credentials of the accessing user.
We do not need it if you are not a client, the less information that is valuable to bad actors we have, the less of a target we become for data breaches that seek such high value information, the less of a target we are, the safer your information is.
That does not mean we do not take security seriously, we are a paranoid bunch and as such take every precaution to ensure we operate a secure cloud system environment with regular audits of access and potential network adversarial activities.
Depending on which of the services we provide that you use, certain information provided by you in all likelihood may include information of your clients or business, all this information is directly controlled by you as the contracting agent. Each product or service comes with a fine grain data management dashboard with access control capabilities so that you can control who even within your organization can view or modify certain information.
We do not take any interest in the data you may choose to store with us or provide us through any data system we provide you, the relevant encryption keys will always reside with you. All network traffic to and from our services is encrypted, data protection standards are ISO 27001 compliant.
As a client of WeNough, in the event you choose to no longer use our services, all copies of any data pertaining to you will be automatically deleted within 30 days. Information relevant to record keeping as prescribed by law will however be retained for the minimum period prescribed for compliance with law, after which it will be permanently deleted.
As an ongoing client of WeNough, all information pertaining to you or your organization is well within your rights to request and you will be furnished with the most upto date copy we have.
Network security logs of the services you make use of will only be provided in the event of a critical system failure or breach either on our end or yours.
As a client of WeNough, certain information will however be required from you in order to be able to render services or products to you or your organization and to be able to effectively communicate any necessary information. this information may include but is not limited to: Name, Surname, Identity No, Address, Phone Number, Organization Registration documents, Banking information and other critical business information.
This information is required to know who we are dealing with and from where in order to best serve your needs. You may contact us to either update this information or request an upto date copy of it. You may need to verify that you are indeed the relevant entity this information belongs to first before we will provide a copy.
We do not make use of any third party data processors, all data provided to us remains within the company, nothing data related is outsourced or accessed by third parties.
We do not sell any information to any third party under any circumstance nor do we provide access to it to any third party.
Legal requests for data will only be acknowledged if a relevant court order is provided and verified to be valid.