When you use our product, in addition to entrusting us with your information, you should know that it is protected and kept strictly confidential, in accordance with current legislation, in particular the General Data Protection Act. This Privacy Policy is intended to help you understand what data we collect, why we collect it and what we do with it. We hope you will take the time to read this policy carefully.
About the website
Your privacy is important to us. It is our policy to respect your privacy regarding any information we may collect from you across this site, and other sites we own and operate.
We only ask for personal information when we really need it to provide you with a service. We do this by fair and lawful means, with your knowledge and consent. We also tell you why we are collecting it and how it will be used.
We only retain the information collected for as long as necessary to provide the requested service. When we store data, we protect it within commercially acceptable means to prevent loss and theft, as well as unauthorized access, disclosure, copying, use or modification.
We do not share personally identifiable information publicly or with third parties, except as required by law.
Our website may contain links to external websites that are not operated by us. Please be aware that we have no control over the content and practices of these sites and cannot accept responsibility for their respective privacy policies.
You are free to refuse our request for personal information on the understanding that we may not be able to provide some of the services you require.
Your continued use of our website will be deemed acceptance of our practices around privacy and personal information. If you have any questions about how we handle user data and personal information, please contact us.
Information we collect.
The Basic and Compliance plans do not collect information on what users are accessing, only specific information related to hardware and software, IP, and machine performance.
In the other plans, such as Metering, Forensics and Ingite, the tool collects information associated with the actions that the user makes on a monitored computer.
Metering, Forensics and Ingite plans: once an application or website is used and/or accessed, an event on behalf of this action is generated and sent to our servers, containing various types of information, such as those illustrated below:
- Application name
- Website name (server and URL)
- Date and time of use
- Computer name
- Name of the user who performed the action
- Duration of action
- Among others
The Forensics and Ingite plans allow business data to be collected through existing product features, such as key logging (monitoring what is being typed), monitoring file activity, screen shots (in these cases the screen is recorded from the computer itself). However, this type of information collected will only be displayed on the dashboard if it has been previously authorized by the account administrator and in accordance with the plan purchased (through prior configuration or any other mechanism provided), while of course preserving the information captured there. This behavior is disabled by default. The collection of business data will only be carried out if previously approved between the parties – Licensor (Ingite) and Licensee (you) – which may occur, for example, for customizations of functionalities requested in the product by the Licensee.
Why do we collect this data?
One of the main purposes of the product is to provide real insights so that you can take action to ensure compliance in the use of computers and the execution of operational work procedures, improve productivity, and so on. This is why we collect the aforementioned data, among others, so that the tool can provide this information. Without the actual actions (events and data) carried out on the monitored computers, we would not be able to provide this insight.
How do we use the information we collect?
As you already know, the information captured by Ingite is accessed only by you, i.e., we safeguard and preserve all the data obtained on the tool’s own server. We generate graphs based on your data for a better visualization of the facts. In compliance with current legislation, under no circumstances do we use the information collected for any type of analysis or action.
Types of information we really use
The information we use is usage statistics of product functionalities to allow us to know and anticipate how to improve our functionalities to provide even more value to the end user. We only use product usage statistics and therefore do not use data collected from the monitored computers as described in the previous section.
Data visibility
Your data is kept completely secure. Only the owner of the original account can see the data associated with it, which means that only you can see your own data from the monitored computers associated with the original account. In other words, third parties cannot access it. If you request Ingite support from one of the trained professionals designated by Ingite and it is necessary for them to access one of your computers, this will only be done with your express authorization/agreement.
How do we protect your data?
All data collected is sent in encrypted form (HTTPS). We transfer the data completely securely so that third parties cannot access it. We use digital certificates issued by well-known security authorities to provide this encryption. In addition, sensitive data, such as your login password, is also stored in encrypted form. The display of the data is intended only for the account owner, i.e., only you can see your own data. The application is also signed to ensure credibility and security in such a way that the operating system can know the provider from which the application originated. It should be noted that we constantly review infrastructure, storage and processing practices, including physical security measures, to prevent unauthorized access to systems.
Environment privacy policy
You, the account owner, are committed to complying with the existing policies of the environment in which you are located, especially from a legal point of view, in accordance with current legislation, and are fully responsible for ensuring that the computers can actually be monitored and also do not violate the privacy of any user – based on the privacy policy of the respective environment – who uses these computers.
Changes
Our Privacy Policy may be updated depending on the evolution of the tool, compliance with legislation, among others.
We will therefore promptly publish any changes to this policy on this page. If the changes are substantial, we will notify you as soon as possible (by e-mail, via the system, by telephone, etc.).