CONSENT LOGGING POLICY – WINTEGO SPY

CONSENT LOGGING POLICY – WINTEGO SPY

Effective Date: 27th September 2025
Company: Wintego Spy
Applies to: All software products and monitoring services offered by Wintego Spy


1. PURPOSE OF THIS POLICY

Wintego Spy is committed to legal, consent‑based monitoring only. The Consent Logging Policy ensures that every monitoring session is backed by verifiable, auditable proof of authorization. Without a valid consent log, no monitoring features will activate.

This policy defines:

  • What constitutes valid consent

  • How consent is captured, stored, and accessed

  • Your obligations as a user

  • The rights of monitored individuals


2. WHAT IS THE CONSENT LOG?

The Consent Log is a secure, tamper‑evident digital record that contains proof of authorization for every monitoring activity performed using Wintego Spy software.

Each consent log entry includes:

 
 
FieldDescription
TimestampDate and time consent was provided (UTC)
Monitor IdentityName, email, or account ID of the person installing the software
Monitored Person IdentityName and identifier of the person being monitored (if applicable)
Legal BasisSelected category: Parental, Employer, Self‑Monitoring, Court Order
Consent MethodDigital signature, uploaded PDF, employment contract reference, or court order number
JurisdictionSelected country/state during installation
Permitted FeaturesList of monitoring features authorized (e.g., screen recording, GPS, keylogging)
DurationStart date and, if applicable, end date of consent
Revocation StatusActive, revoked, or expired
IP AddressIP address at time of consent (for audit purposes)

3. HOW CONSENT IS CAPTURED

Before any monitoring feature can be enabled, the installer must complete the Mandatory Consent Workflow:

Step 1 – Select Legal Basis

Choose one of the following:

  • Parental monitoring – I am the legal parent/guardian of a minor child, I own the device, and the child is aware.

  • Employer monitoring – I own or represent a business, the device is company‑owned, and employees have signed a written monitoring policy.

  • Self‑monitoring – I am monitoring a device I personally own and that only I use.

  • Court order – I possess a valid, unexpired court order authorizing monitoring.

Step 2 – Provide Consent Evidence

Depending on the legal basis selected:

  • Parental: Upload a signed parental consent form or check a box affirming parent‑minor relationship.

  • Employer: Upload the signed employee monitoring policy or reference an employment contract section.

  • Self: Check a box affirming sole ownership and use.

  • Court order: Upload a PDF of the court order (must be legible and unexpired).

Step 3 – Select Jurisdiction

Choose your country/state from the dropdown. This determines which features are legally permitted.

Step 4 – Certify Under Penalty of Perjury

Check a box affirming:

“I certify under penalty of perjury that I have obtained legally valid, informed, written consent from every person whose device will be monitored, or I fall within an explicit legal exception. I understand that unauthorized surveillance is a criminal offense. I assume all legal liability.”

Step 5 – Consent Log Creation

Once all steps are completed, Wintego Spy generates a unique Consent Log ID (e.g., CL-20250927-8A3F). This ID is stored on our secure servers and locally on the monitored device. Monitoring features are now activated only for the permitted features and duration specified.


4. CONSENT LOG ACCESS & TRANSPARENCY

4.1 Monitor Access

As the person who installed the software, you can view, download, or print the consent log at any time from your Wintego Spy dashboard.

4.2 Monitored Person Access

The monitored person has the right to request a copy of the consent log at any time. This is a non‑negotiable requirement of our policy.

To request a consent log:

  • The monitored person emails consent@wintego.com with the device ID or their name and the monitor’s email address.

  • Wintego Spy will verify the request and provide the consent log within 72 hours (or immediately if automated verification is possible).

4.3 Law Enforcement Access

We will provide consent logs to law enforcement upon presentation of a valid subpoena, warrant, or court order.

4.4 Wintego Spy Internal Access

Wintego Spy employees do not have routine access to consent logs. Access is granted only:

  • To respond to a verified request from a monitored person

  • To comply with a law enforcement request

  • To investigate a reported Terms of Service violation

  • For system maintenance (logs are anonymized where possible)

All internal access is logged and audited.


5. CONSENT DURATION & REVOCATION

 
 
Legal BasisDefault DurationRevocation Rights
Parental monitoringUntil child reaches age of majorityParent may revoke at any time; child cannot revoke
Employer monitoringDuration of employment + signed policyEmployee may request review; employer controls revocation
Self‑monitoringIndefinite (until user uninstalls)User may revoke by uninstalling
Court orderAs specified in the orderOnly by subsequent court order

How to Revoke Consent

  • Monitor‑initiated: From your dashboard, click “Revoke Consent.” Monitoring stops immediately. The consent log is archived but not deleted.

  • Monitored person‑initiated (where permitted): Email revocation request to consent@wintego.com. We will investigate and, if legally valid, disable monitoring within 7 days.

Revocation does not delete the consent log. Logs are retained for 7 years for legal audit purposes.


6. WHAT HAPPENS WITHOUT A VALID CONSENT LOG?

No consent log = No monitoring.

If the consent log is missing, expired, revoked, or tampered with:

 
 
ScenarioResult
Fresh installation with no consent logAll monitoring features remain disabled. User sees error: “Consent required. Complete the Consent Workflow.”
Existing consent log expiresMonitoring automatically stops. Notification sent to monitor email.
Consent log tampering detected (checksum mismatch)Monitoring stops immediately. Account flagged for review. Possible permanent ban.
Jurisdiction change without re‑consentMonitoring pauses until new consent log is created for the new jurisdiction.

7. CONSENT LOG STORAGE & SECURITY

 
 
AspectDetails
Storage locationEncrypted servers located in [US/EU – specify]. Redundant backups.
EncryptionAES‑256 at rest. TLS 1.3 in transit.
Retention period7 years after last monitoring activity or account closure.
DeletionAfter 7 years, logs are permanently and irreversibly deleted.
Tamper detectionEach log has a cryptographic hash. Any modification invalidates the log and stops monitoring.
BackupDaily encrypted backups stored separately.

8. YOUR OBLIGATIONS AS A MONITOR

By using Wintego Spy, you agree to:

  1. Provide truthful information in the consent workflow. Falsifying jurisdiction, identity, or legal basis is a breach of these Terms and may be a crime.

  2. Maintain proof of consent beyond the digital log. Keep signed originals of any consent forms or court orders.

  3. Notify the monitored person where required by law of their right to access the consent log.

  4. Revoke monitoring immediately if consent is withdrawn or expires.

  5. Not tamper with, delete, or alter the consent log in any way.

Violation of these obligations may result in immediate account termination, permanent ban, and referral to law enforcement.


9. MONITORED PERSON RIGHTS

If you believe you are being monitored by Wintego Spy without your consent, you have the following rights:

 
 
RightHow to Exercise
Request a copy of the consent logEmail consent@wintego.com with device ID or monitor’s email
Request revocation of monitoringEmail revocation@wintego.com (if legally entitled to revoke)
Request deletion of your dataEmail privacy@wintego.com (subject to legal retention requirements)
Report unauthorized monitoringEmail abuse@wintego.com
Contact law enforcementWe will cooperate fully with any investigation

We respond to all monitored person requests within 72 hours (excluding weekends and legal holidays).


10. AUDIT & ENFORCEMENT

Wintego Spy conducts random audits of consent logs to detect patterns of abuse (e.g., repeated false jurisdictions, identical consent forms used across multiple accounts, signs of forgery).

If an audit reveals a violation:

  • First violation (non‑criminal): Warning and requirement to re‑complete consent workflow.

  • Second violation or evidence of intentional fraud: Immediate account termination, permanent ban, and forfeiture of any paid fees.

  • Evidence of criminal activity (e.g., spying on spouse without consent): Account termination, permanent ban, and referral to law enforcement with all evidence including consent logs, IP addresses, and payment information.


11. CHANGES TO THIS POLICY

Wintego Spy may update this Consent Logging Policy as laws change or as we improve our compliance systems. The effective date at the top of this page will be updated accordingly. Material changes will be notified via email to all active users.

Your continued use of the software after changes constitutes acceptance of the revised policy.


12. CONTACT FOR CONSENT LOGGING QUESTIONS

 
 
PurposeContact
Monitored person consent log requestconsent@wintego.com
Revocation requestrevocation@wintego.com
Report unauthorized monitoringabuse@wintego.com
General compliance questionscompliance@wintego.com
Law enforcement inquirieslegal@wintego.com

13. ACKNOWLEDGMENT

By installing, configuring, or using Wintego Spy software, you acknowledge that you have read, understood, and agreed to this Consent Logging Policy. You further acknowledge that monitoring without a valid, unexpired consent log is a violation of these Terms and may be a criminal offense in your jurisdiction.


Effective as of 27th September 2025


Wintego Spy – No consent log. No monitoring. No exceptions.

Scroll to Top