CONSENT LOGGING POLICY – WINTEGO SPY
CONSENT LOGGING POLICY – WINTEGO SPY
Effective Date: 27th September 2025
Company: Wintego Spy
Applies to: All software products and monitoring services offered by Wintego Spy
1. PURPOSE OF THIS POLICY
Wintego Spy is committed to legal, consent‑based monitoring only. The Consent Logging Policy ensures that every monitoring session is backed by verifiable, auditable proof of authorization. Without a valid consent log, no monitoring features will activate.
This policy defines:
What constitutes valid consent
How consent is captured, stored, and accessed
Your obligations as a user
The rights of monitored individuals
2. WHAT IS THE CONSENT LOG?
The Consent Log is a secure, tamper‑evident digital record that contains proof of authorization for every monitoring activity performed using Wintego Spy software.
Each consent log entry includes:
| Field | Description |
|---|---|
| Timestamp | Date and time consent was provided (UTC) |
| Monitor Identity | Name, email, or account ID of the person installing the software |
| Monitored Person Identity | Name and identifier of the person being monitored (if applicable) |
| Legal Basis | Selected category: Parental, Employer, Self‑Monitoring, Court Order |
| Consent Method | Digital signature, uploaded PDF, employment contract reference, or court order number |
| Jurisdiction | Selected country/state during installation |
| Permitted Features | List of monitoring features authorized (e.g., screen recording, GPS, keylogging) |
| Duration | Start date and, if applicable, end date of consent |
| Revocation Status | Active, revoked, or expired |
| IP Address | IP address at time of consent (for audit purposes) |
3. HOW CONSENT IS CAPTURED
Before any monitoring feature can be enabled, the installer must complete the Mandatory Consent Workflow:
Step 1 – Select Legal Basis
Choose one of the following:
Parental monitoring – I am the legal parent/guardian of a minor child, I own the device, and the child is aware.
Employer monitoring – I own or represent a business, the device is company‑owned, and employees have signed a written monitoring policy.
Self‑monitoring – I am monitoring a device I personally own and that only I use.
Court order – I possess a valid, unexpired court order authorizing monitoring.
Step 2 – Provide Consent Evidence
Depending on the legal basis selected:
Parental: Upload a signed parental consent form or check a box affirming parent‑minor relationship.
Employer: Upload the signed employee monitoring policy or reference an employment contract section.
Self: Check a box affirming sole ownership and use.
Court order: Upload a PDF of the court order (must be legible and unexpired).
Step 3 – Select Jurisdiction
Choose your country/state from the dropdown. This determines which features are legally permitted.
Step 4 – Certify Under Penalty of Perjury
Check a box affirming:
“I certify under penalty of perjury that I have obtained legally valid, informed, written consent from every person whose device will be monitored, or I fall within an explicit legal exception. I understand that unauthorized surveillance is a criminal offense. I assume all legal liability.”
Step 5 – Consent Log Creation
Once all steps are completed, Wintego Spy generates a unique Consent Log ID (e.g., CL-20250927-8A3F). This ID is stored on our secure servers and locally on the monitored device. Monitoring features are now activated only for the permitted features and duration specified.
4. CONSENT LOG ACCESS & TRANSPARENCY
4.1 Monitor Access
As the person who installed the software, you can view, download, or print the consent log at any time from your Wintego Spy dashboard.
4.2 Monitored Person Access
The monitored person has the right to request a copy of the consent log at any time. This is a non‑negotiable requirement of our policy.
To request a consent log:
The monitored person emails consent@wintego.com with the device ID or their name and the monitor’s email address.
Wintego Spy will verify the request and provide the consent log within 72 hours (or immediately if automated verification is possible).
4.3 Law Enforcement Access
We will provide consent logs to law enforcement upon presentation of a valid subpoena, warrant, or court order.
4.4 Wintego Spy Internal Access
Wintego Spy employees do not have routine access to consent logs. Access is granted only:
To respond to a verified request from a monitored person
To comply with a law enforcement request
To investigate a reported Terms of Service violation
For system maintenance (logs are anonymized where possible)
All internal access is logged and audited.
5. CONSENT DURATION & REVOCATION
| Legal Basis | Default Duration | Revocation Rights |
|---|---|---|
| Parental monitoring | Until child reaches age of majority | Parent may revoke at any time; child cannot revoke |
| Employer monitoring | Duration of employment + signed policy | Employee may request review; employer controls revocation |
| Self‑monitoring | Indefinite (until user uninstalls) | User may revoke by uninstalling |
| Court order | As specified in the order | Only by subsequent court order |
How to Revoke Consent
Monitor‑initiated: From your dashboard, click “Revoke Consent.” Monitoring stops immediately. The consent log is archived but not deleted.
Monitored person‑initiated (where permitted): Email revocation request to consent@wintego.com. We will investigate and, if legally valid, disable monitoring within 7 days.
Revocation does not delete the consent log. Logs are retained for 7 years for legal audit purposes.
6. WHAT HAPPENS WITHOUT A VALID CONSENT LOG?
No consent log = No monitoring.
If the consent log is missing, expired, revoked, or tampered with:
| Scenario | Result |
|---|---|
| Fresh installation with no consent log | All monitoring features remain disabled. User sees error: “Consent required. Complete the Consent Workflow.” |
| Existing consent log expires | Monitoring automatically stops. Notification sent to monitor email. |
| Consent log tampering detected (checksum mismatch) | Monitoring stops immediately. Account flagged for review. Possible permanent ban. |
| Jurisdiction change without re‑consent | Monitoring pauses until new consent log is created for the new jurisdiction. |
7. CONSENT LOG STORAGE & SECURITY
| Aspect | Details |
|---|---|
| Storage location | Encrypted servers located in [US/EU – specify]. Redundant backups. |
| Encryption | AES‑256 at rest. TLS 1.3 in transit. |
| Retention period | 7 years after last monitoring activity or account closure. |
| Deletion | After 7 years, logs are permanently and irreversibly deleted. |
| Tamper detection | Each log has a cryptographic hash. Any modification invalidates the log and stops monitoring. |
| Backup | Daily encrypted backups stored separately. |
8. YOUR OBLIGATIONS AS A MONITOR
By using Wintego Spy, you agree to:
Provide truthful information in the consent workflow. Falsifying jurisdiction, identity, or legal basis is a breach of these Terms and may be a crime.
Maintain proof of consent beyond the digital log. Keep signed originals of any consent forms or court orders.
Notify the monitored person where required by law of their right to access the consent log.
Revoke monitoring immediately if consent is withdrawn or expires.
Not tamper with, delete, or alter the consent log in any way.
Violation of these obligations may result in immediate account termination, permanent ban, and referral to law enforcement.
9. MONITORED PERSON RIGHTS
If you believe you are being monitored by Wintego Spy without your consent, you have the following rights:
| Right | How to Exercise |
|---|---|
| Request a copy of the consent log | Email consent@wintego.com with device ID or monitor’s email |
| Request revocation of monitoring | Email revocation@wintego.com (if legally entitled to revoke) |
| Request deletion of your data | Email privacy@wintego.com (subject to legal retention requirements) |
| Report unauthorized monitoring | Email abuse@wintego.com |
| Contact law enforcement | We will cooperate fully with any investigation |
We respond to all monitored person requests within 72 hours (excluding weekends and legal holidays).
10. AUDIT & ENFORCEMENT
Wintego Spy conducts random audits of consent logs to detect patterns of abuse (e.g., repeated false jurisdictions, identical consent forms used across multiple accounts, signs of forgery).
If an audit reveals a violation:
First violation (non‑criminal): Warning and requirement to re‑complete consent workflow.
Second violation or evidence of intentional fraud: Immediate account termination, permanent ban, and forfeiture of any paid fees.
Evidence of criminal activity (e.g., spying on spouse without consent): Account termination, permanent ban, and referral to law enforcement with all evidence including consent logs, IP addresses, and payment information.
11. CHANGES TO THIS POLICY
Wintego Spy may update this Consent Logging Policy as laws change or as we improve our compliance systems. The effective date at the top of this page will be updated accordingly. Material changes will be notified via email to all active users.
Your continued use of the software after changes constitutes acceptance of the revised policy.
12. CONTACT FOR CONSENT LOGGING QUESTIONS
| Purpose | Contact |
|---|---|
| Monitored person consent log request | consent@wintego.com |
| Revocation request | revocation@wintego.com |
| Report unauthorized monitoring | abuse@wintego.com |
| General compliance questions | compliance@wintego.com |
| Law enforcement inquiries | legal@wintego.com |
13. ACKNOWLEDGMENT
By installing, configuring, or using Wintego Spy software, you acknowledge that you have read, understood, and agreed to this Consent Logging Policy. You further acknowledge that monitoring without a valid, unexpired consent log is a violation of these Terms and may be a criminal offense in your jurisdiction.
Effective as of 27th September 2025
Wintego Spy – No consent log. No monitoring. No exceptions.