LEGAL USE POLICY – AUTHORIZED MONITORING ONLY
Effective Date: 27t September 2025.
Applies to: All software products offered by Wintego spy (hereinafter “the Software”)
1. OVERVIEW & CORE PRINCIPLE
This Software is designed exclusively for legal, authorized monitoring with the explicit, informed, written consent of the person whose device is being monitored, or under other strict legal exceptions defined by applicable law.
You may NOT use this Software to spy on, surveil, or monitor any individual without their knowledge and express permission, including but not limited to:
Spouses, partners, or romantic companions
Adult children, roommates, or housemates
Employees on personal devices or without a signed monitoring policy
Any third party whose device you do not own or legally control
Violation of this policy may result in immediate termination of your license, legal action against you, and referral to law enforcement.
2. PERMITTED USES (LEGAL GROUNDS)
You may install and use the Software only if one of the following applies:
2.1 Parental Monitoring of Minor Children
You are the legal parent or guardian of a child under the age of majority in your jurisdiction.
You own the device being monitored.
The child is aware that monitoring software is installed (age-appropriate disclosure).
Monitoring is for the child’s safety and well‑being, not for illegal or abusive purposes.
2.2 Employer Monitoring of Company-Owned Devices
You are the owner or authorized representative of a business or organization.
The device being monitored is company-owned and provided to the employee for work purposes.
Employees have signed a written monitoring policy that explicitly discloses:
What will be monitored (e.g., keystrokes, screenshots, email, location)
When monitoring occurs (e.g., during work hours only)
That the Software may be installed and active
The policy complies with all applicable labor, privacy, and wiretapping laws in your jurisdiction.
2.3 Monitoring Your Own Devices
You are monitoring a device that you personally own and that only you use.
No other person has a reasonable expectation of privacy on that device.
2.4 Legal Guardian or Court Order
You are a court-appointed guardian, conservator, or similar legal representative.
You possess a valid court order or statutory authority permitting the monitoring.
The scope of monitoring does not exceed what the court order allows.
3. PROHIBITED USES (STRICTLY FORBIDDEN)
The following uses are absolutely prohibited and may constitute criminal offenses:
| Prohibited Use | Legal Risk |
|---|---|
| Monitoring a spouse, boyfriend, girlfriend, or ex-partner without consent | Violation of federal and state wiretapping laws (e.g., 18 U.S.C. § 2511) |
| Installing on a roommate’s or friend’s device | Invasion of privacy, computer fraud (CFAA) |
| Secretly monitoring an employee’s personal device or after‑hours activity | Violation of ECPA, GDPR, and labor laws |
| Using “stealth mode” to hide the Software from the device user | May invalidate consent and constitute illegal eavesdropping |
| Recovering deleted messages, ambient audio, or webcam footage without consent | Felony in many jurisdictions |
| Selling or sharing monitoring data with third parties | Data protection violations (GDPR, CCPA) |
| Using the Software to stalk, harass, extort, or intimidate | Criminal harassment/stalking charges |
4. CONSENT REQUIREMENTS
Informed, written consent is mandatory for all monitoring where the device user is not the owner or a minor child under parental authority.
4.1 What constitutes valid consent?
A signed document (physical or electronic) that includes:
Full name of the person being monitored
Date of consent
Specific features that will be used (e.g., screen recording, location tracking, keylogging)
Duration of monitoring (e.g., ongoing until revoked)
Right to revoke consent at any time (except where legally restricted)
The consent must be given freely (not under coercion or threat).
The monitored person must be at least 18 years old (or the age of majority in their jurisdiction).
4.2 Consent logging feature
The Software automatically creates and maintains a Consent Log that records:
Timestamp of consent
Method of consent (digital signature, uploaded PDF, employment contract)
Legal basis selected (parental, employer, court order)
Name/ID of the monitor and the monitored person (if applicable)
This log is accessible to the monitored person upon request. If no valid consent log exists, all monitoring features remain disabled.
5. JURISDICTION & LOCAL LAWS
You are solely responsible for knowing and complying with the laws in your country, state, and local jurisdiction. The following are examples only and not exhaustive:
| Jurisdiction | Key Restriction |
|---|---|
| United States (federal) | Two‑party consent laws in 11 states (CA, FL, IL, MD, MA, MI, MT, NV, NH, PA, WA). Even one‑party consent generally requires the monitor to be a party to the conversation. Secretly recording someone on their own phone is illegal. |
| European Union (GDPR) | Explicit opt‑in consent required for any personal data processing. Deleted message recovery and keylogging are almost always illegal. |
| United Kingdom (IPA 2016) | Unauthorized interception of communications is a criminal offense. Employers must follow ICO guidance. |
| Canada (PIPEDA) | Consent required unless extremely narrow exceptions apply. |
| Australia | Surveillance Devices Acts in each state prohibit listening or recording without consent. |
Before installing the Software, you must check your local laws. If you are uncertain, consult an attorney.
6. FEATURE RESTRICTIONS BASED ON LEGALITY
The following features may be automatically disabled or restricted depending on your selected jurisdiction and consent type:
| Feature | Restriction |
|---|---|
| Keylogging | Disabled in EU, UK, Canada, Australia, and two‑party consent US states unless a court order is uploaded |
| Deleted message recovery | Disabled globally except where a valid court order is provided |
| Ambient / secret microphone activation | Disabled entirely unless the monitor is physically present and a party to the conversation (one‑party consent states only) |
| Hidden webcam capture | Disabled; webcam recording requires a visible indicator or notification |
| Stealth mode (no visible icon) | Only permitted on employer‑owned devices with signed policy and where state law does not require notification |
| Remote screen recording without consent log | Not possible – feature is gated by active consent log |
7. ENFORCEMENT & CONSEQUENCES OF VIOLATION
If we discover or reasonably suspect that you are using the Software for any unauthorized, illegal, or non‑consensual purpose:
Immediate suspension of your license and access to monitoring data.
Permanent ban from purchasing or using our products.
Referral to law enforcement including providing all available identifying information and evidence of unauthorized use.
Civil and criminal liability – you alone bear all legal consequences. We will cooperate fully with any investigation.
By purchasing or installing this Software, you waive any claim against [Your Company Name] arising from your misuse of the product.
8. CERTIFICATION REQUIRED BEFORE INSTALLATION
Before enabling any monitoring features, you must check a box certifying the following under penalty of perjury:
“I confirm under penalty of perjury that I have obtained legally valid, informed, written consent from every person whose device will be monitored, or I fall within an explicit legal exception (parental monitoring of my minor child on a device I own, employer monitoring of company‑owned devices with a signed policy, or valid court order). I understand that unauthorized surveillance is a criminal offense. I assume all legal liability. I will not use this Software to spy on spouses, partners, roommates, or adults without written permission.”
9. CONTACT FOR LEGAL QUESTIONS OR REPORTS
If you have questions about whether your intended use is legal, or if you believe someone is using this Software to monitor you without consent, contact:
Email: [Your Legal/Compliance Email]
Report unauthorized use: [Link or email]
We do not provide legal advice. Consult a qualified attorney before using this Software.
10. ACKNOWLEDGMENT
By using, downloading, or installing this Software, you acknowledge that you have read, understood, and agreed to this Legal Use Policy. You further acknowledge that violating this policy may subject you to criminal prosecution, civil lawsuits, and permanent ban from our services.
Wintego spy – Committed to legal, consent‑based monitoring.
Spying on anyone without permission is a crime. Don’t do it.