LEGAL USE POLICY – AUTHORIZED MONITORING ONLY

Effective Date: 27t September 2025.
Applies to: All software products offered by Wintego spy (hereinafter “the Software”)


1. OVERVIEW & CORE PRINCIPLE

This Software is designed exclusively for legal, authorized monitoring with the explicit, informed, written consent of the person whose device is being monitored, or under other strict legal exceptions defined by applicable law.

You may NOT use this Software to spy on, surveil, or monitor any individual without their knowledge and express permission, including but not limited to:

  • Spouses, partners, or romantic companions

  • Adult children, roommates, or housemates

  • Employees on personal devices or without a signed monitoring policy

  • Any third party whose device you do not own or legally control

Violation of this policy may result in immediate termination of your license, legal action against you, and referral to law enforcement.


2. PERMITTED USES (LEGAL GROUNDS)

You may install and use the Software only if one of the following applies:

2.1 Parental Monitoring of Minor Children

  • You are the legal parent or guardian of a child under the age of majority in your jurisdiction.

  • You own the device being monitored.

  • The child is aware that monitoring software is installed (age-appropriate disclosure).

  • Monitoring is for the child’s safety and well‑being, not for illegal or abusive purposes.

2.2 Employer Monitoring of Company-Owned Devices

  • You are the owner or authorized representative of a business or organization.

  • The device being monitored is company-owned and provided to the employee for work purposes.

  • Employees have signed a written monitoring policy that explicitly discloses:

    • What will be monitored (e.g., keystrokes, screenshots, email, location)

    • When monitoring occurs (e.g., during work hours only)

    • That the Software may be installed and active

  • The policy complies with all applicable labor, privacy, and wiretapping laws in your jurisdiction.

2.3 Monitoring Your Own Devices

  • You are monitoring a device that you personally own and that only you use.

  • No other person has a reasonable expectation of privacy on that device.

2.4 Legal Guardian or Court Order

  • You are a court-appointed guardian, conservator, or similar legal representative.

  • You possess a valid court order or statutory authority permitting the monitoring.

  • The scope of monitoring does not exceed what the court order allows.


3. PROHIBITED USES (STRICTLY FORBIDDEN)

The following uses are absolutely prohibited and may constitute criminal offenses:

 
 
Prohibited UseLegal Risk
Monitoring a spouse, boyfriend, girlfriend, or ex-partner without consentViolation of federal and state wiretapping laws (e.g., 18 U.S.C. § 2511)
Installing on a roommate’s or friend’s deviceInvasion of privacy, computer fraud (CFAA)
Secretly monitoring an employee’s personal device or after‑hours activityViolation of ECPA, GDPR, and labor laws
Using “stealth mode” to hide the Software from the device userMay invalidate consent and constitute illegal eavesdropping
Recovering deleted messages, ambient audio, or webcam footage without consentFelony in many jurisdictions
Selling or sharing monitoring data with third partiesData protection violations (GDPR, CCPA)
Using the Software to stalk, harass, extort, or intimidateCriminal harassment/stalking charges

4. CONSENT REQUIREMENTS

Informed, written consent is mandatory for all monitoring where the device user is not the owner or a minor child under parental authority.

4.1 What constitutes valid consent?

  • A signed document (physical or electronic) that includes:

    • Full name of the person being monitored

    • Date of consent

    • Specific features that will be used (e.g., screen recording, location tracking, keylogging)

    • Duration of monitoring (e.g., ongoing until revoked)

    • Right to revoke consent at any time (except where legally restricted)

  • The consent must be given freely (not under coercion or threat).

  • The monitored person must be at least 18 years old (or the age of majority in their jurisdiction).

4.2 Consent logging feature

The Software automatically creates and maintains a Consent Log that records:

  • Timestamp of consent

  • Method of consent (digital signature, uploaded PDF, employment contract)

  • Legal basis selected (parental, employer, court order)

  • Name/ID of the monitor and the monitored person (if applicable)

This log is accessible to the monitored person upon request. If no valid consent log exists, all monitoring features remain disabled.


5. JURISDICTION & LOCAL LAWS

You are solely responsible for knowing and complying with the laws in your country, state, and local jurisdiction. The following are examples only and not exhaustive:

 
 
JurisdictionKey Restriction
United States (federal)Two‑party consent laws in 11 states (CA, FL, IL, MD, MA, MI, MT, NV, NH, PA, WA). Even one‑party consent generally requires the monitor to be a party to the conversation. Secretly recording someone on their own phone is illegal.
European Union (GDPR)Explicit opt‑in consent required for any personal data processing. Deleted message recovery and keylogging are almost always illegal.
United Kingdom (IPA 2016)Unauthorized interception of communications is a criminal offense. Employers must follow ICO guidance.
Canada (PIPEDA)Consent required unless extremely narrow exceptions apply.
AustraliaSurveillance Devices Acts in each state prohibit listening or recording without consent.

Before installing the Software, you must check your local laws. If you are uncertain, consult an attorney.


6. FEATURE RESTRICTIONS BASED ON LEGALITY

The following features may be automatically disabled or restricted depending on your selected jurisdiction and consent type:

 
 
FeatureRestriction
KeyloggingDisabled in EU, UK, Canada, Australia, and two‑party consent US states unless a court order is uploaded
Deleted message recoveryDisabled globally except where a valid court order is provided
Ambient / secret microphone activationDisabled entirely unless the monitor is physically present and a party to the conversation (one‑party consent states only)
Hidden webcam captureDisabled; webcam recording requires a visible indicator or notification
Stealth mode (no visible icon)Only permitted on employer‑owned devices with signed policy and where state law does not require notification
Remote screen recording without consent logNot possible – feature is gated by active consent log

7. ENFORCEMENT & CONSEQUENCES OF VIOLATION

If we discover or reasonably suspect that you are using the Software for any unauthorized, illegal, or non‑consensual purpose:

  1. Immediate suspension of your license and access to monitoring data.

  2. Permanent ban from purchasing or using our products.

  3. Referral to law enforcement including providing all available identifying information and evidence of unauthorized use.

  4. Civil and criminal liability – you alone bear all legal consequences. We will cooperate fully with any investigation.

By purchasing or installing this Software, you waive any claim against [Your Company Name] arising from your misuse of the product.


8. CERTIFICATION REQUIRED BEFORE INSTALLATION

Before enabling any monitoring features, you must check a box certifying the following under penalty of perjury:

“I confirm under penalty of perjury that I have obtained legally valid, informed, written consent from every person whose device will be monitored, or I fall within an explicit legal exception (parental monitoring of my minor child on a device I own, employer monitoring of company‑owned devices with a signed policy, or valid court order). I understand that unauthorized surveillance is a criminal offense. I assume all legal liability. I will not use this Software to spy on spouses, partners, roommates, or adults without written permission.”


9. CONTACT FOR LEGAL QUESTIONS OR REPORTS

If you have questions about whether your intended use is legal, or if you believe someone is using this Software to monitor you without consent, contact:

Email: [Your Legal/Compliance Email]
Report unauthorized use: [Link or email]

We do not provide legal advice. Consult a qualified attorney before using this Software.


10. ACKNOWLEDGMENT

By using, downloading, or installing this Software, you acknowledge that you have read, understood, and agreed to this Legal Use Policy. You further acknowledge that violating this policy may subject you to criminal prosecution, civil lawsuits, and permanent ban from our services.


Wintego spy – Committed to legal, consent‑based monitoring.
Spying on anyone without permission is a crime. Don’t do it.

Scroll to Top