Security & Data Responsibility Policy

1. Purpose of the Platform

Our platform enables individuals ("contractors") to submit B2B leads generated through ethical and lawful methods. All leads submitted must comply with applicable data privacy laws and reflect the full informed consent of the individuals whose data is being shared.

2. Permitted Lead Sources

Important: The individual whose data is being collected ("lead owner") must explicitly know that their information is being collected and must consent to it. This must be verifiable by the contractor.

3. User Rights

We honor all data removal requests promptly and without objection.

4. Nature of Data Collected

We do not collect personal data such as:

We focus only on B2B information, such as:

Only the lead owner may decide if their information is personal or not. If a lead owner reports any discomfort, we investigate and remove the data if required.

5. Prohibited Practices

Violation of these terms may result in:

6. We Are Not A Data Broker

Our goal is to enable legitimate B2B collaboration between verified businesses.

7. Contractor Acknowledgment

GDPR Compliance Policy

1. Our Commitment to Data Protection

We are fully committed to complying with the General Data Protection Regulation (EU) 2016/679 ("GDPR"). All data collected and processed on our platform is done lawfully, transparently, and only for specified business purposes.

2. Lawful Basis for Data Collection

We only process personal data when we have a valid legal basis, such as:

  • Explicit Consent: Every lead submitted through our platform must have been collected with the clear and informed consent of the individual (lead owner).
  • Legitimate Interest: In the context of B2B services, some data processing may be done under legitimate interest, provided it does not override the rights of the data subject.

3. Data Subject Rights

All individuals (lead owners) have the following rights under GDPR:

  • Right to Access: They can request a copy of the data we hold about them.
  • Right to Rectification: They can ask to correct inaccurate or incomplete data.
  • Right to Erasure (Right to Be Forgotten): They can request that their data be deleted from our systems.
  • Right to Restrict Processing: They can request that we temporarily or permanently stop processing their data.
  • Right to Data Portability: They can request to receive their data in a structured, commonly used format.
  • Right to Object: They can object to the processing of their data at any time.
  • Right to Lodge a Complaint: They have the right to file a complaint with a supervisory authority if they believe their data has been misused.

4. Data Security & Retention

  • Encrypted data storage
  • Access control and role-based user permissions
  • Regular audits and penetration testing
  • Secure servers and end-to-end encryption in data transfers
  • Data retained only for as long as needed or until deletion is requested