We would be glad to make your projects come to life
Share this

Privacy Pack

COMPREHENSIVE PRIVACY POLICY PACK


Deputy: Charlotte Choshane (COO / Operations & Project Manager)
Security Lead: Karabo Mphahlele (IT Specialist)
Review Cycle: Annual or upon material change

Purpose of this Pack
This master pack sets out Eyetrosoft’s privacy and data‑protection framework for all clients and industries we serve (public sector/SOEs, financial services, education, media/advertising & DOOH, healthcare‑adjacent campaigns, retail/e‑commerce, IT & managed services, HR/recruitment, analytics & research). It is POPIA‑centred and maps to global frameworks (GDPR, CCPA/CPRA) to support cross‑border engagements. It is client‑agnostic and may be appended to contracts, SOWs, and tenders.

Disclaimer
This pack is policy guidance and operational templates, not legal advice. Where a client or jurisdiction requires stricter rules, those take precedence. Specific client instructions (as Responsible Party/Controller) will be implemented via contract and project runbooks.


DOCUMENT CONTROL

VersionDateChange SummaryAuthorApprover
4.115 Oct 2025Applicable to all industriesIOCOO

1) SCOPE, APPLICABILITY & DEFINITIONS

Scope: Applies to Eyetrosoft personnel, contractors, and sub‑processors handling company or client data across all services: strategy, content, media buying, DOOH operations, IT support, software/website development, analytics, recruitment support, and corporate services.

Key Definitions (plain language):

  • Personal Information (PI): any information that can identify a person (names, contact details, IDs, online identifiers, device IDs, geolocation, etc.).
  • Special PI: sensitive categories (e.g., health, children’s data, biometrics).
  • Responsible Party/Controller: decides “why” and “how” PI is processed (often our client).
  • Operator/Processor: processes PI on the Controller’s instructions (Eyetrosoft, when acting for clients).
  • POPIA/GDPR/CPRA: data‑protection laws in South Africa/EU‑UK/California.
  • Sub‑processor: a third‑party vendor engaged by Eyetrosoft to process PI for client work.

2) PRIVACY PRINCIPLES (POPIA‑LED, GLOBALLY MAPPED)

We commit to: lawfulness, fairness/transparency, purpose limitation, data minimality, accuracy, security/confidentiality, storage limitation, and accountability. Where multiple laws apply, we adopt the stricter control as our baseline.

Mapping Snapshot:

PrinciplePOPIAGDPRCPRA
Lawfulness & fairnessConditions 2–4Art. 5(1)(a)Notice at collection; purpose compatibility
Purpose limitationCondition 3Art. 5(1)(b)Notice/purpose limits
Data minimalityCondition 3Art. 5(1)(c)Data minimization
AccuracyCondition 4Art. 5(1)(d)Reasonable accuracy
Storage limitationCondition 3Art. 5(1)(e)Retention disclosure
SecurityCondition 7Art. 5(1)(f), 32Reasonable safeguards
AccountabilityCondition 1Art. 5(2)Accountability duties

3) GOVERNANCE & ACCOUNTABILITY

  • Information Officer (IO): overall compliance, liaison with regulators, approves policies, signs DPA/Operator undertakings.
  • Deputy IO: operational compliance, DSR coordination, training.
  • Security Lead: technical controls, incident response, access reviews.
  • Project Leads: maintain ROPA entries, DPIAs where needed, ensure vendor compliance.
  • All Staff: follow policies, complete training, report incidents immediately.

Oversight: Quarterly governance reviews (training uptake, incidents, DSR metrics, audit findings, vendor risk) and an annual management review with improvement actions.


4) LAWFUL BASES & SPECIAL CATEGORIES

Lawful bases we rely on (as Controller for our own operations or as Operator under client instruction):

  • Contract: performance of a contract or pre‑contract steps.
  • Legal Obligation: e.g., financial record‑keeping, employment law.
  • Legitimate Interests: proportionate processing for security, service improvement, limited direct marketing to existing customers (opt‑out), fraud prevention.
  • Consent: where required, e.g., new direct‑marketing lists, cookies, certain analytics, or public use of identifiable content.
  • Public Interest: where a public function is delegated.

Special PI & Children: processed only with explicit legal basis (consent, law, vital interests) and additional safeguards (minimisation, strict access, DPIA, parental consent when applicable). No facial recognition or biometric identification without explicit client/legal approval and DPIA.


5) DATA SUBJECT RIGHTS (DSR)

Supported rights include access, correction, deletion, objection, restriction, portability (where applicable), and rights related to automated decisions.

Process:

  1. Intake via privacy inbox or client channels; log in DSR register within 1 business day.
  2. Verify identity: proportionate KBA/ID checks.
  3. Triage with client (if we are Operator).
  4. Respond as soon as reasonably possible, sharing outcome/rationale; maintain evidentiary trail.

Exemptions: legal privilege, third‑party rights, regulatory hold. Minimal disclosure wherever an exemption is invoked.


6) RECORDS OF PROCESSING (ROPA)

We maintain a central ROPA covering our own operations and per‑client processing. Minimum fields: activity name, purpose, categories of PI, subjects, recipients, cross‑border transfers, retention, security measures, lawful basis, DPIA flag.

Template: see Appendix A.


7) DATA PROTECTION IMPACT ASSESSMENTS (DPIA)

A DPIA is required when processing is likely to result in high risk (e.g., large‑scale profiling/targeting, geolocation tracking, children’s data, special PI, DOOH sensors/cameras, new technologies). Output: risks, mitigations, residual risk, sign‑offs.

Template & triggers: Appendix B.


8) SECURITY MEASURES (PEOPLE • PROCESS • TECH)

People: vetted staff; mandatory training; NDAs; least privilege; 24‑hour access revocation SLA.
Process: joiner‑mover‑leaver; approvals workflow; content QA; vendor due diligence; retention & disposal.
Tech: MFA, encryption, EDR/AV, secure configuration, patching, audit logging, email security, password manager, network segmentation for DOOH players, secure dev practices (code reviews, secrets management).
Evidence: access registers, training logs, vulnerability/patch reports, incident records.


9) CROSS‑BORDER TRANSFERS

We minimise exports and use contractual safeguards (e.g., Standard Contractual Clauses/IDTA), adequacy mechanisms, or consent, in line with POPIA s72 and foreign laws. Data residency preferences: store work product in Microsoft 365 regional data centres where available; avoid bulk DM exports; use pseudonymised datasets for analytics.


10) RETENTION & DISPOSAL

Default retention (unless client/ law requires otherwise):

  • Client working content & approvals: 12 months after publication/end of campaign.
  • Reports, contracts, billing: 5 years minimum (finance/audit).
  • Access logs: 2 years.
  • Recruitment records: 12 months post‑process unless consent for talent pool (24 months).
  • Incident logs: 5 years.

Disposal: provider deletion plus purge; crypto‑erase for devices; destruction certificates for physical media. Deletion is suspended under legal hold.


11) VENDOR & SUB‑PROCESSOR MANAGEMENT

Maintain a vendor inventory with data flows. Before onboarding: security due diligence, DPA/NDA, minimal scopes/permissions, regional storage preference, incident notification clauses. Reviews: annually or on incident. Examples: Microsoft 365, Adobe CC, Meta/LinkedIn/Twitter, scheduling tools (Hootsuite/Buffer), analytics/BI, hosting/CDN, DOOH CMS/player providers.


12) INCIDENT RESPONSE & BREACH NOTIFICATION

SLA: Detect & contain (0–4h) → Assess (≤24h) → Notify client & regulator/data subjects as soon as reasonably possible (coordinated with client) → Remediate (≤72h) → Post‑incident review (≤5 days).
Runbooks: credential compromise, device loss, unauthorised platform access, malicious content injection, DOOH player intrusion, web/app breach.
Registers: incident log with actions, owners, timestamps.


13) DIRECT MARKETING, CONSENT & COOKIES/PIXELS

Electronic Direct Marketing (EDM):

  • Opt‑in required for new prospects (POPIA s69). Existing customers may be marketed about similar services with opt‑out in each message.
  • Maintain consent/opt‑out evidence (time, method, scope).
  • Respect Do Not Contact lists across channels (email, SMS, WhatsApp).

Cookies & Pixels:

  • Use a Consent Management Platform (CMP) for websites/apps where feasible.
  • Categorise: strictly necessary, functional, performance/analytics, advertising.
  • Delay non‑essential tags until consent. Provide a cookie notice and settings panel.
  • Document vendors (e.g., Meta Pixel, LinkedIn Insight Tag, Google Analytics/Ads) and data flows.

Social Advertising: audience targeting must avoid discrimination; apply frequency caps; perform DPIA for sensitive segments.


14) SOCIAL MEDIA & COMMUNITY MANAGEMENT

  • Use platform‑native tools or approved schedulers via OAuth; MFA on all accounts.
  • Business‑hours moderation SLAs; escalation matrix for high‑risk content (legal, safety, regulatory).
  • No collection of unnecessary PI in DMs; never ask for IDs/financial data unless explicitly required and approved.
  • Keep an audit trail of posts, approvals, edits, and takedowns.

15) DOOH / CCTV / SENSORS (OUT‑OF‑HOME)

  • Prefer anonymous/aggregated audience measurement; avoid raw face images/identifiers.
  • If cameras/sensors are deployed: clear signage, purpose limitation, minimisation (e.g., edge‑processing, no storage), DPIA, vendor controls, retention ≤ 72 hours unless incident.
  • No facial recognition or biometric identification without explicit lawful basis and prior approvals.

16) WEBSITE, APP & PLATFORM PRIVACY NOTICES (TEMPLATES)

Provide layered privacy notices: short‑form at point of collection + full privacy policy on site/app. Disclose identity/contact, purposes, lawful bases, recipients, transfers, retention, rights, complaints paths, and policy changes. Templates: Appendix C (Website/App Privacy Policy) & Appendix D (Short‑Form Notices).


17) HR / RECRUITMENT PRIVACY

Employee/Contractor Data: payroll, performance, device monitoring (limited, proportionate), access logs. Provide internal privacy notice and acceptable‑use policy.
Recruitment: collect candidate data only for the vacancy; consent for talent pool; verify references lawfully; delete on request unless lawful basis to retain.


18) CHILDREN & VULNERABLE PERSONS

Where campaigns may involve minors/learners: require parental/guardian consent, age‑appropriate content, heightened review, and minimal data collection. For vulnerable communities, apply additional ethical review and safeguards.


19) ANALYTICS, PROFILING & RESEARCH

  • Use pseudonymisation/anonymisation where feasible.
  • Avoid decisions producing legal or similarly significant effects without human review.
  • Provide opt‑outs for cross‑site advertising where supported; honour platform opt‑outs.

20) TRAINING & AWARENESS

Mandatory onboarding training plus annual refreshers. Quarterly micro‑modules for project teams (POPIA basics, phishing, DSR handling, social/DOOH risks). Track completions for 5 years.


21) COMPLAINTS & REGULATORS

Data subjects may lodge complaints with Eyetrosoft’s privacy contact and/or the relevant data‑protection authority (e.g., Information Regulator — South Africa; EU/UK authorities; California AG/CPPA). We provide guidance and links in client‑facing notices.


22) AUDIT, METRICS & CONTINUAL IMPROVEMENT

KPIs: incident rate/time‑to‑close, DSR SLA, training completion, access‑review closure, vendor assessment status. Annual internal audit; corrective actions tracked to closure.


23) PAIA ALIGNMENT (HIGH LEVEL)

We maintain/assist with a PAIA Manual (separate document) describing how to request access to records, categories of records held, and contact details. Cross‑references are maintained between PAIA and this privacy pack.


24) ROLES & CONTACTS

Information Officer: info@eyetrosoft.com
Privacy Inbox (DSR/Incidents): privacy@eyetrosoft.com
Security Operations: security@eyetrosoft.com


APPENDICES

Appendix A — ROPA (Record of Processing Activities) Template

FieldDescription
Activity Namee.g., Social media community management
Controller/Operator RoleController (Eyetrosoft) or Operator (for Client)
PurposeWhy processing occurs
Data SubjectsCustomers, employees, social followers, website visitors
Categories of PINames, handles, emails, device IDs, geolocation, etc.
Special PIHealth, biometrics, minors (Y/N; basis)
RecipientsPlatforms, vendors, agencies
Cross‑BorderCountries/regions, safeguards (SCC/IDTA/adequacy/consent)
RetentionPeriod/rationale
Security MeasuresMFA, encryption, RBAC, logging
Lawful BasisContract, consent, legitimate interests, legal obligation
DPIA RequiredY/N + reference

Appendix B — DPIA Template & Triggers

Triggers: special PI, children, large‑scale profiling, geolocation, DOOH sensors, new tech, data matching, automated decisions, cross‑border + sensitive data.

Sections:

  1. Overview & scope
  2. Stakeholders & roles
  3. Data flows & systems
  4. Lawful bases & necessity/proportionality
  5. Risks (confidentiality, integrity, availability, rights & freedoms)
  6. Mitigations & residual risk
  7. Sign‑off (IO, Security Lead, Client)

Appendix C — Website/App Privacy Policy (Client‑Agnostic Template)

1. Who we are — Eyetrosoft CC contact details.
2. What we collect — contact data, usage data, device info, cookies/pixels.
3. Why we collect — provide services, respond to queries, analytics, marketing with consent.
4. Legal bases — contract, consent, legitimate interests, legal obligations.
5. Sharing — service providers under contract; legal compliance; business transfers.
6. International transfers — safeguards described.
7. Retention — as per Section 10.
8. Security — measures summarised.
9. Your rights — access/correct/delete/object/restrict/portability where applicable.
10. Cookies — link to cookie policy; CMP controls.
11. Children — services not directed at children unless declared otherwise.
12. Contact & complaints — privacy inbox; regulator references.
13. Changes — how we’ll notify users.


Appendix D — Short‑Form Privacy Notices

  • Lead forms: brief qualifier + link to full policy, consent box for marketing.
  • Event/filming: signage wording; consent for identifiable recording when required.
  • Recruitment: purpose, retention, background checks, equal opportunities statement.
  • DOOH sensing: signage stating analytics only; no facial recognition; retention; contact.

Appendix E — Data Processing Agreement (DPA) — Operator (Processor) Template (Summary Clauses)

  1. Subject matter, duration, nature & purpose.
  2. Types of PI & data subjects.
  3. Processor obligations (confidentiality, security, sub‑processing, assistance with DSRs, DPIA support).
  4. Breach notification duties.
  5. International transfers & safeguards.
  6. Audits & certifications.
  7. Return/Deletion on termination; certification.
  8. Liability & indemnities (per contract).
    Full DPA text available on request.

Appendix F — Cookie Policy & CMP Settings (Template)

Categories: strictly necessary; functional; performance; advertising.
Default: essential on; others off until consent.
Retention examples: analytics 13 months; advertising 6–12 months; CMP consent logs 24 months.
Granular controls: per‑vendor toggles; geo‑based consent where required.


Appendix G — Sector Annexes

G1. Public Sector & SOE Communications

  • Common PI: names, contact details, public social handles, demographics (aggregated).
  • Lawful bases: public interest/contract; consent for marketing lists.
  • Risks: reputational, policy misuse; Controls: approvals workflow, legal sign‑off, content archiving.
  • Retention: content working files 12 months; reports 5 years.

G2. Financial Services Campaigns (incl. savings/bonds awareness)

  • PI: audience segments (pseudonymised), campaign metrics; avoid account/ID numbers.
  • Lawful bases: legitimate interests; consent for new marketing lists.
  • Controls: do not solicit sensitive financial data in DMs; vetted links; fraud‑awareness content.
  • Retention: similar to Section 10; suppressions indefinite.

G3. Education (Universities/Students)

  • PI: names, student emails (if provided by Controller), content interactions.
  • Special care: minors in outreach; parental consent where applicable.
  • Controls: age gates where feasible; DPIA for any profiling.

G4. Media, Advertising & DOOH

  • PI: device IDs, coarse location, time‑of‑day exposure (via vendors); avoid persistent unique IDs unless consented.
  • Controls: aggregate reporting; frequency caps; no facial recognition.
  • Retention: raw logs minimal/short; aggregated KPIs longer.

G5. Healthcare‑Adjacent & Safety Campaigns

  • PI: avoid health data; if testimonials include health info, obtain explicit consent and minimisation.
  • Controls: legal review; remove identifiers where not necessary.

G6. Retail / e‑Commerce / Loyalty

  • PI: contact details, purchase preferences (from Controller), cookie IDs.
  • Bases: contract/legitimate interests; consent for new marketing.
  • Controls: suppression lists, secure payment gateways (Controller’s responsibility), CMP for tracking.

G7. IT & Managed Services / Software Development

  • PI: user accounts, logs, support tickets.
  • Controls: secure SDLC, secrets management, vulnerability management, least privilege, environment segregation.
  • Retention: logs 12–24 months; tickets 24 months.

G8. HR / Recruitment & Talent Pools

  • PI: CV data, references, background checks (lawful basis).
  • Controls: limited access; consent for talent pool; delete on request unless legal basis to retain.
  • Retention: 12 months; talent pool 24 months with consent.

Appendix H — Global Mapping Quick Reference

TopicPOPIAGDPR (EU/UK)CPRA (California)
Lawful BasesContract, legal duty, consent, legitimate interests, public interestArt. 6 bases inc. legitimate interests, consent, legal dutyNotice/limited lawful bases; opt‑out/limit for “sale/share” and sensitive PI
DSRsAccess, correction, deletion, objectionAccess, rectification, erasure, restrict, portability, object, automated decisionsKnow, delete, correct, opt‑out of sale/share, limit sensitive PI
Cookies/AdsConsent for EDM; implied rules for cookies via privacy lawePrivacy + GDPR consent/legitimate interestsNotice and opt‑out for cross‑context advertising
TransfersPOPIA s72 adequacy/consent/contractualSCCs/IDTA/AdequacyContracts; service provider restrictions

Appendix I — Glossary

Anonymisation, Pseudonymisation, CMP, Controller/Processor, DPA, DPIA, DSR, EDR, Legitimate Interests, Operator, PAIA, POPIA, ROPA, SCCs, Special PI, etc.


Sign‑Off

Approved by: Charlotte Choshane (COO / Deputy IO)