Your Privacy Matters
We believe in mutual consent, transparency, and open legal structures that respect your rights and support your business.
As a user of our applications, you are the first advocate for your own data protection. We empower you to:
- Manage what data you share
- Control who accesses your information
- Download or delete your data anytime
- Choose not to expose sensitive credentials
Our mobile-first approach means built-in security advantages:
- Secure authentication on all platforms
- End-to-end encrypted communications
- No unnecessary data collection
- Regular security audits and reviews
We believe in clear, honest agreements with our users:
- Explicit permission for data usage
- Transparent about third-party integrations
- Easy opt-out options
- No surprise policy changes
Our Commitment to Data Protection
At Erudite Systems Solutions, we recognize that data protection is not just a legal requirement—it's a fundamental right. We've built our applications with a philosophy centered on:
1. User Empowerment
You are the primary stakeholder in your data protection journey. Our role is to provide you with the tools, information, and controls necessary to make informed decisions about your personal information. We never make assumptions about what data you're willing to share; we always ask for your explicit consent.
2. Transparency & Open Legal Structures
Rather than hiding behind complex legal jargon, we believe in open, readable documentation. Each of our applications has a specific privacy policy that explains:
- What data we collect from you and why
- How we use and protect that data
- Who we share it with and under what circumstances
- How long we keep it and what happens when you leave
- Your rights and how to exercise them
3. Security Measures Across All Platforms
While our applications are mobile-first (which provides inherent security benefits), we've also taken extensive measures to ensure that users on web, desktop, and other platforms receive the same level of data protection:
- Encrypted Data Transmission: All communication uses TLS/SSL encryption
- Secure Authentication: Email/password verification with optional biometric support
- Role-Based Access Control: Your data is only visible to authorized users
- Regular Security Reviews: We continuously assess and improve our security practices
- Secure Cloud Infrastructure: We partner with industry-leading providers like Firebase
- Data Minimization: We only collect data we actually need to provide our services
4. Your Rights and Responsibilities
We empower you to take an active role in your data protection:
- Access Your Data: Request and download everything we have about you
- Correct Inaccuracies: Update or fix any incorrect information
- Delete Your Account: Permanently remove all your data from our systems
- Control Sharing: Decide who can access your information
- Keep Credentials Secure: Never expose your passwords or sensitive login information
5. Business-Centric Design
Our applications are designed to support your business operations. The data we collect is specifically tied to the features and services you use. We believe that respecting your privacy actually makes for better business relationships—when you trust us with your data, you can focus on growing your business instead of worrying about where your information is going.
Security Across Platforms
Mobile Apps (Android & iOS)
Our mobile applications benefit from the inherent security features of modern mobile operating systems:
- App sandboxing prevents unauthorized access to your data
- Permission system gives you control over what data apps can access
- Device-level encryption protects data at rest
- Biometric authentication adds an extra security layer
Web Applications
Our web platforms provide the same security guarantees as mobile:
- HTTPS (TLS/SSL) encryption for all data in transit
- Secure authentication and session management
- Content Security Policy (CSP) prevents injection attacks
- Regular security testing and vulnerability scanning
- Secure password storage using industry-standard hashing
Desktop Applications (Windows, macOS, Linux)
Desktop access maintains the same security standards:
- Encrypted local storage of sensitive data
- Secure API communication with our servers
- User authentication and session timeouts
- Operating system-level security integration
Mutual Consent in Practice
Our applications operate on the principle of mutual consent. We ask for your permission before collecting any data beyond what's minimally required for the application to function. This includes:
- Account credentials and profile information
- Data directly related to your business needs
- Location access for delivery tracking
- Camera access for photo uploads
- Contact access for integrations
- Notification permissions for updates
No Hidden Tracking: We will never silently collect data or enable features without your knowledge. All data usage is either essential to providing the service, or explicitly requested with your permission.
Ready to Learn More?
Choose an application below to review its privacy policy, terms of service, and technical documentation.
General Legal Information
All of Erudite Systems Solutions applications operate under consistent legal principles, although specific details may vary by app. Each application has:
App-specific privacy policy detailing data collection, usage, and your rights.
View Example →Mutual agreements governing your use of the application and our responsibilities.
View Example →Technical specifications for developers integrating with our services.
View Example →Data Protection Resources
- Data Protection Guide - Comprehensive guide to your data rights
- About Erudite Systems Solutions - Our mission and values
- All Applications - Complete list of all Erudite products
- Contact Privacy Team - Email our privacy specialists
Frequently Asked Questions
Do you sell my data?
No. We do not sell, rent, or lease your personal information to any third party. Period.
Can I delete my account?
Yes. You can request account deletion from within the application or by contacting us. Your data will be permanently removed from our active systems within 30 days of your request.
How long do you keep my data?
Depends on the data: Active account data is kept while you use our services. After deletion, most data is removed within 30 days (though backups may exist for 90 days). Financial records are kept for 7 years for legal compliance.
Is my data encrypted?
Yes. All data transmission between your device and our servers is encrypted using industry-standard TLS/SSL protocols. We also encrypt sensitive data at rest.
What if I find a security vulnerability?
Please tell us! Contact security@erudite.co.ke with details. We take security seriously and appreciate responsible disclosure.
How do I exercise my data rights?
Contact us: Email privacy@erudite.co.ke with your request and app name. We'll respond within 30 days.
Have Questions About Your Privacy?
Our privacy team is here to help. We respond to all inquiries within 30 days.
Contact Privacy Team
© 2026 Erudite Systems Solutions. All rights reserved.
We believe in your right to privacy. See our Privacy Policy and Terms of Service.