Legal

Privacy
Policy

This policy explains how Cypher Innovative Technologies collects, uses, stores, shares, and protects personal information across our websites, apps, games, software, platforms, and related services.

Privacy Policy

Please read this policy carefully to understand how personal information is handled when using Cypher Innovative Technologies products and services.

Effective Date: 06 April 2026

This Privacy Policy explains how Cypher Innovative Technologies, also referred to as Cypher IT, we, us, or our, collects, uses, stores, shares, and protects personal information when you use our websites, apps, games, software, platforms, and related services.

By using our services, you acknowledge that your information may be processed as described in this Privacy Policy.

1. Scope

This Privacy Policy applies to all users, visitors, customers, clients, and end users who access or use our websites, games, apps, software, and related services.

2. Applicable Law

Where applicable, we process personal information in accordance with South African privacy law, including the Protection of Personal Information Act, 2013 (POPIA). POPIA regulates the lawful processing of personal information, and the Information Regulator oversees compliance in South Africa.

3. Information We May Collect

Depending on the product or service, we may collect:

  • name and surname
  • company or business name
  • email address
  • phone number
  • billing information
  • account login details
  • support requests and correspondence
  • device information
  • IP address
  • browser type
  • operating system
  • app usage data
  • diagnostics, crash logs, and performance data
  • payment-related records supplied through payment providers
  • content, files, or data you choose to submit through the software
  • approximate or precise location data where a product requires it and where permission is granted
  • cookies or similar technologies on websites where used

4. How We Collect Information

We may collect information:

  • directly from you
  • automatically through your use of our software or websites
  • from integrations and third-party services you connect
  • from app stores, payment processors, hosting providers, analytics tools, and support systems
  • from your employer or organization where software is provided through a business account

5. How We Use Information

We may use information to:

  • provide and operate our software and services
  • authenticate users and manage accounts
  • process purchases, subscriptions, and invoices
  • provide technical support and customer assistance
  • improve performance, functionality, and security
  • diagnose bugs, crashes, abuse, and misuse
  • communicate updates, notices, service messages, and important account information
  • comply with legal obligations
  • protect our rights, systems, users, and business interests

6. Lawful Basis for Processing

Where required by law, we process personal information on one or more lawful grounds, including where processing is necessary for providing requested services, complying with legal obligations, pursuing legitimate business interests, or based on consent where consent is required.

7. Sharing of Information

We may share information with:

  • hosting and infrastructure providers
  • cloud storage providers
  • analytics and monitoring providers
  • payment processors
  • support desk and communications platforms
  • professional advisers
  • contractors and service providers acting on our instructions
  • law enforcement, regulators, or authorities where required by law
  • buyers, successors, or counterparties in a merger, acquisition, restructuring, or sale of business assets

We do not sell personal information as a standalone product unless clearly disclosed and lawfully permitted.

8. International and Cross-Border Processing

Because software infrastructure may involve hosting, storage, support, or service providers in different jurisdictions, your information may be transferred to and processed outside South Africa.

Where we do so, we will take reasonable steps to use providers and arrangements that offer appropriate protection for personal information, as required by applicable law.

9. Data Security

We take reasonable technical and organizational steps intended to protect personal information against loss, misuse, unauthorized access, disclosure, alteration, and destruction. POPIA sets minimum requirements for the lawful processing of personal information.

However, no method of transmission over the internet, software platform, cloud environment, or electronic storage system is completely secure. Therefore, we cannot guarantee absolute security.

10. Data Breaches and Security Incidents

Although we aim to protect personal information and reduce security risks to the best of our ability, no system can be guaranteed fully secure.

In the event of a suspected or confirmed security incident affecting personal information, we may take steps that we consider appropriate, including investigation, containment, remediation, and notifications where required by law.

To the fullest extent permitted by law, we do not accept liability for losses resulting from criminal attacks, unauthorized access, data breaches, malware, interception, or other security incidents beyond our reasonable control.

11. User Responsibility

You are responsible for maintaining the security of your devices, passwords, backups, internal systems, internet connection, and access credentials.

You should use strong passwords, keep software updated, restrict account access appropriately, and back up important data independently.

12. Data Retention

We retain personal information only for as long as reasonably necessary for the purposes described in this Policy, including legal, accounting, security, contractual, and operational requirements.

When information is no longer reasonably required, we may delete, anonymize, de-identify, or securely destroy it, subject to applicable legal retention obligations.

13. Children’s Privacy

Our software and services are not intentionally directed at children unless expressly stated for a specific product. If we become aware that personal information has been collected from a child in a manner not permitted by law, we may take steps to delete that information.

14. Cookies and Similar Technologies

Our websites may use cookies, session storage, analytics tools, and similar technologies to improve functionality, remember preferences, secure sessions, and understand usage patterns.

You may control cookies through your browser settings, but disabling them may affect functionality.

15. Your Rights

Subject to applicable law, you may have the right to request access to personal information we hold about you, request correction, object to certain processing, request deletion where appropriate, or lodge a complaint with the South African Information Regulator. Your current related privacy page already references these user rights and the Information Regulator.

16. Third-Party Services

Our software may use third-party tools, SDKs, hosting platforms, APIs, payment processors, analytics providers, maps, and authentication systems. Those third parties may process personal information under their own privacy terms, and we are not responsible for their independent privacy or security practices.

17. Changes to This Privacy Policy

We may update this Privacy Policy from time to time. Any revised version becomes effective when posted on our website or otherwise made available, unless a different effective date is stated.

18. Contact Us

If you have any questions, requests, or concerns relating to this Privacy Policy or personal information, contact:

Cypher Innovative Technologies

Website: cypherit.co.za

Email: info@cypherit.co.za

Location: South Africa / Cape Town, South Africa