Specifying Techniques CC – Data Protection, Privacy & Terms of Use Policy
Effective Date: 24 July 2024
Company: Specifying Techniques CC (Reg. No. 98/052094/23) ("ST", "we", "us", "our")
Website: www.spectechonline.com
Contact: office@spectechonline.com | +27 (0)31 561 5812
1. Purpose and Scope
This Policy governs all aspects of personal information handling by ST and establishes the complete terms of engagement for our Website and Services. It ensures compliance with:
-
The Protection of Personal Information Act, 2013 (POPIA)
-
The Cybercrimes Act, 2020
-
The Electronic Communications and Transactions Act, 2002 (ECT Act)
-
All applicable South African consumer protection legislation
This Policy applies to all users, visitors, customers, and third parties interacting with ST's digital platforms, services, or communications.
2. Definitions
"Personal Information" means information as defined in POPIA relating to an identifiable, living, natural person, and juristic person.
"Processing" means any operation performed on personal information, including collection, receipt, recording, organisation, collation, storage, updating, modification, retrieval, alteration, consultation, use, dissemination, merging, linking, restriction, degradation, erasure, or destruction.
"Services" means all products, services, content, training, consultancy, and digital offerings provided by ST.
"User" means any person accessing or using the Website or Services.
3. Terms & Conditions
3.1 Binding Agreement and Acceptance
By accessing, browsing, or using our Website or Services in any capacity, you:
-
Acknowledge reading and understanding this entire Policy
-
Agree to be legally bound by all terms herein
-
Consent to our data processing practices as described
-
Accept that continued use constitutes ongoing agreement to any updates
Disagreement with any provision requires immediate cessation of all use.
3.2 User Obligations and Warranties
Users warrant and undertake to:
-
Provide only accurate, complete, and lawful information
-
Maintain absolute confidentiality of login credentials and account access
-
Implement reasonable security measures on their devices and networks
-
Use Services only for lawful, legitimate business or educational purposes
-
Refrain from any conduct that may compromise system integrity or security
-
Immediately notify ST of any suspected security breaches or unauthorised access
-
Indemnify ST against losses arising from user conduct or information provided
3.3 Intellectual Property Protection
All content, including but not limited to:
-
Proprietary methodologies, processes, and systems
-
Course materials, documentation, and training content
-
Software, algorithms, and technical implementations
-
Trademarks, logos, and branding elements
-
Database structures and compiled information
Are exclusively owned by ST and protected by copyright, trademark, and trade secret laws. Users are granted a limited, non-exclusive, non-transferable license solely for authorised use. Any reproduction, reverse engineering, or unauthorised use constitutes intellectual property infringement and will result in immediate termination and legal action.
3.4 Prohibited Activities and Enhanced Enforcement
Strictly prohibited activities include:
-
Any form of system intrusion, penetration testing, or vulnerability exploitation
-
Introduction of malicious code, viruses, or disruptive technologies
-
Automated data extraction, scraping, or harvesting
-
Circumventing access controls or authentication mechanisms
-
Creating derivative accounts or sharing access credentials
-
Commercial use of information without explicit written authorisation
-
Any activity potentially violating the Cybercrimes Act
Violations will result in immediate account termination, potential legal action, and cooperation with law enforcement authorities.
3.5 Age and Capacity Verification
Services are restricted to persons 18 years or older with full legal capacity. By using our Services, you represent and warrant that you meet these requirements. ST reserves the right to verify age and capacity and terminate access for non-compliance.
4. Information Collection Framework
4.1 Categories of Information Collected
Technical Data such as:
-
IP addresses, device identifiers, browser fingerprints
-
Network information, connection details, and geolocation data
-
Usage patterns, session duration, and interaction analytics
-
Performance metrics and error logs
Account Information such as:
-
Registration details, profile information, and preferences
-
Transaction history, payment information, and billing details
-
Communication history and support interactions
-
Certification records and course completion data
Behavioural Data such as:
-
Navigation patterns and content preferences
-
Search queries and resource access patterns
-
Engagement metrics and learning analytics
-
Marketing response and communication preferences
4.2 Advanced Collection Methods
Information is collected through means such as:
-
Direct user input and form submissions
-
Automated technical collection (cookies, pixels, analytics)
-
Third-party integrations and partner platforms
-
Communication monitoring and recording systems
-
Inference and profiling based on usage patterns
5. Processing Purposes and Legal Bases
Personal information is processed for the following purposes under specific legal grounds:
Contractual Necessity:
-
Service delivery and account management
-
Payment processing and transaction completion
-
Course administration and certification issuance
-
Customer support and technical assistance
Legitimate Interests:
-
Security monitoring and fraud prevention
-
System optimisation and performance improvement
-
Business analytics and reporting
-
Relationship management and service enhancement
Legal Compliance:
-
Regulatory reporting and audit requirements
-
Tax and financial record maintenance
-
Legal proceeding support and evidence provision
-
Law enforcement cooperation when required
Consent-Based:
-
Marketing communications and promotional activities
-
Optional service enhancements and personalisation
-
Third-party integrations and data sharing
-
Research and development initiatives
6. Comprehensive Data Security Framework
6.1 Technical Safeguards
-
End-to-end encryption for data transmission and storage
-
Multi-factor authentication and role-based access controls
-
Advanced intrusion detection and prevention systems
-
Regular penetration testing and vulnerability assessments
-
Secure cloud infrastructure with redundant backups
-
Data segregation and compartmentalisation protocols
6.2 Organisational Measures
-
Comprehensive staff security training and certification
-
Background checks and security clearance procedures
-
Incident response and business continuity planning
-
Regular security audits and compliance assessments
-
Vendor security assessment and management programs
-
Data handling protocols and procedure documentation
6.3 International Data Transfers
Data may be processed in South Africa, Namibia, Botswana, Mozambique, Angola, United Arab Emirates, Ireland, USA, and other jurisdictions with adequate protection measures. All international transfers comply with POPIA requirements through appropriate safeguards including standard contractual clauses and adequacy decisions.
7. Data Sharing and Disclosure
7.1 Authorised Disclosures
Personal information may be shared with:
Service Providers: Under strict data processing agreements including:
-
Cloud hosting and infrastructure providers
-
Payment processors and financial institutions
-
Analytics and marketing technology providers
-
Certification and accreditation bodies
-
Legal, accounting, and professional service providers
Legal Authorities: When required by law or legal process:
-
Court orders, subpoenas, and regulatory investigations
-
Law enforcement requests under proper authority
-
Tax and regulatory compliance requirements
-
National security and public safety obligations
Business Transfers: In connection with:
-
Mergers, acquisitions, or corporate restructuring
-
Asset sales or business dispositions
-
Insolvency or bankruptcy proceedings
-
Due diligence processes with confidentiality protections
7.2 Disclosure Restrictions
ST will never sell personal information for commercial gain and maintains strict controls over all authorised disclosures including contractual privacy protections, data minimisation principles, and purpose limitation requirements.
8. Data Retention and Lifecycle Management
Personal information is retained based on:
-
Active Account Period: For the duration of the customer relationship
-
Legal Requirements: As mandated by applicable laws (minimum 5 years for financial records)
-
Course Records: 7 years from completion for certification and accreditation purposes
-
Marketing Data: Until consent withdrawal or 3 years of inactivity
-
Security Logs: 2 years for investigation and compliance purposes
Data is securely destroyed using industry-standard methods upon retention period expiry, unless legal obligations require continued storage.
9. Enhanced Data Subject Rights
Under POPIA, data subjects have comprehensive rights including:
9.1 Access and Transparency Rights
-
Request confirmation of processing activities
-
Obtain copies of personal information held
-
Receive information about processing purposes and recipients
-
Understand data retention periods and deletion criteria
9.2 Correction and Control Rights
-
Rectify inaccurate or incomplete information
-
Update personal details and preferences
-
Restrict processing for specific purposes
-
Object to processing based on legitimate interests
9.3 Withdrawal and Deletion Rights
-
Withdraw consent for consent-based processing
-
Request data deletion (subject to legal retention requirements)
-
Obtain data portability in structured formats
-
Lodge complaints with the Information Regulator
Request Process: Submit written requests to data@spectechonline.com with identity verification. Responses provided within 30 days, with possible extension for complex requests.
10. Incident Management and Breach Response
10.1 Breach Detection and Assessment
ST maintains continuous monitoring systems to detect potential breaches, with immediate assessment of:
-
Nature and scope of compromised information
-
Risk to affected individuals and business operations
-
Potential for ongoing or additional compromise
-
Required containment and remediation measures
10.2 Response and Notification Protocol
Upon breach confirmation:
-
Immediate containment and investigation initiation
-
Information Regulator notification within 72 hours (where required)
-
Affected individual notification without unreasonable delay
-
Law enforcement cooperation under the Cybercrimes Act
-
Comprehensive incident documentation and reporting
-
Post-incident review and control enhancement
11. Comprehensive Disclaimers and Risk Allocation
11.1 Security Limitations and Shared Responsibility
While ST implements industry-leading security measures, users acknowledge that:
-
No digital system provides absolute security guarantees
-
Internet transmission inherently involves security risks
-
User devices and networks may introduce vulnerabilities
-
Social engineering and phishing remain user responsibilities
-
Third-party service dependencies may create additional risks
11.2 Service Availability and Performance
ST provides Services on a "best efforts" basis but does not guarantee:
-
Continuous, uninterrupted access or availability
-
Error-free operation or complete accuracy
-
Compatibility with all devices or software configurations
-
Performance meeting specific user requirements or expectations
-
Protection against all forms of cyber threats or data loss
11.3 Third-Party Interactions and Dependencies
ST disclaims responsibility for:
-
Third-party website content, services, or privacy practices
-
Integration failures or data synchronisation issues
-
External service provider performance or availability
-
Third-party security breaches or data compromises
-
Regulatory changes affecting external service operations
11.4 User Responsibility Framework
Users accept full responsibility for:
-
Implementing appropriate device and network security
-
Maintaining confidentiality of access credentials
-
Providing accurate, complete, and lawful information
-
Compliance with applicable laws and regulations
-
Monitoring account activity and reporting irregularities
-
Understanding and accepting inherent digital service risks
12. Limitation of Liability
12.1 Maximum Liability Cap
ST's total liability for any claims arising from or related to this Policy or Services is strictly limited to the lesser of:
-
Direct damages actually incurred by the claimant
-
The total fees paid by the user in the 12 months preceding the claim
-
R30,000 (Thirty Thousand Rand) in aggregate
12.2 Excluded Damages
ST shall not be liable under any circumstances for:
-
Indirect, incidental, consequential, or punitive damages
-
Lost profits, revenue, data, or business opportunities
-
Reputational damage or loss of goodwill
-
Third-party claims or cross-claims
-
Damages arising from user negligence or misconduct
-
Force majeure events or circumstances beyond reasonable control
12.3 Time Limitation
All claims must be brought within 12 months of the incident giving rise to the claim, failing which such claims are forever barred.
12.4 Comprehensive Indemnification
Users indemnify and hold ST harmless from all claims, damages, costs, and expenses (including reasonable legal fees) arising from:
-
User breach of this Policy or applicable laws
-
User-provided information or content
-
Unauthorised use of user accounts or credentials
-
Third-party claims related to user conduct
-
Violation of intellectual property or other rights
-
Regulatory fines or penalties resulting from user actions
13. Electronic Communications and Evidence
Under the ECT Act, users acknowledge that:
-
Electronic communications constitute valid legal notices
-
Digital records serve as prima facie evidence in legal proceedings
-
Electronic signatures and timestamps are legally binding
-
System logs and audit trails are admissible as evidence
-
ST's electronic records are authoritative for transaction verification
14. Governing Law and Dispute Resolution
14.1 Exclusive Jurisdiction
This Policy is governed exclusively by South African law. All disputes shall be resolved solely in competent South African courts, and users submit to such jurisdiction.
14.2 Alternative Dispute Resolution
Prior to litigation, parties may engage in mediation through the applicable industry ombudsman or professional mediation service, with costs shared equally unless otherwise agreed.
15. Policy Updates and Version Control
15.1 Modification Rights
ST reserves the right to modify this Policy at any time to reflect:
-
Changes in applicable laws or regulations
-
Evolution of business practices or service offerings
-
Enhanced security measures or technological developments
-
Clarification or improvement of existing provisions
15.2 Notification and Acceptance
Policy updates will be communicated through:
-
Website posting with effective date notification
-
Email notification to registered users (where applicable)
-
In-app notifications or system messages
-
Direct communication for material changes
Continued use of Services after the effective date constitutes acceptance of updated terms.
16. Information Officer and Contact Details
Information Officer: Information Officer
Email: data@spectechonline.com
Phone: +27 (0)11 615 5423
Address: 27A Nicol Road, Bedfordview
For all privacy-related inquiries, data subject requests, incident reports, or policy clarification, contact the Information Officer through the designated channels above.
17. Severability and Interpretation
If any provision of this Policy is found invalid or unenforceable, the remainder shall remain in full force and effect. Invalid provisions shall be reformed to reflect the parties' original intent while ensuring enforceability. This Policy represents the complete agreement regarding data protection and privacy matters, superseding all previous communications or agreements on these topics.
Document Classification: Legal Policy Document
Version: 2.0
Review Date: December 2026