PRIVACY COMPLIANCE
Privacy Policy
Effective Date: May 17, 2026. At Lesous Technology LTD, security is our foundational anchor. We operate high-performance data architectures to respect and protect your privacy.
1. Data Collection & Integrity
We collect metadata required for secure system operations, including browser user-agent tokens, dynamic system clearance records, verified invoice underwriting details, and employee credentials verification metrics.
2. Cryptographic Security Standards
All verification identities are hashed server-side using SHA-256 protocols and stored within highly protected, firewall-shielded database clusters. Raw access strings and master clearance codes are never persisted in plaintext.
3. Verification Access Logging
Our systems automatically generate scan audit records when an ID badge is decoded. These metadata points include client IP geolocation identifiers, scan timestamps, and verification success status, which are used strictly for security tracking and fraud prevention.
4. Information Disclosure & Decency
Aligning with our SEED Core Values (specifically Safety and Decency), Lesous Technology LTD never sells, leases, or distributes personal data to third-party marketing matrices. Data is disclosed strictly under legal mandate under Nigerian law.
Technical Data Governance
If you require information regarding your dynamic scans history, wish to query data storage configurations, or report a system vulnerability, contact the engineering systems division directed by Mr. Oghenekparobo Onosemuode (CEO):

