The Privacy Policy Statement
WORKPAY AFRICA LIMITED (and where applicable its subsidiaries or holding companies or successors in title) (“we” or “us” or “our”) recognises the provisions of the laws on data protection. We acknowledge the importance of confidentiality and privilege duty owed to our clients’ information. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you enjoy our services. We are limited to use your personal information to offer you our products and services.
We invite you to read this policy carefully. If you use our website on behalf of others, you are responsible for ensuring that the others are aware of the content of this Privacy Policy and are in agreement with you supplying their personal data to use to enjoy our services. We will take all reasonable steps necessary to ensure your data is treated securely and in accordance with this privacy policy.
Definitions
“You” means the person who subscribes to, uses or purchases any of our products and services or accesses our websites and includes any person who accesses any of the products and services you have subscribed to.
“Workpay”, “we” or “us”, “our” and “ours” means Workpay Africa Limited and any of its subsidiaries, holding companies or successors in title.
Our mandate to Protect your Data
Workpay strictly adheres to the applicable laws that relate to the protection of data.
We also take into cognisance the principles of lawfulness, fairness and transparency, accuracy, integrity and confidentiality (security) and accountability whilst conducting data collection and processing.
Therefore, our mandate to you includes:
The Nature of Data or Personal Information we collect
Type of personal information | Description |
Personal information | This includes your name, address, email address, telephone number, date of birth, passport or national identification number, driver’s licence, photographs or birth certificate, residential address or billing address. |
Transactional | Details about the transactions and payments made using our software. |
Payments | Bank account, mobile number, cards and virtual cards. |
Contractual | Details about the products or services we provide to you. |
Location | Details that we get about where you are. This may come from where you connect a computer to the internet. |
Behavioural | Data on how you use our Services and Site. |
Technical | Details on the devices, software and technology you use. |
Documentary data | Data about you, your work, salary, working hours, terms of work, contract duration, employers, length of service, stored in documents in different formats, or copies of them. |
Communications | Data from communications between us. |
Public and third-party records | Details about you that are in public records and information about you that is publicly available on the internet. We also collect information about you which we receive from other companies, such as (without limitation) credit reference or fraud protection agencies. |
Usage data | Other data about how you use our products and services. |
Consents | Any permissions, consents or preferences that you give us. |
Sensitive personal data | Such as information concerning medical conditions, disabilities, religious beliefs, race, marital status, children details, spouse details, next of kin, medical data, financial data including pensions, saving schemes, loans, deductions. |
Lawful Processing of Data
We will process your data for any of the lawful purposes stipulated below:
Data Minimization
We are committed to respecting your privacy and ensuring that we collect only the data strictly necessary for the specified purposes outlined in this policy. We will not collect any additional information beyond what is required for the specific services we provide. All personal data we collect is for legitimate purposes as stipulated in this policy and will only be used in accordance with the terms of this policy.
Utilisation of Your Information
We may use your information to:
Where we collect personal information
We may collect personal information about you or your businesses from any of these sources:
Data from third parties
Sharing your personal information with third parties
We may share your personal information to third parties in the manner and for the purposes of rendering a quality service. We will only share your information with the third parties listed below for the purposes described above in the “Utilization of Your Information” Section, unless otherwise noted at the point of collection:
Communications
We may contact you with newsletters and other marketing information that may be of interest to you. You may opt out of receiving any, or all, of these marketing communications from us by following the unsubscribe link or instructions provided in any email we send or by contacting us.
Managing Marketing Ads
To protect your privacy and to ensure you have control over how we manage marketing with you and provided that you have indicated that you would like to receive advertisements, we will:
You can click the “unsubscribe” link that you will find at the bottom of our emails which you receive from us, or you can unsubscribe by contacting us or changing your account settings which will remove you from the relevant marketing list.
You can request that we stop sending you marketing advertisements.
Protection of your Personal Information
We have in place appropriate technical and organisational security measures, and procedures designed to protect the personal information that you share with us and safeguard the privacy of such information. The measures are further described below:
Infrastructure | How it is designed |
Secure infrastructure provider | Workpay hosts all of its data in the secure Google Cloud facilities based in the United Kingdom. Hosting its services on Google Cloud gives the Supplier the ability to remain resilient globally even if one location goes down. The Google Cloud services we use—including VPCs, load balancers, and S3 storage—span multiple availability zones to ensure resiliency in the event of most failure scenarios, including natural disasters and system failures. Workpay performs continuous backups of critical data using Google cloud storage replication capabilities across multiple regions. Our production database clusters are shared across multiple availability zones, and snapshots of their data are constantly backed up in Google Cloud. All backups are encrypted in transit and at rest using strong encryption tactics. |
Data encryption in transit & at rest process | All data sent to or from the Software is encrypted using Transport Layer Security TLS, and all customer data is encrypted using AES-256 encryption standard. The Supplier further secures sensitive data using industry best practices to salt and repeatedly hash data before it is stored in the database. |
Data redundancy and resiliency | Workpay’s infrastructure has been designed to be fault tolerant. All databases operate in a cluster configuration and the application tier scales using load balancing technology that dynamically meets demand. |
Strict access controls | Access to all Workpay’s systems is managed through our identity provider, which automates user provisioning, enforces 2FA, and logs all activity. Workpay Systems have an audit trail functionality where all user system activities are trailed for audit. The Supplier’s Software uses role based access control where different users are provided with different privileges. These roles and privileges are created by the Client. To ensure that such rights and privileges are not abused, the Software operates audit logging protocols to record what each user does on the Software and on the Account. |
Server security and monitoring | All servers are configured using a documented set of security guidelines, and images are managed centrally. Changes to the company’s infrastructure are tracked, and security events are logged appropriately. We also have a data breach and incident management policy that includes among other provisions, the criteria for informing clients of breaches or incidence that may affect their data or their systems. |
Reviews | Before any new product is launched on the Supplier’s software, internal security reviews are conducted. Additionally, on an ongoing basis, continuous internal and external security tests are conducted to ensure that the Software is impregnable. |
Vulnerability management | The Vulnerability Management program establishes how Workpay identifies, responds, and triages vulnerabilities against our platform. The program includes the following initiatives: • Continuous automated scans on library dependencies used by Workpay’s Application; • Vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process; and • Remediation service-level agreements (SLAs) defined according to the severity associated with the vulnerabilities discovered. |
Penetration testing and bug bounties | We regularly partner with reputable security companies to perform penetration tests on the Software and the infrastructure. We run internal pen tests and partner with reputable security firms to run external pen tests. Additionally, our bug bounty program allows anyone to test our system and report bugs. |
Application monitoring and protection | We have deployed an array of solutions to monitor and protect our applications, including: • a Web Application Firewall (WAF) and a Runtime Application Self-Protection (RASP) agent to gain visibility into our application security, identify attacks, and respond quickly to a data breach; • technologies to monitor exceptions and detect anomalies in our applications; • collection and storage of application logs to provide an audit trail of our application activity; • a runtime protection system that identifies and blocks Open Web Application Security Project (OWASP) Top 10 and business logic attacks in real time; and • security headers to protect our users from attacks. |
Our employees are constantly reminded of the great responsibility and trust bestowed on them by our clients. They are constantly trained on confidentiality and data protection obligations. Our employees are held accountable and are required to operate in accordance with high standards of confidentiality and data protection, as a bare minimum. In this regard, the following procedures and processes has been established in respect of personnel security:
Procedure | Why it is there |
Formal security policies and incident response plan | Workpay maintains a set of comprehensive security policies that are kept up to date to meet the changing security environment. These materials are made available to all employees during training and through the Supplier’s knowledge base. |
Strict onboarding and offboarding process | Every new hire must pass a thorough background check and attend a “Legal and Security” training course at least, once a year. We instantly disable departing employee’s devices, apps, and access during offboarding. |
Continuous security training | The Workpay Security Team provides continuous education on emerging privacy and security threats, performs phishing and security awareness campaigns, and communicates with employees regularly. |
Office security | Workpay manages visitors, office access, and overall office security via a formal office security program.Access to Workpay’s offices is managed by a biometric system that tracks who enters and leaves the office. Using this system, we are able to ascertain and hold our employees accountable in the event of any unauthorised access to our office. Logs of successful and unsuccessful entry attempts are maintained for three months. Workpay’s office security is further enhanced by camera surveillance. |
Device Security | All the employee devices are secured using passwords of sufficient length and complexity. In addition, for employees to access their devices and company systems remotely, there is a multifactor authentication required to ensure maximum security for both the Supplier’s devices and the Supplier’s systems. |
Endpoint security | All our employee devices are installed with anti-malware protection software programs. The Supplier even goes a notch higher to provide our engineers with macOS laptops with built-in antivirus technology to provide more protection. We also do not allow any employee to bring their own devices or to use their own devices for work purposes. We have policies in place and do continuous monitoring for patching that ensures all devices in use allow system updates. This patch management policy is further enforced by our anti-malware technology. |
The very lifeblood of our Software is to provide a safe and secure platform for human resource and payroll management. It is therefore imperative that data security is at the forefront of the development of the Software and our engineers keep this commitment in mind as they develop this cutting edge solution. Below is a summary of the key development stages and how data security is kept at the forefront.
Process | What Workpay does |
Secure Software Development Life Cycle Process | From a high level perspective, the Software Development Life Cycle involves Planning, Analysis, Design, Implementation and maintenance with data security at the core of the process. Our engineers are trained regularly on secure coding practices. We segregate development environments into development, staging and production. Developers use development and staging. QA uses staging. Production is used by customers. We never replicate the production environment. Static code analysis is part of development. Further, we do test driven development, QA does integration and end to end tests then finally we do customer acceptance testing before going to production. |
Account Security | The Supplier monitors authentication events and alerts the internal security team of possible compromised accounts. Moreover, we protect users against data breaches by monitoring and automatically blocking brute-force attacks. The Client can add another layer of security to their accounts by enforcing multifactor authentication to access the Software. Through the ongoing awareness of vulnerabilities, incidents, and threats, the Supplier can quickly respond and mitigate accordingly. Workpay leverages a comprehensive collection of application, infrastructure, and software-as-a-service (SaaS) log sources to identify and triage possible security events. |
Development and change management process | Code development is done through a documented SDLC process, and every change is tracked via Gitlab. Automated controls ensure changes are peer-reviewed and pass a series of tests before being deployed to production. |
Third-party vendor security review process | We ensure that all of our third-party apps and providers meet our security data protection standards before using them. |
Right to Access Personal Information.
As our visitor, you have a right to request that we provide you with a copy of your personal information that we hold and you have the right to be informed of: the source of your personal information; the purposes, legal basis and methods of processing; the data controller’s identity; and the businesses or categories of businesses to whom your personal information may be transferred.
Right to Rectify or Erase Inaccurate Personal Information
You have a right to request that we rectify inaccurate personal information about you. We may seek to verify the accuracy of the personal information before rectifying it.
You can also request that we erase your personal information in limited circumstances where:
We are not required to comply with your request to erase personal information if the processing of your personal information is necessary:
Right to obtain a copy of personal information safeguards used for transfers outside your jurisdiction
You can ask to obtain a copy of, or reference to, the safeguards under which your personal information is transferred outside of your country.
We may redact data transfer agreements to protect commercial terms.
Right to restrict the processing of your personal information
You can ask us to restrict your personal information, but only where:
We can continue to use your personal information following a request for restriction, where:
You have a right to lodge a complaint with the Office of the Data Protection Commissioner if you have concerns about how we are processing your personal information.
How long we keep your personal information
We will keep your personal information as long as you are a User of Workpay’s software.
We will retain your personal information for as long as you are a user of Workpay’s software. Once you cease to be a client, we will only retain your personal data for as long as is necessary to fulfill the specific purposes for which it was collected, or to comply with our legal obligations. In some cases, we may retain your personal information after you stop being a customer for the following reasons:
When your personal data is stored for such reasons mentioned, appropriate safeguards shall be implemented to ensure your rights and freedoms are protected, including data minimization and pseudonymization, where possible. Whenever possible, further processing may be carried out in a way that no longer permits the identification of data subjects.
Update of this Policy
This Policy is subject to changes, renewals, amendments and revision. You are expected to check this page from time to time to take notice of any changes we have made, as they are binding on you. If we make any substantial changes, using your personal information we shall notify you by posting a prominent notice on our website.
In case of any query regarding this policy, or if you have any comments or want to opt-out of receiving marketing communications from us or to complain about our use of your personal data kindly contact us through legal@myworkpay.com.
Workpay is subject to oversight by the Kenya Office of Data Protection Commissioner. ODPC is the Kenyan-based independent organization responsible for reviewing and resolving complaints about our data protection and privacy compliance — free of charge to you. We ask that you first submit any such complaints directly to us via legal@myworkpay.com . If you aren't satisfied with our response, please contact ODPC at https info@odpc.go.ke . In the event your concern still isn't addressed by ODPC you may be entitled to binding arbitration.
Page |