Privacy Controls

Privacy Controls

Privacy Built Into System Design Governed, Controlled, and Transparent

ZoikoTime enables organisations to manage workforce data responsibly through policy-driven controls, transparent practices, and alignment with global privacy standards.

ZoikoTime is not a surveillance system. It operates within employer-defined policies and is designed to support lawful, transparent, and accountable workforce management.

Privacy Positioning

Privacy as a System-Level Requirement

ZoikoTime embeds privacy into system design, ensuring that data collection, processing, and access are governed by policy, constrained by purpose, and supported by user rights — from the first line of code to the final evidence record.

Privacy controls are not a feature set that can be toggled off. They are architectural requirements that cannot be bypassed by configuration, individual discretion, or operator policy.

Privacy is enforced through system design, not dependent on individual discretion.

This means every privacy control has three properties: it is enforced at architecture level; it cannot be bypassed by user or admin action; and it is continuously validated to confirm it is functioning as designed. These are verifiable system properties — not policy statements.

Lawful Basis

Lawful Basis for Data Processing

GDPR and equivalent privacy frameworks require a lawful basis for every data processing activity. ZoikoTime's default processing activities and their applicable lawful bases are documented below.

Important note: The applicable lawful basis depends on jurisdiction, the employer's specific policies, and applicable regulatory requirements. ZoikoTime provides the framework and documentation — the deploying organisation is responsible for confirming the appropriate lawful basis in their specific legal context with qualified legal counsel.

Roles & Responsibilities

Roles and Responsibilities in Data Use

ZoikoTime operates under a three-party model — clearly defining the distinct responsibilities of the employer, the ZoikoTime platform, and the employee or user.

Employer

ZoikoTime Platform

Employee / User

ZoikoTime does not independently determine how workforce data is used. It enforces policies defined by the organisation — within the bounds of applicable privacy law and ZoikoTime's own privacy architecture requirements.

Data Lifecycle

Data Lifecycle and Control Points

Every stage of the data lifecycle has a defined control, governing policy, and risk mitigation — applied automatically, not selectively.

Collection

Only minimum required signals. No surplus data collection by design.

Validation

Data validated for quality and lawfulness before processing begins.

Processing

Processed only for stated purpose in isolated, controlled environments.

Storage

Encrypted at rest. Access restricted to governance function scope.

Access

Every access event logged. Cross- purpose access prevented systemically.

Retention

Automated retention per law. Deletion certificates provided at end of lifecycle.

Deletion

Secure, verifiable deletion with documented evidence of completion.

Access Model

Who Can Access What

Role-based visibility scoping ensures that data access is proportionate to governance function — no role can access data beyond the scope required for their responsibilities.

Data Subject Rights

Exercising Privacy Rights

ZoikoTime supports all applicable data subject rights under GDPR and equivalent frameworks — through structured, documented, and traceable processes.

Right of Access

Individuals can request a copy of all personal data processed about them — structured in a human-readable format with full context about how each data point was used.

Right to Correction

Inaccurate personal data can be corrected through a documented request process — with correction evidence maintained as part of the compliance record.

Right to Deletion

Data deletion can be requested where legally applicable — subject to retention obligations for compliance and legal proceedings. Deletion certificates issued on completion.

Right to Restriction

Processing can be restricted in defined circumstances — such as during a dispute about accuracy or pending an objection. Restriction status maintained in the compliance record.

Right to Object

Individuals can object to processing based on legitimate interest in defined circumstances — objections assessed against the balancing test and employer policy with documented outcomes.

Right to Portability

Where applicable, personal data can be provided in a machine-readable format — enabling transfer to another controller in relevant circumstances under GDPR Article 20.

All data subject rights requests are initiated through defined channels, processed in accordance with policy, logged and tracked for audit purposes, and resolved within regulatory timelines. ZoikoTime provides the infrastructure — the deploying organisation is responsible for managing the rights request process for their workforce.

Compliance

Privacy Framework Alignment

ZoikoTime's privacy architecture is aligned to GDPR, UK GDPR, CCPA, and equivalent global privacy frameworks — providing the documentation evidence that compliance and legal teams require.

Transparency System

Transparency and Visibility

Privacy without transparency is not sufficient. ZoikoTime provides multiple layers of visibility — for workers, administrators, and governance teams — ensuring that data practices are never opaque.

Transparency Center

Every worker has access to a personal Transparency Center — showing what signals are collected in their sessions, how the confidence score is calculated, and what decisions have been made about their data. Accessible at any time, without requiring a formal request.

Audit Logs

Immutable logs of all data access events, processing decisions, and system actions — providing complete traceability for administrators, compliance teams, and data subject rights responses. All access logged with full context and timestamp.

Data Use Clarity

Clear documentation of what data is collected, why it is collected, how long it is retained, and who can access it — structured for both technical review and plain-language communication to affected individuals.

Privacy Resources

Privacy Documentation & Downloads

Privacy Overview

Complete privacy architecture documentation — controls, principles, and framework alignment — for legal and compliance review.

Data Processing Summary

Structured summary of all processing activities, lawful bases, and retention schedules — formatted for GDPR Article 30 compliance records.

Compliance Documentation

GDPR, UK GDPR, and CCPA alignment evidence — structured for legal due diligence, procurement review, and regulatory audit support.

Privacy Contact

Contact the Privacy Team

Data Protection & Privacy Enquiries

For questions about ZoikoTime's privacy architecture, data processing practices, DPIA support, or general privacy compliance enquiries from organisations evaluating or deploying ZoikoTime.

Data Subject Rights Requests

For individual workers exercising data subject rights — access requests, deletion requests, objections, and corrections are processed through the structured rights request channel with documented outcomes.

Privacy First

Privacy Designed for Trust, Control, and Compliance

ZoikoTime provides the privacy-by-design architecture, compliance documentation, and user rights infrastructure needed to manage workforce data responsibly — across every jurisdiction, every workforce type, and every governance requirement.

Scroll to Top