Privacy Notice
This notice explains what happens when information about you enters our systems. We've organized it around how data moves through our organization rather than listing rights first and operations later. Start where your interaction with us begins, then follow the information as it flows.
Shashk Lecore processes details about individuals who engage with our financial analysis services. The way we handle that information depends on whether you're browsing casually, requesting specific reports, or working with us directly. Each pathway creates different obligations on our part.
When Information Enters Our Possession
Details about you arrive through three main channels. First, you provide them directly when filling forms, sending messages, or subscribing to updates. Second, your device transmits technical data whenever you load pages on our domain. Third, we derive certain things through analysis of your interactions with content.
Identity Elements
Your name appears when you register for newsletters or submit contact requests. Business affiliations emerge when you specify your organization during report downloads. Email addresses become necessary the moment you want us to send something back to you.
Communication Details
Messages you send contain whatever you choose to include. Phone numbers appear if you request callbacks. Correspondence addresses show up when physical materials need delivery. The content of your questions and our responses gets stored as interaction records.
Technical Readings
Your device announces its type, browser version, and screen dimensions. Network providers assign IP addresses that indicate general location. Time stamps mark when pages load. Navigation sequences show which sections attracted attention and how long you stayed.
Preference Indicators
Choices about report formats get remembered. Industry sector selections help us recommend relevant analysis. Frequency preferences for updates determine mailing schedules. Download history reveals which topics interest you most.
What We Do With Collected Details
Information serves specific operational purposes, not abstract business goals. When you request a market analysis report, your email becomes the delivery mechanism. When technical issues arise, device data helps diagnose compatibility problems. When we design new features, usage patterns inform those decisions.
Service Delivery Operations
Reports reach your inbox because you provided an email address. Account access requires verification against stored credentials. Customized dashboards reflect preferences you selected. Support inquiries get routed based on the topic you indicated.
Financial analysis content adapts to the sectors you follow. Alert settings determine notification frequency. Payment processing involves transaction records and billing details. Content recommendations draw from your browsing history.
Operational Improvement Work
Website performance monitoring depends on technical readings. Error logs help identify broken functionality. Usage statistics reveal which sections need better organization. Device compatibility issues surface through technical data collection.
Survey responses guide feature development. Support ticket analysis highlights common confusion points. Download patterns suggest content gaps worth filling. Navigation data exposes unclear information architecture.
We don't sell contact lists or behavioral profiles to third parties. Marketing affiliations don't exist in our business model. Financial analysis services operate on subscription revenue, not advertising optimization or data brokerage.
Legitimate interests justify certain processing activities where explicit consent feels impractical. Website security monitoring protects both our systems and visitor devices. Fraud detection prevents misuse that harms everyone. Technical diagnostics improve reliability for all users. These operations happen because they benefit the service as a whole rather than serving purely organizational convenience.
Movement Beyond Our Organization
Some information leaves our direct control, though not randomly or carelessly. External services handle specific tasks we don't perform internally. Legal requirements occasionally demand disclosure. Business partnerships create limited sharing scenarios.
- Email delivery systems receive addresses and message content when we send newsletters or reports. Those providers operate under contract with strict usage limitations and cannot repurpose your details for their own marketing.
- Payment processors see transaction data when subscriptions renew or reports get purchased. Card numbers never reach our servers directly. Authorization happens through encrypted connections to financial institutions.
- Hosting infrastructure providers maintain servers where website files and databases reside. Technical staff at those companies access systems for maintenance but face contractual prohibitions against examining content.
- Analytics platforms receive anonymized usage patterns that inform our understanding of visitor behavior. Individual identification gets stripped before data transmission, leaving only aggregated trends.
- South African regulatory authorities can compel disclosure when financial analysis touches on matters under investigation. Court orders occasionally require specific records. Tax compliance involves sharing business transaction details.
Cross-border transfers occur when external service providers operate servers outside South Africa. European Union adequacy decisions cover some destinations. Standard contractual clauses govern others. We verify protection standards before establishing any international data flow, though geographic location matters less than legal safeguards and technical security.
Your Control Mechanisms
Several options exist for managing what we hold and how we use it. Some requests get handled immediately through automated systems. Others require manual processing and take longer. Certain limitations apply based on legal obligations or technical constraints.
Access and Portability
Request a copy of everything we've stored about you. The export arrives as structured data files containing all personal details linked to your account. Processing typically completes within two weeks, though complex requests take longer.
Download your subscription history, saved reports, communication records, and preference settings. Formats vary depending on data type, but most arrive as readable spreadsheets or documents.
Correction and Deletion
Update inaccurate details through account settings or by contacting support. Name changes, address corrections, and preference modifications happen immediately. Email address changes require verification to prevent unauthorized account access.
Request complete account deletion, which removes personal identifiers while preserving anonymized records needed for business operations. Some information survives deletion due to legal retention requirements, particularly financial transaction logs and tax records.
Exercising these rights costs nothing. We don't charge fees for reasonable requests, though excessive or repetitive demands might incur administrative costs. Response timelines depend on request complexity, but acknowledgment happens within three business days.
Objections to specific processing activities get evaluated individually. Marketing communications stop immediately when you unsubscribe. Legitimate interest operations might continue if compelling grounds exist, but we explain the reasoning and offer alternatives where feasible. Automated decision-making doesn't drive significant outcomes in our services, so intervention rights rarely become relevant.
Complaints about privacy practices should first come to us directly. If resolution fails or response proves inadequate, South Africa's Information Regulator handles escalated concerns. That office investigates violations and can impose corrective measures. Contact details for lodging complaints appear at the end of this document.
Retention and Disappearance
Information doesn't stay forever. Different categories have different lifespans based on operational necessity and legal requirements. Active use determines some retention periods. Statutory obligations dictate others. Technical limitations create practical constraints.
Active Relationship Storage
Account details persist while subscriptions remain active. Communication history survives as long as you maintain your profile. Preference settings stick around until you change them or close your account completely.
Downloaded reports stay in your account library indefinitely unless you delete them. Saved searches and custom alerts continue functioning until explicitly removed. Technical logs cycle out after ninety days unless security concerns warrant longer retention.
Post-Relationship Retention
After account closure, most personal identifiers disappear within thirty days. Financial records survive for seven years per tax law requirements. Anonymized usage statistics become part of aggregate datasets that inform long-term improvements.
Legal holds can freeze deletion when disputes arise or investigations begin. Those situations create unpredictable retention extensions, but affected individuals receive notice when their information enters such a hold status.
Backup systems introduce practical complications. Deleted information might persist in backup archives for up to ninety days before those backups age out of rotation. Disaster recovery procedures require this redundancy, even though it delays complete removal. Technical staff cannot selectively extract individual records from backup storage without compromising system integrity.
Reaching Our Privacy Team
Questions about this notice, requests for information, or concerns about how we handle details should come through these channels. Response times vary by method and complexity, but every inquiry receives acknowledgment.