Transparency & Audit Policy

This Transparency & Audit Policy outlines the principles, standards, and internal procedures that govern how GoMyid and GoMyit maintain openness, visibility, accountability, and ethical operation of all remote access activities. Remote access technology requires a high level of transparency to ensure trust, lawful usage, and responsible digital interaction. This document clearly describes how our platform logs activity, how remote actions are monitored, how audit trails are maintained, and how users retain full visibility over their data and sessions.

1. Commitment to Transparency

Transparency is a core value within our software ecosystem. We believe users must always know:

  • What data is collected
  • How data is used
  • Who has access to it
  • How remote sessions operate
  • How actions are logged and monitored

There are no hidden modules, silent tracking mechanisms, or stealth components in our software. Users and organizations maintain full visibility into all remote access operations and internal system activities.

2. Purpose of Audit & Transparency Controls

Audit logs and transparency controls are essential for:

  • Tracking authorized and unauthorized access attempts
  • Ensuring accountability among administrators
  • Providing evidence in case of security incidents
  • Helping organizations comply with international privacy and cybersecurity standards
  • Maintaining trust between users, administrators, and organizations

These controls ensure that every action performed through the system can be traced, reviewed, and verified.

3. Data We Log for Transparency

Our logging system captures only what is necessary for security, auditing, and operational purposes. Logged data may include:

  • Authentication attempts
  • Remote session start and end times
  • User identities performing actions
  • Device names and connection details
  • Administrative changes or configuration updates
  • Security alerts and unusual activity patterns

We do not log personal content (files, messages, private information) unless explicitly shared during a support interaction.

4. How Remote Sessions Are Recorded

To maintain transparency, each remote session is logged with:

  • Date and time of connection
  • Identity of the user initiating the session
  • Identity of the device being accessed
  • Duration of the session
  • High-level actions performed

The purpose of recording this information is to maintain traceability and accountability. It enables organizations to detect misuse and evaluate operational activity.

5. No Hidden or Silent Access

The platform does not support or allow:

  • Hidden remote access
  • Silent viewing without notification
  • Invisible tracking or background monitoring
  • Unauthorized device control

Any remote control session requires clear authorization and must follow explicit user-consent practices as described in our User Consent Policy.

6. Administrator Accountability

Administrators hold privileged access and therefore must follow strict operational standards. Every administrative action is recorded in audit logs, including:

  • Creation of new accounts
  • Changes to permission settings
  • Remote access attempts
  • Device enrollment and removal
  • Security configuration updates

This ensures transparency inside organizations and protects users from unauthorized internal activity.

7. Audit Logs & Review Procedures

Audit logs are central to security and compliance. They provide a verifiable history of system usage. Audit trails include:

  • System-level events
  • Access control changes
  • Remote desktop activity summary
  • Failed authentication attempts
  • Security warnings and alerts

Organizations may perform periodic audits internally or with third-party cybersecurity firms. Our system is designed to support external audit processes without exposing sensitive or personal content.

8. User Visibility & Self-Audit Tools

Users maintain full control and visibility over their accounts and devices. We provide:

  • Activity history panels
  • Device access logs
  • Connection summaries
  • Ability to revoke access at any time
  • Ability to disable administrative permissions

This empowers users to review their own data and verify that remote activities align with authorized usage.

9. Transparency in Data Handling

Data collection, processing, and storage follow strict transparency rules:

  • No data is collected without user awareness
  • No information is sold, rented, or monetized
  • Data is processed only when required and permitted
  • Security measures are openly documented
  • All retention policies are clearly stated

Users may request detailed information about how their data is handled at any time.

10. Organizational Responsibility

Organizations using GoMyid / GoMyit are responsible for:

  • Informing employees about remote access policies
  • Documenting internal usage rules
  • Restricting administrative access to authorized personnel
  • Reviewing audit logs for unusual behavior
  • Enforcing their own transparency and compliance requirements

11. Security & Integrity of Audit Data

Audit logs are stored securely using encryption, controlled access, and tamper-resistant systems to ensure:

  • Logs cannot be altered or deleted without authorization
  • Only approved personnel can review them
  • Integrity checks ensure original data remains unchanged
  • Internal threats are minimized through limited access

12. Reporting Unauthorized Activity

Any user or administrator may report suspicious activity, including:

  • Unauthorized remote sessions
  • Unexpected permission changes
  • Account access attempts without approval
  • Potential misuse of administrative rights

Reports are investigated promptly and thoroughly. Our security team evaluates incidents with a strict and confidential approach.

13. Public Transparency & Legal Requests

We disclose how we handle:

  • Lawful data requests
  • Data sharing with authorities
  • Security updates
  • Compliance practices
  • Operational procedures

We never share user information unless required by legal obligations and after strict verification.

14. Final Statement

This Transparency & Audit Policy ensures accountability, integrity, and trust across all GoMyid / GoMyit operations. Our commitment to openness protects users, supports organizations, and ensures that remote access technology is applied ethically and responsibly. By using our software, you acknowledge and agree to these transparency and auditing principles.