User Consent & Authorization Policy
This User Consent & Authorization Policy outlines the principles, operational rules, and legal requirements governing the authorized use of our software products, including GoMyid and GoMyit.
Ensuring user awareness, explicit consent, and responsible usage is one of our highest priorities.
This policy has been developed to reinforce transparency, reinforce trust, and ensure full compliance with international regulatory standards,
including GDPR, KVKK, CCPA, and industry-specific privacy frameworks that govern modern information systems.
1. Introduction
The purpose of this policy is to clearly define the rules surrounding user authorization, device control, data access,
and transparency for all remote connectivity features provided by our software. Remote access software must be deployed with clear user permission,
ethical usage practices, and strict compliance with privacy laws. Our company does not tolerate unauthorized access, covert surveillance,
or any form of misuse that violates user rights or global legal standards.
All users installing, deploying, or administrating GoMyid / GoMyit must read, understand, and accept this policy before using the software.
By continuing to use the system, users acknowledge their responsibility to follow these guidelines at all times.
The software is designed purely for legal business use cases and cannot be used to monitor or access devices without the knowledge and explicit consent of all parties involved.
2. Definitions
To ensure clarity and avoid ambiguity, the following definitions apply throughout this document:
- Authorized User: A person who has installed and configured the software on a device willingly and knowingly.
- Device Owner: The legal owner or custodian of the device on which the software is installed.
- Administrator: A designated IT professional or authorized staff member managing the system.
- Remote Access: The ability to connect to a device from another physical location through the software.
- User Consent: Informed, voluntary, and explicit approval given by a device owner or user before enabling remote control features.
- Unauthorized Use: Any access without knowledge or approval of the device owner/user.
3. Requirements for User Consent
User consent is the cornerstone of responsible remote access technology. Our software requires explicit permission before any connection can be established.
Under no circumstances may the system be used to access or monitor a device secretly. Consent must be informed,
meaning the user understands what the software does, how it works, and what type of access is being granted.
Consent must also be voluntary. Any form of forced, coerced, or deceptive installation is strictly prohibited.
The software may not be installed on devices owned by individuals who have not provided explicit authorization.
This applies especially to personal computers, employees’ private devices, or any hardware not owned by the company deploying the software.
4. Transparency and Notification Obligations
All users must be clearly informed when GoMyid / GoMyit is installed on their device.
The software does not include hidden modules, stealth components, or silent background monitoring functions.
A user must be aware that the system exists, is operational, and may provide remote access functionalities to authorized administrators.
The following transparency principles apply:
- The installation must not be hidden.
- Users must be informed before any remote session begins.
- Administrators must identify themselves when accessing a device remotely.
- Remote actions that affect the device must be fully visible to the user, unless the company has internal IT policies covering headless management for company-owned hardware.
5. Types of Allowed and Prohibited Usage
5.1 Allowed Usage
The software may be used only for legal, ethical, and authorized activities. Examples include:
- Providing remote technical support for company-owned devices.
- Managing enterprise IT infrastructure.
- Offering remote assistance to customers who have explicitly requested help.
- Accessing work devices that belong to the organization and are covered by internal IT access policies.
5.2 Prohibited Usage
The software may not be used for:
- Covert monitoring or spying on individuals.
- Accessing personal devices without consent.
- Unauthorized capture of user activity, files, or personal data.
- Violating local or international privacy laws.
- Any action that breaches ethical or legal boundaries.
6. Authorization Controls
Every remote session must be authenticated using secure credentials and encryption.
The software includes layered security features such as AES-256 encryption, two-factor authentication options,
session logging, and administrative permission controls. These measures ensure remote access remains safe,
traceable, and restricted only to approved personnel.
Administrators must configure the system using best practices:
- Strong passwords
- Limited-access user accounts
- Audit logs for all remote sessions
- Zero-trust network principles where applicable
7. Device Owner Rights
The device owner maintains full authority over their hardware. They may:
- Remove the software at any time
- Block remote sessions
- Revoke access permissions
- Request deletion of logs or data (where legally permitted)
Users also have the right to be informed about:
- Who is accessing their device
- Why access is needed
- What actions are being performed
- The duration and scope of each session
8. Legal Compliance
This policy ensures compliance with major international regulatory frameworks.
Unauthorized access is treated as a violation of privacy laws such as:
- General Data Protection Regulation (GDPR)
- California Consumer Privacy Act (CCPA)
- Turkish Personal Data Protection Law (KVKK)
- United States Computer Fraud and Abuse Act
- EU ePrivacy Directive
Users must ensure that deployment of the software aligns with regional laws applicable to their jurisdiction.
Our company is not responsible for misuse, illegal installation, or violations committed by end users.
9. Connection Visibility and Logging
All remote connections may be logged for security and auditing. Logs may include timestamps,
session durations, controlling user identities, and actions performed.
Log retention is managed in accordance with company security policies and regional data protection laws.
10. Revocation of Consent
Consent can be withdrawn at any moment. If a user no longer wishes to allow remote access,
they may uninstall the software, disable authorization settings, or revoke administrative privileges.
Administrators must respect revocation requests immediately.
11. Enforcement and Policy Violations
Any user or administrator who violates this policy may be subject to:
- System access restrictions
- Account suspension
- Legal action depending on jurisdiction
- Termination of licensing rights
We reserve the right to disable accounts or block access if misuse is detected or reported.
12. Final Statement
This User Consent & Authorization Policy protects both users and administrators by ensuring
that all remote connections occur with transparency, accountability, and full legal compliance.
By using GoMyid / GoMyit, you acknowledge and accept these principles and agree to always use the software ethically and responsibly.