Privacy Policy
Who we are
Company Information
Company legal name
Enact Systems, Inc
Company address
6200 Stoneridge Mall Road, Suite 300, Pleasanton, CA, 94588, United States
Definitions
Installers (of Solar systems) – Installers are companies (typically construction) that use our Solar design software; either during a demo or as a result of signing a contract with Enact.
Consumers (of electricity) – includes home owners, businesses, and industrial facilities; anything with an energy producing system.
White label customers – a business that offers our Consumer app to their customers, that we have re-branded with their logos and other branding information.
Contractual Partners – Anyone Enact has signed a contract with. Examples would be an Installer who has signed a contract with us to provide Design as a Service (DaaS), a business obtaining Solar from us, a homeowner that we have installed Solar for.
Note that our Installers may themselves have customers they have installed Solar for; Enact may not have signed a contract with that consumer; only the installer. In this case Enact is a “Processor” or “Sub-processor” in terms of the GDPR.
SMS usage
Our Role
- data protection legislation
- instructions given to us from the Customer
- the section in our Privacy Policy that talks about our Installers, Consumers, White-label Customers and
- the Privacy Policy of the Customer, which is made available by them (normally on their website)
Information we collect about you
- Contact Details: examples include real name, email address, address, telephone number, social media username, title, physical address.
- Financial Data: examples include credit card number, credit card verification number (CCV), credit card expiry date, bank account number, billing address, transaction code (TAN), income information, VAT number, credit score.
- Identifiers and Legal Documents: examples include public health number, passport, proof of residence, right to work status, visa status, social security number / national insurance number, driver’s license data, national identification document, signature.
- Personal Characteristics: examples include sex, nationality, date of birth, gender, academic qualifications, height, age.
- Location Data: examples include tracking data, approximate location.
- Communications Data: examples include instant messaging data, social media posts, postal content.
- Images and Recordings: examples include CCTV footage, photos, videos, voice recordings, profile picture.
- Views and Opinions: examples include survey responses, testimonials/references, opinions (non-political/religious/philosophical).
- Work-related Data: examples include name of employer, occupation, completed tasks, details of grievance, disciplinary proceedings, curriculum vitae / resume.
- Technical Identifiers: examples include IP address, MAC address, usernames, passwords, browser data, other device identifiers, unique identifier.
- Activity and Behavioral
- Aggregated Data: examples include statistical or demographic data for any purpose. Aggregated Data could be derived from your personal data but is not considered personal data in law as this data will not directly or indirectly reveal your identity.
- For example, we may aggregate your Usage Data to calculate the percentage of users accessing a specific website feature.
However, if we combine or connect Aggregated Data with your personal data so that it can directly or indirectly identify you, we treat the combined data as personal data which will be used in accordance with this Privacy Policy.
Legal justifications we rely on to process personal data
We process personal data for the purposes described in this policy, based on the following legal bases:
- Consent: the individual has given clear consent for us to process their personal data for a specific purpose.
- Legitimate interests: we have a business or commercial reason to use process your personal data, so long as this is not overridden by the individuals’ own rights and interests.
- Contractual Obligations: the processing is necessary for a contract we have with the individual, or because they have asked us to take specific steps before entering into a contract.
- Legal Obligations: the processing is necessary for us to comply with the law.
How we process personal data of our Consumers
Authenticating Users
Contact Details, Technical Identifiers
Contractual Obligations
Consumer Application (Enact Home)
Contact Details, Financial Data, Identifiers and Legal Documents,
Location Data, Technical Identifiers, Work-related Data</span >
Contractual Obligations
Customer Support
Contact Details, Personal Characteristics, Views and Opinions</span >
Legitimate Interest
Error & Log Management
Contact Details, Technical Identifiers
Legitimate Interest
Feature Flags
Contact Details, Technical Identifiers
Legitimate Interest
Onboarding & Product Demos
Contact Details, Views and Opinions
Legitimate Interest
Product Surveys and Gathering Insights
Contact Details, Personal Characteristics, Technical Identifiers,
Views and Opinions</span >
Consent
Website Tracking/Webapp tracking
Activity and Behavioural, Technical Identifiers</span >
Legitimate Interest
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer’s Privacy Policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer’s Users. While it is infrequent for us to regularly process such specialized data, it’s important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
How we process personal data of our Customers
Accounts Receivable
Contact Details, Financial Data
Contractual Obligations
How we process personal data of our Installers
Accounts Receivable
Contact Details, Financial Data
Contractual Obligations
Authenticating Users
Contact Details, Technical Identifiers
Contractual Obligations
B2B Telephone Marketing (existing customers)
Contact Details, Personal Characteristics, Views and Opinions
Legitimate Interest
Business Intelligence & Analytics
Activity and Behavioural, Contact Details, Personal
Characteristics, Technical Identifiers, Views and Opinions
Legitimate Interest
Creating Testimonials & Quotes
Contact Details, Views and Opinions
Legitimate Interest
Customer Relationship Management (CRM)
Activity and Behavioural, Contact Details, Personal
Characteristics
Legitimate Interest
Customer Support
Contact Details, Personal Characteristics, Views and Opinions
Legitimate Interest
Digitally Signing Documents
Contact Details, Technical Identifiers
Contractual Obligations
Error & Log Management
Contact Details, Technical Identifiers
Legitimate Interest
Feature Flags
Contact Details, Technical Identifiers
Legitimate Interest
Identity Verification (KYC)
Activity and Behavioural, Contact Details, Personal
Characteristics, Technical Identifiers, Views and Opinions
Legal Obligations
Navigation & Map Display
Images and Recordings, Location Data
Consent
Onboarding & Product Demos
Contact Details, Views and Opinions
Legitimate Interest
Product Surveys and Gathering Insights
Contact Details, Personal Characteristics, Technical Identifiers,
Views and Opinions
Consent
Publish App to App Store
Activity and Behavioural, Technical Identifiers
Contractual Obligations
Publish App to Google Play Store
Activity and Behavioural, Technical Identifiers
Contractual Obligations
Website Tracking/Webapp tracking
Activity and Behavioural, Technical Identifiers
Legitimate Interest
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer’s Privacy Policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer’s Users. While it is infrequent for us to regularly process such specialized data, it’s important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
How we process personal data of our White-label Customers
Accounts Receivable
Contact Details, Financial Data
Contractual Obligations
Authenticating Users
Contact Details, Technical Identifiers
Contractual Obligations
Customer Relationship Management (CRM)
Activity and Behavioural, Contact Details, Personal
Characteristics
Legitimate Interest
Customer Support
Contact Details, Personal Characteristics, Views and Opinions
Legitimate Interest
Digitally Signing Documents
Contact Details, Technical Identifiers
Contractual Obligations
Error & Log Management
Contact Details, Technical Identifiers
Legitimate Interest
Feature Flags
Contact Details, Technical Identifiers
Legitimate Interest
Product Surveys and Gathering Insights
Contact Details, Personal Characteristics, Technical Identifiers,
Views and Opinions
Consent
Website Tracking/Webapp tracking
Activity and Behavioural, Technical Identifiers
Legitimate Interest
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer’s Privacy Policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer’s Users. While it is infrequent for us to regularly process such specialized data, it’s important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
How we process personal data of our Leads
B2B Telephone Marketing (prospective customers)
Contact Details, Personal Characteristics, Views and Opinions
Consent
Customer Relationship Management (CRM)
Activity and Behavioural, Contact Details, Personal
Characteristics
Legitimate Interest
Navigation & Map Display
Identifiers and Legal Documents, Images and Recordings, Personal
Characteristics
Consent
Onboarding & Product Demos
Contact Details, Views and Opinions
Legitimate Interest
Product Surveys and Gathering Insights
Contact Details, Personal Characteristics, Technical Identifiers,
Views and Opinions
Consent
Targeted Advertising
Activity and Behavioural, Location Data, Personal
Characteristics
Legitimate Interest
Website Tracking/Webapp tracking
Activity and Behavioural, Technical Identifiers
Legitimate Interest
How we process personal data of our Website Visitors
Bot/Spam Prevention
Activity and Behavioural, Technical Identifiers
Legitimate Interest
Customer Relationship Management (CRM)
Activity and Behavioural, Contact Details, Personal
Characteristics
Legitimate Interest
Displaying Custom Fonts
Technical Identifiers
Legitimate Interest
Tag Management
Activity and Behavioural, Technical Identifiers
Consent
Targeted Advertising
Activity and Behavioural, Location Data, Personal
Characteristics
Legitimate Interest
Website Hosting
Technical Identifiers
Legitimate Interest
Website Tracking/Webapp tracking
Activity and Behavioural, Technical Identifiers
Legitimate Interest
How we process personal data of our Contractors
Code Hosting & Collaboration
Contact Details, Technical Identifiers
Contractual Obligations
Digitally Signing Documents
Contact Details, Technical Identifiers
Contractual Obligations
How we process personal data of our Staff
Code Hosting & Collaboration
Contact Details, Technical Identifiers
Contractual Obligations
Digitally Signing Documents
Contact Details, Technical Identifiers
Contractual Obligations
Feature Flags
Contact Details, Technical Identifiers
Legitimate Interest
GDPR Compliance
Contact Details, Technical Identifiers, Views and Opinions
Legitimate Interest
Guides and Tutorials
Contact Details, Technical Identifiers, Views and Opinions,
Work-related Data
Legitimate Interest
Internal Communication
Communications Data, Contact Details
Legitimate Interest
Internal Note Taking
Contact Details, Technical Identifiers, Views and Opinions
Legitimate Interest
Leave & Absence Management
Contact Details, Work-related Data
Legitimate Interest
Password and Credential Safekeeping
Financial Data, Identifiers and Legal Documents, Technical
Identifiers
Contractual Obligations
Payroll
Contact Details, Financial Data, Identifiers and Legal
Documents
Contractual Obligations
Product Development and Prototyping (internal)
Contact Details, Technical Identifiers, Views and Opinions
Legitimate Interest
Project Management
Contact Details, Work-related Data
Legitimate Interest
Recruitment
Contact Details, Personal Characteristics
Legitimate Interest
Remuneration and Benefits
Contact Details, Financial Data, Identifiers and Legal
Documents
Contractual Obligations
Staff Onboarding & Offboarding
Contact Details, Identifiers and Legal Documents, Work-related
Data
Contractual Obligations
Timesheet & Shift Management
Contact Details, Work-related Data
Legitimate Interest
Web & App Testing
Contact Details, Technical Identifiers
Legitimate Interest
How we process personal data of our Job Applicants
Recruitment
Contact Details, Personal Characteristics
Legitimate Interest
How your personal data is collected
Direct interactions – you may give us information on your Contact Details, Identifiers, Financial Data… (all the categories that come through direct interactions) by filling in forms or by corresponding with us by post, phone, email, via our website or otherwise. This includes personal data you provide when you:
- apply for our products or services;
- create an account with us;
- subscribe to publications;
- request marketing to be sent to you; or
- give us feedback or contact us.
Automated technologies or interactions. – As you interact with our website and services, we will automatically collect Technical, Profile and Usage Data about your equipment, browsing actions, and patterns.
Third parties or publicly available sources. – We might receive personal data about you from various third parties or publicly available sources like the ones set below.
- Work-related data from online recruitment platforms or professional networks.
- Identity and Contact Data from publicly available sources.
Third Parties & Sub-Processors
Crazy Egg
Encryption in Transit, Encryption at Rest
United States
Stripe
Encryption in Transit, Encryption at Rest
United States
Google Tag Manager
Encryption in Transit, Encryption at Rest
United States
Google Fonts
Encryption in Transit, Encryption at Rest
United States
Google Analytics
Encryption in Transit, Encryption at Rest
United States
DoubleClick Ad
Encryption in Transit, Encryption at Rest
European Economic Area
WP Engine
Encryption in Transit, Encryption at Rest
United States
LaunchDarkly
Encryption in Transit, Encryption at Rest
United States
Amazon Web Services
Encryption in Transit, Encryption at Rest
United States
Google Solar
Encryption in Transit
United States
Zoho
Encryption in Transit, Encryption at Rest
European Economic Area
Calendly
Encryption in Transit, Encryption at Rest
United States
Slack
Encryption in Transit, Encryption at Rest
United States
Google Gmail
Encryption in Transit, Encryption at Rest
United States
Bitbucket
Encryption in Transit, Encryption at Rest
Global
Grafana
Encryption in Transit, Encryption at Rest
United States
Keeper
Encryption in Transit, Encryption at Rest
Global
Google Play Store
Encryption in Transit, Encryption at Rest
United States
App Store
Encryption in Transit, Encryption at Rest
United States
Rippling HR Cloud
Encryption in Transit, Encryption at Rest
United States
LinkedIn Ads
Encryption in Transit, Encryption at Rest
European Economic Area
LinkedIn Analytics
Encryption in Transit, Encryption at Rest
European Economic Area
HelloSign
Encryption in Transit, Encryption at Rest
United States
Jira
Encryption in Transit, Encryption at Rest
Global
Cloudflare
Encryption in Transit, Encryption at Rest
United States
GoDaddy
Encryption in Transit, Encryption at Rest
United States
LogRocket
Encryption in Transit, Encryption at Rest
United States
Loom
Encryption in Transit, Encryption at Rest
United States
Notion
Encryption in Transit, Encryption at Rest
United States
Whimsical
Encryption in Transit, Encryption at Rest
United States
Zoom
Encryption in Transit, Encryption at Rest
United States
DocuSign
Encryption in Transit, Encryption at Rest
Global
Privasee
Encryption in Transit, Encryption at Rest
Ireland
BrowserStack
Encryption in Transit, Encryption at Rest
Global
GanttPro
Encryption in Transit, Encryption at Rest
European Economic Area
Highlight.io
Encryption in Transit, Encryption at Rest
United States
Lucidchart
Encryption in Transit, Encryption at Rest
United States
Nearmap
Encryption in Transit, Encryption at Rest
United States
Nicejob
Encryption in Transit, Encryption at Rest
United States
Pendo
Encryption in Transit, Encryption at Rest
United States
Postman
Encryption in Transit, Encryption at Rest
United States
SimpleTexting
Encryption in Transit, Encryption at Rest
United States
Observe Inc.
Encryption in Transit, Encryption at Rest
United States
LinkedIn Recruiter
Encryption in Transit, Encryption at Rest
European Economic Area
reCAPTCHA
Encryption in Transit, Encryption at Rest
United States
Google Forms
Encryption in Transit, Encryption at Rest
United States
Paddle
Encryption in Transit, Encryption at Rest
Global
ShareMyData (PGE)
United States
International Transfers
- the country to which personal data is being transferred has been deemed to provide an adequate level of protection for personal data; or
- we use appropriate transfer mechanisms such as Standard Contractual Clauses or the UK International Data Transfer Agreement.
Data Security
We have put in place procedures to deal with any suspected personal data breach and will notify you and any applicable regulator of a breach where we are legally required to do so.
Where you have chosen a password that enables you to access certain parts of our applications, you are responsible for keeping this password confidential. We ask you not to share the password with anyone.
Data Retention
To determine the appropriate retention period for personal data, we consider the amount, nature, and sensitivity of the personal data, the potential risk of harm from unauthorized use or disclosure of your personal data, the purposes for which we process your personal data and whether we can achieve those purposes through other means, and the applicable legal, regulatory, tax, accounting, or other requirements.
In specific scenarios where our role is designated as a data processor, the duration for which data is retained is not determined by us. Instead, this time period is set and mandated by the data controller, in accordance with their policies and regulatory requirements. This ensures a clear understanding and compliance with the data controller’s guidelines and legal obligations.
Automated decision-making and profiling
Your Legal Rights
Request access to your personal data (commonly known as a “data subject access request”). This enables you to receive a copy of the personal data we hold about you and to check that we are lawfully processing it.
Request correction of the personal data that we hold about you. This enables you to have any incomplete or inaccurate data we hold about you corrected, though we may need to verify the accuracy of the new data you provide to us.
Request erasure of your personal data. This enables you to ask us to delete or remove personal data where there is no good reason for us to continue to process it. You also have the right to ask us to delete or remove your personal data where you have successfully exercised your right to object to processing (see below), where we may have processed your personal data unlawfully or where we are required to erase your personal data to comply with local law. Note, however, that we may not always be able to comply with your request of erasure for specific legal reasons which will be notified to you, if applicable, at the time of your request.
Object to processing of your personal data where we are relying on a legitimate interest (or those of a third party) and there is something about your particular situation which makes you want to object to processing on this ground as you feel it impacts on your fundamental rights and freedoms. You also have the right to object where we are processing your personal data for direct marketing purposes. In some cases, we may demonstrate that we have compelling legitimate grounds to process your personal data which override your rights and freedoms.
Request restriction of processing of your personal data. This enables you to ask us to suspend the processing of your personal data in the following scenarios:
- If you want us to establish the data’s accuracy.
- Where our use of the data is unlawful, but you do not want us to erase it.
-
Where you need us to hold the data even if we no longer require it as you
need it to establish, exercise, or defend legal claims. -
You have objected to our use of your data, but we need to verify whether
we have overriding legitimate grounds to use it.
Request the transfer of your personal data to you or to a third party. We will provide to you, or a third party you have chosen, your personal data in a structured, commonly used, machine-readable format. Note that this right only applies to automated information which you initially provided consent for us to use or where we used the information to perform a contract with you.
Withdraw consent at any time where we are relying on consent to process your personal data. However, this will not affect the lawfulness of any processing carried out before you withdraw your consent. If you withdraw your consent, we may not be able to provide certain products or services to you. We will advise you if this is the case at the time you withdraw your consent.
Make a complaint you have the right to make a complaint at any time to the relevant regulator
You will not have to pay a fee to access your personal data (or to exercise any of the other rights). However, we may charge a reasonable fee if your request is clearly unfounded, repetitive, or excessive. Alternatively, we could refuse to comply with your request in these circumstances.
We may need to request specific information from you to help us confirm your identity and ensure your right to access your personal data (or to exercise any of your other rights). This is a security measure to ensure that personal data is not disclosed to any person who has no right to receive it. We may also contact you to ask you for further information concerning your request to speed up our response.
We try to respond to all legitimate requests within one month. Occasionally it could take us longer than a month if your request is particularly complex or you have made several requests. In this case, we will notify you and keep you updated.
If you want to make a request click the button below, go to the link provided or get in touch with us at privacy@enact-systems.com