Cloudica™
Data Privacy & Monitoring Transparency

1. PURPOSE 69cb7c48cb8d7PURPOSE.png This document outlines how Cloudica™, a monitoring software used by remote teams, demonstrates alignment with the principles of the Data Privacy Act of the Philippines. It explains what data is captured, how it is transmitted, who can access it, and the safeguards built with privacy‑by‑design to enable users to protect their own privacy as they choose. 2. DATA CAPTURE 69cb7cd23c8c9DATA CAPTURE.png Users can switch states at any time. They can disable the webcam or microphone if permitted by managers. Critical Transparency Feature Users see the data at the moment it is captured and uploaded. This is not delayed to the end of the day or even five minutes later; it is nearly instantaneous, similar to a live chat feed. The application automatically shuts down after 30 minutes of idle time and pauses immediately if the computer enters Sleep Mode. 3. TRANSMISSION & STORAGE 69cb9bb0294b7Transmission & Storage.png Data is encrypted in transit (TLS 1.3) and at rest (AES‑256). Pattern Recognition: This data is used to develop models that distinguish between "Deep Work" and "Productivity Theater" (e.g., mouse-jigglers), ensuring the owner has an accurate view of genuine work.  4.  ACCESS HIERARCHY 69cb9bc8c2e5eAccess Hierarchy1.png Developers may access data for system maintenance, bound by NDA. Access is limited to necessary roles.  Audit Trail: Every access to the dashboard is logged (IP address and page visit) for accountability.  69cb9bf2172ebAccess Hierarchy2.png Reciprocal Transparency: Users see a Live Feed of their data. When a manager views a user’s dashboard, the user receives an instantaneous real-time indicator.  5. User Consent & Awareness 69cc7a0922356User Consent & Awareness 1.png On installation or account verification, users complete a permission walkthrough. Each permission clearly states what data will be captured.  69ccc9442b5a0user consent small 2.png Camera and microphone permissions can be skipped if allowed by managers. 6. AUDIT & ACCOUNTABILITY 69ccc9ac944f3audit small.png New server architecture logs page visits and IP addresses, creating an audit trail. Users see real‑time indicators when managers view their data. This feature is available in the dashboard application  7. SAFEGUARDS 69ccab04106eeSafeguards 1.png Keystrokes masked in Confidential mode. 69ccab2293d09Safeguards 2.png Screenshots blurred with Gaussian blur. 69ccc37b79a87Safeguards 3.png Webcam snapshots blur backgrounds. 69cc8f72d6c3dsafeguards 4.png Audio detection limited to decibel checks, no content stored. 69cc8f8a0b55csafeguards 5.png  Automatic shutdown after a maximum idle period of 30 minutes. 8. AI USE OF DATA 69cc7bc0aad37AUDIT & ACCOUNTABILITY1.png Current Development of AI features analyzes application usage only. 69cc7bcbccf53AUDIT & ACCOUNTABILITY2.png AI is housed internally, not exposed externally. 69cc7bdab22e3AUDIT & ACCOUNTABILITY3.png Sensitive categories (keystrokes, screenshots, snapshots) are under review for deletion from AI datasets. 9. USER RIGHTS 69cc7df91b440USER RIGHTS.png Users may request deletion of their data at any time. Requests are processed immediately via manager or direct email.   Cloudica™ provides transparency and control but company policies govern how monitoring states are enforced.  10.  COMPLIANCE ALIGNMENT 69cc7e0765021Compliance Alignment 1.png Cloudica™ aligns with the Data Privacy Act principles: Transparency: Users see captured data instantly and know who is viewing it.  Legitimate Purpose: Monitoring ensures productivity in remote work.  Proportionality: Users can mask, blur, or disable capture features; retention policies are communicated.  Security: Encryption, audit logs, and access controls protect data.  69cc7e33a7185Compliance Alignment 2.png 11. ADDITIONAL NOTES ON IDLE Cloudica™ is engineered to prevent intrusive monitoring via a strict "Logic Gate" for inactivity:  69cc7e3fb5755Additional notes on Idle 1.png Trigger: Initiated only after 4 minutes of zero keyboard/mouse input.  69cc7e5025316Additional notes on Idle 2.png Visual Check: The camera verifies if a user is in front of the screen. If no user is found, the system flags the session as "Idle" and stops.  69cc7e60cd20dAdditional notes on Idle 3.png Acoustic Pulse (Non-Recording): If a user is present, the microphone detects ambient decibels for a maximum of 30 seconds. It stops immediately upon detection. No audio file is ever captured, recorded, or stored. 
Copyright © 2025 Cloudica LLC