PRIVACY POLICY AND PERSONAL INFORMATION MANAGEMENT - GOWST


DATA CONTROLLER IDENTIFICATION

GOWST - Commercial Establishment
Address: Calle 13 Sur #2A-101, Colombia
Communications: legal@gowst.co
Classification: Personal information processing controller


STATEMENT OF PRINCIPLES

At Gowst we understand that digital privacy is not a luxury, but a fundamental right in the information age. Our mission is to return control of personal data to their true owners: our users.

As digital guardians, we implement enterprise-level security architectures and cutting-edge encryption protocols to create an ecosystem where privacy and functionality coexist harmoniously. We believe that protecting personal information should not compromise the digital experience, but enhance it.

This policy describes with absolute transparency how our digital vault collects, protects, processes and manages personal information, establishing a new standard in responsible management of sensitive data.

REGULATORY FOUNDATION

Our operation complies with and exceeds requirements established by:

NATURE OF OUR PLATFORM

WHAT IS GOWST VAULT?

Gowst operates as a personal data digital vault, a technological fortress designed to centralize, protect and control sensitive information of our users when they interact with the digital ecosystem.

FUNDAMENTAL VALUE PROPOSITION

CATEGORIES OF INFORMATION COLLECTED

1. PRIMARY IDENTITY INFORMATION

2. DEMOGRAPHIC AND CONTEXTUAL INFORMATION

3. TECHNICAL AND DIGITAL BEHAVIOR INFORMATION

4. THIRD-PARTY AND PARTNER INFORMATION

5. FINANCIAL AND TRANSACTIONAL INFORMATION

COLLECTION METHODS

DIRECT COLLECTION

Main User Portal: Through our advanced registration system that implements multiple identity verification and granular privacy preference configuration, allowing users to establish from the beginning what information they want to share and under what conditions.

Configuration Interfaces: Through specialized panels where users can:

COLLECTION THROUGH INTEGRATIONS

Authorized Third-party APIs: Secure connectivity with trusted platforms through OAuth protocols and encrypted API keys, ensuring that only information specifically authorized by the user is accessed.

Technology Partners: Information exchange under strict confidentiality agreements and data protection with service providers specialized in identity verification and information validation.

AUTOMATED COLLECTION

Intelligent Prefill Systems: Automated capture of usage patterns and filling preferences to optimize user experience while maintaining total control over what information is shared.

Traceability Monitoring: Automatic recording of all interactions where user data has been used, creating a complete history of the digital footprint of each piece of information.

PROCESSING PURPOSES

MAIN PROTECTION PURPOSES

A. DIGITAL VAULT SERVICES:

B. SECURE AUTOMATION:

C. CONTROL AND TRACEABILITY:

EXPERIENCE AND FUNCTIONALITY PURPOSES

D. INTELLIGENT PERSONALIZATION:

E. DIGITAL ECOSYSTEM INTEGRATION:

RESPONSIBLE COMMERCIAL PURPOSES

F. ETHICAL MONETIZATION:

COMPLIANCE AND SECURITY PURPOSES

G. LEGAL AND REGULATORY OBLIGATIONS:

Processing is based on free, prior, express and informed consent of the data subject, implemented through:

BALANCED LEGITIMATE INTEREST

In specific cases, justified by:

FULFILLMENT OF CONTRACTUAL OBLIGATIONS

For effective provision of services contracted by the user and compliance with applicable legal obligations.

DATA SUBJECT RIGHTS

ENHANCED FUNDAMENTAL RIGHTS

1. RIGHT TO TRANSPARENT ACCESS:

2. RIGHT TO INSTANT RECTIFICATION:

3. RIGHT TO GUARANTEED ERASURE:

4. RIGHT TO ENHANCED PORTABILITY:

5. RIGHT TO GRANULAR OPPOSITION:

FACILITATED RIGHTS EXERCISE

Contact Channels:

Optimized Procedure:

  1. Immediate request: Automatic processing for simple actions
  2. Identity verification: Secure authentication protocols
  3. Accelerated processing: Maximum 10 business days for complex cases
  4. Documented confirmation: Complete evidence of actions performed

ADVANCED SECURITY MEASURES

MULTI-LAYER SECURITY ARCHITECTURE

Level 1 - End-to-End Encryption:

Level 2 - Advanced Access Control:

Level 3 - Infrastructure Protection:

DATA PROTECTION MEASURES

Obfuscation and Anonymization:

Vulnerability Management:

CONTROLLED INFORMATION SHARING

AUTHORIZED THIRD PARTIES UNDER STRICT CONTROL

1. CERTIFIED TECHNOLOGY PARTNERS:

2. COMMERCIAL THIRD PARTIES UNDER CONSENT:

3. AUTHORITIES AND LEGAL COMPLIANCE:

MANDATORY SAFEGUARDS

Reinforced Protection Contracts:

User Control:

SECURE INTERNATIONAL TRANSFERS

INTERNATIONAL TRANSFER PROTOCOLS

When technologically necessary to transfer information outside Colombia:

Mandatory Prior Assessment:

Additional Protection Measures:

RESPONSIBLE RETENTION AND DELETION

DEFINED CONSERVATION PERIODS

Active User Information:

Compliance Records:

CERTIFIED DELETION

Secure Deletion Process:

TRACKING TECHNOLOGIES AND PRIVACY

Essential Security Cookies:

Anonymized Usage Analytics:

ADVANCED PRIVACY MANAGEMENT

User Granular Control:

UPDATES AND CONTINUOUS EVOLUTION

COMMITMENT TO CONTINUOUS IMPROVEMENT

Privacy Development:

CHANGE COMMUNICATION

Transparent Notification:

Communication Channels:

SPECIALIZED CONTACT AND SUPPORT

DATA PROTECTION TEAM

Chief Privacy Officer:

Security Technical Support:

SUPERVISORY AUTHORITIES

Superintendence of Industry and Commerce:

Ombudsman’s Office:


Last Update Date: 18/08/2025 Version: 2.0 - Digital Vault
GOWST - Commercial Establishment
”Protecting your digital identity, empowering your privacy”

Go back