Privacy Policy
Last updated: May 11, 2026
At Make Technology 1SS ("1SS Platform", "we", "us", or "our"), we are committed to protecting your privacy and ensuring the security of your personal information. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our internal project management and proposal tracking platform.
1. Information We Collect
1.1 Information You Provide
We collect information that you voluntarily provide when using the 1SS Platform:
- Account information (name, email address, job title, department)
- Authentication credentials through Single Sign-On (SSO)
- Project data (project names, descriptions, timelines, budgets)
- Proposal information (client details, project scope, pricing)
- Team collaboration data (comments, task assignments, status updates)
- Document uploads and generated reports
- Profile settings and preferences
1.2 Automatically Collected Information
When you access the platform, we automatically collect:
- Device information (browser type, operating system, device identifiers)
- Usage data (pages visited, features used, time spent on platform)
- IP address and general location information
- Session data and authentication tokens
- Error logs and performance metrics
1.3 Third-Party Integrations
We collect data from integrated services you authorize, including Jira project data and SSO authentication providers.
2. How We Use Your Information
We use the collected information for the following purposes:
- To provide, operate, and maintain the 1SS Platform
- To authenticate users and manage access controls
- To enable project management and proposal tracking functionality
- To facilitate team collaboration and communication
- To generate reports, analytics, and business insights
- To synchronize data with integrated third-party services
- To send notifications about platform activities and updates
- To improve platform performance, security, and user experience
- To comply with legal obligations and enforce our terms
- To prevent fraud, abuse, and security incidents
3. Data Sharing and Disclosure
3.1 Internal Sharing
Your information is shared within your organization based on role-based access controls. Team members can only access data relevant to their assigned projects and responsibilities.
3.2 Service Providers
We may share your information with trusted third-party service providers who assist in operating the platform, including cloud hosting providers, authentication services, and analytics tools. These providers are contractually obligated to protect your data.
3.3 Legal Requirements
We may disclose your information if required by law, court order, or governmental regulation, or if we believe disclosure is necessary to protect our rights, your safety, or the safety of others.
3.4 Business Transfers
In the event of a merger, acquisition, or sale of assets, your information may be transferred to the acquiring entity, subject to the same privacy protections.
4. Data Security
We implement industry-standard security measures to protect your information:
- Encryption of data in transit using TLS/SSL protocols
- Encryption of sensitive data at rest
- Secure authentication using SSO and JWT tokens
- Role-based access controls and permission management
- Regular security audits and vulnerability assessments
- Session timeout and automatic logout after inactivity
- Secure backup and disaster recovery procedures
- Employee training on data protection best practices
Note: While we strive to protect your information, no method of transmission or storage is 100% secure. We cannot guarantee absolute security but continuously work to enhance our security measures.
5. Data Retention
We retain your personal information for as long as necessary to fulfill the purposes outlined in this Privacy Policy, unless a longer retention period is required by law. Project data and proposals are retained according to your organization's data retention policies. When data is no longer needed, we securely delete or anonymize it.
6. Your Rights
Depending on your location, you may have the following rights regarding your personal information:
- •Access: Request a copy of the personal information we hold about you
- •Correction: Request correction of inaccurate or incomplete information
- •Deletion: Request deletion of your personal information (subject to legal obligations)
- •Restriction: Request restriction of processing in certain circumstances
- •Portability: Request transfer of your data to another service provider
- •Objection: Object to processing of your information for certain purposes
- •Withdraw Consent: Withdraw consent where processing is based on consent
To exercise these rights, please contact your organization's administrator or reach out to us at privacy@maketechnology.com.
7. Cookies and Tracking Technologies
We use cookies and similar tracking technologies to enhance your experience:
- •Essential Cookies: Required for authentication and platform functionality
- •Performance Cookies: Help us understand how users interact with the platform
- •Functional Cookies: Remember your preferences and settings
You can control cookies through your browser settings, but disabling certain cookies may affect platform functionality.
8. Third-Party Links and Services
The 1SS Platform may contain links to third-party websites or integrate with external services (such as Jira). We are not responsible for the privacy practices of these third parties. We encourage you to review their privacy policies before providing any personal information.
9. International Data Transfers
Your information may be transferred to and processed in countries other than your country of residence. These countries may have different data protection laws. We ensure appropriate safeguards are in place to protect your information in accordance with this Privacy Policy.
10. Changes to This Privacy Policy
We may update this Privacy Policy from time to time to reflect changes in our practices or legal requirements. We will notify you of any material changes by posting the updated policy on the platform and updating the "Last updated" date. Your continued use of the platform after changes are posted constitutes acceptance of the updated policy.
11. Contact Us
If you have questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact us:
Make Technology
Email:privacy@maketechnology.com
Data Protection Officer:dpo@maketechnology.com
Address:Saatchi House 2296, Don Chino Roces Ave, Makati City, Metro Manila, Philippines
12. ISO Compliance and Certifications
Make Technology is committed to maintaining the highest standards of information security, quality management, and data protection through internationally recognized ISO certifications:
ISO/IEC 27001:2022 - Information Security Management
Our information security management system (ISMS) is certified to ISO/IEC 27001:2022 standards, ensuring systematic protection of sensitive information through risk management, security controls, and continuous improvement processes. This certification demonstrates our commitment to confidentiality, integrity, and availability of client data.
ISO 9001:2015 - Quality Management Systems
We maintain ISO 9001:2015 certification for our quality management system, ensuring consistent delivery of high-quality services, continuous process improvement, and customer satisfaction. This standard governs our project management, proposal development, and service delivery processes.
ISO/IEC 27701:2019 - Privacy Information Management
Our privacy information management system extends our ISO 27001 certification to specifically address privacy controls. ISO/IEC 27701:2019 certification demonstrates our compliance with GDPR, CCPA, and other global privacy regulations, providing a framework for processing personally identifiable information (PII).
ISO/IEC 27017:2015 - Cloud Security
As a cloud-based platform, we adhere to ISO/IEC 27017:2015 guidelines for information security controls applicable to cloud services. This includes secure provisioning, data segregation, virtual machine hardening, and cloud-specific incident management.
ISO/IEC 27018:2019 - Protection of PII in Public Clouds
We implement ISO/IEC 27018:2019 controls for protecting personally identifiable information in public cloud computing environments, ensuring transparency in data processing, limiting data use to specified purposes, and providing customers with control over their data.
Audit and Certification
Our ISO certifications are maintained through annual surveillance audits and triennial recertification audits conducted by accredited third-party certification bodies. Certification documents and audit reports are available upon request to authorized stakeholders.