VEEP SOFTWARE INC.

Privacy Policy

Effective Date: March 18, 2026
Last Updated: March 18, 2026

1. Introduction

Veep Software Inc. (“Veep,” “we,” “our,” or “us”) recognizes that privacy and data protection are critically important to individuals who use financial technology platforms. We are committed to maintaining responsible and transparent data practices and to protecting the personal information entrusted to us by users of the Veep platform and services (collectively, the “Service”).

This Privacy Policy describes how Veep collects, uses, stores, processes, and discloses personal information when individuals access or interact with the Service.

The Veep platform enables eligible individuals to access a portion of wages that have already been earned but have not yet been paid through a traditional payroll cycle. In order to provide this functionality, Veep must interact with certain employment, payroll, and financial information relating to users.

Because the Service involves the handling of sensitive financial and employment-related data, Veep takes privacy and data security seriously and implements administrative, technical, and organizational measures designed to protect such information.

This Privacy Policy explains:

• the categories of information Veep collects; • how that information is obtained; • the purposes for which information is used; • how information may be shared with partners and service providers; • the security measures used to protect information; • the rights individuals may have regarding their personal information.

By accessing or using the Service, you acknowledge that you have read and understood this Privacy Policy.

2. Scope of This Privacy Policy

This Privacy Policy applies to personal information collected by Veep in connection with the operation of the Service.

The policy applies to information collected through:

• the Veep website; • mobile applications or web-based applications operated by Veep; • integrations with payroll providers, employers, and financial institutions; • communications between users and Veep customer support.

This Privacy Policy applies to individuals who access or interact with the Service, including:

• employees of participating employers; • individuals who connect financial accounts to the platform; • visitors to Veep websites or applications.

This Privacy Policy does not apply to the privacy practices of third parties that interact with the Service but are not controlled by Veep.

For example, the privacy practices of the following entities may be governed by separate policies:

• employers participating in the Service; • financial institutions providing banking services; • payroll providers that integrate with the platform; • third-party technology providers that may offer services through the platform.

Users should review the privacy policies of those third parties to understand how their information may be handled by those organizations.

3. Categories of Information We Collect

In order to provide the Service and enable earned wage access functionality, Veep may collect several categories of personal information.

The categories of information described below represent the types of information that may be collected depending on how an individual interacts with the Service.

Not all users will provide every category of information described in this section.

3.1 Personal Identification Information

Personal identification information may include information that identifies or can reasonably be used to identify a particular individual.

Examples of such information may include:

• full name • email address • phone number • mailing address • date of birth • partial national identification numbers (such as the last four digits of a Social Security number).

This information may be collected when users create an account, verify their identity, or communicate with Veep.

3.2 Employment and Payroll Information

Because the Service enables access to earned wages prior to payday, Veep may collect or receive employment and payroll-related information necessary to determine eligibility and calculate earned wage availability.

Examples of employment and payroll information may include:

• employer identification information • employment status • pay rate or salary information • hours worked • accrued wages • scheduled pay dates • payroll identifiers or employee identification numbers.

Employment information may be obtained from several sources, including:

• information provided directly by users; • participating employers; • payroll processors or payroll software providers.

Such information may be used to estimate wages earned but not yet paid.

3.3 Financial Information

In order to facilitate the transfer of funds through the Service, Veep may collect certain financial information.

Examples may include:

• bank account numbers • bank routing numbers • account ownership verification data • transaction history relating to earned wage access transfers.

Financial information may be used to:

• enable the transfer of funds to users; • reconcile amounts accessed through the Service; • verify account ownership.

Financial information may be processed through integrations with financial institutions or payment processors.

3.4 Account Information

Users who create accounts on the Veep platform may provide information necessary to establish and maintain their account.

Such information may include:

• account login credentials • authentication information • communication preferences • records of interactions with the Service.

Users are responsible for maintaining the confidentiality of their account credentials.

4. Information Collected Automatically

When users interact with the Service, Veep may automatically collect certain technical and usage information.

This information allows Veep to maintain system functionality, detect fraud, and improve the performance of the Service.

4.1 Device and Technical Information

Technical information collected automatically may include:

• device identifiers • browser type and version • operating system • device type • IP address • network connection information.

This information helps Veep ensure compatibility with different devices and platforms.

4.2 Platform Usage Information

Veep may collect information about how users interact with the Service.

Examples include:

• login activity • transaction activity • navigation patterns within the platform • interactions with specific features.

Such information helps Veep improve the functionality and user experience of the Service.

4.3 Security Monitoring

Technical and behavioral data may be used to detect and prevent unauthorized access to the Service.

For example, Veep may monitor:

• unusual login activity • device fingerprints • suspicious transaction patterns • abnormal account behavior.

Such monitoring is designed to protect both users and the integrity of the platform.

4.4 Log Files and System Monitoring

Like many online platforms, Veep may maintain system logs that record events occurring within the Service.

Log files may include:

• internet protocol (IP) addresses • browser type • internet service provider (ISP) • date and time stamps • referring and exit pages • system error logs.

These logs are used for system administration, security monitoring, and performance analysis.

5. Information We Receive From Employers, Payroll Providers, and Financial Institutions

In addition to the information that users provide directly to Veep, we may receive certain information from participating employers, payroll processors, financial institutions, and other authorized partners that support the operation of the Service.

The information received from these sources allows Veep to verify eligibility for the Service and to calculate the amount of wages that a user has earned but not yet received through a standard payroll cycle.

5.1 Information Received From Participating Employers

Employers that participate in the Veep platform may provide certain employment and payroll-related information necessary for the operation of the Service.

Such information may include:

• employee identification numbers or employment identifiers; • employment status; • pay rates or salary information; • timekeeping or attendance records; • payroll schedules and pay dates; • accrued wages or earnings information.

This information enables Veep to estimate wages that have been earned but not yet paid.

5.2 Information Received From Payroll Providers

Employers may use third-party payroll processors or payroll software providers to manage payroll data.

Where authorized by the employer or the user, Veep may receive payroll-related data from such providers.

Examples of information that may be received from payroll providers include:

• hours worked during a payroll period; • wages accrued; • pay period information; • payroll adjustments.

Payroll provider integrations are designed to allow Veep to access data necessary to calculate earned wage availability.

5.3 Information Received From Financial Institutions

Veep may also receive information from financial institutions that support the processing of transactions through the Service.

This may include information necessary to:

• verify bank account ownership; • confirm account validity; • facilitate electronic funds transfers; • reconcile payments associated with earned wage access.

Such information may be obtained through integrations with payment processors or financial institutions.

5.4 Information From Data Verification Providers

In order to maintain the integrity of the Service and prevent fraud, Veep may obtain information from third-party verification providers.

Such information may include:

• identity verification data; • account verification data; • fraud risk indicators.

Verification providers may use automated processes to validate the authenticity of information provided by users.

6. How We Use Personal Information

Veep uses personal information for a variety of purposes related to the operation and improvement of the Service.

These purposes may include the following.

6.1 Providing and Operating the Service

Personal information may be used to enable the functionality of the Veep platform, including:

• creating and maintaining user accounts; • calculating earned wage availability; • enabling access to wages earned prior to payday; • facilitating transactions associated with the Service.

6.2 Transaction Processing and Settlement

Personal and financial information may be used to process transactions associated with the Service.

Such processing may include:

• transferring funds to users; • reconciling amounts accessed through the Service; • maintaining transaction records.

6.3 Identity Verification

Personal information may be used to verify the identity of users and to confirm eligibility to access the Service.

Identity verification may be performed using information provided by users or obtained from third-party verification services.

6.4 Fraud Detection and Security

Veep may use personal information and technical data to detect and prevent fraudulent activity.

Such uses may include:

• monitoring account activity for suspicious behavior; • detecting unauthorized access attempts; • identifying unusual transaction patterns.

These processes are intended to protect both users and the integrity of the platform.

6.5 Communication With Users

Personal information may be used to communicate with users regarding the Service.

Examples of communications may include:

• account notifications; • transaction confirmations; • customer support responses; • security alerts.

6.6 Improving the Service

Veep may analyze usage data to improve the functionality and performance of the Service.

This may include:

• evaluating how users interact with platform features; • identifying technical issues; • improving the user experience.

6.7 Research and Development

Veep may use aggregated or anonymized data for research and development purposes.

Aggregated data does not identify individual users.

Such information may be used to:

• develop new features; • improve platform functionality; • analyze trends in user activity.

6.8 Compliance With Legal Obligations

Personal information may be used where necessary to comply with legal and regulatory obligations.

Examples include:

• responding to lawful requests from governmental authorities; • complying with financial crime prevention laws; • maintaining records required by applicable regulations.

7. Legal Bases for Processing (GDPR)

Where applicable under data protection laws such as the General Data Protection Regulation (“GDPR”), Veep relies on several legal bases to process personal information.

7.1 Performance of a Contract

Certain processing activities are necessary to perform the contract between the user and Veep relating to the provision of the Service.

This includes processing necessary to:

• establish and maintain user accounts; • calculate earned wages available through the Service; • process transactions.

7.2 Compliance With Legal Obligations

In certain circumstances, Veep may process personal information in order to comply with legal obligations.

Examples include:

• responding to lawful government requests; • maintaining financial records required by law.

7.3 Legitimate Business Interests

Veep may process personal information where necessary for legitimate business interests, provided such interests are not overridden by the rights of individuals.

Examples may include:

• improving the Service; • detecting fraud; • maintaining platform security.

8. Automated Processing and Analytics

8.1 Use of Analytics Tools

Veep may use analytics tools to better understand how the Service is used.

Analytics tools may analyze information such as:

• platform usage patterns; • device information; • transaction activity.

8.2 Automated Risk Monitoring

Automated systems may be used to detect suspicious or potentially fraudulent activity.

Such systems may evaluate factors including:

• unusual login patterns; • abnormal transaction behavior; • inconsistencies in account activity.

These systems are designed to protect users and the platform.

8.3 Algorithmic Wage Calculations

The Service may use automated processes to estimate wages that have been earned but not yet paid.

These estimates are based on payroll information obtained from employers or payroll providers.

Users should understand that such calculations may involve estimates and may depend on the accuracy of payroll data provided by third parties.

9. How We Share Personal Information

Veep may share personal information with third parties in limited circumstances necessary to provide the Service, operate our platform, comply with legal obligations, and maintain the security and integrity of our systems.

Veep does not sell personal information to third parties.

Any sharing of information occurs in accordance with applicable laws and with appropriate safeguards designed to protect personal information.

The categories of recipients described below represent the types of third parties with whom personal information may be shared depending on how users interact with the Service.

9.1 Sharing With Participating Employers

Where the Service is made available through a participating employer, Veep may share certain information with that employer in order to facilitate the operation of the Service.

Such information may include:

• confirmation that an employee has enrolled in the Service; • information relating to earned wage access transactions; • payroll reconciliation information.

Employers may use this information to coordinate payroll records and reconcile amounts accessed through the Service.

9.2 Sharing With Payroll Providers

Veep may share information with payroll providers that support payroll integrations used by participating employers.

Information shared with payroll providers may include:

• employment identifiers; • payroll transaction information; • wage reconciliation information.

Payroll providers process such information in order to facilitate payroll calculations and related processes.

9.3 Sharing With Financial Institutions

In order to facilitate financial transactions associated with the Service, Veep may share information with financial institutions and banking partners.

Examples of such information may include:

• bank account identifiers; • payment instructions; • transaction confirmations.

Financial institutions process such information in order to execute electronic funds transfers.

9.4 Sharing With Payment Processors

Payment processors and payment network providers may process certain financial information on behalf of Veep.

Such information may include:

• transaction data; • bank account verification information; • payment authorization data.

Payment processors process this information solely for the purpose of executing financial transactions.

9.5 Sharing With Technology Service Providers

Veep may engage third-party technology providers to support the operation of the Service.

These service providers may provide services including:

• cloud hosting infrastructure; • data storage and processing; • analytics and monitoring services; • customer support tools.

These providers are contractually required to safeguard personal information and process it only for authorized purposes.

9.6 Sharing With Fraud Prevention and Security Providers

Veep may share certain information with fraud detection and security service providers in order to protect the Service and its users.

Such providers may analyze information relating to:

• account activity; • transaction patterns; • device identifiers.

These processes help detect fraudulent activity and protect against unauthorized access.

10. Service Providers and Data Processors

Veep may engage third-party vendors and service providers that process personal information on behalf of Veep in order to support the operation of the Service.

These service providers act as data processors and are authorized to process personal information only for the purposes specified by Veep.

10.1 Categories of Service Providers

Service providers used by Veep may include organizations providing:

• cloud hosting services; • infrastructure management services; • payment processing services; • identity verification services; • fraud monitoring services; • customer support platforms.

10.2 Contractual Safeguards

Veep requires service providers that process personal information to agree to contractual obligations designed to protect personal information.

These obligations may include requirements to:

• implement appropriate security safeguards; • restrict the use of personal information to authorized purposes; • maintain confidentiality of personal information.

10.3 International Service Providers

Certain service providers used by Veep may be located in jurisdictions outside the United States.

Where personal information is transferred internationally, Veep takes steps designed to ensure that such transfers occur in accordance with applicable data protection laws.

11. Regulatory Disclosures and Legal Requirements

Veep may disclose personal information where necessary to comply with legal or regulatory requirements.

Such disclosures may occur in response to:

• court orders; • subpoenas; • lawful requests from governmental authorities.

11.1 Compliance With Financial Crime Laws

Veep may disclose information where necessary to comply with laws relating to financial crime prevention.

Such laws may include requirements relating to:

• fraud detection; • anti-money laundering obligations; • sanctions compliance.

11.2 Cooperation With Law Enforcement

Veep may cooperate with law enforcement agencies where required by law or where necessary to protect the rights, property, or safety of Veep, its users, or others.

11.3 Protection of Rights and Security

Veep may disclose personal information where necessary to:

• enforce our Terms of Service; • protect the security of the Service; • investigate potential violations of our policies.

12. Business Transfers and Corporate Transactions

In the event that Veep undergoes a corporate transaction, personal information may be transferred as part of that transaction.

Examples of such transactions may include:

• mergers or acquisitions; • asset sales; • corporate reorganizations; • financing transactions.

12.1 Successor Entities

If Veep is acquired or merged with another company, personal information may be transferred to the successor entity as part of the transaction.

The successor entity may continue to process personal information in accordance with this Privacy Policy or a revised policy.

12.2 Due Diligence

During the course of evaluating potential corporate transactions, Veep may share certain information with advisors or prospective partners.

Such disclosures will be subject to confidentiality obligations designed to protect personal information.

12.3 Notification of Material Changes

If a corporate transaction results in material changes to the handling of personal information, Veep may provide notice to users where required by law.

13. Data Security and Information Protection

Veep takes the protection of personal information seriously and implements a variety of administrative, technical, and physical safeguards designed to protect personal information from unauthorized access, disclosure, alteration, or destruction.

Because the Service involves the handling of financial, employment, and payroll information, Veep employs security practices designed to protect the confidentiality and integrity of such data.

However, no method of transmitting information over the internet or storing electronic data is completely secure. While Veep takes reasonable steps to protect personal information, we cannot guarantee absolute security.

13.1 Administrative Safeguards

Administrative safeguards refer to policies, procedures, and internal governance frameworks designed to ensure that personal information is handled responsibly.

These safeguards may include:

• internal data protection policies governing the collection and use of personal information • employee training programs relating to data privacy and information security • confidentiality agreements with employees and contractors • internal procedures governing access to sensitive information • policies governing the use of third-party service providers.

Administrative safeguards are designed to ensure that personal information is accessed only by authorized individuals for legitimate business purposes.

13.2 Technical Safeguards

Veep employs a range of technical security measures designed to protect data stored and transmitted through the Service.

Examples of technical safeguards may include:

• encryption of sensitive data in transit using secure communication protocols • encryption of certain data stored within platform systems • authentication mechanisms designed to verify the identity of users accessing the Service • monitoring systems designed to detect suspicious activity • intrusion detection systems designed to identify potential security threats.

Technical safeguards are regularly evaluated and updated in order to address evolving security risks.

13.3 Physical Safeguards

In addition to administrative and technical safeguards, Veep also implements physical security measures designed to protect infrastructure used to support the Service.

Examples may include:

• secure data center environments • access controls governing entry to facilities • environmental protections designed to safeguard hardware infrastructure.

Many infrastructure services used by Veep may be operated by reputable third-party cloud service providers that maintain robust physical security standards.

13.4 Access Control and Authorization

Access to personal information within the Veep platform is restricted to authorized personnel who require such access in order to perform their job responsibilities.

Access controls may include:

• role-based access permissions • multi-factor authentication • logging and monitoring of system access.

These controls are designed to reduce the risk of unauthorized access to sensitive information.

13.5 Monitoring and Security Testing

Veep may conduct periodic monitoring and testing of its systems in order to identify potential vulnerabilities.

Security testing activities may include:

• vulnerability assessments • system monitoring • internal security reviews.

These practices are designed to strengthen the security posture of the platform.

14. Security Incident Response

Despite the security safeguards implemented by Veep, security incidents may occur.

A security incident may include any unauthorized access to personal information or unauthorized use of platform systems.

14.1 Incident Detection

Veep maintains monitoring processes designed to detect potential security incidents affecting the Service.

Examples of indicators that may trigger investigation include:

• unusual account activity • abnormal system behavior • alerts generated by security monitoring systems.

14.2 Incident Investigation

If Veep becomes aware of a potential security incident, we may conduct an investigation designed to determine:

• the nature of the incident • the scope of information affected • the potential impact on users.

14.3 Mitigation Measures

Where appropriate, Veep may take steps designed to mitigate potential harm arising from a security incident.

Such steps may include:

• restricting access to affected systems • implementing additional security controls • conducting forensic analysis.

14.4 Notification

Where required by applicable law, Veep may notify affected individuals or regulatory authorities of certain security incidents involving personal information.

Such notifications may be provided through electronic communications or other appropriate channels.

15. Data Retention

Veep retains personal information only for as long as necessary to fulfill the purposes described in this Privacy Policy.

Retention periods may vary depending on the type of information involved and the legal or operational requirements applicable to the Service.

15.1 Operational Retention

Personal information may be retained for as long as necessary to provide the Service and maintain user accounts.

For example, Veep may retain information relating to:

• account activity • transaction history • platform usage.

15.2 Legal and Regulatory Retention

Certain information may be retained for longer periods where necessary to comply with legal obligations.

Examples may include:

• financial recordkeeping requirements • fraud prevention investigations • dispute resolution processes.

15.3 Retention for Security and Fraud Prevention

Veep may retain certain information for the purpose of detecting and preventing fraud.

Such information may include logs and security monitoring data.

15.4 Data Deletion

When personal information is no longer required for the purposes described in this Privacy Policy, Veep may take reasonable steps to delete or anonymize such information.

In certain circumstances, information may be retained in backup systems for limited periods.

16. Cross-Border Data Transfers

Because Veep operates as an online platform, personal information may be processed in multiple jurisdictions.

Information collected through the Service may be stored or processed in the United States or in other jurisdictions where Veep or its service providers maintain operations.

16.1 International Processing

Users who access the Service from outside the United States acknowledge that personal information may be transferred to and processed in the United States.

Data protection laws in the United States may differ from those in other jurisdictions.

16.2 Safeguards for International Transfers

Where personal information is transferred internationally, Veep may implement safeguards designed to protect such information.

These safeguards may include:

• contractual protections with service providers • compliance with applicable data protection regulations.

16.3 Third-Party Infrastructure Providers

Certain infrastructure used to operate the Service may be provided by third-party technology companies that maintain global data centers.

Such providers may process information on behalf of Veep in accordance with contractual obligations designed to protect personal information.

17. Privacy Rights for Residents of the United States

Residents of certain U.S. states may have specific rights regarding their personal information under applicable privacy laws.

These rights may arise under statutes including, but not limited to:

• the California Consumer Privacy Act (“CCPA”), as amended by the California Privacy Rights Act (“CPRA”)

• the Virginia Consumer Data Protection Act (“VCDPA”)

• the Colorado Privacy Act (“CPA”)

• the Connecticut Data Privacy Act (“CTDPA”)

• the Utah Consumer Privacy Act (“UCPA”)

• other privacy laws that may be enacted in additional states.

These laws provide individuals with certain rights relating to the collection, use, disclosure, and retention of personal information.

The specific rights available to an individual may depend on the individual’s state of residence and the applicability of a particular privacy law.

17.1 Categories of Personal Information Collected

Individuals may have the right to request information about the categories of personal information collected by Veep.

These categories may include:

• personal identifiers such as name, email address, or phone number

• employment and payroll information

• financial account information

• internet activity and device information

• account usage information.

Individuals may also request disclosure regarding the categories of sensitive personal information collected.

Sensitive personal information may include:

• partial government identification numbers

• financial account credentials

• authentication credentials used to access accounts.

17.2 Sources of Personal Information

Individuals may have the right to request information about the sources from which personal information was collected.

Sources may include:

• information provided directly by users

• information received from participating employers

• information received from payroll processors

• information collected automatically through platform interactions.

17.3 Business and Commercial Purposes for Data Processing

Individuals may request disclosure regarding the purposes for which personal information is collected and processed.

Examples may include:

• providing and operating the Veep Service

• calculating earned wage availability

• processing financial transactions

• preventing fraud and unauthorized activity

• maintaining the security and reliability of the platform.

17.4 Categories of Third Parties Receiving Personal Information

Individuals may request information about the categories of third parties with whom personal information may be shared.

Such categories may include:

• financial institutions

• payment processors

• payroll providers

• technology service providers

• fraud prevention vendors.

17.5 Right to Access Specific Pieces of Personal Information

Certain laws may allow individuals to request access to specific pieces of personal information maintained by Veep.

Such requests may include access to:

• account data

• transaction records

• employment and payroll data associated with the Service.

17.6 Right to Correction

Individuals may have the right to request correction of inaccurate personal information.

Where appropriate, Veep will take reasonable steps to update inaccurate information.

17.7 Right to Deletion

Indiviuals may have the right to request deletion of personal information collected by Veep.

However, Veep may retain certain information where necessary to:

• complete transactions requested by the user

• comply with legal obligations

• detect security incidents

• maintain required business records.

17.8 Right to Data Portability

Individuals may have the right to request that personal information be provided in a portable format.

Where applicable, Veep will provide personal information in a structured, commonly used format that allows the data to be transmitted to another service provider.

17.9 Right to Opt Out of Sale or Sharing of Personal Information

Certain privacy laws provide individuals with the right to opt out of the sale or sharing of personal information.

Veep does not sell personal information.

17.10 Right to Limit Use of Sensitive Personal Information

Certain laws may provide individuals with the right to limit the use of sensitive personal information.

Where required by applicable law, Veep will honor such requests.

17.11 Right to Non-Discrimination

Veep will not discriminate against individuals for exercising privacy rights.

For example, Veep will not:

• deny services to individuals who exercise privacy rights

• charge different prices for services

• provide a different level of service.

18. Rights of Individuals in the European Economic Area and United Kingdom

Individuals located in the European Economic Area (EEA), the United Kingdom, or other jurisdictions with comparable data protection frameworks may have rights under the General Data Protection Regulation (“GDPR”) or equivalent laws.

These rights are designed to give individuals greater control over their personal data

18.1 Right of Access

Individuals may have the right to obtain confirmation regarding whether Veep processes personal information about them.

Individuals may also request access to the personal data being processed and information relating to:

• the purposes of processing

• the categories of data processed

• the recipients of the data.

18.2 Right to Rectification

Individuals may request correction of inaccurate personal data or completion of incomplete personal data.

Veep will take reasonable steps to correct inaccurate information where appropriate.

18.3 Right to Erasure (“Right to Be Forgotten”)

Individuals may request deletion of personal data in certain circumstances, including where:

• the data is no longer necessary for the purposes for which it was collected

• the individual withdraws consent

• the data has been unlawfully processed.

However, Veep may retain information where necessary to comply with legal obligations or establish legal claims.

18.4 Right to Restrict Processing

Individuals may request that Veep restrict processing of personal data in certain circumstances.

For example, individuals may request restriction while the accuracy of data is being verified.

18.5 Right to Data Portability

Where processing is based on consent or contractual necessity, individuals may request that personal data be provided in a structured, machine-readable format.

18.6 Right to Object

Individuals may object to the processing of personal data where such processing is based on legitimate interests.

Veep will evaluate such objections in accordance with applicable law.

18.7 Rights Related to Automated Decision-Making

Individuals may have the right not to be subject to decisions based solely on automated processing that produce legal or similarly significant effects.

Where automated processing is used, individuals may request human review of the decisio

18.8 Right to Lodge a Complaint With a Supervisory Authority

Individuals located in the EEA or UK may lodge complaints with a data protection supervisory authority.

Examples include:

• the Information Commissioner’s Office (United Kingdom)

• national data protection authorities in EU member states.

19. Exercising Privacy Rights

Individuals who wish to exercise privacy rights may submit requests to Veep using the contact information provided in this Privacy Policy.

Requests may include:

• access requests

• deletion requests

• correction requests

• portability requests.

Requests may be submitted by contacting:

support@veepsoftware.com

19.1 Identity Verification

In order to protect personal information, Veep may verify the identity of individuals submitting privacy requests.

Verification procedures may include:

• confirming account credentials

• confirming email addresses associated with accounts

• requesting additional identifying information.

19.2 Authorized Agents

Certain laws allow individuals to designate authorized agents to submit privacy requests on their behalf.

Where an authorized agent submits a request, Veep may require documentation demonstrating the agent’s authority.

19.3 Response Timeframes

Veep will respond to verified requests within the timeframe required by applicable law.

In certain cases, Veep may extend response timeframes where permitted by law.

19.4 Appeals

Where a privacy request is denied, individuals may have the right to appeal the decision.

Requests for review may be submitted using the contact information provided in this Privacy Policy.

19.5 Recordkeeping

Veep may maintain records of privacy requests in order to demonstrate compliance with applicable privacy laws.

Such records may include:

• the date of the request

• the nature of the request

• the outcome of the request.

21. Cookies and Tracking Technologies

Like many online platforms, Veep may use cookies and similar technologies to collect information about how users interact with the Service.

Cookies are small text files stored on a user’s device that help websites recognize returning visitors and improve functionality.

Tracking technologies may be used for several purposes, including improving the performance and functionality of the Service.

21.1 Types of Cookies We May Use

The Service may use several categories of cookies or similar technologies.

Esential Cookies

Essential cookies are necessary for the operation of the Service.

These cookies enable core platform functionality such as:

• user authentication

• account access

• security monitoring.

Without these cookies, certain features of the Service may not function properly.

Performance and Analytics Cookies

Performance cookies help Veep understand how users interact with the Service.

These cookies may collect information relating to:

• how frequently users visit certain pages

• how users navigate the platform

• whether error messages occur during platform usage.

Such information helps Veep improve the reliability and performance of the Service.

Security Cookies

Security cookies help protect the platform by detecting suspicious or unauthorized activity.

For example, such cookies may help detect:

• unusual login attempts

• account takeover attempts

• fraudulent activity.

These cookies support the integrity and security of the Service.

Functionality Cookies

Functionality cookies may remember user preferences, such as language or display settings.

These cookies help improve the user experience by allowing the Service to remember certain settings.

21.2 Device Identifiers and Similar Technologies

In addition to cookies, Veep may use other technologies to recognize devices and improve platform performance.

Such technologies may include:

• device identifiers

• session tokens

• browser storage mechanisms.

These technologies help maintain secure sessions and improve platform functionality.

21.3 Managing Cookie Preferences

Users may be able to manage cookie preferences through their browser settings.

Most web browsers allow users to:

• view stored cookies

• delete cookies

• block certain types of cookies.

However, disabling cookies may affect the functionality of certain features of the Service.

21.4 Analytics Providers

Veep may use analytics tools provided by third-party technology providers to understand how the Service is used.

Analytics providers may collect information relating to:

• device type

• browser type

• operating system

• interactions with platform features.

This information helps Veep improve the Service and identify technical issues.

22. Children’s Privacy

The Veep Service is intended for individuals who are at least 18 years of age.

Veep does not knowingly collect personal information from individuals under the age of 18.

22.1 Compliance With Children’s Privacy Laws

If Veep becomes aware that personal information has been collected from an individual under the age of 18 without appropriate authorization, Veep will take reasonable steps to delete such information.

Parents or guardians who believe that a child has provided personal information to Veep may contact us using the contact information provided in this Privacy Policy.

22.2 Age Restrictions

Individuals under the age of 18 should not use the Service or provide personal information through the platform.

23. Changes to This Privacy Policy

Veep may update this Privacy Policy from time to time in order to reflect changes in:

• legal or regulatory requirements

• platform functionality

• business practices.

23.1 Notification of Updates

When this Privacy Policy is updated, the revised version will be posted on the Veep website or platform with an updated “Last Updated” date.

Where required by law, Veep may provide additional notice of significant changes.

23.2 Continued Use of the Service

Continued use of the Service after updates to this Privacy Policy constitutes acceptance of the revised policy.

Users are encouraged to review this Privacy Policy periodically.

24. Contact Information

If you have questions about this Privacy Policy or wish to exercise your privacy rights, you may contact Veep using the information below.

Veep Software Inc.

6400 W. Boynton Beach Blvd., Ste. 740486

Boynton Beach, FL 33474

United States

Email:

support@veepsoftware.com

24.1 Data Protection Inquiries

Questions relating to data protection, privacy rights, or personal information requests may be directed to the contact email listed above.

Veep will make reasonable efforts to respond to inquiries in a timely manner.

24.2 Regulatory Contact

Individuals located in jurisdictions with applicable data protection authorities may also contact the relevant supervisory authority if they believe their privacy rights have been violated.

However, Veep encourages individuals to contact us first so that we may attempt to resolve concerns directly.

Learn more

about our product!

Let's Get in Touch

Complete the form to watch the video