LETON PRIVACY POLICY
Effective Date: January 2026
Last Updated: January 2026
1 INTRODUCTION
Leton L.L.C. ("we", "our", or "us") is a project management platform designed for construction and contracting businesses. We provide tools for planning, procurement, contract management, execution tracking, and financial control. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use the Leton application and related services (collectively, the "Service").
We are committed to protecting your privacy and handling your data with transparency. This policy is designed to help you understand your rights and choices regarding your personal information.
2 INFORMATION WE COLLECT
2.1 Account and Identity Data
When you create an account or are invited to join a company workspace, we collect the following information:
• Identity information such as full name and email address, used for account creation, authentication, and communication
• Authentication credentials such as encrypted password hashes, used for secure login and session management
• Profile photo (optional avatar image), used for user identification within the platform
• Company association data such as company name and role within the company, used for multi-tenant workspace organization
2.2 Company and Organization Data
Company administrators may provide the following information:
• Company identity information including legal name, trading name, and company logo, used for branding and document generation
• Registration details such as registration number and VAT/Tax ID, used for invoicing and legal compliance
• Contact information including company email, phone number, and website, used for business communication
• Address information including street, city, postal code, country, and region, used for invoicing and legal documentation
• Banking details such as bank name, IBAN, and SWIFT/BIC, used as payment references
• Financial settings including default VAT rate, payment terms, and invoice prefix, used for document generation
2.3 Team Member and Workforce Data
For operational team management (separate from user accounts), we may store:
• Personal details such as name, email, and phone number, used for team communication and management
• Employment information such as job title, role, and department, used for organizational structure
• Compensation data including hourly rates and overtime or holiday multipliers, used for cost tracking and payroll calculations
• Work metrics such as hours worked, tasks completed, and assigned projects, used for performance tracking and project costing
• Profile photos (optional avatars), used for team member identification
2.4 Partner and Contact Data
We collect information about your business partners, including clients and vendors. This may include company name, legal name, contact person name, email address, phone number, business address, tax ID, registration number, and for vendors, specialization and certifications.
We also collect project contact information such as full name, email, phone number, organization, role, and designation as a primary contact.
2.5 Project and Operational Data
When using the Service, we collect project-related and operational data, including project names, descriptions, locations, timelines, budgets, and status. We also collect financial records such as invoices, payments, purchase orders, cost codes, and change orders. Procurement data such as proposals, RFPs, bids, and contracts may be stored, as well as execution data including daily logs, RFIs (Requests for Information), issues, photos, and progress entries. Documents uploaded to the platform, folders, attachments, notes, and comments are also stored.
2.6 Activity and Audit Data
We automatically collect activity and audit data, including user actions such as created, updated, or commented items, timestamps, notification records (type, recipient, read status), and session information such as login timestamps and authentication events. This data is used for audit trails, accountability, communication tracking, and security monitoring.
2.7 Technical and Device Data
We collect limited technical data, including authentication tokens stored in browser storage for session persistence, browser language preferences for language detection, and error logs used for debugging purposes (in development mode only).
3 HOW WE COLLECT INFORMATION
We collect information directly through account registration, profile updates, company settings configuration, form submissions, and file uploads. We also collect information automatically through authentication state monitoring, activity logging for audit purposes, and browser language detection. In addition, we collect limited information through third parties, such as invitation acceptance when you are invited by a company administrator and email delivery status from our email service provider.
4 HOW WE USE YOUR INFORMATION
We use your information to deliver the Service, including providing access to project management features, enabling multi-tenant company workspaces, generating invoices, proposals, and reports, and sending notifications and alerts.
Your information is also used for account management, including authenticating users, processing invitations and onboarding, enforcing role-based access control, and managing subscription and billing status.
We use your data for communication purposes, such as sending transactional emails (including invitations and password resets), delivering in-app notifications, and providing system announcements related to features or policy updates.
We use information for security and compliance, including maintaining audit logs, enforcing data isolation between companies, and detecting or preventing unauthorized access.
We may also use aggregated and anonymized data to debug technical issues and analyze usage patterns for service improvement.
5 INFORMATION SHARING AND DISCLOSURE
5.1 Within Your Organization
Your data is shared with other members of your company workspace based on their assigned role. Company administrators have full access to all company data. Project managers have access to assigned projects and related data. Project accountants have access to all financial data across projects. Project procurement users have access to procurement data for assigned projects.
5.2 Third-Party Service Providers
We use third-party service providers to operate the Service. These include infrastructure providers such as Supabase and Lovable Cloud for database hosting, authentication, and file storage, where stored data is encrypted. We use Resend for transactional email delivery, which receives recipient email addresses and email content for invitations. We use Google Cloud Storage for hosting static public marketing assets such as favicons and social images.
5.3 Legal Requirements
We may disclose your information if required to comply with applicable laws, regulations, or legal processes, to respond to lawful requests from public authorities, to protect our rights, privacy, safety, or property, or to enforce our Terms of Service.
5.4 Business Transfers
In the event of a merger, acquisition, or sale of assets, your information may be transferred to the acquiring entity.
5.5 No Sale of Personal Data
We do not sell, rent, or trade your personal information to third parties for marketing purposes.
6 DATA STORAGE AND SECURITY
Your data is stored on secure cloud infrastructure. Database and file storage services are provided through our infrastructure partners Lovable Cloud and Supabase.
We implement multiple layers of security aligned with industry best practices and the current technical implementation of the Service. This includes database-level Row Level Security (RLS) to enforce tenant isolation, validation of every query against company membership and role permissions, and enforced company identifiers on data operations.
Passwords are stored using industry-standard cryptographic hashing algorithms. JSON Web Tokens (JWT) are used for session management with automatic refresh. Invitation tokens are cryptographically random UUIDs with a seven-day expiration.
Access control is enforced through role-based access control (RBAC) with four distinct permission levels, project-level access assignments for non-admin users, and UI-level permission checks.
Private documents are accessed via signed URLs with limited expiration. File storage policies restrict access to authenticated users, and files are organized by company identifier for tenant isolation.
All data in transit is encrypted using HTTPS/TLS. Infrastructure components such as serverless edge functions verify JWTs, and service role keys are protected and never exposed to clients.
7 DATA RETENTION
We retain your data for as long as your account or company workspace remains active and as necessary to provide the Service.
Unused invitation tokens automatically expire after seven days. Authentication sessions are refreshed automatically, and session tokens are invalidated upon logout.
When data is deleted through the application, records are removed from the database and associated files are removed from storage. Activity logs may be retained for audit purposes.
Upon account or company deletion requests, we will delete or anonymize personal data within a reasonable timeframe. Certain data may be retained as required by law or for legitimate business purposes.
8 YOUR RIGHTS AND CHOICES
You may access and review your personal information through your profile page, company settings (for administrators), and exported reports such as Excel or PDF files.
You may update your personal information at any time, including profile name, avatar, notification preferences, and company settings if you are an administrator.
You may export your data in standard formats, including Excel exports for project and financial data and PDF documents for invoices and proposals.
You may control notification preferences, including in-app notifications, email notifications, and digest frequency (instant, daily, or weekly).
You may request account deletion by contacting your company administrator or our support team.
You may choose your preferred interface language, including English, German, and Albanian.
9 COOKIES AND LOCAL STORAGE
We use browser storage and cookies strictly for essential functionality. This includes authentication session storage, navigation layout preferences, UI preferences such as language, theme, and date format, and remembering view preferences for tables or cards. We do not use third-party analytics cookies, advertising cookies, or tracking pixels, and we do not implement cross-site tracking mechanisms.
10 CHILDREN’S PRIVACY
Leton is a business-to-business application designed exclusively for professional use. The Service is not intended for use by minors. We do not knowingly collect personal information from individuals who are not legally permitted to use professional business software under applicable laws.
11 INTERNATIONAL DATA TRANSFERS
If you access the Service from outside the region where our servers are located, your data may be transferred internationally. We ensure appropriate safeguards are in place in accordance with applicable data protection laws.
12 THIRD-PARTY LINKS
The Service may contain links to external websites or services. We are not responsible for the privacy practices of those third parties and encourage you to review their privacy policies.
13 CHANGES TO THIS POLICY
We may update this Privacy Policy from time to time. Changes will be posted on this page with an updated “Last Updated” date. For significant changes, we may provide additional notice through the Service or via email.
14 CONTACT US
Leton L.L.C.
Prishtina, Kosova
Email: akengji@gmail.com
Website: https://leton.online
Privacy Policy: https://leton.online/privacy-policy
Terms of Service: https://leton.online/terms-conditions
15 LEGAL BASIS FOR PROCESSING (GDPR)
If you are located in the European Economic Area, our legal bases for processing personal data include contract performance, legitimate interests such as security and service improvement, legal obligations, and consent where applicable.
Under GDPR, you have the right to access your data, rectify inaccurate data, request erasure, restrict processing, request data portability, object to processing, and lodge a complaint with a supervisory authority.
16 SUMMARY OF KEY POINTS
We collect account, company, team, project, financial, and activity data.
We use this data to deliver, secure, and improve the Service.
Data is shared only within your organization and with essential service providers.
We apply strong security measures including encryption and access control.
You control your profile, notifications, exports, and deletion requests.
We do not use tracking or advertising cookies.
Data is retained only as long as necessary.