2.1. Work Behaviors

The first line of defense in data security is the informed behavior of personnel, who play a significant role in ensuring the security of all data, regardless of format. Such behaviors include those listed in this section as well as any additional requirements specified in the employee handbook, specific security processes, and other applicable codes of conduct.

Training

All employees and contractors must attend the WeGroup security training program, offered at least twice annually, to inform all users of the requirements of this Policy.

Unrecognized Persons and Visitors

It is the responsibility of all personnel to take positive action to maintain physical security. Challenge any unrecognized person present in a restricted office location. Any challenged person who does not respond appropriately should be immediately reported to supervisory staff and the security team. All visitors to WeGroup offices must be registered as such or accompanied by a WeGroup employee.

Clean Desk

Personnel should maintain workspaces clear of sensitive or confidential material and take care to clear workspaces of such material at the end of each workday.

Unattended Devices

Unattended devices must be locked. All devices will have an automatic screen lock function set to automatically activate upon no more than fifteen minutes of inactivity.

Use of Corporate Assets

Systems are to be used for business purposes in serving the interests of the company, and of our clients and partners in the course of normal business operations. Personnel are responsible for exercising good judgment regarding the reasonableness of personal use of systems. Only WeGroup-managed hardware and software is permitted to be connected to or installed on corporate equipment or networks and used to access WeGroup data. WeGroup-managed hardware and software includes those either owned by WeGroup or owned by WeGroup personnel but enrolled in a WeGroup device management system. Only software that has been approved for corporate use by WeGroup may be installed on corporate equipment. All personnel must read and understand the list of prohibited activities outlined in this Policy. Modifications or configuration changes are not permitted without explicit written consent by the WeGroup security team.

Removable Storage, No Backups, Use of Cloud Storage

Use of removable media such as USB drives is prohibited. Personnel may not configure work devices to make backups or copies of data outside corporate policies. Instead, personnel are expected to operate primarily “in the cloud” and treat local storage on computing devices as ephemeral. WeGroup data must be saved to company-approved secure cloud storage (e.g. Google Docs) to ensure that even in the event of a corporate device being lost, stolen, or damaged, such artifacts will be immediately recoverable on a replacement device.

Prohibited Activities

The following activities are prohibited. Under certain conditions and with the explicit written consent of the security team, personnel may be exempted from certain of these restrictions during the course of their legitimate job responsibilities (e.g. planned penetration testing, systems administration staff may have a need to disable the network access of a host if that host is disrupting production services).

The list below is by no means exhaustive, but attempts to provide a framework for activities which fall into the category of unacceptable use.

  • Under no circumstances are personnel of WeGroup authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing WeGroup-owned resources.
  • Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations including, but not limited to, the installation or distribution of "pirated" or other software products that are not appropriately licensed for use by WeGroup.
  • Violating or attempting to violate the terms of use or license agreement of any software product used by WeGroup is strictly prohibited.
  • Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which WeGroup or the end user does not have an active license is strictly prohibited.
  • Exporting software, technical information, encryption software or technology may result in a violation of international or regional export control laws. The appropriate management should be consulted prior to export of any material that is in question.
  • Revealing your account password to others or allowing use of your account by others. This includes colleagues, as well as family and other household members when work is being done at home.
  • Making fraudulent offers of products, items, or services originating from any WeGroup account.
  • Making statements about warranty, expressly or implied, unless it is a part of normal job duties and then only to the extent the warranties are consistent with WeGroup’s authorized warranties.
  • Introduction of malicious programs into the network or server (e.g., viruses, worms, Trojan horses, e-mail bombs, etc.).
  • Effecting security breaches or disruptions of network communication. Security breaches include, but are not limited to, accessing data of which the employee is not an intended recipient or logging into a server or account that the employee is not expressly authorized to access. For purposes of this section, "disruption" includes, but is not limited to, network sniffing, ping floods, packet spoofing, denial of service, and forged routing information for malicious or unlawful purposes.
  • Except by or under the direct supervision of the security team, port scanning or security scanning, or other such software designed to exploit or find computer, software, or network vulnerabilities.
  • Executing any form of network monitoring which will intercept data not intended for the employee’s host, unless this activity is a part of the employee’s normal job/duty.
  • Circumventing user authentication or security of any host, network or account or attempting to break into an information resource or to bypass a security feature. This includes running password-cracking programs or sniffer programs, and attempting to circumvent file or other resource permissions.
  • Attempting to interfere with or deny service to any other user.
  • Providing information about, or lists of, WeGroup personnel to parties outside WeGroup.
  • Installation of software which installs or includes any form of malware, spyware, or adware as defined by the security team.
  • Crashing an information system. Deliberately crashing an information system is strictly prohibited. Users may not realize that they caused a system crash, but if it is shown that the crash occurred as a result of user action, a repetition of the action by that user may be viewed as a deliberate act.
  • Attempts to subvert technologies used to effect system configuration of company-managed devices (e.g. MDM) or personal devices voluntarily used for company purposes (e.g. mobile Work Profiles).

Cookie Policy

1. Introduction

1.1. General

This website https://www.wegroup.be (“our website”) uses cookies and similar technologies to distinguish you from other users. By using cookies, we can provide you with a better experience and improve our website by better understanding how you use it. To the extent that these cookies are not strictly necessary for offering our website and services, we shall ask you to consent to the use of cookies when you first visit our website.

1.2. Glossary

In this Cookie Policy, the following terms have the following meanings, unless the context requires otherwise:

"Cookie"
means a small file placed by our website on your computer or device when you visit certain parts of our website and/or when you use certain features of our website. Cookies generally do not contain information that personally identifies a user, but personal information that we store about you may be linked to the information stored in and obtained from cookies.

"Cookie Legislation"
means the relevant provisions of EU Directive 2002/58on Privacy and Electronic Communications 2002 (“E-Privacy Directive”) and of EU Regulation 2016/679 General DataProtection Regulation (“GDPR”).

"Personal data"
means any data relating to an identifiable person that can be identified, directly or indirectly, by those data, as defined in GDPR; and

"We/Us/Our"
refers to WeGroup, a public limited company registered in Belgium under company number 0680.957.816, the registered address of which is Bomastraat 12a, 9000 Ghent.

2. Contact data

Our website and services are offered and managed by WeGroup NV. We are registered in Belgium under registration number 0680.957.816, and our registered office is located at Bomastraat 12a in Ghent. 

You can contact us:

(a) by post to the above postal address;
(b) via the contact form on our website;
(c) by telephone, on +32 92 27 93 02; or
(d) by email, through hello@wegroup.be

3. How does our website use cookies and what types of cookies are there?

Our website may place certain first-party cookies on your computer or device and access them there. First-party cookies are cookies that are placed directly by us and used only by us. We use cookies to facilitate and improve your experience of our website and to provide and improve our services. We have carefully selected these cookies and have taken steps to ensure that your privacy and personal details are protected and respected at all times. By using our website, you may also receive certain third-party cookies on your computer or device (Third-Party Cookies). Third-party cookies are cookies that are placed by websites, services and/or parties other than us.

For more details, see section 4.2. For more information about the personal data we collect and use, the measures we have taken to protect personal data, your legal rights and our legal obligations, please refer to our Privacy policy.

For more specific details about the cookies we use, please refer to Section 4. All cookies used by our website are used in accordance with current cookie legislation. We may use some or all of the types of cookies listed below. For more specific details about the cookies we use, please refer to Section 4.

3.1. Strictly necessary cookies

A cookie falls into this category if it is essential for the operation of our website, supporting functions such as setting your privacy preferences, logging in, your shopping cart, payment transactions or filling in forms. In other words, these cookies are used to enable the website to function and they cannot be disabled in our systems. They are usually only set in response to actions you have taken.

3.2. Analytical cookies

It is important for us to understand how you use our website, for example, how efficiently you can navigate and what functions you use. These cookies allow us to track visits and traffic so that we can measure and improve the performance of our website. They help us know which pages are the most popular and the least popular and how visitors move around the website. Analytical cookies allow us to collect this information and help us improve our website and your experience of it.

3.3. Tracking cookies

These cookies record analytical (anonymous) information about how you visit the website, with a view to improving the website and the user experience, but also to be able to advertise in a more targeted manner.

3.4. Persistent Cookies

Each of the above types of cookie can be a persistent cookie. Persistent cookies are cookies that remain on your computer or device for a predetermined period of time and are activated each time you visit our website.

3.5. Session cookies

Each of the above types of cookie can be a session cookie. Session cookies are temporary and only remain on your computer or device from the time you visit our website until you close your browser. Session cookies are deleted when you close your browser.

4. Which cookies does our website use?

4.1. First party cookies

The following first-party cookies may be placed on your computer or device:

Name of cookies
Purpose and type
Strictly necessary
Retention period

fr

This  cookie is set by our website itself, to keep track of your choice of language  in order to further optimise ease of use.

Yes

1 year

_tawkuuid, _ga, _gid, _cfduid, ss, tawkUUID

WeGroup uses Tawk.to within their platform to providea live chat with the support team.

Yes

180 days

4.2. Third party cookies

The following third-party cookies may be placed on your computer or device:

Name of cookies
Purpose and type
Provider
Strictly necessary
Retention period

DoubleClick is a cookie placed by Google for targeted  advertisement.

DoubleClick

Yes

optimizelyEndUserId, sid, uid, _cfruid

Medium  is used to share blogs and news articles.

Medium

No

1 year

4.3. Analytical cookies

Our website makes use of analytical services. Analysis of the website refers to a range of tools used to collect and analyse anonymous usage information so that we can better understand how our website is used. This, in turn, enables us to improve our website and the services offered through it. You do not need to allow us to use these cookies because the use of analytical cookies does not pose any risk to your privacy or your secure use of our website. They enable us to continuously improve our website, making it a better and more useful experience for you. 

The analytical services used by our website include the following cookies:

Name of cookies
Purpose and type
Provider
Strictly necessary
Retention period

_ga, _gat_gtag_UA_123265168_1, _gid, collect

WeGroup  uses Google Analytics to see how many, when and which pages someone visits on  our website.

1 day - 2 years

LogRocket  makes it possible to gain a better understanding of how a user uses our  website so that we can optimise the user experience.

30 days

5. Consent and retaining control

Before cookies are placed on your computer or device, you shall see a pop-up or banner asking for your consent to set these cookies. By giving your consent to the placing of cookies, you enable us to provide you with the best experience and service possible. You can, if you wish, refuse consent to place cookies, unless these cookies are strictly necessary. However, certain features of our website may not function fully or properly. You have the option of allowing and/or refusing various categories of cookies that we use. 

In addition to the above-mentioned controls we offer, you can choose to enable or disable cookies in your internet browser. Most internet browsers also allow you to choose whether you want to disable all cookies or only third-party cookies. By default, most internet browsers accept cookies, but this can be changed. For more information, see the help menu of your web browser or the documentation provided with your device. 

The following links provide instructions on how to manage cookies in all common browsers:

6. Changes

We may change this Cookie Policy at any time. In that event, the details of the changes shall be explained at the top of this page. You are therefore advised to check this page from time to time. In case of inconsistency between the current version of this Cookie Policy and one or more previous versions of this Cookie Policy, the current and applicable provisions shall prevail unless expressly stated otherwise.

7. Your rights and information regarding the processing of personal data

Some rights are complex and not all details are included here. Therefore, please read the relevant provisions and guidelines of supervisory authorities for a full explanation of these rights. 

Your main rights under the GDPR are:
a.  right of access;
b.  right to correction;
c.  right to erasure (to be forgotten);
d.  right to restrict processing;
e.  right to object to processing;
f.   right to data portability;
g.  right to lodge a complaint with a supervisory authority; and
h.  right to withdraw your consent. 

These rights are exercised in accordance with the terms and conditions set out in our Privacy Policy. Further information about privacy, data protection and your rights can be found in the Privacy policy.