Privacy policy
Last updated: April 2026.
This policy describes the Lazy POS web application when operated by you or your organization. If you self-host, you are typically the data controller for end-customer and staff data stored in your database.
The software may process authentication data, business transactions, inventory records, audit logs, and settings you configure. Technical logs on your server (e.g. web server, PHP) are under your control.
We do not describe third-party subprocessors here because deployment is under your infrastructure. If you use external email, analytics, or payment gateways, their policies apply separately.
Secure deployments should use HTTPS, strong passwords, restricted database access, and regular backups. Contact your administrator for data export or deletion workflows.