Your Privacy Matters
Policy in Effect
This section shows the date our Privacy Policy took effect. Stay informed about the current data protection guidelines.
Date defined
The effective date is clearly stated.
Policy updates
Understand how updates are handled.
Stay informed
Learn how to stay updated.
What We Gather
Learn about the data we collect—business, payer, transaction, and technical information—to understand what affects your experience.
  • Business information
    Details related to the business operations and structure.
  • Payer data
    Financial information from those making payments.
  • Transaction data
    Records of all interactions and exchanges.
  • Technical data
    Information about devices and usage patterns.
Putting Data to Work
Discover how we utilize your information to enhance payment processing, ensure compliance, support API services, fulfill regulatory checks, and maintain robust security.
  • Payment processing
    Facilitating financial transactions.
  • Compliance
    Adhering to legal and regulatory requirements.
  • Api services
    Providing access to application programming interfaces.
  • Security monitoring
    Protecting against unauthorized access and ensuring data integrity.
Who We Share With
Discover when we share your data with acquirers, processors, regulators, and merchants, while prioritizing your privacy.
  • Acquirers
    Data may be shared with companies that acquire our business.
  • Processors
    Information is shared with entities that process data on our behalf.
  • Regulatory bodies
    Data may be disclosed to comply with legal requirements.
  • Merchants
    Information may be shared with merchants for transactions.
Keeping Data Safe
We use strong security measures like authentication, encryption, and regular scans to protect your information from threats.
  • Authentication
    We use strong authentication methods to verify user identities.
  • Encryption
    Data is encrypted both in transit and at rest.
  • Vulnerability scanning
    Regular vulnerability scans are performed to identify and address potential security weaknesses.
  • Access control
    We limit access to your data to authorized personnel only.
Your Control Over Data
Learn about your rights regarding your personal information. Understand how you can access, correct, or request deletion of your data, and how to submit these requests.
  • Access
    You have the right to request access to your personal information.
  • Correction
    You can request corrections to inaccurate or incomplete data.
  • Deletion
    You have the right to request the deletion of your personal information.
  • Submission
    Instructions are available for submitting requests related to your data.
Made on
Tilda