The Privacy Policy is effective as of March 1, 2026.
We collect business information, payer data, transaction data, and technical data.
The information is used to provide and improve services, process transactions, and communicate with users.
Data may be shared with service providers and as required by law.
We implement various security measures to protect user data.
Users have the right to access, correct, and delete their information.
Policy in Effect
This section shows the date our Privacy Policy took effect. Stay informed about the current data protection guidelines.
Date defined
The effective date is clearly stated.
Policy updates
Understand how updates are handled.
Stay informed
Learn how to stay updated.
What We Gather
Learn about the data we collect—business, payer, transaction, and technical information—to understand what affects your experience.
Business information
Details related to the business operations and structure.
Payer data
Financial information from those making payments.
Transaction data
Records of all interactions and exchanges.
Technical data
Information about devices and usage patterns.
Putting Data to Work
Discover how we utilize your information to enhance payment processing, ensure compliance, support API services, fulfill regulatory checks, and maintain robust security.
Payment processing
Facilitating financial transactions.
Compliance
Adhering to legal and regulatory requirements.
Api services
Providing access to application programming interfaces.
Security monitoring
Protecting against unauthorized access and ensuring data integrity.
Who We Share With
Discover when we share your data with acquirers, processors, regulators, and merchants, while prioritizing your privacy.
Acquirers
Data may be shared with companies that acquire our business.
Processors
Information is shared with entities that process data on our behalf.
Regulatory bodies
Data may be disclosed to comply with legal requirements.
Merchants
Information may be shared with merchants for transactions.
Keeping Data Safe
We use strong security measures like authentication, encryption, and regular scans to protect your information from threats.
Authentication
We use strong authentication methods to verify user identities.
Encryption
Data is encrypted both in transit and at rest.
Vulnerability scanning
Regular vulnerability scans are performed to identify and address potential security weaknesses.
Access control
We limit access to your data to authorized personnel only.
Your Control Over Data
Learn about your rights regarding your personal information. Understand how you can access, correct, or request deletion of your data, and how to submit these requests.
Access
You have the right to request access to your personal information.
Correction
You can request corrections to inaccurate or incomplete data.
Deletion
You have the right to request the deletion of your personal information.
Submission
Instructions are available for submitting requests related to your data.