Privacy Policy
GO Cash (hereinafter referred to as " GO Cash" or "us")
Thank you for your trust and support to GO Cash. We fully understand the importance of personal information to you. For this reason, GO Cash will take corresponding security protection measures in accordance with the common privacy and data protection laws, regulations and principles of the country where the business operates , Fully protect the security of your personal information.
Before using our services, please be sure to read and understand this policy carefully. If you start using GO Cash's services, it means that you have fully understood and agreed to this policy.
1. How we collect and use your information
1.1 When you register for this application account, you provide personal registration information according to the requirements of this application;
1.2 The application obtains user personal data from business partners through legal channels.
1.3 Your registered account in GO Cash is for your own use only, and it is forbidden to give away, borrow, rent or sell. If GO Cash discovers or has reason to suspect that the user is not the initial registrant of the account, it has the right to suspend or terminate the provision of services to the registered account without notice, and has the right to cancel the account without registering the account Of users bear legal responsibility. The resulting losses, including but not limited to interruption of user communication, clearing of user data and information, etc., shall be borne by the user.
1.4 The user is responsible for maintaining the security and confidentiality of the personal account and password. The user is fully responsible for all activities undertaken in the name of his registered account, including the modification of user data and other operations on GO Cash. Therefore, users should attach great importance to the confidentiality of account numbers and passwords, and notify GO Cash immediately if they find that others use their account without permission or any other security breaches. However, the user shall be responsible for the leakage of the password for any reason.
2. How do we use cookies and similar technologies
2.1 A cookie is a small text file created by the website server and saved on the user's browser. When the user visits the website server, the website can access the cookie information. In addition to being generally used to confirm user identity, cookies can also be used to store user information and track user visits.
2.2 In addition to using cookies to confirm the user's identity and login status, we will not collect and track any user information and behavior through it.
2.3 You can manage and delete cookies according to your own preferences, but it should be noted that blocking cookies may cause some functions of our website or system to not work effectively or be unusable, which may affect your experience.
3. How do we share, transfer, and publicly disclose your personal information
3.1 Business sharing
We promise to keep your information strictly confidential. Except as otherwise provided by laws, regulations and regulatory authorities, we will only share your information with third parties in the following situations. The third parties include the financial institutions with which you have opened securities accounts and share your personal information. Before information, we will ask for the level of its personal information security protection capabilities, confirm the legality, legitimacy, necessity, and security of the personal information collected, and sign a confidentiality agreement with it. In addition, after obtaining your explicit consent, we will share your information with third parties within the scope of your authorization, as permitted by laws and regulations and does not violate public order and good customs.
3.2 Assignment
We will not transfer your personal information to any company, organization or individual, except in the following cases:
Obtain your explicit consent in advance
According to laws and regulations or mandatory administrative or judicial requirements
When it comes to asset transfer, acquisition, merger, reorganization, or bankruptcy liquidation, if it involves the transfer of personal information, we will inform you of the situation and require new companies and organizations that hold your personal information to continue to be bound by these guidelines. If the purpose of using personal information is changed, we will require the company or organization to regain your explicit consent.
3.3 Public disclosure
Without your authorization, in principle, we will not publicly disclose your personal information. If there is a situation that must be publicly disclosed, we will truthfully inform you of the purpose of the disclosure, the type of information disclosed, and the sensitive information that may be involved, and obtain your consent. However, in the following circumstances, we may share, Transfer and publicly disclose your personal information without your consent:
Directly related to national security and national defense security;
Directly related to public health, public safety, and major public interests;
Directly related to criminal investigation, prosecution, trial, and execution of judgments;
To protect your or other individuals’ life, property, and other major legal rights, but it is difficult to obtain your own consent;
Your personal information disclosed to the public by yourself;
Personal information collected from legally publicly disclosed personal information, such as legal news reports, government information and other channels.
4. How do we protect and store your personal information
4.1 Protection
We promise to protect the security of your personal information and prevent information loss, tampering, leakage and improper use. We will use various security protection measures to protect your information within a reasonable security level.
We only retain your personal information for the purposes described in this "Privacy Policy" and within the time limit permitted by laws and regulations.
In order to protect your information security, we will take reasonable and necessary measures to protect your information under the current technical level, and adopt physical, technical and administrative security measures to reduce loss, misuse, unauthorized access, disclosure and modification Risks, including but not limited to transmission layer data encryption, firewall and encrypted storage, physical access control, and information access authorization control. For this reason, we have set up security procedures to protect your information from unauthorized access. We use high-strength encryption measures to encrypt and store your personal information on our servers. Please understand and understand that due to the existence of various unpredictable malicious means that cannot be defended by existing technologies, even if we try our best to take the above measures, your information may still be leaked, destroyed or lost.
We have established a special management system, process and organization to protect your information security. For example, we strictly limit the scope of people who have access to information within the company, all employees sign confidentiality agreements, and independent security organizations conduct regular audits. We will organize security and privacy protection training courses to strengthen employees’ awareness of the importance of protecting personal information.
In the unfortunate event of a personal information security incident, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions that you can prevent and reduce risks independently, Remedies for you, etc. We will inform you of the incident-related situation by email, letter, telephone, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to publish an announcement. At the same time, we will also report the handling of information security incidents in accordance with the requirements of the regulatory authorities.
Please be sure to take good care of you GO Cash registered account and other relevant identity elements. When you use our services, we will identify your identity through GO Cash registered account and other relevant identity elements. Once you disclose the aforementioned information, you may suffer losses and may have adverse legal consequences for you. If you find that your account password and other related identity elements may or have been leaked, please contact us immediately through customer service (personal center-feedback) so that we can take corresponding measures to avoid or reduce your related losses.
4.2 Storage
The information and data about you collected by this application will be stored on the servers of this application and/or its affiliates. This information and data may be transmitted to your country, region or outside the country where this application collects information and data, and accessed, stored and displayed outside of the country.
5.permission description
In the process of using the app, in order to assess credit risk and provide faster loan issuance, we need to collect your following permissions
5.1 User's personal information
Collect your name, mobile phone number and other personal details in order to register and communicate with you during the loan application process. We will also monitor some of your account information to verify your form fill-in information, such as your email account.
5.2 Phone
Collect and monitor specific information about the mobile phone, such as the mobile phone's unique device identifier and user profile information, because this information helps us uniquely identify the user so that GO Cash can detect and prevent unauthorized device operations. This allows us to detect fraud and better reduce the risk of fraud.
5.3 SMS
We collect and transmit your text messages, which help us identify the various accounts you hold as a user and your cash flow, and help us conduct credit risk assessments so that we can determine your risk profile and provide you with appropriate Credit analysis. You can choose to agree to secondary permissions. If you do not agree, we will not access your information. We guarantee that your SMS data is safe.
5.4 Contact
GO Cash collects and monitors contacts and account access. To this end, we will collect your contact information when submitting a form to our application to detect close contacts so that you can automatically fill in the data during the loan application process. In addition, we collect contact information from your device for risk analysis by detecting reliable reference information. The more reliable the contact information, the lower the risk.
5.5 Camera
An image application that allows you to capture documents and pictures for the loan.
5.6 Local
Collect and monitor information about the location of the device in order to provide services for your loan application and reduce the risks associated with your application, and protect the security of your capital account.
5.7 Installed apps
We collect and monitor the metadata information list of installed applications, including the application name, package name, installation time, update time, version name and other data of each installed application on the device to evaluate your reputation and enrich Your personal information, and through configuration to provide you with personalized loans.
6.the update of this privacy policy
We will update the amendments to these guidelines in due course to reflect changes in the way we handle your personal information or changes in legal requirements. If we make such changes to the privacy policy, we will publish the revised policy on GO Cash or in other ways.
We recommend that you check this webpage regularly for the latest information on our privacy guidelines. Your continued use of our products and services provided on the website will be deemed to have accepted the updated privacy policy.
Contact us:
gocashsupport4@gmail.com
Time : 10 AM - 6PM
Comments
Post a Comment