Privacy Policy for the Customers of Lipachat Africa
This Privacy Policy describes how Lipachat Africa (“we,” “us,” or “our”) collects, uses, and shares personal information obtained from customers (“you” or “your”) when you use our software. We are committed to protecting your privacy and ensuring the security of your personal information. By using our software, you consent to the practices described in this Privacy Policy.
Personal Information:
We may collect the following types of personal information from you:
- Contact information (such as name, email address, phone number)
- Account information (such as username, password)
- Payment information (such as credit card details)
- Usage information (such as IP address, device information, browser type)
- Communication preferences (such as your marketing preferences)
Non-Personal Information:
We may collect non-personal information about your use of our software, such as aggregated and anonymized data for analytics purposes.
Provision of Services:
We may use your personal information to:
- Provide and maintain our software.
- Process your transactions and deliver the requested services.
- Respond to your inquiries and provide customer support.
- Send you administrative information, including updates and notifications related - to our software.
Improving Our Services:
We may use your information to:
- Understand and analyse usage patterns to enhance and customize our software.
- Conduct research, develop new features, and improve the overall user experience.
Marketing and Communication:
With your consent, we may use your personal information to:
- Send you promotional materials, newsletters, and marketing communications.
- Inform you about new products, features, and updates.
You can opt-out of receiving marketing communications at any time by following the instructions provided in the communication or by contacting us directly.
Third-Party Service Providers:
We may share your personal information with trusted third-party service providers who assist us in operating our software, conducting business activities, and delivering services to you. These third parties are contractually obligated to keep your information confidential and use it solely for the purposes we specify.
With Legal Obligations:
We may disclose your personal information to comply with applicable laws, regulations, legal processes, or enforceable governmental requests.
Business Transfers:
In the event of a merger, acquisition, or sale of all or a portion of our assets, your personal information may be transferred as part of the transaction. We will notify you via email or a prominent notice on our website in such circumstances.
In the event of a merger, acquisition, or sale of all or a portion of our assets, your personal information may be transferred as part of the transaction. We may disclose or transfer your personal information to the acquiring entity or any other third party involved in the transaction. Your personal information may be one of the assets that are transferred or acquired in such circumstances.
We will notify you via email or through a prominent notice on our website of any such change in ownership or control of your personal information. We will also provide you with choices regarding your personal information, following any applicable laws and regulations.
During a business transfer, we will ensure that the receiving party agrees to protect your personal information in a manner consistent with this Privacy Policy. We will respond appropriately to ensure that any such transfer is conducted securely and in accordance with applicable privacy laws.
If you do not wish your personal information to be transferred to the acquiring entity or any other third party, you may contact us using the information provided in the “Contact Us” section below to exercise your right to object or seek further clarification about the transfer.
It is important to note that in the event of a business transfer, the new entity or third party may continue to process your personal information in accordance with their own privacy policies and practices, which may differ from this Privacy Policy. We encourage you to review the privacy policies of any new entity or third party before disclosing your personal information to them.
We will make reasonable efforts to ensure that any business transfer is conducted in a manner that protects the privacy and security of your personal information. However, we cannot guarantee that such transfers will always occur, and we deny any liability for any actions or omissions of third parties involved in the business transfer process.
If you have any questions or concerns regarding business transfers or the protection of your personal information during such transactions, please contact us using the information provided in the “Contact Us” section below. We will be happy to provide you with additional information and address any concerns you may have.
Data Security:
We take the security of your personal information seriously and implement appropriate technical and organizational measures to protect it from unauthorized access, use, disclosure, alteration, or destruction. We strive to ensure the confidentiality, integrity, and availability of your data by following industry best practices and complying with applicable data protection regulations. We implement appropriate technical and organizational measures to protect your personal information from unauthorized access, use, disclosure, alteration, or destruction. However, please note that no method of transmission over the Internet or electronic storage is completely secure, and we cannot guarantee absolute security.
Here is how we prioritize data security:
Secure Transmission:
We employ secure transmission protocols, such as HTTPS (Hypertext Transfer Protocol Secure), to encrypt data transmitted between your device and our software. This encryption helps safeguard your information against interception and unauthorized access during transmission.
Encryption:
We utilize encryption techniques to protect sensitive information, such as payment details and passwords. Your data is encrypted both at rest (when stored on our servers) and in transit (when transmitted over networks). This encryption ensures that even if unauthorized individuals gain access to the data, it remains indecipherable and unusable.
Access Controls:
We maintain strict access controls to limit access to your personal information to authorized personnel who have a legitimate need to access it. Access privileges are granted on a “need-to-know” basis and are regularly reviewed and updated. We also enforce strong authentication measures to protect against unauthorized access to your account.
Firewalls and Intrusion Detection Systems:
We employ firewalls and intrusion detection systems to protect our software and infrastructure against unauthorized access, malicious attacks, and suspicious activities. These security measures help prevent unauthorized individuals from gaining access to our systems and your personal information.
Data Minimization:
We only collect and retain the personal information necessary to fulfil the purposes outlined in this Privacy Policy. We do not store more data than is required and have implemented data minimization principles to reduce the risk associated with data storage.
Employee Training and Awareness:
We provide comprehensive training to our employees to ensure they understand the importance of data security and their responsibilities in safeguarding your personal information. Our employees are trained on security best practices, managing sensitive data, and identifying and responding to potential security threats.
Regular Security Assessments:
We conduct regular security assessments, including vulnerability scans and penetration testing, to identify and address any vulnerabilities in our software and infrastructure. These assessments help us proactively detect and mitigate potential security risks.
Third-Party Security:
When we engage third-party service providers, we carefully evaluate their security practices and ensure that they have adequate measures in place to protect your personal information. We require our third-party providers to comply with applicable data protection regulations and maintain the confidentiality and security of your information.
Incident Response:
In the event of a data breach or security incident, we have established incident response procedures to promptly investigate, mitigate, and notify affected individuals and relevant authorities as required by applicable laws and regulations. We take immediate action to address any security vulnerabilities and prevent future incidents.
Despite our rigorous efforts to secure your personal information, it is important to note that no method of transmission or storage is completely secure. While we strive to protect your data, we cannot guarantee its absolute security. If you believe that your interaction with our software is no longer secure or if you suspect any unauthorized access or use of your account, please notify us immediately using the contact information provided in the “Contact Us” section below.
We are committed to continuously improving our data security practices and staying up to date with the latest industry standards and developments in data protection.
Your Rights and Choices:
You have certain rights regarding your personal information. These include:
- The right to access and rectify your personal information.
- The right to request the erasure of your personal information.
- The right to object to the processing of your personal information
- The right to restrict the processing of your personal information.
- The right to data portability
To exercise these rights, please contact us using the information provided in the “Contact Us” section below. We will respond to your request in accordance with applicable data protection laws.
Updates to this Privacy Policy:
We may update this Privacy Policy from time to time. Any changes will be effective upon posting the revised policy on our website. We encourage you to review this Privacy Policy periodically for any updates.
If you have any questions, concerns, or requests regarding this Privacy Policy or our privacy practices, please contact us at:
Lipachat Africa
chat@lipachat.com
Please allow up to 30 days for us to respond to your inquiries.