Protection Policy
Brief introduction
We respect and protect the personal privacy and information security of all users of Pea money (hereinafter referred to as "you"). In order to provide you with more accurate and personalized services, this application will use and disclose your personal information in accordance with the provisions of this Privacy Policy. While you are using Pea money , we will collect, store, use, manage and protect your personal information. Before using Pea money , please be sure to read and thoroughly understand this Privacy Policy, and start using it after confirming that you fully understand and agree. Except as otherwise provided in this Privacy Policy, this app will not disclose or provide this information to third parties without your prior permission. During this process, if you have any questions, comments or suggestions, you can contact us through the contact information provided in the final contact instructions of this Privacy Policy, and we will reply to you as soon as possible.
Description of the information collect and its purpose
When you use our products or services, we need/may need to collect and use your relevant personal information to provide you with services, optimize our services, and protect your account security.We will use the collected information as important indicator data for evaluating your credit rating, allowing us to judge your credit rating more quickly and accurately.
Information We May Collect
A.SMS
Why we request your device SMS data
Pea money-secure loan will read the SMS information in your device to measure the user’s credibility and discover and analyze potential fraud and risks.
What you can do
You can choose to refuse the authorization, which will not affect your continued application for loans on the APP.
Data safety
Your SMS data will be encrypted and transmitted to https://www.peamoney.info. After analysis, we will permanently delete the SMS data. We will not share your SMS data with any third party.
For the collection of your SMS data, it will only be read after you authorize us to obtain the 'READ_SMS' permission in your device. Pea money-secure loan will not read and collect your SMS data when the app is closed or not in use.
B.PHONE STATE
Pea money-secure loan require phone state access so that we can ensure that no unauthorized device acts on your behalf to prevent frauds. we will collects and monitors specific information about your device including your hardware model, build model, RAM, storage; unique device identifiers like IMEI, serial number, SSAID; SIM information that includes network operator, line1Number, roaming state, MNC and MCC codes, WIFI information that includes MAC address and mobile network information to uniquely identify the devices. This also helps us in enriching your credit profile and assessing your credit worthiness.
C.LISTE DES APPLICATIONS
Why we request your device APP list data
We querying for specific apps that satisfy our app\'s manifest declaration on your device. These specific apps will help us to know if your device has apps installed with related features such as fraud or cloning (e.g. fake location information, cloned email id and contact information). So that we can judge the authenticity of your information and make a correct judgment on your credit risk.
What you can do
You can choose to refuse the authorization, which will not affect your continued application for loans on the APP.
what data we will collect
We will collect basic information such as the name, version number and package name of the applications installed on the user's device.
Data safety
This limited app information will collects and transmits to Pea money-secure loan servers https://www.peamoney.info. Pea money-secure loan will not read and collect your data when the app is closed or not in use.. Pea money-secure loan will never share data to any third party. The collection will only be done if you agree to the authorization.
Description for the use, transfer and disclosure of information collected by
Except for the following situations, we will not share your personal information with any other third parties:
with your prior consent, to third parties in order to provide the products and services you have requested.
In accordance with the relevant provisions of the law, or the requirements of administrative or judicial institutions, to third parties or administrative or judicial institutions.
If you or the account you use violates laws and regulations, violates public order and good morals, or seriously violates our rules, causing significant social impact and damage to our reputation.
If you are a qualified intellectual property complainant and have filed a complaint, at the request of the respondent, disclose it to the respondent so that both parties can deal with possible rights disputes.
In a transaction created on this application platform, if any party to the transaction fulfills or partially fulfills the transaction obligations and makes a request for information disclosure, this application has the right to decide to provide the user with the contact information of the counter party of the transaction, etc. information to facilitate the completion of a transaction or the resolution of a dispute.
We will not transfer your personal information to any company, organization or individual, except in the following cases:
Transfer with your explicit consent.
In the event of a merger, acquisition or bankruptcy liquidation of our service provider, or other situations involving mergers, acquisitions or bankruptcy liquidation, if the transfer of personal information is involved, we will require new companies and organizations that hold your personal information to continue to receive Restricted by this privacy policy, otherwise we will require the company, organization and individual to seek authorization and consent from you again.
Description of request permission and purpose
You can check the open status of the following permissions one by one through the application permission settings of Pea money in the system settings, and you can decide to open or close these permissions.Turning on means that you authorize us to use these permissions to implement the following functions, and turning off means that you cancel these authorizations, and we will not be able to provide you with the following functions corresponding to these authorizations.
In order for you to better understand and use our functional services, you can learn about it through the permission usage instructions listed below:
1 will use the camera to shoot to support the shooting certificate.
2.will collect, read, and transmit contact list data to support credit risk assessment and convenient payment, anti-fraud, quick filling and verification of emergency contacts, and in special cases (overdue), others can communicate through to contact you.
3.We collect, upload and store your SMS information, including SMS content, mobile phone number and name. Analyzing SMS content through big data models in an environment of absolute confidentiality allows us to assess your risk profile with reliable analysis results. Use I can rule out scammers.
4.collects location data to support finding and verifying addresses, helping to make better credit risk decisions.
5. will collect and transmit application list data (including but not limited to application name, application package name, application installation time, application update time, application version name and application version code) to support risk credit assessment and anti-fraud functions.
6. will collect, read, and transmit album data (including but not limited to name, width and height, latitude and longitude, creation time, modification time) to support the risk credit assessment function, which allows us to judge your credit faster and more accurately grade.
7. Used for basic connection network functions
8. will collect and transmit specific information data about mobile phones (including but not limited to mobile phone model, system version, device name, screen resolution) to support credit risk assessment and anti-fraud functions.
Description of information security protection
In order to ensure the security of your personal information we collect, we promise to strive to achieve a reasonable level of security. Now we state the specific security measures and security capabilities as follows:
1. In order to protect your information security, we resolutely take various reasonable physical, electronic and management security measures in line with industry standards to protect your information, so that your information will not be leaked, damaged or lost, including but not limited to SSL, information encrypted storage, data center access control, etc. We will use advanced encryption technology to improve the security of personal information; we will use reliable protection mechanisms to prevent personal information leakage and malicious attacks.
2. We have an industry-leading data security management system, which improves the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, operation management, and product technology. At present, in order to improve the security of your use of the services provided by our enterprises and partners, protect your personal and property safety from losses, and better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, etc. Security risks, more accurately identify whether there are violations of laws and regulations or the rules of our customer-related agreements, our enterprise provides the highest degree of protection for the system.
3. We regularly organize security and privacy protection training sessions to enhance employees' awareness of the importance of protecting your personal information. We strictly manage employees who may have access to your information, sign non-disclosure agreements with them, and closely monitor their work. We will protect your information by providing the highest level of security measures based on available technology. We will do our best to prevent your information from being leaked, damaged or lost.
Description of minor protection
We attach great importance to the protection of the personal information of minors. If you are a minor, we ask you to ask your parents or other guardians to read this privacy information protection policy carefully, and use our services or provide us with information with the consent of your parents or other guardians.
If you are the parent or other guardian of a child, please pay attention to whether the child under your custody uses our services after obtaining your authorization. If you have any questions about the personal information of the children under your supervision, please contact us through the contact information in the contact information Description of contact information section at the bottom.
Description of the revision for this privacy policy
We may revise this privacy policy from time to time. After the agreement is revised, we will publish the revised content on relevant pages or in other suitable ways. If you do not agree to the modification of this agreement, please immediately stop using the platform or cancel the service you have already obtained; if you choose to continue to access or use the platform or service after the modification of this privacy policy, you shall be deemed to have accepted the modification of this privacy policy.
Without your explicit consent, we will not restrict your rights in accordance with this privacy policy. For major changes, we will provide relatively significant notice
The major changes referred to in this privacy policy include but are not limited to:
A major change in our service model. Such as the purpose of processing personal information, the type of personal information processed, and the way in which personal information is used.
We have a major change in control. Such as changes in owners caused by mergers and acquisitions.
The main objects of personal information sharing, transfer or public disclosure have changed.
When the department responsible for handling personal information security, contact information and complaint channels change.
How to contact us
If you have any queries or questions in relation to our privacy policy, the data we hold on you, or you would like to exercise any of your data protection rights, please do not hesitate to contact us via any of the following
- contact us -
Telephone:+233 0503494465
e-mail: PeamoneyGhanaservice@outlook.com
address:kkPu1156 -2makom, Ghana
Peamoney