Privacy Policy

Last Reviewed: October 2023

1. Introduction

The right to privacy is a fundamental right and is necessary to protect personal data as an essential facet of informational privacy. The growth of the digital economy has meant the use of data as a critical means of communication between people. Hence, it is necessary to create a collective culture that fosters a free and fair digital economy, respecting the informational privacy of individuals, and ensuring empowerment, progress, and innovation.

Our Information Security Philosophy is to ensure that the right data is used by a person in the right role and only in the right context, so that internal and external customers and other stakeholders can trust us for their business. Our Data Privacy Policy is a legal document that we use to disclose the way we gather, use, and manage the personal information of our customers and clients. Personal information can be anything that identifies an individual. Our Data Privacy Policy not only covers our customers but also covers our business partners, franchisee partners, and suppliers.

We follow strict security procedures in the storage and disclosure of any information so that our internal and external clients, employees, Board members, other partner in our organization (voluntary or otherwise), contractor or agent feel confident about the privacy and security of their personal information. We handle data protection and privacy by categorizing all data based on our sensitivity (confidentiality), criticality (availability), identifiability (privacy) and compliancy; this categorization is then used to determine the safeguards required. We control the framework which is primarily based upon ISO 27001:2013 which states:

Information SecurityThe protection of the confidentiality, integrity, and availability of information
Information PrivacyEstablishing rules which govern the collection and handling of personal information
Information ComplianceAdherence with all applicable IT regulatory requirements or implementing compensating controls or documenting exception requests

2. Definitions

Personal Data:

Any information that directly or indirectly identifies an individual.

Data Controller:

A person, department or organization that determines the purposes and means of data processing.

Data Subject:

An individual whose personal data is subject to processing.

Processing:

Any operation or set of operations applied to Personal Data, such as data collection, recording, organization, structuring, storage, adaptation, modification, extraction, consultation, use and transmission.

3. Our Provision

We have made the below provision:

3. Our Basic principles of personal data processing

Our personnel need to respect and apply the following basic principles when processing personal data:

4.1 Legitimate and fair processing

Our policy of processing of personal data shall only be carried out on a legitimate basis and in a fair and transparent manner. We process personal data based on the consent and in the best interests to ensure your safety and security.

4.2 Purpose Specification

4.3 Based on Customer/User Consent

By submitting or providing to us your personal information, you consent to the use of that information as set out in this Privacy Policy. We process personal data based on your consent, given no later than at the commencement of the processing. We process personal data only when there is a legal basis for doing so or you have granted us your consent in this regard.

4.4 Data Quality

Our data protection team ensure that personal data processed is complete, accurate, not misleading and updated, having regard to the purposes for which it is processed.

4.5 Necessity and Proportionality

The processing of personal data should be necessary and proportionate to the purpose(s) for which it is being processed. Therefore, data that is processed should be adequate and relevant to the identified purpose, and not exceed that purpose.

4.6 Accuracy

Personal data should be recorded as accurately as possible and, where necessary, updated to ensure it fulfils the purpose(s) for which it is processed.

4.7 Collection limitation

Collection of personal data shall be limited to such data that is necessary for the purposes of processing.

4.8 Right to Information Respect the rights of the data subject or user

When we collect or process personal information, we notify and take your consent.

4.9 Confidentiality, Security and Availability (CIA)

We maintain Confidentiality, Security and Availability (CIA) of the data we collect or gather. We maintain Confidentiality of data by ensuring that data exchanged is not accessible to unauthorized users. We make sure the Integrity of the data by ensuring that a system and its data has not suffered unauthorized modification; And the Availability guarantees that data, systems, and applications are available to users when they need them.

4.10 Prevention, detection, investigation, and prosecution of contraventions of law

Processing of personal data in the interests of prevention, detection, investigation and prosecution of any offence or any other contravention of law shall not be permitted unless it is authorized by a law made by Parliament and State Legislature and is necessary for, and proportionate to, such interests being achieved.

4.11 In compliance with law or any order of any court or tribunal

In compliance with law or court order personal data shall be processed if such processing is:

4.12 For reasonable purposes

Personal data shall also be processed if such processing is necessary for such reasonable purposes related to the below activities after taking into consideration:

4.13 Based on explicit consent.

Sensitive personal data shall be processed based on explicit consent only. We process personal data only when there is a legal basis for doing so or you have granted us your consent in this regard.

4.14 Sensitive personal data of children

We shall process personal data of children in a manner that protects and advances the rights and best interests of the child.

4.15 By Implementing Partners

Where the collection and processing of personal data is one of the responsibilities of Implementing Partners, the personal data is being collected and processed on behalf of us. For these reasons, Implementing Partners are expected to respect and implement the same or comparable standards and basic principles of personal data protection as contained in our privacy and legal policies. This applies whether we intend to share personal data to Implementing Partners or Implementing Partners collect personal data to carry out agreed activities.

5. How we collect personal data

We are committed to collect personal data through lawful and transparent means, with your explicit consent where required, which include:

6. Information we collect while you use our services

When you visit our website, or our web applications, we may also collect certain data by “cookies” and other automated means. Cookies are small pieces of data that are stored by your browser on your computer’s storage. Such data may comprise the following data:

We do not collect data which is, by its nature, particularly sensitive (e.g., genetic data, biometric data, data revealing racial or ethnic origin, political opinions, sex life, sexual orientation, religion or other beliefs, data concerning health, criminal background, or trade union membership).

7. How we use your personal information

We have a legitimate business interest in operating and improving the business and the services we offer and therefore we use and processes your personal data, and we will not do so to the extent that processing would override your interests, rights, and freedoms to protect your personal data.

In this situation, we shall only process your personal data when you have given us your explicit consent and you have the right to withdraw your consent at any time. Your decision to provide your data for such purposes is optional and shall have no consequence on your ability to stay with us or benefit from the requested services. Your decision to provide personal data (including special category/ sensitive personal data) to us is voluntary, however, if you do not provide such personal data, you may not benefit from some of the services.

We process personal information about you for the following purposes:

8. Personal Information for Marketing Purposes

You have the right to ask us not to process your personal information for marketing purposes. When we collect contact information from you (for example, when you provide us with your business card), we may add your details to our contacts database. You can ask us not to use your information in this way at any time by sending us an email at info@digitalpaygo.com

9 For Minors below the age of 18

Our websites are not for individuals under age 18. Individuals below the age of 18 are not allowed to access the website or provide personal information to us. However, we may collect Personal Information about children below the age of 18 years from the parent or guardian directly, and with that person’s explicit consent.

10. Disclosures without Your Consent

We may share personal information with government authorities/ law enforcement agencies in response to warrants, or court orders, in connection with any legal or regulatory process, or to comply with relevant laws. We may also share your personal information to establish or exercise our rights, to defend against a legal claim, to investigate, prevent, or act regarding possible illegal activities, suspected fraud, safety of person or property, for audit purposes, or a violation of our policies.

11. How do we Protect Personal Data

We maintain technical, physical, and administrative safeguards designed to protect the personal data provided against accidental, unlawful, or unauthorized destruction, loss, alteration, access, disclosure, or use.

All employees receive induction during joining and periodically receive training and awareness emails on data security and/or privacy related risks and procedures.

Also, we provide data privacy and security training and awareness to third party vendor and NDA is signed as well by users/employee/third party vendor. Employees or management team who might have access to this data to provide services shall be contractually obliged to keep such data in confidence, provide adequate data security measures, and may not use that data for any other purpose.

Also, for your own protection, we encourage you not to include sensitive personal data, credit card or similar personal data in any e-mails you send us or our employee.

12. Customer/User Data Sharing

We share the data with third party who give services on behalf of us and is committed to comply with our policy.

13. Usage of Customer Data for Secondary Purposes

We do not use customer data for any purpose other than the primary purpose defined in this Policy. We do not sale customer data to any third party through sale or rentals.

14. We ensure that sharing personal data does not negatively impact

The safety and security of our personnel and/ or personnel of Implementing Partners. The effective functioning of our operation or compromise our mandate, for example due to the loss of the climate of trust and confidence between us and persons of concern or the loss of the perception of us as an independent, humanitarian, and non-political Organization.

Before agreeing to share personal data to a third party, we assess the level of data protection afforded by the third party. As part of this assessment, the data controller assesses, inter alia, the applicable laws and regulations, internal statutes, and policies of the third party, specific contractual obligations, or undertakings to respect specific data protection frameworks, their effective implementation as well as the technical and organizational means of data security put in place.

15. Verification

Irrespective of a partnership agreement, we need to verify, prior to sharing personal data to an Implementing Partner or to engaging an Implementing Partner in the collection and processing of personal data, that the processing of personal data by the Implementing Partner satisfies the standards and basic principles of our privacy and legal policies. Such verification may form part of a Data Protection Impact Assessment.

16. Partnership agreements

We mandate Implementing Partners to comply with our privacy and legal policies through an undertaking as part of the signing of partnership agreements. Such agreements also need to specify the specific purpose(s) for the processing of personal data and the legitimate basis for processing.

17. Partnership termination

After termination of a partnership, all personal data collected in the performance of the partnership would be returned to us. Partnership agreements may provide for exceptions, where there are legitimate reasons to do so, namely your consent.

18. Data Share Agreements

Unless there are satisfactory reasons not to do so, prior to sharing personal data to a third party, the data controller shall seek to sign a data share agreement, or, as appropriate, incorporate data protection clauses within broader agreements, particularly where share of personal data are likely to be large, repeated, or structural, i.e. where the same type(s) of data is shared with the same third party for the same purpose over a certain period of time.

Data share agreements should, inter alia:

19. How long we keep personal data for

We are committed to collect and process user data which is limited to the stated purpose only. We maintain appropriate security safeguards to protect your Personal Information and retain it for as long as needed to fulfil the purposes for which it is collected unless we are required or permitted by law to keep the personal data for longer. We delete your information whenever you request us to do so. Your Personal data shall be anonymized or deleted if your last interaction with Digital Paygo was over 7 years ago. Interaction with us includes visiting our office.

20. Cookies

A “cookie” is an element of data that a website can send to your browser which may then be stored on your system. We use cookies to gather data about the visitors to our websites (as they enable us to improve our websites and deliver a better and more personalized service). We do not associate the data in a website visitor’s cookie with any other data about that visitor.

The cookies we use on our websites, where you have accepted are for maintaining session, user preferences, site performance information, site functionality, analytics, conversion tracking.

We do not control the use of third-party technology either use by the browser or any application installed in your system. We are not responsible for any actions or policies of such third parties.

When you access our websites/applications, you will receive a clear notice advising you that the websites/applications you are visiting or using intends to use cookies and that:

Unless you have adjusted your browser setting so that it will refuse cookies from our websites, our system will issue cookies. Most browsers will tell you how to stop accepting new cookies, how to be notified when you receive a new cookie, and how to disable existing cookies. You can find out how to do this for your browser by clicking “help” on your browser’s menu. Please note, however, that without cookies you may not be able to take full advantage of some of our websites/applications features.

21. Data Storage Limitation

Our data protection team shall retain personal data only if may be reasonably necessary to satisfy the purpose for which it is processed.

Personal data that is not recorded in individual case files is not to be retained longer than necessary for the purpose(s) for which it was collected.

All individual case files, whether open or closed, are considered permanent records, and must therefore be permanently retained in line with our Access Policy.

Our data protection team undertake periodic review to determine whether it is necessary to retain the personal data in its possession.

22. In case of Data Breach

A breach of data security leading to the accidental or unlawful/ illegitimate destruction, loss, alteration, unauthorized disclosure of, or access to, personal data shared, stored, or otherwise processed. Our employees notify the Data Controller / Data Protection Officer/ Head of Risk & Compliance as soon as possible upon becoming aware of a personal data breach and to properly record the breach.

Disciplinary Action in case of Violation of Data Privacy Policy

Adherence to Data Privacy Policy is considered as an important parameter while evaluating performance of employees. We have zero tolerance for any kind of data breach done by any of our employees. In case, any employee is found violating any sections of the Data Privacy Policy, disciplinary and/or legal action is taken.

If a personal data breach is likely to result in personal injury or harm to a data subject, the Data Controller / Information Security Officer / Head of Risk & Compliance shall use his or her best efforts to communicate the personal data breach to you and take mitigating measures as appropriate without undue delay.

The notification shall describe:

23. Updates to our Privacy Policy

This Privacy Policy was last updated in June 2023. We update this privacy policy from time to time. If we change our Privacy Policy, we shall post the changes on our website so that you may be aware of the information we collect and its uses. You shall therefore review this page regularly to ensure that you are aware of any changes to our terms. If the user consent for this policy has been taken in the past, it shall be taken again. If you need any clarifications or help about this Privacy Policy, please contact info@digitalpaygo.com

24. Periodic Audit by Internal and External IT Auditors

We periodically audited by external and internal auditor for ISO 27001:2013 certification. We also conduct or undergo Information Security audit for its entire IT systems by external agencies, regulatory and statutory bodies.

25. Information collected when you use our Mobile Applications

Such safeguards include but are not limited to:

Control ObjectiveDescription
Access ControlAccess to our non-public information is controlled in accordance with authorized privileges of the user access
Awareness and TrainingWe provide ongoing security and privacy awareness training to its employee
Audit and AccountabilityThe information systems maintain a record of system activity by system or application processes and by user activity
Configuration ManagementSystems are built and maintained according to a baseline configuration standard which addresses security
Data GovernanceThe right data is used by a person in the right role and only in the right context
Identification and AuthenticationThe system verifies that people are who they claim to be. Identify and authenticate individuals in a manner that balances the right to privacy and protection of personal information with the need of organizations to collect, use and disclose personal information for legitimate purposes.
Information Security Management SystemWe establish, implement, operate, monitor, review, maintain and improve information security.
Incidence ResponseWe have a defined, repeatable process for managing information security related incidents.
Media ProtectionWe protect media throughout its lifecycle. Only authorized personnel shall have access to Media. Media is always stored in a safe and secure environment. Contents of the re-usable media are always erased when the information is no longer required.
Technology AbsorptionWe have our own technology policy for our acquisition, absorption, and adaptation, on long-term as well as short term basis. We adept Co-development and co-production
Personnel SecurityWe identify the security controls needed to properly address how users, developers, implementors, and managers interact with computers and the access and authorities they need to do their job.
Physical and Environmental ProtectionOur facilities are protected against physical and environmental threats. We develop, approve, and maintain a list of individuals with authorized access to the facility where the information system resides. We remove individuals from the facility access list when access is no longer required. We escort visitors and monitor visitor activity.
Risk ManagementWe continually analyse, respond to, communicate, and manage specific risks to our systems.
System and Services Development and AcquisitionInformation security and privacy is addressed throughout the development lifecycle.
System and Communications ProtectionThe technical implementation of the system provides a base level of confidence in the technical implementation so that the system's various security functional capabilities can be trusted.
System and Information IntegritySystems and information are protected against unauthorized modification.
ComplianceWe adhere to the applicable government body regulations, legal, and contractual requirements.

26. Data Controller / Information Security Officer / Head Risk & Compliance / Legal Officer

The data controller is responsible for establishing and overseeing the processing of personal data under his or her area of responsibility. He or she therefore also bears the main responsibility for compliance with the Policy. We have appointed a Head of Risk & Compliance to obtain more information in data privacy or to submit suggestions or complaints regarding the processing of personal data who can be contacted on email or address given.

Data Controller carryout the following functions:

27. Grievance Redressal

We have proper procedures and effective mechanisms in place to address grievances efficiently and in a speedy manner.

If you require any information or clarification regarding

28. Conclusion

We conclude that we at Digital Paygo:

We are committed in ensuring the confidentiality, protection, security, and accuracy of personal information available to it and it has been our ongoing strict policy to ensure that personal information is accurate, complete, not misleading, up-to-date, and stored in a secure environment protected from unauthorized access, modification or disclosure. We would also ensure that personal data shall not be used for political and commercial purposes. In case of any concerns, the Information Security Manager and Data Protection Officer can be contacted at support@digitalpaygo.com