Privacy Policy

Mkopo Cash Privacy Agreement

This Privacy Agreement is formulated by STELLAR DASH INVESTMENT COMPANY LIMITED (hereinafter referred to as "we" or "the Company") and applies to the Mkopo Cash application (hereinafter referred to as the "Application"). This Agreement is intended to explain to you in detail how and what rules we use to collect, use, store, share and protect your personal information during your use of the Application to ensure that your personal information is properly handled and protected. Please read and understand the contents of this Privacy Agreement carefully before using the Application. If you have any questions or comments about this Privacy Agreement, please contact us through the contact information provided at the end of this Agreement.


1. Information We Collect:

Personal information permissions:

Access content: We will collect your name, ID number, contact information, bank card information and other necessary information through the loan information form for loan application review, identity verification, risk assessment and subsequent repayment management. Help us confirm your identity and assess your repayment ability and credit risk. At the same time, ensure the accuracy and smoothness of the repayment process and protect the legitimate rights and interests of you and the platform. All personal information is stored on a secure server: https://qeb.stelldashltd.store, using encryption technology to prevent data leakage.


Location permission:

When you use the APP, you will be requested to obtain your approximate geographic location information, including location data obtained by GPS positioning, base station positioning, etc. Location information is mainly used to assess the applicability of financial service policies in your area, and in some cases, to assist in risk assessment, such as determining whether your current location is in a frequently used location to prevent fraudulent transactions.All personal information is stored on a secure server: https://qeb.stelldashltd.store, using encryption technology to prevent data leakage.


Camera permissions:

The APP may request camera permissions for taking photos in scenarios such as real-name authentication and uploading supporting documents. By taking a photo of your face or ID card, face recognition verification and identity information verification are performed to ensure that the applicant's information is consistent with the document information, improve the security of the loan application, and simplify the material submission process. The photos taken are only used for verification and review processes related to the loan application. After the review is completed, they will be stored and deleted according to the period specified in our privacy policy.


App list permission description

We only collect information about apps that are actively installed on your device (excluding pre-installed apps). This information will be used to: Analyze financial habits and product adaptation: By evaluating your app usage scenarios, we recommend more suitable loan products to you, and help improve your credit score while ensuring your repayment ability; Device security protection: Detect high-risk apps that may exist in your device to ensure the security of your data and finances.All personal information is stored on a secure server: https://qeb.stelldashltd.store, using encryption technology to prevent data leakage.


SMS

Once you grant this permission, we will access some of your financial SMS information to assess your financial situation from multiple perspectives. Active financial activity can demonstrate your financial needs, potentially leading to higher loan amounts. We strictly adhere to Google's privacy policy and adhere to the "minimum necessary" principle, preventing access to SMS messages containing your personal information. We use keyword filtering to only capture SMS messages containing the following keywords: [financial, umepokea, Kumbukumbu, TZS, tarehe, Akaunti, account, mteja, received, malipo, loan, yamepokelewa, tsh, Transaction, pesa, lipa, balance, kutoka, VAT, imethibitishwa, lako, fee, Kuta, mkopo, paid, repayment, salio, betPawa, amount, umelipia, tafadhali, kulipa]. This financial SMS information helps prevent loan fraud rings from using virtual devices to commit loan fraud, allowing us to serve more users who truly need loan services. The above data will be encrypted and uploaded to: https://qeb.stelldashltd.store and deleted after the loan review


Contact information permission:

During the loan application process, the APP will request to read your address book information in the form of a form to obtain the contact name and phone number. It is mainly used as an emergency contact channel when your loan is overdue and you cannot be contacted, so that we can communicate with your emergency contact. At the same time, in some cases, it can also be used as an auxiliary credit assessment basis. We will not read your address book without your explicit consent. When requesting permission, you will be informed of the purpose in detail and provided with an alternative method to manually enter emergency contact information.All personal information is stored on a secure server: https://qeb.stelldashltd.store, using encryption technology to prevent data leakage.


Device permission:

The APP will collect basic information about the device, such as device model, operating system version, IMEI number (International Mobile Equipment Identity), MAC address, device serial number, etc.This device information is used to identify your device to ensure that you can maintain the consistency and security of your account when logging in on different devices. At the same time, by analyzing device information, the compatibility and performance of the APP on different devices can be optimized to provide you with a better user experience. In terms of risk prevention and control, device information can help us detect whether there is abnormal login behavior, such as the same account logging in from multiple different devices in a short period of time, which may indicate the risk of account theft. All personal information is stored on a secure server: https://qeb.stelldashltd.store, using encryption technology to prevent data leakage.


II. How we use the collected information

(I) Providing services

Account management: Use the registration and account information you provide to create and manage your account, and ensure that you can log in and use the various functions of this application safely.

Loan services: Use the loan application information you provide and the credit information obtained from third parties to review your loan application, assess your credit risk, determine the loan amount and term, and handle loan issuance and repayment and other related matters.

Other services: Based on the information you provide when using other functions of this application (such as customer service consultation, feedback, etc.), provide you with corresponding services and support, answer your questions, and handle your feedback.

(II) Personalized services and recommendations

Analysis and optimization: Through the analysis of your device information, log information, usage behavior and other data, understand your usage habits and preferences, optimize the functions, interface design and user experience of this application, and provide you with services that better meet your needs.

Personalized recommendations: Based on your personal information and usage behavior, recommend loan products, promotions, services or partner information that may be of interest to you, but we will ensure that the recommended content is relevant to your interests and needs, and you have the right to choose whether to receive such personalized recommendation information.

(III) Security Assurance

Identity Authentication: Use the personal information you provide for identity authentication to prevent unauthorized access and account theft and ensure the security of your account.

Risk Monitoring and Prevention: By analyzing your personal information and behavioral data, monitor and identify possible risk behaviors (such as fraudulent behavior, abnormal transactions, etc.), take appropriate measures to prevent and deal with risks, and protect your and our legitimate rights and interests.

Compliance Management: Collect and use your personal information to comply with applicable laws, regulations, industry norms and regulatory requirements to ensure that our business operations are legal and compliant.


III. How we store information


(I) Storage location


We will store your personal information collected in Tanzania or other locations with your consent. If we need to transfer your personal information overseas for processing or storage, we will ensure that appropriate security measures are taken to protect the security of your personal information and comply with the relevant laws and regulations on cross-border data transfer.


(II) Storage period


We will only retain your personal information for the period necessary to achieve the purposes stated in this Privacy Agreement, unless otherwise provided by laws and regulations. For example, during the processing of your loan application, we will retain your loan application information; during the existence of your account, we will retain information related to your account. When your account is cancelled or the loan is fully settled and the relevant business is processed, we will delete or anonymize your personal information in accordance with the requirements of laws and regulations and business practices.


IV. How we protect information security


(I) Security technical measures


We have adopted a series of security technical measures to protect the security of your personal information, including but not limited to:


Data encryption: Your sensitive personal information (such as ID number, bank account information, etc.) is encrypted during transmission and storage to ensure the confidentiality of the data.​

Access control: Establish a strict access control mechanism to restrict access to your personal information to authorized personnel only, and record and audit the operations of access personnel. ​

Security vulnerability management: Regularly scan and repair the system for security vulnerabilities, promptly deal with security issues found, and prevent hacker attacks and data leaks. ​

Backup and recovery: Regularly back up important data and establish a data recovery mechanism to ensure that data can be restored in time when data is lost or damaged. ​

(II) Security management system ​

We have established a complete data security management system, clarified the responsibilities and obligations of each department and personnel in data protection, conducted data security training for employees, improved their data security awareness and operating standards, and ensured that employees strictly abide by relevant laws and regulations and the company's security policies when handling your personal information. ​

Although we have taken the above security measures, please note that due to technical limitations and the complexity of the network environment, it is impossible to guarantee the absolute security of information. If you find that your personal information may have security risks, please contact us immediately through the contact information provided in this privacy agreement, and we will take timely measures to deal with it.​

V. Your Rights​

(I) Right of Access​

You have the right to access the personal information you provide in this application, including account information, loan application information, etc. You can query and obtain a copy of your personal information through the relevant functional interface of this application or contact our customer service staff. ​

(II) Right of Correction​

If you find that your personal information collected and stored by us is wrong or inaccurate, you have the right to ask us to correct it. You can submit a correction application through the relevant functional interface of this application, or contact our customer service staff, and we will correct your personal information in a timely manner after verification. ​

(III) Right of Deletion​

In compliance with the provisions of laws and regulations, you have the right to request us to delete your personal information. For example, if our processing of your personal information violates the provisions of laws and regulations, or your personal information has exceeded the period necessary to achieve the purposes stated in this Privacy Agreement, you can make a deletion request to us. However, please note that in some cases, according to the requirements of laws and regulations or business needs, we may not be able to delete all of your personal information immediately, but we will anonymize your personal information or take other measures to restrict its use. ​

(IV) Right to Withdraw Consent​

You have the right to withdraw your consent to the use of your personal information at any time. You can withdraw your consent through the relevant settings of this application or contact our customer service staff. However, please note that withdrawing consent may affect your use of certain functions of this application. After you withdraw your consent, we will no longer process your personal information based on your consent, but the processing behavior that has been carried out based on your consent will still be valid. ​

(V) Right to complain and report ​

If you have questions or opinions about our personal information processing behavior or believe that our behavior infringes your legal rights and interests, you have the right to complain to us. You can contact us through the contact information provided in this privacy agreement. After receiving your complaint, we will promptly investigate and handle it, and feedback the processing results to you within a reasonable period of time. ​

VI. Protection of minors ​

This application does not provide services for minors, and we will not intentionally collect personal information of minors. If we find that we have collected personal information of minors, we will immediately take measures to delete the information. If you are the guardian of a minor and find that a minor has used this application without your consent and provided us with personal information, please contact us in time and we will assist you in handling it. ​

VII. Changes to the Privacy Policy ​

We may revise this privacy agreement based on changes in laws and regulations, business development or other reasons. The revised privacy agreement will be published in this application, and the publication date shall be the effective date of the revision. If the revised privacy agreement has a significant impact on your rights, we will notify you through appropriate means (such as push notifications, pop-up prompts, etc.). After the revised privacy agreement takes effect, your continued use of this application shall constitute your consent to be bound by the revised privacy agreement. ​

VIII. How to contact us​

If you have any questions, comments or suggestions about this privacy agreement or our privacy protection measures, or if you need to exercise your relevant rights, please contact us through the following methods:​

Contact email: STELLARDASH@outlook.com

Contact phone: +255 794773270

Mailing address:Dar Es Salaam, Kinondoni, Mikocheni, 14112, room number 101, first floor ,T G B Building near by Dar es Salaam Tumaini University, Coca Cola road, light industrial area, mikocheni, Kinondoni, DSM.

We will contact you as soon as possible after receiving your feedback and handle your issue. Generally, we will reply to your email or telephone consultation within [specific working days]. ​

IX. Other Terms​

(I) Dispute Resolution​

The signing, performance, interpretation and dispute resolution of this Privacy Agreement shall be subject to Tanzanian law. If the parties have a dispute during the execution of this Privacy Agreement, they shall first be resolved through friendly negotiation; if the negotiation fails, either party shall have the right to file a lawsuit with the People's Court with jurisdiction. ​

(II) Severability of Terms​

If any provision of this Privacy Agreement is deemed invalid or unenforceable, it will not affect the validity and enforceability of other provisions. We will try our best to modify the invalid or unenforceable provisions to make them comply with the requirements of laws and regulations and be as close to the intention of the original provisions as possible. ​

(III) Notice Delivery​

The notice we send to you may be sent by push notification in this application, sending emails, text messages or mailing letters. The notice shall be deemed to have been delivered to you within [specific number of days] from the date of sending. The notice you send to us shall be sent in accordance with the contact information provided in this Privacy Agreement, and the notice shall take effect from the date we receive it.​

STELLAR DASH INVESTMENT COMPANY LIMITED