DATA PROTECTION & PRIVACY POLICY

Inclusive Money Technology Limited

Trading as ‘Digmo’

Republic of Zambia Registration Number: 120230060434

Registered Office: Suite FF 08, Lusaka, Zambia


1 PURPOSE


The Policy is developed to describe the fundamental principles that all Employees, Directors, Contractors, and Customers of Inclusive Money Technology Limited must fully comply with regarding the protection and privacy of personal/sensitive data in line with relevant regulations.

     

2 POLICY STATEMENT

This document is the property of Inclusive Money Solutions Limited (“the Company”) of Lusaka, Zambia and is for the sole use of individuals working for the Company or on its behalf. The Company is committed to protecting the privacy and personal information of its customers, employees, contractors and third parties. We fully subscribe to the letter and spirit of the Data Protection Regulation in Zambia, applicable international convents, and other policy statements in this direction. We are committed to reviewing our Data Protection & Privacy strategies and objectives on an on-going basis and to maintain effective compliance framework.

This policy manual is binding and should be used in conjunction with every other existing policy of the company. Every member of staff is enjoined to study the manual thoroughly for effective understanding of its contents and actualization of the company’s objective to comply with the guidance in the manual. We must all work together to safeguard the Personal Data of our customers and colleagues from unsolicited exposure and leaks.

3 INTRODUCTION

Inclusive Money Technology Limited is committed to treating personal information of employees, customers, and other stakeholders with paramount care and confidentiality. In line with our commitment and compliance with the Data Protection Regulation (DPR) Act No. 3 of 2021, we have developed our Data Protection & Privacy Policy (DPPP). The Policy emphasises our resolve to ensure that we gather, store and handle data fairly, transparently and with respect towards Data subject’s rights.


4 DEFINITIONS

“Consent”

Means any freely given, specific, informed, and unambiguous indication of a data subject’s wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her.


“Data Subject”

Means an identifiable person, one who can be identified directly or indirectly, by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural, or social identity.


“Data Breach”

A data breach is a security incident in which information is accessed without authorisation.


“DPIA”

Data Protection Impact Assessment


“DPPP”

Data Protection & Privacy Policy


“DPR”

Data Protection Regulation Act


“Personal Data”

Means information that can be associated with an identified or directly or indirectly identifiable natural person.

5 ROLES AND RESPONSIBILITIES OF SENIOR MANAGEMENT

In compliance with the DPPP, the Company has identified key stakeholders and their responsibilities to drive the operationalisation of the Policy and implementation of necessary data protection controls.

5.1 Board

  • To set the tone at the top on Data Protection and Privacy;
  • To approve all policies regarding the implementation of the Data Protection Regulation Act;
  • and to provide effective governance functions on DPR compliance obligations.

5.2 Management

  • To approve frameworks, programs, processes, and procedures regarding the implementation of the Data protection and privacy policy;
  • To ensure that data protection objectives are established and are aligned with the strategic direction of the company;
  • Ensure that the resources needed for the protection of Personal Data are available;
  • Communicate the importance of effective data protection in the Company and of conforming to its requirements;
  • Ensure that the Company meets the obligations of the Regulation.

5.3 Employees

  • To fully comply with the requirements of the policy;
  • To report any data breach to senior management within 24 hours of being aware of it.

6 DATA PROTECTION GOVERNANCE

When personal data is collected and processed from our data subjects, such data is used in accordance with the extent to which data protection regulation in Zambia allows. Personal Data is handled with the greatest care and is used only for legitimate and specified business purposes.

6.1 Principles for Handling Personal Data

The Company will be guided by the following principles when handling Personal Data:


Lawfulness, Fairness and Transparency

The company processes personal data of Data Subjects based on consent, contract, legal obligation, vital interests, public task, or legitimate interest. Where data is processed based on the Data Subject’s consent, evidence of opt-in consent are kept with the Personal Data.

Purpose Limitation

We collect Personal Data of Data Subjects for specified explicit and legitimate purposes.

Data Minimization

We only process adequate data for relevant purposes and in a limited capacity.

Accuracy

We maintain accurate data that is continually kept up to date. Similarly, inaccurate Personal Data is either erased or promptly rectified.

Storage Limitation

We keep Personal Data of our Data Subjects in a form that permits identification of Data Subjects for no longer than is necessary and for the purposes in which the Personal Data are being processed.

Integrity and Confidentiality  

We protect Personal Data by implementing appropriate technical and organisational measures to ensure appropriate security, in order to safeguard the rights and freedom of Data Subjects.

Accountability

We hold ourselves accountable to demonstrate compliance with applicable legal and regulatory requirements and understand our roles and responsibilities for efficient data protection.

Ultimately, our policy is implemented in order to abide by the DPR and to assist the government in fostering safe conduct of transactions involving the exchange of Personal Data by customers/clients of both public and private organisations in Zambia.

7 DATA SECURITY AND STORAGE

To safeguard Personal Data of Data Subjects, we apply the following information security measures:

7.1 Network Access Control

To prevent unauthorised access that may lead to data breach through our network, only devices on our access control lists have the permission to utilise our networks.

7.2 Intrusion Prevention System

To protect Personal Data and sensitive information, we have implemented an Intrusion Prevention System in the form of a firewall solution. Our firewall solution protects our network and connected systems from malicious attacks and hacking from cybercriminals by filtering and blocking unwanted data packets from accessing our computer network.

Our Next-Gen firewall solution has a pre-emptive approach to network security as it can identify potential threats and respond to them swiftly. When a threat is detected, the firewall solution deploys a lateral movement protection defence response, which isolates the threat from spreading, and system from communicating with other systems or returns the threat back to the host.

7.3 Endpoint Security System

We have installed an endpoint protection system that combines antimalware, Data Loss Prevention (DLP), firewall, application, and device control as well as a host-based intrusion prevention system.

This also offers website browsing protection and filtering, email protection (such as anti-spam) and patch assessment.

Our endpoint protection system offers protection from zero-day attacks and drive-by downloads, includes root cause analysis and anti-exploit technology to minimise damage from breaches, and incorporates Crypto-Guard to protect against ransomware.

7.4 Data Backup

Backups in our organisation are daily and done automatically. Backups are encrypted with industry standard solutions and backed up data can only be accessed by authorised personnel for control purposes.

7.5 Offsite Protection

Our devices are also protected for offsite use, as we support our staff working remotely. Our endpoint security system extends to registered devices which can communicate over the internet only through our Virtual Private Network (VPN). This means that our staff can work from any location with their provided devices and are still under the security controls applicable to those within the organisation premises.

7.6 Hardware Encryption

Our computers and other mobile devices are encrypted to prevent their storage drives from being accessible in the event of loss or theft.

7.7 Physical Security

To mitigate the threat of data loss that could arise from a physical breach at our premises, we have, apart from human security services deployed, the use of CCTV and round the clock surveillance systems in strategic locations.

Our entry points are secured with biometric scanners for access authorization. Fire alarm systems are also present in the case of arson or accidental fire outbreak. Documents stored in hard copies are secured in a code-enabled cabinet and accessible to only authorised personnel who keep logs of collected and returned documents.

Our information security policies and practices apply to all personal information in our custody.

8 THIRD PARTY DATA PROCESSING

8.1 Disclosure to Employees

Employees have access to, and process Personal Data based upon a “need to know” basis to do their job. We regularly check who has access to our systems and data.

8.2 Disclosure to Third Parties      
                                                                                                                                                                                                                                                                                                                                                                                                                                                       

We may disclose Data Subject’s Personal Data to these categories of third parties some of which may be subject to the Data Subject’s consent.

  • Our service providers and agents e.g., marketing agencies, research specialists, tax advisers etc.
  • Clients or partners who provide us with Data Subject’s Personal Data.
  • Persons legally authorised to act on our behalf e.g., Lawyer, Insurance Company, etc.
  • Individuals nominated and authorised by the Data Subject to engage us on his/her behalf.
  • Regulatory and law enforcement agencies.
  • Customer relationship management.
  • Independent customer satisfaction survey providers.
  • Financial organisations and advisers.
  • Credit reference agencies.
  • Government and its agencies.
  • Selected third parties in connection with the sale, transfer, or disposal of the business or in connection with employee assessment, academic records verification and employee well-being survey.

The above disclosures to the third party shall be made only to the extent necessary for the specific purpose for which the data is provided. The third party shall be informed of the confidential nature of such information and shall be directed to keep the Data Subject’s information strictly confidential.

9 DATA PRIVACY BREACH

Staff members are obligated to bring to Management’s notice any data breach occurrence within 24 hours which shall in turn be reported to Bank of Zambia within 72 hours of knowledge of the breach.

The report details shall include;

  • A description of the circumstances of the loss or unauthorised access or disclosure;
  • The date or time period during which the loss or unauthorised access or disclosure occurred;
  • A description of the personal information involved in the loss or unauthorised access or disclosure;
  • An assessment of the risk of harm to individuals as a result of the loss or unauthorised access or disclosure;
  • An estimate of the number of individuals to whom there is a real risk of significant harm as a result of the loss or unauthorised access or disclosure;
  • A description of any steps the organisation has taken to reduce the risk of harm to individuals;
  • A description of any steps the organisation has taken to notify individuals of the loss or unauthorised access or disclosure; and
  • The name and contact information of the DPO to answer, on behalf of the organisation, questions about the loss of unauthorised access or disclosure.

10 INTERNAL SANCTIONS

All employees are enjoined to ensure that they do not indulge in activities that can result in the compromise or breach of data. In addition, it is the responsibility of everyone to adhere to the dictates of this policy.

Failure to comply with this policy, whether or not intentional, will lead to disciplinary action (up to and including dismissal).

11 TRANSFER TO A FOREIGN COUNTRY

Data Subjects’ personal information may be transferred to a third party in a foreign country which has adequate data protection laws for data transfer, as will  be determined by the Bank of Zambia and/or subject to the Data’s subject’s consent. Data Subjects are informed of the appropriate safeguards for data protection in the foreign country.

Where the Bank of Zambia has not determined the third-party country, the Data Subject’s personal information may be transferred to a third party in a foreign country in the following circumstances:

  • The Data Subject has consented to the proposed transfer after having been informed of the possible risks of such transfers.
  • The transfer is for the performance of a contract between the Data Subject and Inclusive Money Technology Limited.
  • The transfer is for the performance of a contract concluded in the interest of the Data Subject between the Company and another natural or legal person.
  • The transfer is for public interest.
  • The transfer is for the establishment exercise or defence of legal claim.
  • The transfer is to protect the vital interest of the Data Subject or other persons, where the Data Subject is physically or legally incapable of giving consent.

12 AWARENESS AND TRAINING

Ultimately, our employees are the most important element of our commitment to the protection of our Data Subjects’ Personal Data. Our employees are involved in every step of the data lifecycle, including sourcing, and receiving Personal Data, processing it in compliance with laws and regulations, employing safeguards, and establishing the means and schedules of retention and deletion. It is therefore imperative that employees understand their role and be committed to safeguarding Personal Data.

Our data protection training programme is designed to be relevant and focused on concrete risks. More importantly, we conduct data protection trainings for employees and management bi-annually; and run regular data protection and information security awareness campaigns. We also share, with employees, other knowledge resources on data protection and privacy, including guidance on ways they can better protect and safeguard Personal Data.

It is imperative that employees understand the significance of protecting Personal Data and respecting privacy rights, with the ability to relate this back to the risks and consequences from an individual perspective.

We remain committed to our goal of ensuring that employees and other stakeholders understand their respective roles and responsibilities for compliance with the DPR.

12 DATA PROTECTION IMPACT ASSESSMENT

At the advent of any project that would involve processing sensitive/high risk data, a data protection impact assessment is conducted. This is to identify possible areas where breaches may occur, and device means of minimising the data protection risks. We also conduct periodic DPIA on our processes, services, and technology to ensure continuous compliance with the DPR.


Our DPIA takes the following form:

  • It describes the nature, scope, context, and purposes of the processing;
  • It accesses necessity, proportionality, and compliance measures;
  • It identifies and assesses risks to Data Subjects; and
  • It identifies any additional measures to mitigate those risks.

The level of risk is accessed by considering both the likelihood and the severity of any impact on our Data Subjects. The Risk and Compliance department is responsible for conducting DPIA.

13 INTERNAL AUDIT

The company shall conduct regular internal audits of our privacy and data protection practices to ensure compliance.

14 PRIVACY POLICY

The privacy of our Data Subjects’ Personal Data is of utmost importance to us.  In line with our resolution, we have developed this Privacy Policy to explain your privacy rights regarding our collection, use, sharing and protection of your Personal Data when you visit our website, premises or use our digital platforms.


This privacy policy between the Company and you constitute our commitment to your privacy on all our platforms. It is designed to provide information regarding our privacy practices and help you understand how we handle your data.

14.1 Consent

You accept this privacy policy when you give consent upon access to our platforms, use the services offered on our website and digital platforms or visit any of our offices for official or non-official purposes.

What Personal Data do we collect?

We collect Personal Data about you when you use the services offered on our website and digital platform, including the following:

  • Sign-up information: When you register to use the services offered on our digital platform, we will collect Personal Data that is necessary to on-board you such as your name, email address, mobile phone number and debit card details. We may require you to provide additional personal details as you use our services.
  • Transaction information: When you use our digital platform to send and receive money, make purchases from merchants, pay bills, and deposit and withdraw cash, we collect information about the transaction, as well as other information associated with the transaction such as amount sent or received, amount paid for products or services, merchant information, including information about your device and geolocation.
  • Participant Personal Data: When you use our services, we collect Personal Data about the other participants associated with the transaction. We collect Personal Data such as name and financial account information about the participant who is receiving money from you or sending money to you.
  • Information from other sources: We may collect information from other sources, such as our social media platforms when you reach out to us to lodge a complaint about our services. However, we will only ask for information required to help us be of service to you.
  • Other information we collect related to your use of our website or Services: We may collect additional information from or about you when you communicate with us, contact our customer support teams or respond to a survey.
  • When you apply for a job with us: We may request Personal Data about your education, employment, and state of health. As part of your application, you will be asked to provide your express consent to our use of this information to assess your application and any monitoring activities which may be required of us under applicable laws as an employer.

We may also carry out screening checks (including reference, background, and criminal record checks). We may exchange your Personal Data with academic institutions, recruiters, health maintenance organisations, law enforcement agencies, referees, and your previous employers. Without your Personal Data, we may not be able to process your application for positions with us. We do not collect the information of minors. If you are under the age of 18, you are not eligible to use the service offered on our digital platform.

How Do We Retain Personal Data?

We retain Personal Data in an identifiable format for our business purposes and to fulfil our legal or regulatory obligations.  We may retain Personal Data for longer periods if it is in our legitimate business interests and required to comply with applicable laws. We will continue to use and disclose such Personal Data in accordance with this Privacy Policy.

What do we do with your Personal Data?

We collect your personal data to provide you an efficient and secure customer experience.

We process your information to:

  • Provide services, including to:
  • initiate a Transfers, Deposits and Payments
  • authenticate your access to an account.
  • communicate with you about your account
  • Manage risk, fraud and abuse of our services and you from fraud by verifying your identity.
  • Comply with our obligations and to enforce the terms of our sites and services, including to comply with all applicable laws and regulations.
  • Trail information breach and remediate such identified breaches.
  • Resolve disputes and troubleshoot problems.


With your consent:

  • Market the Company’s products and services to you.
  • Use cookies to provide a targeted display, feature, service or offer to you.
  • We will not send unsolicited marketing communications to you by SMS or email if you have not opted in to receive them. Additionally, you can withdraw your consent at any time and free of charge.

14.2 Sharing your Personal Data

We may share your Personal Data or other information about you with others for the following reasons:

  • With other companies that provide services to us: We may share Personal Data with third-party service providers that perform services and functions at our direction and on our behalf.  These third-party service providers may, for example, provide you with services, verify your identity, assist in processing transactions, send you advertisements for our products and services, or provide customer support.
  • With other financial institutions: We may share Personal Data with other financial institutions that we have partnered with to only offer the Company services, unless you have given consent for other uses. We may also share Personal Data to process transactions and keep your financial information up to date.
  • With the other parties to transactions when you use the services, such as other users and their service providers. This includes other users you are sending or receiving funds from and their service providers. The information might include:
  • Personal Data and account information necessary to facilitate the transaction; and
  • Personal Data to help other participant(s) resolve disputes and detect and prevent fraud.

With other third parties for our business purposes or as permitted or required by law: We may share information about you with other parties for business purposes or as permitted or required by law, including:

  • if we need to do so to comply with a law, legal process, or regulations;
  • to law enforcement authorities or other government officials, or other third parties pursuant to a court order or other legal process or requirement applicable to Inclusive Money Technology Limited.
  • we believe, in our sole discretion, that the disclosure of Personal Data is necessary or appropriate to prevent physical harm or financial loss or in connection with an investigation of suspected or actual illegal activity;
  • to protect the vital interests of a person;
  • with credit agencies and data processors for credit reference checks and anti-fraud and compliance purposes;
  • to investigate violations of or enforce a user agreement or other legal terms applicable to any service;
  • to protect our property, services, and legal rights;
  • to facilitate a purchase or sale of all or part of the Company’s business;
  • to companies that we plan to merge with or be acquired by; and
  • to support our audit, compliance, and corporate governance functions.

With your consent: We also will share your Personal Data and other information with your consent or direction.

14.3 How We Use Cookies


Cookies are small files placed on your device’s browser that enables the website to identify your device as you view different pages. Like most interactive websites, our website uses cookies to enable the tracking of your activity for the duration of a session. Our website uses only encrypted session cookies which are erased either after a predefined timeout period or once the user logs out of the platform and closes the browser. Session cookies do not collect information from your device. They will typically store data in the form of a session identification that does not personally identify you. Certain aspects of our website are only available through the use of cookies, so your use of our website may be limited or not possible if you choose to disable or decline cookies.

14.4 What Are Your Rights?

Requests to Access, Rectify or Erase

Access Request


You have the right to ask us whether we hold any Personal Data relating to you and, if we do, to be provided with a copy of that Personal Data in electronic form, unless you want to receive it in another way (for example, a paper copy). In addition, you can ask us for information on how we use your Personal Data, who we share it with, how long we keep it, where it is stored, and other information to help you understand how we use it.


Rectification Request

You have the right to ask us to correct your Personal Data (including by means of providing a supplementary statement) if it is inaccurate and to have incomplete Personal Data updated without undue delay. If we cannot correct the Personal Data, we include a note on our files regarding your request to correct your Personal Data.


Erasure Request

You have the right to ask us to erase your Personal Data if:

  • Your Personal Data are no longer necessary for the purpose(s) they were collected for.
  • Your Personal Data have been unlawfully processed.
  • Your Personal Data must be erased to comply with a regulation.
  • You withdraw your consent for the processing of the Personal Data (and if this is the only basis on which we are processing your Personal Data).
  • You object to processing that is based on our legitimate interests, provided there are no overriding legitimate grounds for continued processing, or
  • You object to processing for direct marketing purposes.

If we have made the Personal Data concerned public, we will also take reasonable steps to inform other data controllers processing the data so they can seek to erase links to or copies of your Personal Data.

We may refuse to act on your request to erase your Personal Data if the processing of your Personal Data is necessary:

  • To exercise our right of freedom of expression and information.
  • To comply with the DPR and relevant other Zambian laws.
  • For the performance of a task carried out in the public interest or to exercise official authority vested in us.
  • To establish, exercise or defend legal claims.

In these cases, we can restrict the processing instead of erasing your Personal Data if requested to do so by you.

Requests to Object

You have the right to object at any time to the processing of your Personal Data if we process it based on our legitimate interests. This includes any purported “profiling”. Our privacy notice informs you when we rely on legitimate interests to process your Personal Data. In these cases, we will stop processing your Personal Data unless we can demonstrate compelling legitimate reasons for continuing the processing. We may reject your request if the processing of your Personal Data is needed to establish, exercise, or defend legal claims. You have the right to object at any time if we process your Personal Data for direct marketing purposes. You may also object at any time to profiling supporting our direct marketing. In such cases, we will stop processing your Personal Data when we receive your objection.

Requests to Restrict

You have the right to ask us to restrict the processing of your Personal Data if:

  • You contest the accuracy of your Personal Data and we are in the process of verifying the Personal Data we hold
  • The processing is unlawful, and you do not want us to erase your Personal Data
  • We no longer need your Personal Data for the original purpose(s) of processing, but you need them to establish, exercise or defend legal claims and you do not want us to delete the Personal Data as a result, or
  • You have objected to processing carried out because of our legitimate interests while we verify if our legitimate grounds override yours.


If processing is restricted, we may process your Personal Data (excepting for storage purposes), only:

  • If you have given us your consent
  • For establishing, exercising, or defending legal claims
  • For protecting the rights of another natural or legal person, or
  • For reasons of important public interest as defined under the DPR and other relevant Zambian laws.


Once processing is restricted following your request, we will inform you before we lift the restriction.


Requests for Portability

If our processing is performed by computer and is necessary to fulfil a contract with you, or is based on your consent, you have the right to:

  • Receive any Personal Data you have provided to us in a structured, commonly used and machine-readable electronic format
  • Send your Personal Data to another organization or have us do so for you if it is technically feasible for us to do so.
  • If your request relates to a set of Personal Data that also concerns other individuals, the fact that you request that we port this data as described above does not preclude those individuals from exercising their own rights regarding their Personal Data.
  • Even if you request the portability of your Personal Data, you retain your right to also request their erasure.


Requests to Object to Automated Decisions

Generally, you have the right to object to any decision producing a legal effect concerning you or which otherwise significantly affects you if this is based solely on the automated processing of your Personal Data. This includes automated decisions based on profiling.

We may refuse your request if the decision in question is:

  • Necessary to enter into a contract with you, or for the performance of your contract with us
  • Permitted by regulations, or
  • Based on your explicit consent.

We will only make decisions relying solely on automated processing that involve your sensitive Personal Data if you have given your explicit consent or the processing is necessary for reasons of substantial public interest, based on the DPR and relevant laws.

14.5 How Do We Protect Your Personal Data?


We maintain technical, physical, and administrative security measures designed to provide reasonable protection for your Personal Data against loss, misuse, unauthorised access, disclosure, and alteration. The security measures include firewalls, data encryption, physical access controls to our premises, CCTV cameras for public safety and quality control as well as information access authorisation controls.  While we are dedicated to securing our systems and services, you are responsible for securing and maintaining the privacy of your password(s) and account/wallet/profile registration information and verifying that the Personal Data we maintain about you is accurate and current.

We will inform you of any breaches which may affect your Personal Data.

14.6 Remedies for Violation and Timeframe for Remedy


In the event of violation of this policy, we shall within Seven (7) days redress the violation. Where the violation pertains to the disclosure of your Personal Data without your consent, such information shall be retracted immediately, and confirmation of the retraction sent to you within 48 hours of the redress.

15 GOVERNING LAW


This Privacy Policy is made according to the Data Protection Regulation Act No.3 of 2021 and other relevant Zambia laws, regulations, or international conventions applicable to Zambia.