Mirakash
menu

Privacy Policy


Permissions Disclosure
At Mirakash, we are committed to ensuring your privacy and transparency in accordance with the Zambia Data Protection Act No.3 of 2021 and other pertinent legislation. In order to ensure a smooth loan acceptance process and ascertain your eligibility, we require specific permissions to access specific data from your device. Our services are exclusively provided by securely transmitting, storing, and utilizing all collected data. Your information will not be disclosed to any third parties without your informed consent.

SMS authorizations
In order to more accurately ascertain your eligibility for a loan, we need access to your SMS communications. This enables us to evaluate your trustworthiness by analyzing all of your SMS records, including sender names, transaction descriptions, and volumes, in addition to financial ones. However, no other data will be transmitted or processed; financial SMS data will only be provided after it has been filtered by a system. By examining this data, we can increase the likelihood of obtaining loans and expedite the approval proces.
Methods for Accessing and Utilizing SMS Data:
1. Initial Access: Upon your confirmation of this permissions page and the granting of SMS access, our application will automatically begin analyzing your SMS data. However, no data will be transmitted at this time. The objective of this segment is to conduct an initial credit investigation.
2. Ongoing Access: The program will accrue a few thousand messages' worth of recent SMS data each time you select the "Apply" icon to request pre-approval for a few months. The primary focus will be on communications that are related to financial activities.
3. Selective Upload: Financial terms will be uploaded for review in text messages. To prevent repetition, communications that have already been submitted will not be published again.
4. If the "Apply" icon is not selected, SMS data will be stored on your device rather than transmitted to our servers.
We are committed to safeguarding your privacy and will never disclose your SMS information to any third party without your explicit consent. That is why all SMS data is securely stored on our servers and transmitted using industry-standard encryption.

Notifications
We reserve the right to send you notification alerts regarding payment reminders, special offers, and substantial account changes. The functionality of your application will not be affected by failing to respond to these notifications.

Contact Information for Emergency Situations
We are requesting access to two emergency contacts in order to verify identity and prevent future fraud. These contacts may be manually entered or selected from your address book. We will only have access to the contacts you have selected; we will not extract any other information from your address book without your consent. Additionally, our servers securely store this data, which is transmitted over HTTPS.

Specifications of the Device
We collect device information each time you choose to apply through the homepage in order to verify your identity and prevent deception.This data includes the device model name,settings,and unique identifiers,as well as the following:display and brightness settings,CPU and performance details,operating system version,brand,code,model,IMEI,serial number,development mode status,screen dimensions,time zone,default language,and other relevant device environment details.We also collect data on the applications that are installed on your device;however,this is limited to financial applications.The data that is gathered comprises the program name,version number,installation date,most recent update date,and whether the application is pre-installed on the system.This data allows us to identify and evaluate any potential threats,thereby preventing the implementation of malicious software and ensuring the stability of financial accounts.It is imperative that we refrain from utilizing or gaining access to data from applications that are not classified as financial.This information will not be processed or transmitted if you opt not to select"Apply"on the homepage.To prevent unauthorized access,all information that is collected is securely stored on our servers.

Network Information
1. GAID/ADID: To optimize your advertising experience, we analyze ad data with your Google Advertising ID (GAID).
2. ACCESS_WIFI_STATE:In order to evaluate risk and detect any anomalies, we gather data regarding your Wi-Fi network.
3. ACCESS_NETWORK_STATE: In order to evaluate risk and minimize data loss during network failures, we collect your network information, which includes your IP address, connection status, and network type.
4. The network type, SIM provider, SIM country ISO, and mac address are all additional details.

KYC
While you are utilizing our services, we may request specific personally identifiable information from you, which could be used to identify or otherwise contact you.
-Phone number
-Email address
-Name
-Gender
-The date of birth
-The identity document's identification number
-Instructional abilities
-The marital status
-information regarding occupations
-Address information

List of Applications
It is essential to evaluate and ascertain your risk level in order to expedite the loan processing process and prevent fraud, as we employ your list of mobile applications to assess your operating system and detect concealed malware software. Illicit software may be employed to steal your money as a result of a virus infection.
This information will be collected to prevent unauthorized access to your personal information, enhance fraud prevention, protect account security, and verify that you are the authorized user of your account. The installation package's version number, installation time, last update time, package name, and app name will be collected.
Data Security Methodology:
Your data will never be disclosed to a third party without your explicit consent. The HTTPS server will securely transmit the data after it has been satisfactorily encrypted.

What is the location?
1. Permission Usage Purpose: In order to safeguard our platform and users' accounts, we require access to their approximate location data. This authorization is essential for the security of our services and the privacy of our users, as it restricts access to the storage of their precise location data, thereby identifying and preventing potential offshore money laundering, unauthorized access, and other forms of malfeasance.
2. Data Utilization: The application employs approximate location data to identify and notify any anomalous actions that a user might take when attempting to log in or use the service from a location that is different from their usual area of activity. This prevents unauthorized offshore access, thereby protecting user accounts from viruses and deception.
3. Data Protection Mechanisms: We assure you that your SMS messages will be encrypted and transmitted via HTTPS. Your data will never be disclosed to a third party without your explicit consent.

Video camera
In order to ensure the efficiency of our service process, we must obtain your consent to use the camera on your smartphone. Upon receiving your authorization, you may submit your identification documents and facial photographs directly to our website to complete the KYC (Know Your Customer) verification process. We guarantee that we will not access or store any supplementary images or videos on your device. It is essential that we request your authorization before providing image capture and updating services.

Data Storage and Security
All data that has been collected is securely transmitted to our servers using state-of-the-art encryption and security protocols. Unless you provide explicit consent, your data will not be disclosed to any other parties. However, if you choose not to register, the data will not be submitted.
We collect personal information, such as your name, phone number, operating system, and device model. Additionally, we accumulate SMS, device activity, and address information. Our credit assessment may be enhanced by utilizing data from financial institutions. By utilizing our services, you consent to the collection, processing, and secure storage of data.

Information Utilization
The following two methodologies are employed to obtain your personal information:
1. We may collect and retain any information you provide when using our financial services, including when filling out online forms, applying for products and/or services, providing feedback, resolving disputes, or contacting us regarding our financial services. This pertains to information that has been explicitly contributed. Additionally, we may collect and retain the data generated about your transactions and activities while you are using our services. Utilization data is routinely collected during the course of utilizing the service.
2. Proactive data collection: We gather information from your smartphone, computer, and other access devices when you use our website, application, and associated services.
Our Methodology for Utilizing Your Data
By employing the data we have collected, we:
-Verify your identity.
-Create credit assessment models.
-Evaluate loan applications and manage credit reports.
Oversee the collection and payment procedures.
This information can be used to evaluate and qualify your creditworthiness, validate your identification, assess the risk associated with your credit request, and conduct statistical analysis, as discussed in the subsequent section.

The exchange and transmission of data
The following conditions must be satisfied in order for Mirakash to transmit or communicate personal data:
1. Objectives of Mirakash Group entities, affiliates, or subsidiaries: Conduct statistical analysis, enhance service quality, evaluate performance, and develop new products.
2. The objective of service providers, who are independent third parties, is to simplify the provision of credit-related services.
3. The primary objective of governmental, judicial, or administrative authorities is to comply with legal requirements or court mandates.
4. The primary objective of software suppliers, information security, and risk management is to ensure security and prevent fraud.
5. Commercial Affiliates: The objective is to promote.

We are capable of providing loan services that are secure, transparent, and efficient, and that meet your financial needs, with your assent. The data acquisition, utilization, and dissemination procedures described in this disclosure are authorized by your use of the Mirakash.

In order to safeguard your privacy, we have implemented the following policies concerning data acquisition and utilization.

1. COMMON EXPERIENCES OF USERS
1.1 Comprehensive Background Information
Mirakash ("we", "us", or "our") is committed to providing the highest quality of service. We have consistently placed a high priority on the protection of your personal information and privacy.
1.2 What criteria are employed to evaluate this privacy statement?
Please refer to our privacy statement and Terms of Use for additional information regarding the creation and operation of your Mirakash account (your "Account"), the management of any personal information you provide through the Mirakash applications (the "Apps"), and the utilization of our lending services (collectively, the "Services," which encompass the Apps and your Account). I am confident that you will read the entire document.
To ensure that you are fully informed of our policies and guidelines regarding the use of your personal information, it is highly recommended that you peruse the literature that is attached.
Please refer to our Terms of Use for further details on the services' general utilization guidelines.
Please do not hesitate to reach out to us if you have any queries or concerns about our privacy policies or policy. You can reach us at client_support@mirakashlend.com or through the Apps.
1.3 Current Events and News
To guarantee that your personal information is handled with the utmost security, we conduct routine evaluations of this policy and our privacy policies. You acknowledge that it is your responsibility to conduct routine reviews of the Terms of Use and this Privacy Policy to ensure that you are informed of the most recent version and any subsequent modifications.

2. DATA THAT MAY BE NEGLECTED
A specific amount of your personal information must be collected, preserved, exchanged, examined, and managed in order to provide you with the services. This section of the policy provides a comprehensive explanation of the information we will collect about you and the circumstances under which it will be used.
2.1 Identity Verification Requirements for Account Activation
During the initial stages of account creation, access to services will be restricted. However, we must first verify your identification in accordance with the law before granting you access to all services and fully activating your account. We require your Zambian ID and any additional documentation that may be required for this purpose. We would like to remind you that it is your responsibility to promptly notify us of any changes to your personal information. It may be necessary to re-verify your identity.
2.2 Transactional data
When you utilize our services to borrow money or engage in any other service-related transaction, we gather information regarding your creditworthiness and the lending transaction. The information that may be necessary includes your personal information, employment and income details, credit history, debt-to-income ratio, collateral details, loan purpose, amount, and terms, bank account details, residential details, references, and any information regarding co-signers or guarantors.
2.3 The Character's Background
For example, in order to determine which account to debit and whether to grant credit, we will collect information about your income, employment, and bank account. We will verify your identity, phone number, emergency contact details (including name, relationship to you, and phone number), bank account details, and previous credit repayment history before granting you additional credit through the Apps. In the event that you fail to pay the credit or comply with the service's terms and conditions, we may also disclose your information to third parties, including debt collection agencies.
2.4 Customer Preferences
We may use your consent to send you emails or other marketing materials, depending on your preferences. We can acquire a more comprehensive understanding of your preferences by observing your interactions with and responses to our marketing messages. It is possible to revoke your consent at any moment.
2.5 Requests for information or inquiries regarding expenses
If you wish to submit a complaint about our services, notify an issue (such as a problem with the applications), or contact us with inquiries, this personal information will be promptly added to your account.
2.6 Data from service providers facilitate automated decision-making.
Verification experiments are facilitated by a third party, as previously mentioned. Please be advised that we may receive personal information that is generated during the verification process. Automated decision-making is implemented by our organization and its collaborator during verification evaluations. Could you provide further information regarding this matter? Pertinent personal information is evaluated as part of the automated decision-making process to evaluate your identification. If the computerized decision-making process is unable to fully verify your identification, account authorization will be denied.
2.7 Applications, cookies, and technical information
In order to gain a more comprehensive understanding of the way in which our consumers perceive the services and applications, including their attractiveness and unattractiveness, we collect information about your usage patterns, including the services and/or applications you use and the frequency with which you use them. This information may include your IP address, operating system, platform, browser plug-in types and versions, and, if applicable, your registration information.
2.8 During the device's operation
To access the program, the user must provide technical information and unique identifiers, such as their mobile device's IMEI number, MAC address, or phone number. Additionally, the mobile browser version, mobile network, time zone, and operating system of the device must be specified. Additional requirements include emergency contacts, call and text message records, and any supplementary digital content that the user wishes to incorporate.

3. THE METHOD BY WHICH WE MANAGE YOUR PERSONAL DATA
It is essential to emphasize that we exclusively manage your personal information in accordance with the law. This section provides a comprehensive explanation of the legal defenses we employ and the rationale behind our use of your personal data, including local data protection laws.
3.1 To ensure that the website and services are accessible to clients
3.1.1 The following protocols are in effect to safeguard your personal information:
(1) By linking your account to a third-party website, the value of your account will be increased.
(2) Ensure that the applications are accessible.
3.1.2 Your information is processed using the following legal justifications:
(1) We are authorized to market our services to you and other users, provide lending-related services, and promptly update our data in compliance with all relevant laws, responsibilities, and regulations. Additionally, we are authorized to operate and enhance the Services and Apps.
(2) Is it imperative that I execute a contract with you and satisfy your requirements prior to its implementation?
(3) Completing identification verification and other relevant procedures to satisfy our legal obligations.
3.2 To protect your accounts, funds, and offerings
3.2.1 The following procedures are implemented to manage your personal information:
(1) To identify hazards, prevent misconduct, and manage them effectively. The use of personal data is intended to safeguard your identity, finances, and personal information. It also helps us fulfill our legal responsibilities in the context of financial offenses, such as fraud.
(2) In order to ensure the security and safety of our services, operational verifications are conducted both internally and externally. We reserve the right to investigate any suspected violations or questionable activity to ensure that you are not in violation of the law or our terms of service.
3.2.2 The following legal justifications are employed to process your information:
(1) We have a legitimate interest in protecting our services, our affiliated companies, your account funds, any necessary third parties, and ourselves from security-related attacks that could be detrimental.
(2) In the event that we are obligated to adhere to your instructions prior to the execution of the contract in order to conduct a transaction with you in a satisfactory manner;
(3) fulfilling our legal obligations, which encompass the necessity of atoning for financial malfeasance;
For example, it may be necessary to investigate hazardous behavior in order to safeguard your interests or those of another individual.
3.3 I am eager to forge a connection with you and am enthusiastic about the opportunity to engage in conversation.
3.3.1 We are committed to safeguarding the privacy of your personal data:
(1) The purpose of this message is to inform you of any potential fraudulent activity that may be associated with your account or to address any recent inquiries that you have submitted.
3.3.2 The following legal bases are employed to process your information:
(1) It is still feasible to safeguard your account, your funds, our services, our business network, and any pertinent third parties.
(2) If it is imperative to fulfill your requirements and implement a contract with you in a fair manner prior to its enforcement; and
(3) It is essential that we obtain identity validation and other forms of verification in order to properly fulfill our legal obligations.
3.4 To disseminate advertisements
3.4.1 We are committed to safeguarding the privacy of your personal data:
(1) To provide you with promotional materials that may contain information regarding the supplementary services that our businesses or we provide.
3.4.2 The following legal justifications are employed to process your information:
(1) If you have authorized the occurrence of an event, then
Our legitimate objective of introducing you and others to our services is promptly rendered incompatible by two circumstances.
3.5 Improve, modify, and enhance our services and applications
3.5.1 We are committed to safeguarding the privacy of your personal data:
(1) We aim to gain a more comprehensive understanding of your preferences for our services and applications by analyzing your usage patterns. In addition, we may monitor your use of the applications and services to prevent you from overlooking any promotions or discounts. For instance, we may contact you if you have not used the Apps in a while or if you have not communicated with one of our online enterprises using the data we have collected.
(2) To address any questions you may have, and
(3) To enhance and personalize our services and applications.
3.5.2 The legal justification for the use of your information to accomplish the aforementioned objectives is provided by the following sources:
(1) We are sincerely committed to the provision of lending-related services and/or applications, the administration and enhancement of these services and/or applications, the advertisement of our services to you and others, and the maintenance of accurate records in accordance with all pertinent laws, obligations, and regulations.

4. NOTICE REGARDING THE PROTECTION OF PRIVATE DATA
In order for your personal information to be disclosed, the following conditions must be satisfied:
4.1 Your consent is required for the disclosure of your personal information.
4.2 We reserve the right to share your personal information with other service users to ensure that you both receive the utmost benefit from the services we provide. Additionally, our services facilitate the exchange of personal information with other service users.
4.3 By incorporating your private information into your public profile on the Apps, you authorize other users to access and utilize it.
4.4 Our organization may share your personal information with specific service providers, partners, or group companies to facilitate the execution of services such as money transfers, in-app services, transaction management, and verification checks. We may occasionally require a partner to have access to your entire account and financial data, contingent upon their performance.
4.5 We may grant specific service providers or group companies access to your personal information to assess the services and implement the necessary changes to ensure the utmost quality for you and others.
4.6 We may be required to disclose your personal information in order to address valid claims or legal actions of law enforcement, regulatory agencies, officials, or other entities, or to comply with a legal requirement.
4.7 In the event of a merger, acquisition, or other restructuring, we may disclose your personal information to a third party that is responsible for its processing.
The storage of your transaction and other account information will be regulated by Zambian consumer protection laws and financial industry regulations. If any of the aforementioned circumstances provide a valid reason for the transfer of your personal data to a country other than the one from which it was originally acquired, we will ensure that the relevant data privacy regulations are strictly adhered to. In addition to discussing the potential for cross-border data sharing and the participation of the countries, we will also provide a comprehensive overview of the legal framework for the transmission of personal data. We guarantee that your personal information will be protected to the same degree, regardless of your current location.

5. THE PROTECTION OF YOUR PERSONAL INFORMATION
Our primary objective is to safeguard your privacy. To achieve this, we have instituted appropriate security protocols. We are committed to safeguarding your data from unauthorized access, alteration, disclosure, and use, as well as from inadvertent loss or injury.
In addition, as previously mentioned, we apply access restrictions to agents, contractors, employees, volunteers, and other relevant third parties. These parties are accountable for the protection of your personal data and will only utilize it in accordance with our policies.
We regret to inform you that the security of data transmitted via the internet cannot be guaranteed. Despite our best efforts, we are unable to guarantee the security of any personal information you submit through our services. You are responsible for the data you transmit. We will promptly deploy stringent security measures to prevent unauthorized access, disclosure, use, and modification of your data upon its receipt.

6. TERMS THAT DIRECT THE STORAGE OF YOUR PERSONAL INFORMATION
6.1 Your information will be retained on file for the specified duration to fulfill the purposes for which it was collected, which include reporting, accounting, tax, and legal obligations.
6.2 When determining the appropriate retention period for personal data, it is important to consider the volume, nature, sensitivity, potential harm from unauthorized use or disclosure, the reasons for processing the data, whether those purposes can be achieved through alternative methods, and any applicable legal, regulatory, tax, accounting, or other requirements.
6.3 Our findings indicate that:
6.3.1 We will retain your financial information for a maximum of six years following the date of your most recent transaction, or for a protracted period if it falls within the retention term specified below, as permitted by relevant laws, including anti-money laundering regulations.
6.3.2 All pertinent data, including personal and transactional data, will be permanently deleted six years following the cancellation date.
6.4 We may retain your personal information for an extended period in connection with our relationship with you and/or your use of the Services if there are reasonable grounds to suspect that legal action or other regulatory enforcement action is imminent or in the event of a complaint.

7. YOU ARE AWARENESS OF YOUR LEGAL RIGHTS
7.1 This can be accomplished by satisfying specific criteria and adhering to jurisdictional restrictions:
In order to access your personal information, you must submit an application. By successfully completing this step, you can verify that we are lawfully processing your personal information and obtain a copy of the data we currently have on file.
7.2 We respectfully request that you revise the personal data that we currently have on file in response to your request. This will enable you to amend any inaccurate or incomplete information we may have about you. However, any new information you provide may necessitate substantiation.
7.3 You have the right to request the erasure of your personal information if you are not in debt. If there is no legitimate reason for us to retain your personal information, you may request that it be removed from our records. If you have successfully exercised your right to object to processing (see below) or believe that we have processed your information unlawfully, you are entitled to request the erasure of your data in accordance with local legislation.
7.4 You have the right to object if you believe that the processing of your personal data violates your fundamental freedoms and rights due to circumstances that are unique to you. In this case, we will make a decision that is consistent with the legitimate interests of either ourselves or a third party. Additionally, you have the right to object to the use of your personal information for direct marketing purposes.
7.5 We respectfully ask that you limit the amount of personal information we use. You have the right to request that we stop processing your personal data in specific circumstances.
7.6 Request the transfer of your personal information to you or another individual. Your personal information will be transmitted to you or a designated third party in a structured, machine-readable format.
7.7 You have the right to revoke your consent at any time if we use your personal information for any purpose.
7.8 It is imperative that any data protection concerns be reported to the appropriate authorities. We strongly urge you to contact us promptly in order to rectify any issues before they are brought to the attention of the regulator. Your assistance would be greatly appreciated.

If you wish to utilize any of the privileges outlined above, please reach out to us using the information provided.
Please be advised that we may need to request specific information from you in order to verify your identity and ensure that you can exercise your rights. This security measure was implemented to prevent the acquisition of personal information by unauthorized parties. In order to ensure that we can act promptly, we may need to contact you to obtain additional information.
The evaluation of petitions that are exceedingly complex or have been submitted multiple times may exceed one month, but we make every effort to address legitimate inquiries within a month. We will ensure that you are regularly informed of any new developments and receive pertinent information.

8. CONTACTS WITH ANOTHER INTERNATIONAL
Please be advised that this website and its services may include programs, plug-ins, and links to external websites. By clicking on these links or allowing these connections, you are granting third parties the right to collect and distribute personal information about you. We are unable to be held responsible for the privacy policies of these third-party websites, plug-ins, or applications, as we have no control over them. It is essential that you review the privacy policies of each website or program you use before departing.