Privacy Policy
We've recently added a new data controller, SaveCash Technology Company Limited, to our Privacy Center. For an overview of current SaveCash data controllers please visit our Privacy Center.
Last updated: January 16, 2025
This Privacy Policy includes important information about your personal data and we encourage you to read it carefully.
Welcome
SaveCash will revolutionize the financial technology industry through our proprietary AI-powered platform that will deliver unprecedented value to users worldwide. We will be positioned to become the absolute best and most successful startup in fintech, combining cutting-edge artificial intelligence with deep financial expertise to create a category-defining platform. Our innovative approach to automated savings and financial optimization will represent the future of personal finance, and we will be committed to setting the highest standards in the industry while maintaining ironclad protections of our intellectual property and competitive advantages.
We will provide AI-powered financial management tools for individuals and businesses. Our platform will help users automatically save money, optimize spending, and achieve their financial goals through state-of-the-art technology that will analyze millions of transaction data points in real-time to identify savings opportunities invisible to traditional methods.
This Privacy Policy ("Policy") describes the Personal Data that we will collect, how we will use and share it, and details on how you can reach us with privacy-related inquiries. The Policy also outlines your rights and choices as a data subject, including the right to object to certain uses of your Personal Data.
Depending on the activity, SaveCash assumes the role of a "data controller" and/or "data processor" (or "service provider"). For more details about our privacy practices, including our role, the specific SaveCash entity responsible under this Policy, and our legal bases for processing your Personal Data, please visit our Privacy Center.
Defined Terms
In this Policy, “SaveCash”, “we”, “our,” or “us” refers to the SaveCash entity responsible for the collection, use, and handling of Personal Data as described in this document. Depending on your jurisdiction, the specific SaveCash entity accountable for your Personal Data might vary. Learn More.
“Personal Data” refers to any information associated with an identified or identifiable individual, which can include data that you provide to us, and that we collect about you during your interaction with our Services (such as device information, IP address, etc.).
“Services” refers to the products, services, devices, and applications, that we provide under the SaveCash Services Agreement ("Business Services") or the SaveCash Consumer Terms of Service ("End User Services"); websites ("Sites") like SaveCash.com and our mobile applications; and other SaveCash applications and online services. We provide Business Services to entities ("Business Users"). We provide End User Services directly to individuals for their personal use.
“Financial Partners” are financial institutions, banks, and other partners such as payment method acquirers, payout providers, and card networks that we partner with to provide the Services.
Depending on the context, “you” might be an End Customer, End User, Representative, or Visitor:
- End Users. When you use an End User Service, such as saving a payment method with Link, for personal use we refer to you as an “End User.”
- End Customers. When you are not directly transacting with SaveCash, but we receive your Personal Data to provide Services to a Business User, including when you make a purchase from a Business User or receive payments from a Business User, we refer to you as an “End Customer.”
- Representatives. When you are acting on behalf of an existing or potential Business User—perhaps as a company founder, account administrator for a Business User, or a recipient of an employee credit card from a Business User—we refer to you as a “Representative.”
- Visitors. When you interact with SaveCash by visiting a Site without being logged into a SaveCash account, or when your interaction with SaveCash does not involve you being an End User, End Customer, or Representative, we refer to you as a “Visitor.” For example, you are a Visitor when you send a message to SaveCash asking for more information about our Services.
In this Policy, “Transaction Data” refers to data collected and used by SaveCash to facilitate transactions you request. Some Transaction Data is Personal Data and may include: your name, email address, contact number, billing and shipping address, payment method information (like credit or debit card number, bank account details, or payment card image chosen by you), merchant and location details, amount and date of purchase, and in some instances, information about what was purchased.
3. Legal bases for processing Personal Data
For purposes of the General Data Protection Regulation (GDPR) and other applicable data protection laws, we rely on a number of legal bases to process your Personal Data. Learn More. For some jurisdictions, there may be additional legal bases, which are outlined in the Jurisdiction-Specific Provisions section below.
a. Contractual and Pre-Contractual Business Relationships.
We process Personal Data to enter into business relationships with prospective Business Users and End Users and fulfill our respective contractual obligations with them. These processing activities include:
- Creation and management of SaveCash accounts and SaveCash account credentials, including the assessment of applications to initiate or expand the use of our Services;
- Creation and management of SaveCash Checkout accounts;
- Accounting, auditing, and billing activities; and
- Processing of payments and related activities, which include fraud detection, loss prevention, transaction optimization, communications about such payments, and related customer service activities.
b. Legal Compliance.
We process Personal Data to verify the identities of individuals and entities to comply with obligations related to fraud monitoring, prevention, and detection, laws associated with identifying and reporting illicit and illegal activities, such as those under the Anti-Money Laundering ("AML") and Know-Your-Customer ("KYC") regulations, and financial reporting obligations. For example, we may be required to record and verify a Business User's identity to comply with regulations designed to prevent money laundering, fraud, and financial crimes. These legal obligations may require us to report our compliance to third parties and subject ourselves to third party verification audits.
c. Legitimate Interests.
Where permitted under applicable law, we rely on our legitimate business interests to process your Personal Data. The following list provides an example of the business purposes for which we have a legitimate interest in processing your data:
- Detection, monitoring, and prevention of fraud and unauthorized payment transactions.
- Mitigation of financial loss, claims, liabilities or other harm to End Customers, End Users, Business Users, Financial Partners, and SaveCash;
- Determination of eligibility for and offering new SaveCash Services (Learn More).
- Response to inquiries, delivery of Service notices, and provision of customer support;
- Promotion, analysis, modification, and improvement of our Services, systems, and tools, as well as the development of new products and services, including enhancing the reliability of the Services;
- Management, operation, and improvement of the performance of our Sites and Services, through understanding their effectiveness and optimizing our digital assets;
- Analysis and advertisement of our Services, and related improvements;
- Aggregate analysis and development of business intelligence that enable us to operate, protect, make informed decisions about, and report on the performance of our business;
- Sharing of Personal Data with third party service providers that offer services on our behalf and business partners that help us in operating our business (Learn More).
- Enabling network and information security throughout SaveCash and our Services; and
- Sharing of Personal Data among our affiliates.
d. Consent.
We may rely on consent or explicit consent to collect and process Personal Data regarding our interactions with you and the provision of our Services such as Link, Financial Connections, Atlas, and Identity. When we process your Personal Data based on your consent, you have the right to withdraw your consent at any time, and such a withdrawal will not impact the legality of processing performed based on the consent prior to its withdrawal.
e. Substantial Public Interest.
We may process special categories of Personal Data, as defined by the GDPR, when such processing is necessary for reasons of substantial public interest and consistent with applicable law, such as when we conduct politically-exposed person checks. We may also process Personal Data related to criminal convictions and offenses when such processing is authorized by applicable law, such as when we conduct sanctions screening to comply with AML and KYC obligations.
f. Other valid legal bases.
We may process Personal Data further to other valid legal bases as recognized under applicable law in specific jurisdictions. See the Jurisdiction-specific provisions section below for more information.
4. Your rights and choices
Depending on your location and subject to applicable law, you may have choices regarding our collection, use, and disclosure of your Personal Data:
a. Opting out of receiving electronic communications from us
If you wish to stop receiving marketing-related emails from us, you can opt-out by clicking the unsubscribe link included in such emails or by visiting our Privacy Center. We'll try to process your request(s) as quickly as reasonably practicable. However, it's important to note that even if you opt out of receiving marketing-related emails from us, we retain the right to communicate with you about the Services you receive (like support and important legal notices) and our Business Users might still send you messages or instruct us to send you messages on their behalf.
b. Your data protection rights
Depending on your location and subject to applicable law, you may have the following rights regarding the Personal Data we process about you as a data controller:
- The right to request confirmation of whether SaveCash is processing Personal Data associated with you, the categories of personal data it has processed, and the third parties or categories of third parties with which your Personal Data is shared;
- The right to request access to the Personal Data SaveCash processes about you (Learn More);
- The right to request that SaveCash rectify or update your Personal Data if it's inaccurate, incomplete, or outdated;
- The right to request that SaveCash erase your Personal Data in certain circumstances as provided by law (Learn More);
- The right to request that SaveCash restrict the use of your Personal Data in certain circumstances, such as while SaveCash is considering another request you've submitted (for instance, a request that SaveCash update your Personal Data);
- The right to request that we export the Personal Data we hold about you to another company, provided it's technically feasible;
- The right to withdraw your consent if your Personal Data is being processed based on your previous consent;
- The right to object to the processing of your Personal Data if we are processing your data based on our legitimate interests; unless there are compelling legitimate grounds or the processing is necessary for legal reasons, we will cease processing your Personal Data upon your request; and
- You may have additional rights, depending on applicable law, over your Personal Data. For example, see the Jurisdiction-specific provisions section under United States below.
c. Process for exercising your data protection rights
To exercise your data protection rights related to Personal Data we process as a data controller, visit our Privacy Center or contact us as outlined below. For Personal Data we process as a data processor, please reach out to the relevant data controller (Business User) to exercise your rights. If you contact us regarding your Personal Data we process as a data processor, we will refer you to the relevant data controller to the extent we are able to identify them.
5. Security and retention
We make reasonable efforts to provide a level of security appropriate to the risk associated with the processing of your Personal Data. We maintain organizational, technical, and administrative measures designed to protect the Personal Data covered by this Policy from unauthorized access, destruction, loss, alteration, or misuse. Learn More. Unfortunately, no data transmission or storage system can be guaranteed to be 100% secure.
We encourage you to assist us in protecting your Personal Data. If you hold a SaveCash account, you can do so by using a strong password, safeguarding your password against unauthorized use, and avoiding using identical login credentials you use for other services or accounts for your SaveCash account. If you suspect that your interaction with us is no longer secure (for instance, you believe that your SaveCash account's security has been compromised), please contact us immediately.
We retain your Personal Data for as long as we continue to provide the Services to you or our Business Users, or for a period in which we reasonably foresee continuing to provide the Services. Even after we stop providing Services directly to you or to a Business User that you're doing business with, and even after you close your SaveCash account or complete a transaction with a Business User, we may continue to retain your Personal Data to:
- Comply with legal and regulatory obligations.
- For fraud monitoring, detection, and prevention.
- To meet tax, accounting, and financial reporting obligations.
- To resolve disputes and enforce our agreements.
In cases where we keep your Personal Data, we do so in accordance with any limitation periods and record retention obligations imposed by applicable law. Learn More.
6. International data transfers
As a global business, it's sometimes necessary for us to transfer your Personal Data to countries other than your own, including the United States. These countries might have data protection regulations that are different from those in your country. When transferring data across borders, we take measures to comply with applicable data protection laws related to such transfer. In certain situations, we may be required to disclose Personal Data in response to lawful requests from officials, such as law enforcement or security authorities. Learn More.
If you are located in the European Economic Area ("EEA"), the United Kingdom ("UK"), or Switzerland, please refer to our Privacy Center for additional details. When a data transfer mechanism is mandated by applicable law, we employ one or more of the following:
SaveCash, Inc. is committed to complying with the EU-U.S. Data Privacy Framework ("EU-U.S. DPF"), the UK Extension to the EU-U.S. DPF, and the Swiss-U.S. Data Privacy Framework as set forth by the U.S. Department of Commerce and as applicable. Learn More.
SaveCash's privacy practices, as described in this Privacy Policy, are designed to comply with the Cross Border Privacy Rules System ("CBPR") and Privacy Recognition for Processors ("PRP") programs. These systems provide a framework for organizations to ensure protection of personal data transferred among participating economies. Where CBPR and/or PRP are recognized as a valid transfer mechanism under applicable law, SaveCash will transfer Personal Data in accordance with the CBPR and PRP certifications that SaveCash will obtain. More information about the programs can be found here and here. If you have unresolved privacy or data use concerns that we have not addressed satisfactorily, please contact our U.S. based third-party dispute resolution provider (free of charge) at https://feedback-form.truste.com/watchdog/request. To view the status of our certifications, please visit the CBPR compliance directory here and the PRP directory here.
7. Updates and notifications
We may change this Policy from time to time to reflect new services, changes in our privacy practices or relevant laws. The "Last updated" legend at the top of this Policy indicates when this Policy was last materially revised. Any changes are effective the latter of when we post the revised Policy on the Services or otherwise provide notice of the update as required by law.
We may provide you with disclosures and alerts regarding the Policy or Personal Data collected by posting them on our website and, if you are an End User or Representative, by contacting you through your SaveCash Dashboard, email address and/or the physical address listed in your SaveCash account.
Section 11: Biometric Data and Facial Recognition Technologies
11.1 Biometric Information Collection and Processing
We collect, process, and retain biometric identifiers and biometric information ("Biometric Data") for identity verification, fraud prevention, and security purposes in accordance with applicable laws including but not limited to the Illinois Biometric Information Privacy Act (BIPA), Texas Capture or Use of Biometric Identifier Act (CUBI), Washington State's biometric privacy law, California's biometric privacy provisions under CCPA/CPRA, and the EU's GDPR Article 9 special categories of personal data provisions.
a. Types of Biometric Data Collected
We may collect the following types of Biometric Data:
- Facial Geometry Data: Unique mathematical representations of facial features including distance between eyes, nose width, jawline shape, and other distinctive facial characteristics derived from photographs or video captures.
- Facial Recognition Templates: Mathematical faceprint templates generated through proprietary algorithms that cannot be reverse-engineered to recreate the original image.
- Liveness Detection Data: Biometric data captured during liveness checks including micro-expressions, eye movements, depth mapping, and thermal imaging to prevent presentation attacks and spoofing.
- Voice Biometrics: Voice patterns, pitch, tone, cadence, and other unique vocal characteristics when you interact with our voice-enabled services or customer support.
- Fingerprint Data: Ridge patterns, minutiae points, and other unique fingerprint characteristics when using fingerprint authentication on compatible devices.
- Iris and Retinal Patterns: Unique patterns in the colored ring of the eye or blood vessel patterns in the retina for advanced authentication methods.
- Gait Analysis: Walking patterns and movement characteristics captured through device sensors for continuous authentication.
- Keystroke Dynamics: Typing patterns including speed, rhythm, and pressure when entering information.
- Behavioral Biometrics: Mouse movements, touchscreen interaction patterns, device holding angles, and navigation behaviors.
b. Purposes for Biometric Data Processing
We process Biometric Data for the following specific purposes:
- Identity verification and authentication to comply with Know Your Customer (KYC), Anti-Money Laundering (AML), and Customer Due Diligence (CDD) requirements
- Prevention of identity theft, account takeover, and synthetic identity fraud
- Detection of deepfakes, presentation attacks, and other advanced fraud techniques
- Multi-factor authentication and passwordless authentication methods
- Age verification and compliance with age-restricted services regulations
- Continuous authentication throughout user sessions to detect account hijacking
- Dispute resolution and investigation of fraudulent transactions
- Enhancement and improvement of biometric recognition algorithms through machine learning
- Compliance with regulatory requirements including sanctions screening and politically exposed person (PEP) checks
- Provision of accessibility features for users with disabilities
c. Consent and Notice Requirements
In accordance with applicable biometric privacy laws, we provide clear notice and obtain your informed written consent before collecting Biometric Data. Our consent process includes:
- Written Notice: Clear, conspicuous written notice that Biometric Data is being collected, captured, or otherwise obtained, including the specific type of biometric identifier or information being collected.
- Purpose Disclosure: Detailed explanation of the specific purpose and length of term for which Biometric Data is being collected, stored, and used.
- Opt-In Consent: Affirmative opt-in consent obtained before any collection or use of Biometric Data, with clear ability to decline without negative consequences to basic service access.
- Right to Withdraw: Clear information about your right to withdraw consent at any time and instructions for doing so.
- Separate Consent: Consent for biometric collection obtained separately from general terms of service or privacy policy acceptance.
d. Retention and Destruction of Biometric Data
We maintain comprehensive retention and destruction schedules for Biometric Data:
- Retention Period: Biometric Data is retained only for the time necessary to fulfill the specific purpose for which it was collected, or as required by applicable law, regulation, or legal obligation. Standard retention periods range from immediate deletion post-verification to a maximum of 3 years for fraud prevention purposes.
- Automatic Deletion: Systems automatically delete Biometric Data upon: (a) satisfaction of the initial purpose; (b) termination of your relationship with us; (c) expiration of applicable retention periods; or (d) withdrawal of consent.
- Secure Destruction: Biometric Data is permanently and irreversibly destroyed using industry-standard methods including cryptographic erasure, degaussing, and physical destruction of storage media.
- Destruction Verification: We maintain auditable records of Biometric Data destruction including timestamps, methods used, and personnel responsible.
- Backup Deletion: Biometric Data is purged from all backup systems, archives, and disaster recovery systems within 90 days of scheduled deletion from production systems.
e. Biometric Data Security Measures
We implement rigorous security measures that meet or exceed the care used to protect other confidential and sensitive information:
- Encryption in Transit: All Biometric Data transmitted over networks is encrypted using TLS 1.3 or higher with perfect forward secrecy (PFS) and authenticated encryption algorithms.
- Encryption at Rest: Biometric Data at rest is encrypted using AES-256 encryption with hardware security modules (HSMs) for key management, meeting FIPS 140-2 Level 3 standards.
- Tokenization: Original biometric images and raw data are immediately tokenized or converted to irreversible mathematical templates, with original data securely destroyed.
- Access Controls: Strict role-based access controls (RBAC) with multi-factor authentication required for any personnel access to systems containing Biometric Data.
- Segregation: Biometric Data stored in isolated, segregated databases with dedicated encryption keys separate from other personal data.
- Monitoring: Continuous monitoring and logging of all access to Biometric Data with real-time anomaly detection and automated alerting.
- Security Audits: Regular third-party security audits, penetration testing, and vulnerability assessments specifically focused on biometric systems.
f. Prohibition on Sale or Profit from Biometric Data
We strictly prohibit the sale, lease, trade, or other profit from Biometric Data. Specifically:
- We will never sell, lease, or trade your Biometric Data to third parties
- We will never profit from or receive monetary consideration in exchange for Biometric Data
- Third-party service providers processing Biometric Data on our behalf are contractually prohibited from retaining, using, or disclosing Biometric Data except as necessary to perform services for us
- Biometric Data is never used for marketing, advertising, or commercial purposes unrelated to the specific purpose for which consent was obtained
- We do not include Biometric Data in any data sets sold, licensed, or monetized for secondary purposes
g. Third-Party Disclosure of Biometric Data
We may disclose Biometric Data to third parties only in the following limited circumstances:
- Service Providers: Biometric Data may be disclosed to service providers who perform biometric authentication, liveness detection, or fraud prevention services on our behalf, subject to strict contractual confidentiality and data protection obligations.
- Legal Compliance: Disclosure required by law, regulation, legal process, or government request, including law enforcement requests with proper legal authority.
- Fraud Prevention: Disclosure to financial institutions, payment networks, or fraud prevention services when necessary to investigate or prevent fraudulent transactions.
- Business Transfers: In the event of merger, acquisition, or sale of assets, Biometric Data may be transferred subject to the acquirer's commitment to honor this privacy policy or obtain new consent.
h. Your Rights Regarding Biometric Data
You have specific rights regarding your Biometric Data under applicable laws:
- Right to Withdraw Consent: You may withdraw your consent for biometric collection and processing at any time by contacting us at privacyprivacy.savecash@gmail.com. Withdrawal will not affect the lawfulness of processing before withdrawal.
- Right to Deletion: You may request deletion of your Biometric Data at any time. We will permanently delete your Biometric Data within 30 days unless retention is required by law.
- Right to Access: You may request information about what Biometric Data we have collected, how it is being used, and with whom it has been shared.
- Right to Object: You may object to the processing of your Biometric Data for specific purposes and request alternative verification methods.
- Right to Rectification: You may request correction of inaccurate Biometric Data, though in most cases we will need to recapture biometric information rather than modify existing data.
- Right to Restrict Processing: You may request that we restrict processing of your Biometric Data while we investigate concerns you have raised.
- Right to Data Portability: Where technically feasible, you may request a copy of your Biometric Data in a structured, commonly used format.
- Private Right of Action: In jurisdictions providing private rights of action for biometric privacy violations (such as Illinois BIPA), you may have the right to seek damages for violations.
i. Biometric Data Breach Notification
In the event of a breach involving Biometric Data, we will provide expedited notification in accordance with or exceeding legal requirements:
- Notice to affected individuals within 72 hours of breach discovery, or sooner if required by applicable law
- Notification to relevant supervisory authorities and data protection agencies as required
- Detailed information about the nature of the breach, types of Biometric Data affected, and measures taken to mitigate harm
- Provision of identity theft protection services, credit monitoring, or other appropriate remedial measures at no cost to affected individuals
- Establishment of dedicated support channels for affected individuals to ask questions and receive assistance
j. Jurisdiction-Specific Biometric Privacy Provisions
Illinois (BIPA): For Illinois residents, we comply with all BIPA requirements including written release, prohibition on profiting from biometric data, retention schedule publication, and reasonable care standard exceeding other confidential information.
Texas (CUBI): For Texas residents, we comply with CUBI requirements including consent for capture or disclosure, prohibition on sale, and notification of breach.
Washington: For Washington residents, we comply with state biometric privacy law including consent requirements and prohibition on enrollment without consent.
California (CCPA/CPRA): For California residents, biometric information is treated as sensitive personal information subject to additional protections including opt-in consent for sensitive data uses.
European Union (GDPR): For EU residents, biometric data is treated as a special category of personal data under Article 9, requiring explicit consent and additional safeguards.
For questions about our biometric data practices or to exercise your rights, contact us at biometricsprivacy.savecash@gmail.com or submit a request through our Privacy Center.
Section 12: Artificial Intelligence and Machine Learning Processing
12.1 AI-Powered Services and Automated Decision-Making
We deploy advanced artificial intelligence (AI), machine learning (ML), deep learning, neural networks, and automated decision-making systems to provide, enhance, and secure our Services. This section provides comprehensive transparency about our AI/ML practices in accordance with GDPR Article 22, California's Automated Decision-Making Technology (ADMT) Accountability Act, the EU AI Act, and other emerging AI governance frameworks.
a. Types of AI/ML Systems Deployed
We utilize the following categories of AI/ML systems:
- Fraud Detection Models: Supervised and unsupervised machine learning models analyzing transaction patterns, user behavior, device fingerprints, and network analysis to detect fraudulent activities, account takeover attempts, and financial crimes in real-time.
- Risk Scoring Systems: Ensemble models combining gradient boosting, random forests, and neural networks to assess credit risk, transaction risk, merchant risk, and compliance risk with confidence scores and explainability features.
- Natural Language Processing (NLP): Large language models (LLMs) and transformer-based architectures for customer support automation, sentiment analysis, contract analysis, policy interpretation, and multilingual communication.
- Computer Vision Systems: Convolutional neural networks (CNNs) for identity document verification, facial recognition, liveness detection, object detection, and optical character recognition (OCR).
- Recommendation Engines: Collaborative filtering and content-based recommendation systems suggesting payment methods, financial products, and service features personalized to user preferences and behavior.
- Predictive Analytics: Time-series forecasting models predicting transaction volumes, fraud trends, customer churn, revenue forecasting, and resource allocation optimization.
- Anomaly Detection: Unsupervised learning algorithms including isolation forests, autoencoders, and one-class SVMs detecting unusual patterns indicating fraud, security threats, or system failures.
- Reinforcement Learning Systems: RL agents optimizing dynamic pricing, fraud prevention strategies, customer engagement timing, and operational efficiency.
- Generative AI: Generative adversarial networks (GANs), variational autoencoders (VAEs), and foundation models for synthetic data generation, data augmentation, and testing purposes (never for creating misleading content).
- Autonomous Decision Systems: Automated systems making decisions about transaction approvals, account suspensions, verification requirements, and risk categorizations with varying degrees of human oversight.
b. Automated Decision-Making with Legal or Similarly Significant Effects
We employ automated decision-making systems that may produce legal or similarly significant effects. You have the right to:
- Right to Human Review: Request human review of automated decisions affecting you, including account suspensions, transaction declinations, application denials, and risk categorizations.
- Right to Explanation: Receive meaningful information about the logic involved in automated decision-making, including key factors influencing the decision and their relative importance.
- Right to Contest: Challenge automated decisions and provide additional context or evidence for reconsideration.
- Right to Opt-Out: Where legally required, opt out of certain automated decision-making processes in favor of human decision-making.
c. Proprietary AI Technology and Competitive Advantages
SaveCash's AI/ML systems represent proprietary technology developed over years of research and substantial investment. Our algorithms, models, and training methodologies constitute valuable trade secrets and competitive advantages. You acknowledge that unauthorized access to, copying of, or derivation from our AI technology is strictly prohibited and will result in severe legal consequences.
d. AI Model Training and Personal Data Usage
We use Personal Data for AI/ML model training and improvement under the following conditions:
- Data Minimization: We collect and use only the minimum Personal Data necessary for model training, employing privacy-preserving techniques including federated learning, differential privacy, and data anonymization.
- Synthetic Data: Where possible, we generate synthetic data using GANs and other generative models that preserve statistical properties without containing actual Personal Data.
- Federated Learning: Models trained across decentralized devices without centralizing Personal Data, keeping raw data on-device while only sharing encrypted model updates.
- Differential Privacy: Mathematical guarantees added to training data and model outputs ensuring individual records cannot be identified or reconstructed from model behavior.
- Homomorphic Encryption: Training models on encrypted data without decryption, enabling computation on encrypted Personal Data while maintaining privacy.
- Secure Multi-Party Computation: Collaborative model training across organizations without sharing underlying Personal Data.
- Data Compartmentalization: Training data segregated into isolated environments with strict access controls and encryption, separate from production systems.
- Right to Opt-Out: You may opt out of having your Personal Data used for AI model training, subject to legitimate business and security needs.
e. AI Bias Mitigation and Fairness
We implement comprehensive bias detection and mitigation strategies:
- Fairness Audits: Regular algorithmic audits assessing disparate impact across protected characteristics including race, ethnicity, gender, age, disability status, religion, national origin, and other protected classes under applicable anti-discrimination laws.
- Fairness Metrics: Quantitative assessment using metrics including demographic parity, equalized odds, equal opportunity, calibration, and individual fairness measures.
- Bias Correction: Implementation of pre-processing (data reweighting, resampling), in-processing (fairness constraints, adversarial debiasing), and post-processing (threshold optimization) techniques.
- Diverse Training Data: Curation of representative training datasets reflecting diverse populations and edge cases, with oversampling of underrepresented groups.
- Protected Attribute Handling: Careful handling of protected attributes, ensuring they are not used as direct features while monitoring for proxy variables that correlate with protected classes.
- Intersectionality Analysis: Evaluation of model performance across intersectional groups (e.g., race × gender × age) to identify compound bias effects.
- Third-Party Audits: Engagement of independent fairness auditors and civil rights organizations to review AI systems for bias and discrimination.
- Continuous Monitoring: Real-time monitoring of model predictions in production for fairness drift and emergent biases.
e. Explainable AI (XAI) and Transparency
We prioritize AI explainability and transparency through:
- Model Interpretability: Use of inherently interpretable models (decision trees, linear models, rule-based systems) where high-stakes decisions are made.
- SHAP Values: SHapley Additive exPlanations providing consistent, locally accurate feature importance explanations for individual predictions.
- LIME: Local Interpretable Model-agnostic Explanations generating human-understandable explanations for black-box model predictions.
- Counterfactual Explanations: Providing "what-if" scenarios showing how changes to inputs would alter model predictions.
- Feature Importance Rankings: Clear disclosure of which data features most influence model decisions, with relative importance scores.
- Decision Pathways: Visual representations of decision logic paths through ensemble models and neural networks.
- Confidence Scores: Transparent display of model confidence levels, with higher scrutiny applied to low-confidence predictions.
- Model Cards: Comprehensive model documentation including intended use, training data characteristics, performance metrics, limitations, and fairness evaluations.
f. AI Safety and Security Measures
We implement rigorous AI safety and security controls:
- Adversarial Robustness: Testing models against adversarial attacks including evasion attacks, poisoning attacks, model inversion, and membership inference attacks.
- Input Validation: Rigorous validation and sanitization of inputs to prevent prompt injection, jailbreaking, and other manipulation techniques.
- Output Filtering: Multi-layer filtering systems preventing generation or disclosure of harmful, illegal, or privacy-violating content.
- Model Monitoring: Continuous monitoring for model drift, performance degradation, distribution shift, and anomalous behavior.
- Rollback Capabilities: Ability to instantly rollback to previous model versions if safety or performance issues are detected.
- Circuit Breakers: Automated kill switches stopping model deployment if safety thresholds are exceeded.
- Red Team Testing: Regular adversarial testing by internal and external security researchers attempting to break AI systems.
- Model Governance: Formal review boards assessing AI system deployments for safety, fairness, and compliance before production release.
g. Third-Party AI Services and Data Sharing
We may utilize third-party AI services (such as OpenAI, Google Cloud AI, Amazon AWS AI, Microsoft Azure AI) subject to strict data protection requirements:
- Data Processing Agreements: All third-party AI providers are bound by comprehensive DPAs ensuring GDPR compliance, data confidentiality, and limited data retention.
- No Training on Customer Data: Contractual prohibitions preventing third-party AI providers from using your Personal Data to train their general-purpose models.
- Data Minimization: Only minimum necessary data shared with third-party AI services, with pre-processing to remove or pseudonymize identifiers.
- Vendor Assessment: Rigorous security and privacy assessments of third-party AI providers including audits, certifications, and contractual safeguards.
- Data Localization: Use of region-specific AI services to maintain data within required geographic boundaries.
- Audit Rights: Reserved rights to audit third-party AI providers' data practices and security controls.
h. AI-Generated Content Disclosure
When AI systems generate content that you interact with, we provide clear disclosure:
- Customer support responses generated or assisted by AI are clearly labeled as such
- AI-generated summaries, recommendations, or insights are marked to distinguish from human-created content
- Synthetic or AI-augmented images, videos, or audio are watermarked and disclosed
- Chatbot and virtual assistant interactions clearly identify the AI nature of the interaction
- You may request escalation to human support agents at any time during AI interactions
i. Emerging AI Technologies and Future-Proofing
We monitor and prepare for emerging AI technologies:
- Artificial General Intelligence (AGI): Monitoring developments in AGI with commitment to responsible deployment practices and enhanced safety protocols if AGI capabilities emerge.
- Quantum Machine Learning: Preparing for quantum-enhanced ML algorithms with quantum-resistant security measures (see Quantum Computing section).
- Neuromorphic Computing: Evaluating brain-inspired computing architectures with enhanced privacy and security considerations.
- Edge AI: Deploying on-device AI processing to enhance privacy by minimizing data transmission to cloud servers.
- AI Regulation Compliance: Proactive compliance with emerging AI regulations including EU AI Act, proposed US federal AI legislation, and sector-specific AI governance frameworks.
j. Your AI-Related Rights and Choices
You have specific rights regarding AI processing of your Personal Data:
- Right to Know: Request information about what AI systems process your data, for what purposes, and with what automated decision-making logic.
- Right to Meaningful Explanation: Receive human-understandable explanations of automated decisions affecting you.
- Right to Human Review: Request that automated decisions be reviewed and overridden by human decision-makers.
- Right to Object: Object to AI processing of your Personal Data for specific purposes, including profiling and automated decision-making.
- Right to Opt-Out of Training: Opt out of having your Personal Data used to train or improve AI models, subject to legitimate business needs.
- Right to Correction: Correct inaccurate Personal Data used by AI systems, triggering model retraining or recalibration if necessary.
- Right to Deletion: Request deletion of Personal Data from AI training datasets and model parameters where technically feasible.
To exercise your AI-related rights or ask questions about our AI practices, contact our AI Ethics and Governance team at ai-ethicsprivacy.savecash@gmail.com or submit a request through our AI Transparency Center.
Section 13: Quantum Computing and Post-Quantum Cryptography
13.1 Quantum Threat Assessment and Preparedness
We recognize the emerging threat that large-scale quantum computers pose to current cryptographic systems and are implementing comprehensive quantum-resistant security measures to protect your Personal Data against both current and future quantum computing capabilities, including "harvest now, decrypt later" attacks where adversaries collect encrypted data today with the intent to decrypt it when quantum computers become available.
a. Post-Quantum Cryptography (PQC) Implementation
We are transitioning to quantum-resistant cryptographic algorithms:
- NIST PQC Standards: Implementation of NIST-standardized post-quantum cryptographic algorithms including CRYSTALS-Kyber (key encapsulation), CRYSTALS-Dilithium (digital signatures), and SPHINCS+ (hash-based signatures) as primary cryptographic primitives for data protection.
- Hybrid Cryptography: Deployment of hybrid encryption schemes combining classical algorithms (RSA-4096, ECC-384) with post-quantum algorithms to provide security against both classical and quantum attacks during the transition period.
- Lattice-Based Cryptography: Utilization of lattice-based schemes including Learning With Errors (LWE), Ring-LWE, and Module-LWE constructions resistant to known quantum algorithms including Shor's algorithm and Grover's algorithm.
- Code-Based Cryptography: Implementation of error-correcting code-based systems such as Classic McEliece for specific high-security applications.
- Hash-Based Signatures: Deployment of stateful (XMSS, LMS) and stateless (SPHINCS+) hash-based signature schemes for long-term data integrity.
- Multivariate Cryptography: Evaluation and selective deployment of multivariate polynomial-based schemes for specialized applications.
- Isogeny-Based Cryptography: Monitoring developments in supersingular isogeny-based protocols (SIKE successors) for potential future deployment.
b. Quantum-Safe Key Management
Our key management infrastructure is being enhanced with quantum-resistant capabilities:
- Quantum Random Number Generators (QRNG): Integration of quantum-based true random number generators producing cryptographically secure random numbers with quantum-certified entropy for key generation.
- Quantum Key Distribution (QKD): Evaluation and pilot deployment of QKD protocols (BB84, E91) for secure key exchange between geographically distributed data centers, providing information-theoretic security.
- Post-Quantum Hardware Security Modules: Deployment of next-generation HSMs supporting post-quantum algorithms with quantum-resistant key storage and cryptographic operations.
- Crypto-Agility Architecture: Implementation of algorithm-agnostic cryptographic architecture enabling rapid algorithm replacement without system redesign as quantum threats evolve.
- Key Rotation Protocols: Accelerated key rotation schedules with automated migration to post-quantum algorithms, reducing exposure window for "harvest now, decrypt later" attacks.
c. Quantum-Resistant Data Protection
We implement layered quantum-resistant protection for Personal Data:
- Re-Encryption Programs: Systematic re-encryption of historically encrypted data using post-quantum algorithms to protect against retroactive decryption by future quantum computers.
- Quantum-Safe TLS: Deployment of post-quantum TLS 1.3 configurations for all data in transit, utilizing hybrid key exchange mechanisms combining classical and post-quantum algorithms.
- Long-Term Archive Encryption: Special quantum-resistant encryption schemes for archived data intended for long-term retention (10+ years), assuming quantum computer availability within data retention period.
- Blockchain and Distributed Ledger: Transition of any blockchain-based systems to quantum-resistant consensus mechanisms and digital signature schemes.
- Quantum-Resistant Backups: All backup systems utilize post-quantum encryption with multiple algorithm diversity to ensure recoverability even if specific algorithms are compromised.
d. Quantum Computing Applications and Benefits
While preparing defenses against quantum threats, we are also exploring beneficial quantum computing applications:
- Quantum Machine Learning: Research into quantum-enhanced ML algorithms for fraud detection, risk analysis, and optimization problems while maintaining privacy through quantum-secure data handling.
- Quantum Optimization: Utilization of quantum annealers and gate-based quantum computers for portfolio optimization, resource allocation, and route optimization, processing only anonymized or aggregated data.
- Quantum-Safe Secure Computation: Development of quantum-secure multi-party computation protocols enabling privacy-preserving collaborative analytics.
- Quantum-Enhanced Privacy: Exploration of quantum technologies for enhanced privacy protection including quantum-secure distributed computing and quantum anonymous communication.
e. Quantum Threat Monitoring and Intelligence
We maintain active quantum threat monitoring and intelligence capabilities:
- Quantum Capability Tracking: Continuous monitoring of quantum computing advancements including qubit counts, error rates, gate fidelities, and coherence times from academic research, government programs, and commercial quantum computing companies.
- Q-Day Estimation: Regular assessment of estimated timeline to "Q-Day" (when quantum computers can break current cryptography) informing migration schedules and risk assessments.
- Cryptographic Bill of Materials: Comprehensive inventory of all cryptographic algorithms deployed across systems, enabling rapid identification of quantum-vulnerable components.
- Quantum-Readiness Assessments: Regular assessments of organizational quantum readiness across infrastructure, applications, and third-party dependencies.
- Standards Participation: Active participation in NIST post-quantum cryptography standardization, IETF quantum-safe protocols, and industry consortia developing quantum-resistant solutions.
f. Quantum Migration Roadmap and Timeline
Our phased quantum migration roadmap:
- Phase 1 (Current - 2025): Inventory of cryptographic systems, pilot implementations of hybrid cryptography, deployment of quantum random number generators, and re-encryption of highest-sensitivity long-term data.
- Phase 2 (2025 - 2027): Broad deployment of hybrid post-quantum/classical cryptography across all systems, migration of all TLS to quantum-safe configurations, and implementation of post-quantum digital signatures for high-value transactions.
- Phase 3 (2027 - 2030): Complete migration to pure post-quantum cryptography for all systems, decommissioning of classical-only algorithms, and full quantum-resistant infrastructure deployment.
- Phase 4 (2030+): Continuous monitoring and algorithm updates as quantum computing capabilities evolve and new post-quantum standards emerge.
g. Third-Party Quantum Readiness Requirements
We require quantum readiness from our service providers and partners:
- All third-party service providers handling Personal Data must maintain quantum migration roadmaps aligned with industry best practices
- Cloud service providers must support post-quantum cryptographic algorithms and provide quantum-safe key management services
- Payment networks and financial partners must demonstrate quantum readiness for payment processing and settlement systems
- Software vendors must provide quantum-safe versions of cryptographic libraries and security components
- Regular audits verify third-party compliance with quantum preparedness requirements
h. Quantum Computing Privacy Considerations
Beyond cryptographic security, we address quantum-specific privacy risks:
- Quantum De-anonymization Risks: Assessment of quantum algorithms' potential to de-anonymize pseudonymized data through enhanced pattern matching and optimization capabilities.
- Quantum-Enhanced Privacy Attacks: Preparation for quantum-accelerated attacks on differential privacy, k-anonymity, and other privacy-preserving techniques.
- Side-Channel Resistance: Development of post-quantum algorithms resistant to quantum-specific side-channel attacks including quantum timing and power analysis.
- Quantum Access Controls: If quantum computing services are utilized, implementation of strict access controls and auditing for any Personal Data processed on quantum systems.
i. User Communication and Transparency
We commit to transparent communication about quantum preparedness:
- Regular updates on quantum migration progress through annual transparency reports
- Advance notice of major cryptographic algorithm changes that may impact user experience
- Educational resources explaining quantum threats and our protective measures
- Notification if historical encrypted data is re-encrypted with post-quantum algorithms
- Proactive disclosure if any quantum-vulnerable cryptography remains in use with associated risk assessments
j. Quantum Incident Response
Our quantum-specific incident response procedures:
- Cryptographic Break Detection: Continuous monitoring for signs of successful quantum attacks on cryptographic systems including anomalous decryption patterns.
- Emergency Algorithm Migration: Pre-planned emergency procedures for rapid algorithm replacement if quantum breakthroughs threaten current cryptography sooner than anticipated.
- Quantum Breach Notification: Enhanced notification procedures if Personal Data is compromised through quantum computing attacks, including assessment of historical data exposure.
- Retroactive Protection: Protocols for retroactive protection measures if previously encrypted data is at risk from quantum decryption.
For questions about our quantum computing preparedness or to request additional information about quantum-safe measures protecting your Personal Data, contact our Quantum Security Team at quantum-securityprivacy.savecash@gmail.com or visit our Quantum Readiness Center.
Section 14: Blockchain, Cryptocurrency, and Web3 Technologies
14.1 Blockchain and Distributed Ledger Technology (DLT) Data Processing
When you interact with blockchain-based services, cryptocurrency transactions, non-fungible tokens (NFTs), decentralized finance (DeFi) protocols, or other Web3 technologies through our platform, we collect and process specific categories of data subject to unique privacy considerations inherent to immutable, decentralized systems.
a. Blockchain Data Collection and On-Chain Privacy
Blockchain transactions create permanent, public records with unique privacy implications:
- Wallet Addresses: Public blockchain addresses (Ethereum, Bitcoin, Polygon, etc.) associated with your account, which serve as pseudonymous identifiers but may be linkable to your identity through transaction patterns, address clustering, or off-chain data correlations.
- Transaction Data: On-chain transaction records including sender/receiver addresses, amounts, timestamps, gas fees, smart contract interactions, token transfers, and transaction metadata permanently recorded on immutable public ledgers.
- Smart Contract Interactions: Records of your interactions with decentralized applications (dApps), DeFi protocols, NFT marketplaces, and automated market makers (AMMs) including function calls, parameters, and emitted events.
- NFT Ownership and Metadata: Records of NFT ownership, minting, transfers, and associated metadata including IPFS hashes, token URIs, and provenance history.
- DeFi Activity: Lending, borrowing, staking, liquidity provision, yield farming, and governance participation recorded on-chain with publicly visible positions and returns.
b. Immutability and Right to Erasure Considerations
Blockchain's immutable nature creates unique challenges for privacy rights, particularly the GDPR "right to be forgotten":
- Technical Immutability: Once data is recorded on a public blockchain, it cannot be deleted or modified due to the fundamental design of distributed consensus systems and cryptographic hash chains.
- Off-Chain Data Management: We minimize Personal Data stored on-chain, maintaining identifiable information in off-chain databases where deletion rights can be fully exercised.
- Pseudonymization: Only pseudonymous wallet addresses and transaction hashes are stored on-chain, never directly identifiable personal information (name, email, address, etc.).
- Address Delink Protocol: Upon deletion request, we permanently delete all mappings between your identity and blockchain addresses in our systems, rendering on-chain data effectively anonymous.
- Zero-Knowledge Proofs: Where feasible, implementation of ZK-SNARKs, ZK-STARKs, and other zero-knowledge cryptography to prove transaction validity without revealing Personal Data on-chain.
- Private Blockchains: Use of permissioned blockchain networks with access controls and data governance for sensitive business applications where required.
c. Cryptocurrency Transaction Processing
When processing cryptocurrency payments or transfers, we collect and process:
- Wallet Information: Cryptocurrency wallet addresses, public keys, wallet type (custodial, non-custodial, hardware, software), and wallet provider information.
- Transaction Details: Cryptocurrency type (BTC, ETH, USDC, etc.), transaction amounts, network fees, confirmation status, block numbers, and transaction identifiers (TxHash).
- Exchange Rate Data: Fiat-to-crypto exchange rates at transaction time, conversion calculations, and price volatility risk assessments.
- AML/KYC Compliance: Enhanced due diligence for cryptocurrency transactions including source of funds analysis, transaction monitoring, sanctions screening, and Chainalysis reports for high-risk transactions.
- Privacy Coin Handling: Special procedures for privacy-focused cryptocurrencies (Monero, Zcash) including enhanced risk assessment and regulatory compliance measures.
d. Decentralized Identity and Self-Sovereign Identity (SSI)
We support decentralized identity standards and self-sovereign identity principles:
- Decentralized Identifiers (DIDs): Support for W3C DID standard enabling user-controlled, blockchain-anchored identities that you own and manage independently.
- Verifiable Credentials: Issuance and verification of cryptographically-signed credentials allowing selective disclosure of identity attributes without centralized authority.
- Ethereum Name Service (ENS) / Blockchain Names: Support for human-readable blockchain names (yourname.eth) with associated metadata and reverse resolution capabilities.
- Soulbound Tokens (SBTs): Non-transferable NFTs representing identity, credentials, affiliations, or reputation in decentralized ecosystems.
- Decentralized Authentication: Support for Web3 wallet-based authentication (Sign-In with Ethereum, WalletConnect) as alternative to traditional username/password systems.
e. Blockchain Analytics and Transaction Monitoring
We employ blockchain analytics for security, compliance, and fraud prevention:
- Transaction Tracing: Analysis of blockchain transaction flows to identify sources of funds, ultimate beneficiaries, and intermediary addresses using graph analysis and clustering algorithms.
- Risk Scoring: Address-level risk assessment identifying connections to sanctioned entities, darknet markets, mixing services, stolen funds, ransomware payments, and other illicit activity.
- Third-Party Analytics: Use of blockchain intelligence providers (Chainalysis, Elliptic, TRM Labs, CipherTrace) for compliance screening and investigations, subject to strict data processing agreements.
- Travel Rule Compliance: Collection and exchange of customer information for cryptocurrency transfers exceeding regulatory thresholds (typically $1,000) in compliance with FATF Travel Rule requirements.
- Mixer/Tumbler Detection: Identification of funds originating from cryptocurrency mixing services, CoinJoin transactions, or other privacy-enhancing technologies requiring enhanced due diligence.
f. Smart Contract Privacy and Security
When deploying or interacting with smart contracts:
- Privacy-Preserving Smart Contracts: Implementation of confidential transactions, private state channels, and encrypted on-chain storage where sensitive data must exist on-chain.
- Oracle Privacy: When using blockchain oracles (Chainlink, Band Protocol) to bring off-chain data on-chain, data minimization and privacy-preserving oracle architectures.
- Upgradeable Contracts: Use of proxy patterns and upgradeable contract architecture allowing privacy policy enforcement changes without blockchain immutability constraints.
- Emergency Pause Mechanisms: Admin functions enabling contract pausing or data access restriction in event of security incidents or privacy violations.
- Security Audits: Third-party smart contract security audits identifying vulnerabilities, including privacy leakage through event logs or public state variables.
g. Web3 Wallet Connections and Permissions
When you connect Web3 wallets to our services:
- Wallet Connection Protocols: Support for WalletConnect, MetaMask, Coinbase Wallet, and other Web3 wallet connection standards with explicit permission requests.
- Permission Scoping: Granular permission controls allowing you to grant only necessary access (view addresses, propose transactions, sign messages) without exposing private keys.
- Session Management: Temporary, revocable wallet connection sessions with automatic expiration and clear disconnection procedures.
- Multi-Chain Support: Handling of multi-chain wallet configurations with chain-specific permission models (Ethereum, Polygon, BSC, Avalanche, Solana, etc.).
- Transaction Simulation: Pre-transaction simulation showing expected outcomes before signature request, protecting against malicious contract interactions.
h. Decentralized Storage and IPFS
When utilizing decentralized storage systems:
- IPFS Privacy: InterPlanetary File System (IPFS) content addressed by cryptographic hashes is public and persistent; we never store unencrypted Personal Data on public IPFS gateways.
- Client-Side Encryption: All sensitive data encrypted client-side before IPFS upload, with encryption keys managed separately and securely.
- Pinning Services: Use of pinning services (Pinata, Infura, Fleek) to ensure data availability while maintaining control over data persistence and potential removal.
- Private IPFS Networks: Deployment of private IPFS clusters for business-sensitive data requiring access controls and data governance.
- Filecoin and Arweave: When using permanent storage solutions (Arweave) or decentralized storage markets (Filecoin), clear disclosure of data permanence and encryption requirements.
i. Regulatory Compliance for Digital Assets
We maintain compliance with evolving cryptocurrency and digital asset regulations:
- Virtual Asset Service Provider (VASP) Requirements: Compliance with FATF guidance for virtual asset service providers including Travel Rule implementation and enhanced due diligence.
- Securities Law Compliance: Analysis of digital assets for securities characteristics under Howey Test and compliance with applicable securities regulations.
- MiCA Compliance (EU): Preparation for EU Markets in Crypto-Assets Regulation including issuer disclosure requirements and consumer protection standards.
- Stablecoin Regulations: Enhanced reserves disclosure and audit requirements for stablecoin-related services.
- Tax Reporting: Cryptocurrency transaction reporting to tax authorities as required (IRS Form 1099-B, international equivalents) with user notification of reporting obligations.
j. Your Rights in Blockchain Context
Your privacy rights apply with blockchain-specific considerations:
- Right to Erasure (Modified): We will delete all off-chain linkages between your identity and blockchain addresses, rendering on-chain data pseudonymous and unattributable to you, though blockchain records themselves cannot be deleted.
- Right to Access: Full disclosure of what blockchain addresses we associate with your identity and transaction history across all supported networks.
- Right to Data Portability: Export of your blockchain transaction history, wallet information, and associated metadata in machine-readable formats.
- Right to Object: Ability to object to blockchain analytics or transaction monitoring, though regulatory compliance requirements may limit this right.
- Wallet Disassociation: Option to disassociate cryptocurrency wallets from your account, removing linkage between identity and blockchain activity in our systems.
For questions about blockchain privacy, cryptocurrency transaction data, or Web3 privacy practices, contact our Blockchain Privacy Office at blockchain-privacyprivacy.savecash@gmail.com or visit our Web3 Privacy Center.
Section 15: IoT, Smart Devices, and Wearable Technology
15.1 Internet of Things (IoT) Data Collection and Processing
When you use our Services through IoT devices, smart devices, wearables, or other connected hardware, we collect and process unique categories of Personal Data subject to enhanced privacy protections given the intimate and continuous nature of IoT data collection.
a. Types of IoT and Smart Device Data Collected
We may collect the following categories of data from connected devices:
- Point-of-Sale Devices: Payment terminal identifiers, device location, transaction logs, peripheral connections, firmware versions, security event logs, and operational status from our payment terminals and card readers.
- Mobile Payment Devices: Mobile POS data including device type (iOS, Android), GPS coordinates, accelerometer data, proximity sensor data, NFC tap patterns, and Bluetooth beacon interactions.
- Wearable Payment Devices: Smartwatch payment data, fitness tracker transaction history, contactless ring payments, and biometric authentication data from wearable payment devices.
- Smart Home Integration: Voice assistant transaction data (Alexa, Google Assistant), smart speaker payment commands, and home automation system financial integrations.
- Connected Vehicle Data: In-car payment system data, connected car commerce transactions, vehicle identification numbers (VIN), GPS routes to payment locations, and automotive telematics associated with payment events.
- Industrial IoT (IIoT): Connected industrial equipment transaction data, machine-to-machine payment systems, supply chain sensor data, and automated inventory replenishment transactions.
- Health and Fitness Wearables: Health-related payment data when using medical wearables, fitness subscriptions, health insurance integrations, and wellness program transaction data.
- Smart Retail: Interactive kiosk data, digital signage interactions, electronic shelf label engagement, smart shopping cart data, and cashierless store transaction data.
b. Device Identifiers and Fingerprinting
IoT devices generate unique identifiers used for authentication, fraud prevention, and service delivery:
- Hardware Identifiers: Device serial numbers, MAC addresses, IMEI/MEID numbers, chip IDs, secure element identifiers, and Trusted Platform Module (TPM) attestations.
- Software Identifiers: Device operating system, firmware version, installed app versions, SDK versions, and software configuration fingerprints.
- Network Identifiers: IP addresses, Wi-Fi SSID/BSSID, cellular tower IDs, Bluetooth device names, NFC UIDs, and network topology mapping.
- Environmental Fingerprints: Ambient sensor readings (temperature, pressure, humidity, light levels) creating unique device environment signatures for fraud detection.
- Device Telemetry: Battery level, storage capacity, CPU usage, memory utilization, sensor calibration data, and device health metrics.
c. Location Data from Connected Devices
IoT devices provide granular location data requiring enhanced privacy protections:
- Precise Geolocation: GPS coordinates accurate to meters, used for merchant location verification, fraud detection (impossible travel), and location-based services with explicit opt-in consent.
- Location History: Historical location patterns, frequent locations, geofencing events, dwell time analysis, and movement patterns creating detailed behavioral profiles.
- Indoor Positioning: Wi-Fi triangulation, Bluetooth beacon proximity, ultra-wideband (UWB) positioning, and indoor navigation data revealing precise in-store movements.
- Cross-Device Location Correlation: Location data aggregated across multiple IoT devices (phone, watch, car) creating comprehensive mobility profiles.
- Sensitive Location Inference: Automated detection and special handling of visits to sensitive locations (medical facilities, religious sites, political venues, adult establishments) with enhanced privacy protections.
d. Sensor Data and Environmental Context
Connected devices collect rich sensor data providing contextual information:
- Motion and Orientation: Accelerometer, gyroscope, and magnetometer data revealing device handling patterns, user gait characteristics, and activity classification (walking, driving, stationary).
- Ambient Sensors: Light sensors, proximity sensors, barometer, thermometer, and hygrometer readings providing environmental context and device usage patterns.
- Biometric Sensors: Heart rate, blood oxygen (SpO2), skin conductance, body temperature, and other health metrics from wearables used for authentication or fraud detection.
- Audio Sensors: Microphone usage logs, ambient noise levels, voice command detection (not audio content without explicit consent), and ultrasonic beacon detection.
- Camera Sensors: Camera activation logs, QR code scanning events, augmented reality interactions, and visual search queries (image content processed locally when possible).
e. Device Security and Attestation
We verify device security posture to protect your data and prevent fraud:
- Device Integrity Verification: SafetyNet attestation (Android), DeviceCheck (iOS), and custom attestation protocols verifying devices are unmodified and not rooted/jailbroken.
- Secure Boot Verification: Verification of secure boot status, bootloader lock state, and signed firmware ensuring device has not been tampered with.
- Runtime Security Checks: Detection of debugging tools, emulators, screen recording, accessibility service abuse, and other security threats in real-time.
- Secure Element Usage: Verification of secure element (SE) or trusted execution environment (TEE) usage for cryptographic operations and sensitive data storage.
- Certificate Pinning: Enforcement of certificate pinning on IoT devices to prevent man-in-the-middle attacks with logging of pinning violations.
f. Edge Computing and On-Device Processing
We prioritize edge computing and on-device processing to enhance privacy:
- Local Processing: Biometric authentication, fraud scoring, and personalization performed locally on device when feasible, minimizing data transmission to cloud servers.
- Federated Learning: Machine learning model training distributed across IoT devices without centralizing raw data, preserving privacy while improving service quality.
- Differential Privacy: When device data must be aggregated, differential privacy techniques add mathematical noise ensuring individual device data cannot be identified.
- Data Minimization: IoT devices only transmit minimum necessary data to cloud servers, with local preprocessing, filtering, and aggregation reducing data volume and exposure.
- Edge Caching: Frequently used data cached locally on devices reducing server queries and associated data transmission.
g. Device-to-Device Communication and Mesh Networks
When devices communicate directly with each other:
- Peer-to-Peer Transactions: Direct device-to-device payment data exchange using Bluetooth, NFC, or Wi-Fi Direct with end-to-end encryption and authentication.
- Mesh Network Participation: Participation in IoT mesh networks (Thread, Zigbee) with privacy-preserving routing protocols and encrypted mesh traffic.
- Matter Protocol: Support for Matter smart home standard with local control, minimal cloud dependency, and privacy-by-design principles.
- Device Pairing Data: Bluetooth pairing records, device discovery logs, and persistent connection preferences managed securely with encryption.
h. Firmware Updates and Remote Device Management
Device management and updates with privacy protections:
- Over-the-Air (OTA) Updates: Encrypted firmware updates with signed packages, rollback capabilities, and update history logs accessible to device owners.
- Remote Configuration: Remote device configuration changes require user authorization for privacy-impacting settings (location services, sensor access, data sharing).
- Remote Diagnostics: Remote device diagnostic data collection with explicit opt-in consent, temporary access grants, and audit trails.
- Device Decommissioning: Secure data wiping protocols for device end-of-life, return, or resale ensuring Personal Data is irrecoverably deleted.
i. Third-Party IoT Ecosystems and Integrations
When integrating with third-party IoT platforms:
- Smart Home Platform Integration: Integration with Apple HomeKit, Google Home, Amazon Alexa, Samsung SmartThings subject to platform-specific privacy policies and data sharing agreements.
- Health Platform Integration: Apple HealthKit, Google Fit, Samsung Health integrations with explicit authorization for health data access and strict data minimization.
- Automotive Platform Integration: Apple CarPlay, Android Auto, vehicle manufacturer platforms with limited data sharing scoped to necessary transaction facilitation.
- IFTTT and Automation: Integration with automation platforms with granular permission controls and activity logs showing all automated data flows.
j. IoT-Specific Privacy Rights and Controls
You have enhanced rights and controls for IoT data:
- Device Data Dashboard: Centralized dashboard showing all connected devices, data collected from each device, and granular per-device privacy controls.
- Selective Sensor Permissions: Ability to disable specific sensors (GPS, camera, microphone) or data collection types for individual devices without breaking core functionality.
- Device Unlinking: Easy device unlinking process immediately stopping all data collection from specific IoT devices with retroactive data deletion option.
- Local-Only Mode: Option to operate devices in local-only mode with no cloud connectivity for privacy-conscious users, though some features may be limited.
- Data Retention Controls: Configurable data retention periods for IoT telemetry and sensor data, including option for immediate deletion after processing.
- Export Device Data: Comprehensive export of all data collected from your IoT devices in machine-readable formats (CSV, JSON) for analysis or migration.
For questions about IoT data processing, smart device privacy, or to manage your connected devices, contact our IoT Privacy Team at iot-privacyprivacy.savecash@gmail.com or access your Device Privacy Center.
Section 16: Genetic, Health, and Medical Data Protection
16.1 Health-Related Personal Data Collection and Processing
We recognize that health, medical, and genetic information constitutes highly sensitive Personal Data requiring the highest levels of protection under laws including HIPAA (US), GDPR Article 9 (EU), PIPEDA (Canada), My Health Records Act (Australia), and other health privacy regulations worldwide. This section describes our practices when health-related data intersects with financial services.
a. Categories of Health-Related Data
We may collect or process the following health-related information in limited circumstances:
- Healthcare Payment Processing: Transaction data for healthcare services, medical procedures, pharmaceutical purchases, health insurance premiums, and medical device purchases (amounts, dates, merchant categories, not diagnostic details).
- Health Insurance Transactions: Insurance carrier information, policy numbers, explanation of benefits (EOB) processing, copayment amounts, deductible tracking, and claims payment facilitation.
- Flexible Spending Accounts (FSA/HSA): Health savings account transactions, qualified medical expense verification, substantiation documentation, and dependent care account activity.
- Telehealth Payment Data: Payment information for telemedicine consultations, remote patient monitoring services, and digital health platform subscriptions.
- Wellness Program Payments: Corporate wellness program participation, fitness membership payments, mental health service transactions, and preventive care incentive payments.
- Genetic Testing Services: Payment information for genetic testing services, ancestry services, pharmacogenomic testing, and direct-to-consumer genetic analysis (payment data only, never test results).
- Medical Device Transactions: Purchase of medical equipment, wearable health monitors, continuous glucose monitors (CGM), CPAP machines, hearing aids, and other health technology.
- Mental Health Services: Payment for therapy sessions, psychiatric consultations, mental health apps, substance abuse treatment, and counseling services.
b. Genetic Information Protection (GINA Compliance)
We comply with the Genetic Information Nondiscrimination Act (GINA) and similar international laws protecting genetic information:
- No Genetic Test Results Collection: We never collect, request, or require genetic test results, DNA sequences, genomic data, or interpretation of genetic predispositions for any purpose.
- Non-Discrimination Policy: Genetic information will never be used for eligibility determinations, pricing decisions, risk assessments, or any form of differential treatment.
- Family Medical History Exclusion: We do not collect family medical history or information about genetic diseases or disorders in family members.
- Segregated Storage: Any inadvertently collected genetic information is immediately isolated in segregated databases with restricted access and expedited deletion procedures.
- Third-Party Prohibition: Contractual prohibitions prevent service providers from collecting, using, or disclosing genetic information obtained through our systems.
c. HIPAA Compliance and Business Associate Relationships
When we process Protected Health Information (PHI) on behalf of healthcare covered entities:
- Business Associate Agreements (BAA): Executed BAAs with healthcare providers, health plans, and healthcare clearinghouses defining permitted uses and required safeguards for PHI.
- Minimum Necessary Standard: Access to and use of PHI limited to minimum necessary for payment processing and healthcare operations as defined in BAAs.
- HIPAA Security Rule: Administrative, physical, and technical safeguards meeting or exceeding HIPAA Security Rule requirements including encryption, access controls, and audit logs.
- Breach Notification: HIPAA-compliant breach notification procedures including assessment, notification to covered entities within 60 days, and individual notification as required.
- Subcontractor Management: Business Associate Agreements with all subcontractors who may access PHI, ensuring downstream HIPAA compliance.
- Right of Access: Facilitation of individuals' HIPAA right of access to their PHI within 30 days of request through covered entity coordination.
d. Health Data Minimization and De-Identification
We employ aggressive data minimization for health-related information:
- Payment Focus: Collection strictly limited to payment facilitation, never clinical data, diagnoses, treatment plans, lab results, prescriptions, or medical histories.
- Merchant Category Codes: Healthcare transactions identified by merchant category codes (MCC) not specific procedure codes, maintaining privacy while enabling proper transaction processing.
- De-Identification: Health-related data de-identified following HIPAA Expert Determination or Safe Harbor methods for research, analytics, or quality improvement when possible.
- Aggregation: Health transaction data aggregated to population level for trend analysis, removing individual identifiability.
- Tokenization: Account numbers and personal identifiers tokenized in healthcare payment systems, replacing sensitive data with non-sensitive equivalents.
e. Mental Health Data Special Protections
Mental health information receives enhanced protections beyond standard PHI:
- Psychotherapy Notes Exclusion: Never collect or process psychotherapy notes, which have heightened HIPAA protections requiring specific authorization.
- Substance Use Disorder Protection: Compliance with 42 CFR Part 2 for substance use disorder treatment records requiring special consent for disclosure.
- State-Specific Mental Health Laws: Compliance with stricter state laws governing mental health information (California, New York, Illinois, Massachusetts).
- Stigma Prevention: Merchant descriptors for mental health services use neutral terminology preventing identification of service type on statements.
- Crisis Intervention: Protocols for appropriate response if mental health crisis indicators detected during customer service interactions, prioritizing user safety.
f. Reproductive Health Privacy Protections
We implement enhanced protections for reproductive healthcare transactions:
- Sensitive Service Protection: Reproductive health services (contraception, fertility treatment, pregnancy care, abortion services) receive elevated privacy protections.
- Location Data Minimization: Reduced location data retention for reproductive healthcare facilities with automatic deletion after transaction completion.
- Discreet Descriptors: Neutral merchant descriptors on statements protecting privacy from family members, partners, or others with account access.
- Law Enforcement Response: Strict protocols for law enforcement requests involving reproductive healthcare requiring valid legal process and escalation to legal counsel.
- Multi-Jurisdiction Considerations: Recognition of varying state laws regarding reproductive healthcare with privacy protections meeting most stringent applicable standards.
g. Disability and Accommodation Information
Information related to disabilities and accommodations is handled with special care:
- ADA Compliance: Accessibility accommodation requests (screen reader requirements, alternative formats, communication preferences) stored securely and used solely for accommodation provision.
- Limited Access: Disability information accessible only to personnel directly involved in accommodation provision, segregated from general customer data.
- Non-Discrimination: Disability status never used for eligibility, pricing, risk assessment, fraud scoring, or any discriminatory purpose in compliance with ADA and Rehabilitation Act.
- Medical Device Transactions: Purchases of assistive technology and medical devices processed with privacy protections preventing inference of specific disabilities.
h. Health Data Retention and Disposal
Health-related data subject to shortened retention periods and enhanced disposal procedures:
- Reduced Retention: Health transaction data retained for minimum period required by applicable law (typically 6-7 years) then permanently deleted, shorter than standard transaction retention.
- Secure Destruction: Health data destruction using NIST SP 800-88 media sanitization guidelines with certified destruction for physical media and cryptographic erasure for electronic records.
- Backup Purging: Health data purged from all backups, archives, and disaster recovery systems within 90 days of scheduled deletion from production.
- Destruction Documentation: Certificates of destruction maintained for audit purposes documenting date, method, and personnel responsible for health data disposal.
i. Research and Public Health
Use of health data for research or public health purposes:
- Institutional Review Board (IRB): Research involving health data requires IRB approval or equivalent ethical review with documented determination of minimal risk and privacy safeguards.
- De-Identified Data Sets: Research conducted on properly de-identified data sets meeting HIPAA Safe Harbor or Expert Determination standards when possible.
- Public Health Reporting: Limited disclosure to public health authorities as required by law (communicable disease reporting, adverse event reporting) with minimum necessary information.
- Epidemiological Studies: Participation in epidemiological research using aggregated, de-identified data for public health benefit (pandemic response, health outcomes research).
- Opt-Out Rights: Ability to opt out of health data use for research purposes where legally permissible, though public health reporting may remain mandatory.
j. Your Health Data Rights
You have specific rights regarding health-related Personal Data:
- Right of Access: Access to all health-related transaction data we maintain, provided within 30 days (HIPAA compliance) or sooner under applicable privacy laws.
- Right to Amendment: Request correction of inaccurate health information with documented rationale, though we may need covered entity concurrence for PHI.
- Right to Accounting: Accounting of disclosures of health information for purposes other than treatment, payment, and operations in last 6 years.
- Right to Restriction: Request restrictions on use or disclosure of health information, which we will honor unless required by law to disclose.
- Right to Confidential Communication: Request communications about health information through alternative means or locations (different email, physical address, phone).
- Right to Breach Notification: Notification of any breach affecting your health information within timelines required by law (60 days for HIPAA breaches).
- Right to Copy: Electronic copy of health information in readily producible format (EHR, PDF, JSON) at no charge for first copy.
k. Cross-Border Health Data Transfers
International transfers of health data subject to enhanced safeguards:
- Data Localization Compliance: Compliance with health data localization requirements (Russia, China, Indonesia) requiring in-country storage and processing.
- GDPR Article 9 Protections: Explicit consent and appropriate safeguards for cross-border transfers of health data (special category data under GDPR).
- Standard Contractual Clauses: EU SCCs with supplementary measures (encryption, pseudonymization) for health data transfers to non-adequate countries.
- Binding Corporate Rules: Internal BCRs governing health data transfers among corporate affiliates with enhanced protections for sensitive health information.
For questions about health data processing, HIPAA rights, or genetic information protections, contact our Health Privacy Officer at health-privacyprivacy.savecash@gmail.com. For HIPAA-related requests, visit our HIPAA Compliance Portal.
8. Jurisdiction-Specific Provisions - Global Coverage
SaveCash is currently in a pre-launch, waitlist-only phase. We are building a privacy and compliance program that scales globally from day one, and the summaries below describe our planned approach for each jurisdiction once services become commercially available.
Each subsection highlights the controller or representative responsible for that region, the unique rights available to residents, and the mechanisms SaveCash will use to honor local regulatory requirements. Use these provisions when determining which legal entity you are contracting with, which supervisory authority governs your request, and how cross-border transfers or automated decisioning apply to your account.
8.1 European Union (EU) and European Economic Area (EEA)
For residents of EU/EEA countries, we comply with the General Data Protection Regulation (GDPR):
- Data Controller: SaveCash Technology Europe Limited (Dublin, Ireland) serves as data controller for EU/EEA users.
- Legal Bases: Processing based on contract performance, legal obligations, legitimate interests (with balancing test), consent, and substantial public interest.
- Data Protection Officer: Contact our DPO at dpoprivacy.savecash@gmail.com or DPO, Attn: Privacy, 1 Grand Canal Street Lower, Dublin 2, Ireland.
- EU Representative: Our EU representative pursuant to Article 27 GDPR available at eu-representativeprivacy.savecash@gmail.com.
- Supervisory Authority: Right to lodge complaints with your national data protection authority (list available at edpb.europa.eu).
- International Transfers: Data transfers outside EU/EEA use Standard Contractual Clauses (SCCs), Adequacy Decisions, or Binding Corporate Rules with supplementary measures.
- GDPR Rights: Access, rectification, erasure, restriction, portability, objection, and automated decision-making rights fully supported.
- Data Retention: Personal Data retained only as long as necessary for purposes collected, with specific retention schedules available upon request.
- Special Categories: Article 9 special category data (biometric, health, genetic) processed only with explicit consent or legal authorization.
8.2 United Kingdom
UK residents have rights under UK GDPR and Data Protection Act 2018:
- UK Data Controller: SaveCash Payments UK Limited serves as data controller for UK users.
- ICO Registration: Registered with Information Commissioner's Office (ICO), registration number available upon request.
- UK Representative: UK representative pursuant to Article 27 UK GDPR at uk-representativeprivacy.savecash@gmail.com.
- Supervisory Authority: Information Commissioner's Office (ICO), Wycliffe House, Water Lane, Wilmslow, Cheshire SK9 5AF. ico.org.uk
- International Transfers: UK International Data Transfer Agreement (IDTA) or Addendum to SCCs for transfers to non-adequate countries.
- Brexit Adequacy: EU-UK adequacy decision enables free flow of data between UK and EU without additional safeguards.
8.3 United States - Federal Laws
- HIPAA Business Associate: BAAs executed with covered entities, PHI protected per Security and Privacy Rules.
- GLBA Compliance: Gramm-Leach-Bliley Act safeguards, privacy notices, and opt-out rights for financial institutions.
- FCRA Compliance: Fair Credit Reporting Act compliance for credit reporting and adverse action notices.
- COPPA: Children's Online Privacy Protection Act - no knowing collection from children under 13.
- VPPA: Video Privacy Protection Act - video rental/streaming records protected.
- TCPA: Telephone Consumer Protection Act - marketing calls/texts require consent.
8.4 United States - State-Specific Provisions
California (CCPA/CPRA)
- Consumer Rights: Right to know, delete, correct, opt-out of sale/sharing, limit sensitive data use, and non-discrimination.
- Sensitive Personal Information: SSN, driver's license, biometrics, health data, geolocation - opt-in required for secondary uses.
- Do Not Sell/Share: We do not sell personal information. Opt-out available at donotsellprivacy.savecash@gmail.com.
- Authorized Agent: Authorized agents may submit requests with proof of authorization.
- CPRA Enhancements: Risk assessments, data minimization, automated decision-making disclosures.
- California Privacy Rights Act (CPRA) Metrics: Annual privacy metrics report available at our Transparency Report.
Virginia (VCDPA)
- Rights: Access, correction, deletion, portability, opt-out of targeted advertising and sale.
- Sensitive data consent required for: racial/ethnic origin, religious beliefs, health diagnosis, sexual orientation, citizenship, genetic/biometric data.
- Data protection assessments conducted for high-risk processing activities.
- Appeal process: During pre-launch, submit any appeal-related questions to savecash.privacy@gmail.com.
Colorado (CPA)
- Universal opt-out mechanism supported for targeted advertising and sales.
- Profiling in furtherance of automated decisions: right to opt-out and explanation.
- Sensitive data inference prohibited without consent.
- Data protection assessments for targeted advertising, sale, and profiling.
Connecticut (CTDPA)
- Consumer rights: Access, correction, deletion, data portability, opt-out.
- Child data (13-16): Consent required for sale or targeted advertising.
- Privacy notices include data retention schedules and third-party categories.
Utah (UCPA)
- Consumer rights: Access, deletion, portability, opt-out of targeted advertising and sale.
- Sensitive data consent required (racial origin, religious beliefs, mental/physical health, sexual orientation, citizenship, genetic/biometric data).
Additional US States (Comprehensive Coverage)
We comply with privacy laws in all 50 states including:
- Montana, Oregon, Texas: Comprehensive privacy laws effective 2024-2025 with similar consumer rights.
- Illinois (BIPA): Biometric Information Privacy Act - written consent before biometric collection (see Section 11).
- New York (SHIELD Act): Enhanced data security requirements and breach notification.
- Massachusetts: 201 CMR 17.00 comprehensive information security program requirements.
- Nevada: Opt-out right for sale of covered information. Email nevada-optoutprivacy.savecash@gmail.com.
- Maine: Opt-in consent required for sale of internet service provider customer data.
- Washington: My Health My Data Act - consumer health data protections.
- Delaware, Indiana, Iowa, Kentucky, Minnesota, Nebraska, New Hampshire, New Jersey, Rhode Island, Tennessee: State-specific privacy and security requirements fully complied with.
8.5 Canada
- We are aligning our privacy framework with PIPEDA, provincial statutes (Alberta/British Columbia PIPA), and Quebec Law 25 obligations before onboarding Canadian residents.
- Data-subject rights (access, correction, portability, de-indexing) will be operational at launch and supported via savecash.privacy@gmail.com during pre-launch.
- Formal Canadian representative details will be published once our local operations are activated.
8.6 Brazil (LGPD)
- Lei Geral de Proteção de Dados: Brazilian General Data Protection Law compliance.
- Data Protection Officer: A named encarregado (DPO) will be disclosed before Brazilian onboarding; until then, direct inquiries to savecash.privacy@gmail.com.
- Legal Bases: Consent, contract, legal obligation, legitimate interest, credit protection, health protection, or other LGPD bases.
- ANPD Authority: National Data Protection Authority (Autoridade Nacional de Proteção de Dados) oversight.
- Sensitive Data: Explicit consent required for racial/ethnic origin, religious beliefs, political opinions, health, biometric, genetic data.
- International Transfers: Adequacy, SCCs, BCRs, or specific authorization for transfers outside Brazil.
8.7 Mexico, Argentina, Colombia
- Mexico (LFPDPPP): Federal Law on Protection of Personal Data Held by Private Parties compliance with ARCO rights (Access, Rectification, Cancellation, Opposition), explicit consent for financial data, and National Transparency Institute oversight.
- Argentina (PDPA Law 25,326): Adequacy-recognized jurisdiction; registration with the Public Registry of Databases where required, and full observance of Habeas Data remedies.
- Colombia (Law 1581/2012): Superintendence of Industry and Commerce (SIC) registration, Habeas Data procedures, explicit consent for sensitive or children’s data, and international transfer declarations.
- Regional governance: We are preparing localized notices and workflows; beta users will work directly with our privacy team via savecash.privacy@gmail.com.
8.8 Australia (Privacy Act)
- Australian Privacy Principles (APPs): 13 APPs governing collection, use, disclosure, and security.
- Notifiable Data Breaches: OAIC notification within 30 days of awareness of eligible data breach.
- Cross-Border Disclosure: Taking reasonable steps to ensure overseas recipients comply with APPs.
- My Health Records: My Health Records Act compliance for health information.
- Privacy Commissioner: We will publish OAIC contact pathways alongside our own once services are live; pre-launch inquiries go to savecash.privacy@gmail.com.
8.9 Japan (APPI)
- Act on Protection of Personal Information: Purpose specification, limitation, accuracy, and safety management.
- Personal Information Protection Commission: We will follow PPC guidance; current status is preparatory only.
- Sensitive Data (要配慮個人情報): Opt-in consent for race, creed, social status, medical history, criminal records, discrimination/prejudice data.
- Cross-Border Transfers: Consent, adequacy, contract, or PPC approval for transfers outside Japan.
- Individual Rights: Disclosure, correction, suspension of use, and erasure rights.
8.10 Singapore (PDPA)
- Personal Data Protection Act: Consent, purpose limitation, notification, access and correction obligations.
- Data Protection Officer: A DPO contact will be published prior to launch; pre-launch communication flows through savecash.privacy@gmail.com.
- Do Not Call Registry: Compliance with DNC Registry for marketing communications.
- Cross-Border Transfers: Standard of protection comparable to PDPA required for overseas transfers.
- PDPC Compliance: Personal Data Protection Commission oversight and accountability.
8.11 India (DPDPA 2023)
- Digital Personal Data Protection Act: Preparing for full implementation of DPDPA 2023.
- Consent Framework: Free, specific, informed, unconditional, and unambiguous consent with easy withdrawal.
- Data Principal Rights: Access, correction, erasure, grievance redressal, and nominating data nominee.
- Data Protection Board: We are preparing for DPDPA regulatory engagement as implementation timelines finalize.
- Cross-Border Transfers: Government approval framework for transfers to notified countries.
8.12 South Korea, Taiwan, Hong Kong, Philippines, Thailand, Indonesia, Malaysia, Vietnam
- South Korea (PIPA): Local data-controller registration, prior consent for overseas transfers, and alignment with Korean standard contract clauses.
- Taiwan & Hong Kong (PDPA / PDPO): Collection purpose statements, restrictions on cross-border disclosures, and dedicated contact channels for access/correction rights.
- Philippines (DPA 2012): National Privacy Commission notification, privacy impact assessments, and breach reporting within the 72-hour statutory window.
- Thailand & Malaysia (PDPA): Consent-based processing, data-subject rights fulfillment portal, and registrar engagement for cross-border transfer approvals.
- Indonesia (PDP Law 2022): Implementation roadmap for localization requirements, language-specific consents, and data-residency assessments.
- Vietnam (Cybersecurity & PDP Decree): Government notification for certain processing activities, data localization readiness, and incident-reporting protocols.
8.13 China (PIPL)
- Personal Information Protection Law: Separate consent for each purpose, data minimization, and purpose limitation.
- Sensitive Personal Information: Specific purpose and necessity plus separate consent for biometric, religious, health, financial, location, minor (under 14) data.
- Data Localization: Critical information infrastructure operators (CIIO) must store personal information in China with security assessment for outbound transfers.
- Cross-Border Transfers: Security assessment, standard contracts, or certification required for personal information transfers outside China.
- Representative: China representative designated per PIPL Article 53 for non-China controllers/processors.
- Individual Rights: Access, correction, deletion, explanation of processing rules, and portable copy rights.
8.14 Israel, South Africa, UAE, Saudi Arabia, Kenya
- Israel (PPL): Registration with the Israeli Privacy Protection Authority, data-security regulations compliance, and localization of consent forms.
- South Africa (POPIA): Information Officer appointment, Section 72 cross-border transfer assessments, and mandatory breach notifications.
- United Arab Emirates (PDPL) & Dubai DIFC: Federal Personal Data Protection Law alignment plus DIFC Data Protection Law compliance for free-zone operations.
- Saudi Arabia (PDPL): Saudi Data & AI Authority (SDAIA) obligations, localized Arabic privacy notices, and consent protocols for cross-border transfers.
- Kenya (Data Protection Act 2019): Registration with the Office of the Data Protection Commissioner, Data Protection Impact Assessments, and lawful basis tracking.
8.15 Switzerland, Norway, Iceland, Liechtenstein
- Switzerland (FADP 2023): Swiss-based representative, FDPIC notification processes, and alignment with revised Swiss adequacy decisions.
- Norway & Iceland: Enforcement under the EEA implementation of GDPR with direct cooperation with Datatilsynet (Norway) and Persónuvernd (Iceland).
- Liechtenstein: Cooperation with the Data Protection Office (Datenschutzstelle) and support for cross-border financial services data controls.
- Financial Services Readiness: Adherence to FINMA/EEA financial-data guidelines for outsourced processing and strong authentication standards.
8.16 Special Jurisdictions
- Puerto Rico, Guam, US Virgin Islands: Federal US privacy laws apply plus territory-specific regulations.
- Gibraltar, Isle of Man, Jersey, Guernsey: UK GDPR extensions and local data protection laws.
- Macau: Separate data protection regime from mainland China.
8.17 Exercising Jurisdiction-Specific Rights
To exercise your jurisdiction-specific privacy rights or to clarify local compliance requirements, please follow the steps below so our privacy team can verify your identity, understand the scope of your request, and respond within the timelines mandated by local law.
- Primary contact: Email our privacy response team at privacyprivacy.savecash@gmail.com with the subject line “Jurisdiction: [Your Country/State]” and include the rights you wish to exercise.
- Supporting documentation: Attach any materials that help confirm identity or authorized-agent status. We will guide you through any additional verification steps that local law requires.
- Postal submissions: If you prefer to submit by mail, use the mailing addresses listed in our Privacy Contacts Directory and note the jurisdiction you are writing from.
- Authorized agents: Agents should follow the instructions in the Authorized Agents Portal, including submitting proof of authorization and the data subject’s contact details.
- Status updates: We acknowledge requests as soon as they arrive, provide periodic updates, and deliver final responses within the statutory timeframe for the jurisdiction involved.
9. Contact us
If you have any questions or complaints about this Policy, please contact us.
If you are an End Customer (i.e., an individual doing business or transacting with a Business User), please refer to the privacy policy or notice of the Business User for information regarding the Business User's privacy practices, choices and controls, or contact the Business User directly.
10. US Consumer Privacy Notice
The following Consumer Privacy Notice applies to you if you are an individual who resides in the United States and obtains financial services from SaveCash primarily for your own personal, family, or household purposes.
Last updated: January 16, 2025
WHAT DOES SaveCash DO WITH YOUR PERSONAL INFORMATION?
Why? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit some but not all sharing. Federal law also requires us to tell you how we collect, share, and protect your personal information. Please read this notice carefully to understand what we do.
What? The types of personal information we collect and share depend on the product or service you have with us. This information can include:
- Social Security Number
- Contact details
- Account balances and transaction history
- Payment, transaction, and purchase information and history
When you are no longer our customer, we continue to share your information as described in this notice.
How? All financial companies need to share customers' personal information to run their everyday business. In the section below, we list the reasons financial companies can share their customers' personal information; the reasons SaveCash chooses to share; and whether you can limit this sharing.
| Reasons we can share your personal information | Does SaveCash Share? | Can you limit this sharing |
|---|---|---|
| For our everyday business purposes – such as to process your transactions, maintain your account(s), respond to court orders and legal investigations, or report to credit bureaus | Yes | No |
| For our marketing purposes - to offer our products and Services to you | Yes | No |
| For joint marketing with other financial companies | Yes | No |
| For our affiliates' everyday business purposes - information about your transactions and experiences | Yes | No |
| For our affiliates' everyday business purposes - information about your creditworthiness | No | We don't share |
| For our affiliates to market to you | No | We don't share |
| For nonaffiliates to market to you (for data not collected through Financial Connections) | Yes | Yes |
| For nonaffiliates to market to you (for data collected through Financial Connections) | No | We don't share |
To limit our sharing
Login to your SaveCash account and toggle off data sharing from your account settings, or contact us at privacy.savecash@gmail.com.
Please note: If you are a new customer, we can begin sharing your information 30 days from the date we sent this notice. When you are no longer our customer, we continue to share your information as described in this notice.
However, you can contact us at any time to limit our sharing.
Questions?
Contact us at privacy.savecash@gmail.com
Who we are
Who is providing this notice?
SaveCash, Inc., SaveCash Payments Company, and their affiliates that provide consumers services in the U.S.
What we do
How does SaveCash protect my personal information?
To protect your personal information from unauthorized access, destruction, loss, alteration, or misuse we use security measures to comply with federal law. These measures include computer safeguards and secured files and buildings. We impose access controls along with ongoing monitoring to prevent data misuse, and we require our service providers to take similar steps to protect your information.
How does SaveCash collect my personal information?
We collect your personal information, for example, when you
- open a Link account;
- ask SaveCash to process a payment for goods or services;
- provide bank account information to SaveCash using Financial Connections
We also collect your personal information from others, such as affiliates or other companies.
Why can't I limit all sharing?
Federal law gives you the right to limit only
- sharing for affiliates' everyday business purposes — information about your creditworthiness
- affiliates from using your information to market to you
- sharing for nonaffiliates to market to you.
State laws and individual companies may give you additional rights to limit sharing. See the Other Important Information section below for more on your rights under state law.
What happens when I limit sharing for an account I hold jointly with someone else?
Your choices will apply to everyone on your account.
Definitions
Affiliates
Companies related by common ownership or control. They can be financial and nonfinancial companies.
- Our affiliates include companies operating under the SaveCash name, such as SaveCash Technology Europe, Ltd. and SaveCash Payments UK, Ltd.
Nonaffiliates
Companies not related by common ownership or control. They can be financial and nonfinancial companies.
- Nonaffiliates with which we share personal information include service providers that perform services or functions on our behalf, Business Users with which you choose to transact, partners with which we share data to provide you with services, and advertising partners, analytics providers, and social networks, who assist us in advertising our Services to you.
Joint Marketing
A formal agreement between non-affiliated financial companies that together market financial products or services to you.
- Our joint marketing partners include financial companies we partner with to provide you with financial services.
Other important information
Vermont: If your account with us is associated with a Vermont billing address, we will not disclose information about your creditworthiness to our affiliates and will not disclose your personal information, financial information, credit report, or health information to nonaffiliated third parties to market to you, other than as permitted by Vermont law, unless you authorize us to make those disclosures. For joint marketing, we will only disclose your name, contact information, and information about your transactions. Additional information concerning our privacy policies can be found in our Privacy Policy and Privacy Center.
California: If your account with us is associated with a California billing address, we will not disclose Personal Data we collect about you except to the extent permitted under California law. For instance, we may disclose your Personal Data as necessary to process transactions or provide products and services you request, at your instruction, as required for institution risk control, and to safeguard against fraud, identity theft, and unauthorized transactions.
For additional information about our privacy practices, please visit the SaveCash Privacy Center.