Acceptance of the Privacy Policy
This Privacy Policy describes our policies and procedures on the collection, use, and disclosure of your information when you use our services and informs you about your privacy rights and how the law protects you. By using our services, you agree to the collection and use of information in accordance with this Privacy Policy.
Interpretation and Definitions
Interpretation
The words of which the initial letter is capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or in plural.
Definitions
For the purposes of this Privacy Policy:
Collecting and Using Your Personal Data
Types of Data Collected
Personal Data
While using our service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally identifiable information may LLC include, but is not limited to:
We use automated services to screen customers when making crypto purchases or sales to comply with "know your customer" and other government rules and regulations.
Usage Data
Usage Data is collected automatically when using the service. Usage Data may include information such as your device's Internet Protocol address (e.g., IP address), browser type, browser version, the pages of our service that you visit, the time and date of your visit, the time spent on those pages, unique device identifiers, and other diagnostic data. When you access the service by or through a mobile device, we may collect certain information automatically, including, but not limited to, the type of mobile device you use, your mobile device unique ID, the IP address of your mobile device, your mobile operating system, the type of mobile internet browser you use, unique device identifiers, and other diagnostic data. We may also collect information that your browser sends whenever you visit our service or when you access the service by or through a mobile device.
Tracking Technologies and Cookies
We use cookies and similar tracking technologies to track the activity on our service and store certain information. Tracking technologies used are beacons, tags, and scripts to collect and track information and to improve and analyze our service. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some parts of our service. Cookies can be "persistent" or "session" cookies. Persistent cookies remain on your personal computer or mobile device when you go offline, while session cookies are deleted as soon as you close your web browser.
Use of Your Personal Data
The Company may use Personal Data for the following purposes:
Sharing Your Personal Data
We may share your personal information in the following situations:
Retention of Your Personal Data
The Company will retain your personal data only for as long as is necessary for the purposes set out in this Privacy Policy. We will retain and use your personal data to the extent necessary to comply with our legal obligations (for example, if we are required to retain your data to comply with applicable laws), resolve disputes, and enforce our legal agreements and policies. The Company will also retain usage data for internal analysis purposes. Usage data is generally retained for a shorter period of time, except when this data is used to strengthen the security or to improve the functionality of our service, or we are legally obligated to retain this data for longer periods.
Transfer of Your Personal Data
Your information, including personal data, is processed at the company’s operating offices and in any other place where the parties involved in the processing are located. It means that this information may be transferred to — and maintained on — computers located outside of your state, province, country, or other governmental jurisdiction where the data protection laws may differ from those from your jurisdiction. Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer. The company will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your personal data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information.
Disclosure of Your Personal Data
We may disclose your personal data in the good faith belief that such action is necessary to:
Security of Your Personal Data
The security of your personal data is important to us, but remember that no method of transmission over the internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your personal data, we cannot guarantee its absolute security.
General Data Protection Regulation (GDPR)
The Gramm-Leach-Bliley Act (the "GLBA") is also known as the Financial Modernization Act of 1999. It is a United States federal law, enforced by the Federal Trade Commission ("FTC") that requires financial institutions to explain how they share and protect their customers’ private information. To be GLBA compliant, financial institutions must communicate to their customers how they share the customers’ sensitive data, inform customers of their right to opt-out if they prefer that their information not be shared with third parties, and apply specific protections to customers’ private data in accordance with a written information security plan created by the institution.
Children’s Privacy
Our service does not address anyone under the age of 13. We do not knowingly collect personally identifiable information from anyone under the age of 13.
Clean Desk Policy
To ensure the security and confidentiality of Personal Identifiable Information (PII), all employees must adhere to the following clean desk standards:
Email Use Policy
To protect the integrity and confidentiality of PII communicated via email, the following email use standards are enforced:
Remote Networking Policy
When accessing company systems remotely, employees must follow these standards to protect PII:
Password Policy
To prevent unauthorized access to systems containing PII, the following password standards are in place:
Records Management Policy
To ensure proper handling of records containing PII, the following standards are enforced:
Gramm-Leach-Bliley Act (GLBA) Compliance
As required by the GLBA, we implement the following measures to protect PII:
If you have any questions or concerns about our privacy practices, please contact us at:
Email: info@mandioca.global
Website: [mandioca.global]
Contact Information:
If you have any questions or wish to revoke your consent, please contact us at: