Who we are
Welcome to oblor escrow services . We are committed to protecting your privacy and handling your personal information with transparency and care. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our escrow service platform, available via our mobile application and website.
2. Information We Collect
2.1 Personal Information
Communication Data:Â Records of your correspondence with us, other users, or customer support.
Identity Information:Â Full name, date of birth, government-issued identification (e.g., driver’s license, passport), photographs.
Contact Information:Â Email address, phone number, physical address.
Financial Information:Â Bank account details, credit/debit card information (processed through third-party payment processors), transaction history.
Verification Information:Â Information required for identity verification, including copies of identification documents and proof of address.
2.2 Transaction Information
Dispute-related communications and documentation.
Details about the escrow transactions you initiate or participate in, including descriptions of goods/services, transaction amounts, payment terms, and parties involved.
3. How We Use Your Information
We use your information for the following purposes:
To send marketing communications (with your consent where required).
To create and manage your account
To verify your identity and prevent fraud
To facilitate escrow transactions between buyers and sellers
To communicate with you about transactions, account updates, and security alerts
To provide customer support and resolve disputes
To comply with legal obligations, including anti-money laundering (AML) and know-your-customer (KYC) regulations
To improve our services, develop new features, and conduct research
Embedded content from other websites
Suggested text: Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.
5. Information Sharing and Disclosure
We may share your information with:
Business Transfers:Â In connection with a merger, acquisition, or sale of assets
Other Transaction Parties:Â Necessary information to facilitate the escrow transaction
Service Providers:Â Payment processors, identity verification services, cloud hosting providers, customer support platforms
Financial Institutions:Â Banks and payment networks as required to process transactions
Legal and Regulatory Authorities:Â When required by law, court order, or to comply with regulatory requirements
Professional Advisors:Â Lawyers, accountants, and auditors as necessary
How long we retain your data
Suggested text: If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
8. Your Rights and Choices
Depending on your location, you may have the following rights:
- Access and receive a copy of your personal data
- Correct inaccurate or incomplete data
- Delete your personal data (subject to legal requirements)
- Restrict or object to processing
- Data portability
- Withdraw consent (where processing is based on consent)
- Opt out of marketing communications
To exercise these rights, contact us at [privacy contact email].
9. Security Measures
We implement appropriate technical and organizational security measures, including:
Secure development practices
Encryption of data in transit and at rest
Regular security assessments and penetration testing
Access controls and authentication protocols
Employee training on data protection
Â
NOTE: You must be at least 16 years old to use this website and our services.
