Privacy Policy

Who we are

Welcome to oblor escrow services . We are committed to protecting your privacy and handling your personal information with transparency and care. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our escrow service platform, available via our mobile application and website.

2. Information We Collect

2.1 Personal Information

Communication Data: Records of your correspondence with us, other users, or customer support.

Identity Information: Full name, date of birth, government-issued identification (e.g., driver’s license, passport), photographs.

Contact Information: Email address, phone number, physical address.

Financial Information: Bank account details, credit/debit card information (processed through third-party payment processors), transaction history.

Verification Information: Information required for identity verification, including copies of identification documents and proof of address.

2.2 Transaction Information

Dispute-related communications and documentation.

Details about the escrow transactions you initiate or participate in, including descriptions of goods/services, transaction amounts, payment terms, and parties involved.

3. How We Use Your Information

We use your information for the following purposes:

To send marketing communications (with your consent where required).

To create and manage your account

To verify your identity and prevent fraud

To facilitate escrow transactions between buyers and sellers

To communicate with you about transactions, account updates, and security alerts

To provide customer support and resolve disputes

To comply with legal obligations, including anti-money laundering (AML) and know-your-customer (KYC) regulations

To improve our services, develop new features, and conduct research

Embedded content from other websites

Suggested text: Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

5. Information Sharing and Disclosure

We may share your information with:

Business Transfers: In connection with a merger, acquisition, or sale of assets

Other Transaction Parties: Necessary information to facilitate the escrow transaction

Service Providers: Payment processors, identity verification services, cloud hosting providers, customer support platforms

Financial Institutions: Banks and payment networks as required to process transactions

Legal and Regulatory Authorities: When required by law, court order, or to comply with regulatory requirements

Professional Advisors: Lawyers, accountants, and auditors as necessary

How long we retain your data

Suggested text: If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

8. Your Rights and Choices

Depending on your location, you may have the following rights:

  • Access and receive a copy of your personal data
  • Correct inaccurate or incomplete data
  • Delete your personal data (subject to legal requirements)
  • Restrict or object to processing
  • Data portability
  • Withdraw consent (where processing is based on consent)
  • Opt out of marketing communications

To exercise these rights, contact us at [privacy contact email].

9. Security Measures

We implement appropriate technical and organizational security measures, including:

Secure development practices

Encryption of data in transit and at rest

Regular security assessments and penetration testing

Access controls and authentication protocols

Employee training on data protection

 

NOTE: You must be at least 16 years old to use this website and our services.