Privacy Policy

ChatVender is committed to protecting your privacy. This privacy policy explains how we collect, use, and disclose your personal information when you use our services, including our website, mobile applications, and other online products and services (collectively, the "ChatVender Services").

We may also collect information from third-party sources, such as other websites or services, and combine it with information we have collected from you to better understand your preferences and interests.

Who We Are.

ChatVender is a social media platform that enables people to connect with each other, build communities, and grow businesses. We are committed to protecting the privacy of our users and their personal information. Our data controller is ChatVender, Inc. and you can contact us from our contact us page.

What Information Do We Collect. 

When you use the ChatVender Services, we may collect information about you, including:

  • Personal information, such as your name, email address, and phone number, when you create an account or place an order
  • Payment information, such as your credit or debit card details, when you make a purchase
  • Location information, such as your IP address or device location, when you use our website or mobile applications
  • Usage information, such as how you use our services and which pages you visit

How Do We Use Personal Information.

We use the information we collect to provide, maintain, and improve the ChatVender Services, including to:

  • Process and fulfill your orders
  • Communicate with you about your account and orders
  • Personalize your experience on our website and mobile applications
  • Provide customer service and support
  • Send you promotional emails and other marketing communications
  • Analyze usage and trends, and improve our services

What Legal Basis Do We Have for Processing Your Personal Data.

We rely on consent as the legal basis for processing personal data. We will only collect and use personal information with the user's express consent. Users may withdraw their consent at any time by contacting us at [insert contact details].

 

When Do We Share Personal Data.

We may share your information with third parties for the following purposes:

  • With service providers and business partners who perform services on our behalf, such as payment processing, shipping, and customer service
  • With third-party advertisers and partners for marketing and promotional purposes
  • With law enforcement, government agencies, or other third parties as required by law or in response to legal process
  • In the event

Where Do We Store and Process Personal Data.

We store and process personal data on servers located both in the US and the European Economic Area. We take appropriate measures to ensure that personal data is processed according to our privacy policy and the applicable laws of the countries where the data is located. We have put in place appropriate safeguards such as standard contractual clauses, data transfer agreements and other measures to ensure that the data is protected as required by the laws of the countries where the data is processed.

How Do We Secure Personal Data

  1. Encryption: We use industry-standard encryption techniques to protect personal data in transit and at rest. This means that data is scrambled while it is being sent over the internet, and is stored in an encoded format on our servers.

  2. Firewalls: We use firewalls to block unauthorized access to our servers and network infrastructure. Firewalls are a first line of defense against cyber threats and are designed to keep unauthorized users and malicious software out of our systems.

  3. Access Control: We have strict access controls in place to ensure that only authorized personnel have access to personal data. This includes role-based access controls, where different users have different levels of access depending on their role and responsibilities.

  4. Regular Auditing: We conduct regular audits of our systems and infrastructure to ensure that our security measures are effective and to identify and address any vulnerabilities.

  5. Incident Response Plan: We have an incident response plan in place to quickly and effectively respond to any security breaches or other incidents that may affect the security of personal data.

  6. Employee Training: All of our employees are trained on security best practices and data protection regulations, and are made aware of their responsibilities to protect the personal data of our users.

  7. Third-Party Risk Management: We conduct thorough security reviews of any third-party service providers that we work with and require them to comply with industry-standard