Privacy Policy for Trospo Wallet
Last Updated: October 2, 2025
1. Information We Collect
We collect the following information to provide our VTU services:
- Personal Information: Full name, email address, phone number
- Financial Information: Transaction history, payment details, wallet balance
- App Usage Data: Session information, user interactions for app functionality
2. How We Use Your Information
Your information is used for:
- Account management and authentication
- Processing VTU transactions (airtime, data, cable TV, electricity)
- Maintaining transaction history and receipts
- Customer support and service improvements
- Security and fraud prevention
3. Data Security
We implement industry-standard security measures:
- All data transmission is encrypted using HTTPS
- Sensitive data is stored using secure encryption methods
- Access to user data is strictly limited to authorized personnel
- Regular security audits and updates
4. Data Sharing
We do NOT sell, trade, or share your personal information with third parties except:
- When required by law or legal process
- To our secure payment processors for transaction processing
- To network providers for VTU service delivery
5. Data Retention
- Account Information: Retained while your account is active
- Transaction History: Retained as required by financial regulations
- Session Data: Automatically deleted after logout
6. Your Rights
You have the right to:
- Access your personal information
- Request correction of inaccurate data
- Request deletion of your data (subject to legal requirements)
- Withdraw consent for optional data processing
7. Children's Privacy
Our app is not intended for children under 13. We do not knowingly collect personal information from children under 13.
8. Changes to Privacy Policy
We may update this policy periodically. Users will be notified of significant changes through the app or email.
10. Compliance
This privacy policy complies with:
- Google Play Store requirements
- Nigerian Data Protection Regulation (NDPR)
- General data protection best practices