Privacy Policy

Instanly Mobile Application

Last updated: June 30, 2025
Version: 3.0 | Effective date: July 1, 2025

๐Ÿ”’ Privacy Commitment

Instanly SARL ("we", "our", "us") is firmly committed to protecting your privacy and personal data. This Privacy Policy transparently details how we collect, use, store, and protect your information when using our mobile application for instant money transfers and interoperability between African mobile wallets.

๐Ÿข1. Entity Identification and Legal Status

1.1 Company Identity

1.2 Operating Jurisdictions

1.3 Nature of our Services

โš ๏ธ IMPORTANT CLARIFICATION: Instanly is a technology service provider and NOT a financial institution. We never hold user funds and do not provide wallets, accounts, or deposit services. We act exclusively as an API interoperability layer that connects users to licensed financial partners who execute the actual transfers. Funds are debited from the sender and instantly credited to the recipient via licensed providers.

๐Ÿ“‹2. Personal Data Collected

To provide and improve our services in compliance with KYC/AML regulations and security requirements, we collect the following categories of personal data:

2.1 Identification and KYC Data

2.2 Contact and Communication Data

2.3 Transactional and Financial Data

2.4 Technical and Usage Data

2.5 Biometric and Security Data

2.6 Analytics and Behavioral Data

โš™๏ธ3. Data Processing Purposes

3.1 Primary Purposes (Contract Performance)

  1. Executing money transfers: Secure and instant transaction processing
  2. Identity verification (KYC): Compliance with financial regulations
  3. Fraud prevention: Detection and prevention of suspicious activities
  4. Customer support: Technical assistance and problem resolution
  5. Providing receipts: Transaction documentation

3.2 Secondary Purposes (Legitimate Interest)

  1. Service improvement: User experience optimization
  2. Platform security: Protection against cyberattacks
  3. Analytics and statistics: Usage trend analysis
  4. New feature development: Product innovation
  5. Regulatory compliance: Legal obligation fulfillment

3.3 Purposes with Explicit Consent

  1. Personalized marketing: Offers tailored to preferences (OPT-IN only)
  2. Referral program: Recommendation and bonus management
  3. Push notifications: Personalized transaction alerts
  4. Precise geolocation: Location-based services
  5. Social media sharing: Success and achievement publishing

๐Ÿšซ What we NEVER do

๐Ÿ”4. Data Security and Protection

4.1 Technical Security Measures

Domain Applied Measures Standards/Certifications
Encryption in Transit TLS 1.3, Perfect Forward Secrecy FIPS 140-2 Level 3
Encryption at Rest AES-256-GCM, rotating keys FIPS 140-2 Level 4
Authentication MFA, biometrics, JWT tokens OATH TOTP/HOTP
Infrastructure Secure AWS/Azure, WAF SOC 2 Type II, ISO 27001
Monitoring 24/7 SIEM, anomaly detection NIST Cybersecurity Framework

4.2 Organizational Measures

4.3 Sensitive Data Protection

Biometric Data

Financial Data

๐ŸŒ5. Data Storage and International Transfers

5.1 Data Location

Data Type Primary Location Secondary Location Purpose
KYC/Identity Data Cรดte d'Ivoire (MTN Data Center) Germany (Private Cloud) Local compliance + Backup
Transactional Data Multi-region Africa Europe (AWS Frankfurt) Performance + Redundancy
Logs and Analytics United States (Google) Europe (Google) Processing and analysis
Biometric Data Cรดte d'Ivoire only N/A Maximum protection

5.2 International Transfer Safeguards

5.3 Cloud Partners and Subprocessors

Partner Service Location Certifications
Cloudflare / Amazon Web Services Cloud infrastructure Multi-regions SOC 1/2/3, ISO 27001, PCI-DSS
Google Firebase Analytics, authentication Europe, United States ISO 27001, SOC 2
MTN CLOUD CI Cรดte d'Ivoire Data Center Abidjan, CI ISO 27001, Tier III
WORKCLOUD AFRICA Backup Abidjan, Ivory Coast ISO 27001, HDS

๐Ÿ‘ฎ6. Data Sharing with Third Parties

6.1 Licensed Financial Partners (Contractual Necessity)

Payment Service Providers (PSP)

Data shared: Name, phone number, amount, transaction reference

Legal basis: Transfer contract performance

Aggregators and Technical Partners

Data shared: Minimal necessary transactional information

Safeguards: Data processing agreements, end-to-end encryption

6.2 KYC and Compliance Providers

Data shared: Identity documents, photos, biographical data

Retention period: Maximum 90 days for verification

6.3 Authorities and Regulatory Bodies

โš–๏ธ Legal Communication Obligations

We may be required to share your data with:

Notification: You will be informed unless expressly prohibited by law

6.4 Analytics Platforms (Pseudonymized Data)

Data shared: Anonymous identifiers, usage events, technical data

Opt-out available: Via application settings

โš–๏ธ7. Your Rights and How to Exercise Them

7.1 Fundamental Rights (GDPR and National Laws)

๐Ÿ” Right of Access (Article 15 GDPR)

โœ๏ธ Right to Rectification (Article 16 GDPR)

๐Ÿ—‘๏ธ Right to Erasure / "Right to be Forgotten" (Article 17 GDPR)

๐Ÿ”’ Right to Restriction of Processing (Article 18 GDPR)

๐Ÿ“ฆ Right to Data Portability (Article 20 GDPR)

๐Ÿšซ Right to Object (Article 21 GDPR)

7.2 Biometric Data Specific Rights

7.3 Minor-Specific Rights (Under 18 years)

๐Ÿ‘ถ Enhanced Protection for Minors

7.4 How to Exercise Your Rights

๐Ÿ“ง Contact Methods

๐Ÿ“‹ Information to Provide

โฑ๏ธ Processing Times

๐Ÿงพ8. Legal Basis for Processing

8.1 Categorization by Legal Basis

Legal Basis Data Concerned Purposes Duration
Explicit Consent Biometric data, precise geolocation Authentication, geolocated services Until revocation
Contract Performance Identity, contact details, transactions Money transfers, customer support Contract duration + 5 years
Legal Obligation KYC, transaction history AML/CFT compliance, taxation 10 years minimum
Legitimate Interest Analytics, security logs Service improvement, security 3 years maximum

8.2 Legitimate Interest Assessment

We have conducted impact assessments (DPIA) for each processing based on legitimate interest:

โฐ9. Data Retention Period

9.1 Detailed Retention Schedule

Data Category Active Retention Intermediate Archiving Final Fate
Identification data (KYC) During relationship + 5 years 5 additional years Definitive deletion
Transaction history 10 years (legal obligation) 5 years (tax archiving) Anonymization
Biometric data During use Not applicable Deletion upon deactivation
Technical logs 3 years 2 years (security) Definitive deletion
Marketing data 3 years after last interaction Not applicable Definitive deletion
Customer support 3 years after resolution 2 years (improvement) Anonymization

9.2 Automatic Purge Process

๐Ÿ”ง10. Cookies and Tracking Technologies

10.1 Types of Cookies Used

๐Ÿ”’ Strictly Necessary Cookies (Exempt from Consent)

๐Ÿ“Š Performance Cookies (Consent Required)

๐ŸŽฏ Functionality Cookies (Consent Required)

10.2 Consent Management

10.3 Alternative Technologies

๐Ÿšจ11. Incident Management and Data Breaches

11.1 Breach Notification Procedure

โšก Incident Response Plan (24/7)

  1. Detection: Automatic SIEM systems + human monitoring
  2. Containment: Immediate isolation of affected systems
  3. Assessment: Risk level classification (1-4)
  4. Authority notification: CNIL within 72 hours if high risk
  5. User notification: Within 72 hours if risk to rights
  6. Remediation: Vulnerability correction
  7. Final report: Post-incident analysis and improvements

11.2 Types of Incidents Covered

11.3 Incident Communication

๐Ÿ“ž Security Emergency Contacts

๐ŸŒ12. Multi-Jurisdictional Compliance

12.1 General Data Protection Regulation (GDPR)

12.2 California Consumer Privacy Act (CCPA)

12.3 Personal Data Protection Law (Cรดte d'Ivoire)

12.4 Other Applicable Regulations

๐Ÿ”„13. Policy Updates

13.1 Versioning and History

13.2 Modification Process

  1. Impact analysis: Assessment of regulatory changes
  2. Internal consultation: Legal and technical review
  3. DPO validation: Compliance and consistency
  4. Prior notification: 30 days before effective date
  5. Publication: Website, application, email

13.3 Types of Modifications

Minor Modifications (Simple Notification)

Major Modifications (Consent Required)

๐ŸŽ“14. Glossary and Definitions

Technical Terms

Legal Terms

Financial Terms

๐Ÿ“ฉ15. Contacts and Complaints

๐Ÿ›ก๏ธ Data Protection Officer (DPO)

๐Ÿข Legal Department

๐ŸŒ International Representatives

โš–๏ธ Supervisory Authorities

โ—16. Disclaimer and Limitations

๐Ÿ”„ Nature of our Services

IMPORTANT REMINDER: Instanly is a technology service provider and NOT a financial institution. We never hold user funds and do not offer banking services. We act exclusively as an interoperability platform that connects users to licensed financial service providers.

๐Ÿ›๏ธ Partner Brands and Logos

Intellectual property: All logos and icons representing mobile money operators (MTN, Orange, Moov, M-Pesa, Airtel, Wave, etc.) used in the Instanly application and website are the property of their respective holders. They are displayed solely to indicate interoperability and compatibility with their services and do not imply any ownership, partnership, or endorsement except where explicitly stated otherwise.

โš–๏ธ PSP Responsibility

Licensed payment service providers (PSPs) are responsible for holding, debiting, and crediting funds under regulatory supervision. Instanly cannot be held responsible for decisions, policies, or malfunctions of partner PSPs.