Privacy Policy - Moneyto Limited
YOUR PRIVACY IS RESPECTED HERE
We aim to be transparent. We care so much about our business, and you are key to it. That is why we do not hide behind complex wording and fine print.
Read our Privacy Policy below to understand what we use your data for.
When we provide our services to our Customers, we are acting on their behalf as their service provider and processor. If you are a user that is using our service on behalf of one of our customers, your personal data is processed in accordance to:
- data protection legislation
- instructions given to us from the Customer
- the section in our privacy policy that talks about our Leads, Website Visitors, Customers, Users, Staff, Subscribers, Viewers/Listeners and
- the privacy policy of the Customer, which is made available by them (normally on their website)
- Contact Details: examples include real name, email address, address, telephone number, social media username, title, physical address.
- Financial Data: examples include credit card number, credit card verification number (CCV), credit card expiry date, bank account number, billing address, transaction code (TAN), income information, VAT number, credit score.
- Household and Relationships: examples include emergency contact, marital status, parent/guardian status, propery ownership, family status, information about individual's children, next of kin, emergency contact details.
- Identifiers and Legal Documents: examples include public health number, passport, proof of residence, right to work status, visa status, social security number / national insurance number, driving license data, national identification document, signature.
- Activity and Behavioural: examples include browsing history, search history, likes, clicks, shopping cart information, products purchased.
- Personal Characteristics: examples include sex, nationality, date of birth, gender, academic qualifications, height, age.
- Location Data: examples include tracking data, approximate location.
- Communications Data: examples include instant messaging data, social media posts, postal content.
- Images and Recordings: examples include cctv footage, photos, videos, voice recordings, profile picture.
- Views and Opinions: examples include survey responses, testimonials/references, opinions (non-political/religious/philosophical).
- Technical Identifiers: examples include ip address, mac address, usernames, passwords, browser data, other device identifiers, uique identifier.
- Aggregated Data: examples include such as statistical or demographic data for any purpose. Aggregated Data could be derived from your personal data but is not considered personal data in law as this data will not directly or indirectly reveal your identity.
- For example, we may aggregate your Usage Data to calculate the percentage of users accessing a specific website feature.
This is just an overview, please see the next section to see in more detail, exactly what we use.
We process your information for the purposes described in this policy, based on the following legal bases:
- Consent: the individual has given clear consent for us to process their personal data for a specific purpose.
- Legitimate interests: a legitimate interest is when we have a business or commercial reason to use your information, so long as this is not overridden by your own rights and interests.
- Contractual Obligations: the processing is necessary for a contract we have with the individual, or because they have asked us to take specific steps before entering into a contract.
- Legal Obligations: the processing is necessary for us to comply with the law.
Purpose | Personal Data Category | Legal Justification |
---|---|---|
Accounts Payable | Contact Details, Financial Data | Contractual Obligations |
Internal Communication | Communications Data, Contact Details | Legitimate Interest |
Purpose | Personal Data Category | Legal Justification |
---|---|---|
Accounts Receivable | Contact Details, Financial Data | Contractual Obligations |
Anti-Money Laundering (AML) Checks | Contact Details, Household and Relationships, Identifiers and Legal Documents, Images and Recordings, Personal Characteristics | Legal Obligations |
Authenticating Users | Contact Details, Technical Identifiers | Contractual Obligations |
B2C Email/Text Digital Marketing (existing customers) | Contact Details, Personal Characteristics | Consent |
B2C Telephone Marketing (existing customers) | Contact Details, Personal Characteristics | Consent |
Business Intelligence & Analytics | Activity and Behavioural, Contact Details, Personal Characteristics, Technical Identifiers | Legitimate Interest |
Collecting Customer Reviews | Contact Details, Views and Opinions | Legitimate Interest |
Customer Relationship Management (CRM) | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
Customer Support | Contact Details, Personal Characteristics, Views and Opinions | Legitimate Interest |
Error & Log Management | Contact Details, Technical Identifiers | Contractual Obligations |
Lead Generation | Technical Identifiers | Consent |
Onboarding & Product Demos | Activity and Behavioural, Contact Details, Views and Opinions | Legitimate Interest |
Processing Transactions (Payments) | Contact Details, Financial Data, Technical Identifiers | Contractual Obligations |
Publish App to App Store | Contact Details, Technical Identifiers | Contractual Obligations |
Publish App to Google Play Store | Contact Details, Technical Identifiers | Contractual Obligations |
Targeted Advertising | Activity and Behavioural, Contact Details, Location Data, Personal Characteristics, Technical Identifiers | Legitimate Interest |
Website Tracking/Webapp tracking | Activity and Behavioural, Technical Identifiers | Consent |
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's privacy policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
Purpose | Personal Data Category | Legal Justification |
---|---|---|
Business Intelligence & Analytics | Activity and Behavioural, Contact Details, Personal Characteristics, Technical Identifiers | Legitimate Interest |
Customer Relationship Management (CRM) | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
Lead Generation | Contact Details, Technical Identifiers | Consent |
Onboarding & Product Demos | Activity and Behavioural, Contact Details, Views and Opinions | Legitimate Interest |
Publish App to App Store | Contact Details, Technical Identifiers | Contractual Obligations |
Publish App to Google Play Store | Contact Details, Technical Identifiers | Contractual Obligations |
Targeted Advertising | Activity and Behavioural, Contact Details, Location Data, Personal Characteristics, Technical Identifiers | Legitimate Interest |
Website Hosting | Technical Identifiers | Legal Obligations |
Website Tracking/Webapp tracking | Activity and Behavioural, Technical Identifiers | Consent |
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's privacy policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
Purpose | Personal Data Category | Legal Justification |
---|---|---|
Collaboration & Communication | Communications Data, Contact Details, Technical Identifiers, Views and Opinions | Consent |
Customer Relationship Management (CRM) | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
Expense Management | Contact Details, Financial Data | Contractual Obligations |
Internal Communication | Communications Data, Contact Details | Legitimate Interest |
Financial Data, Identifiers and Legal Documents, Technical Identifiers | Contractual Obligations | |
Payroll | Contact Details, Financial Data, Identifiers and Legal Documents, Personal Characteristics | Contractual Obligations |
Remuneration and Benefits | Contact Details, Financial Data, Identifiers and Legal Documents | Contractual Obligations |
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's privacy policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
Purpose | Personal Data Category | Legal Justification |
---|---|---|
Customer Relationship Management (CRM) | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
Publish App to App Store | Contact Details, Technical Identifiers | Contractual Obligations |
Publish App to Google Play Store | Contact Details, Technical Identifiers | Contractual Obligations |
Sending a Newsletter | Contact Details | Consent |
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's privacy policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
Purpose | Personal Data Category | Legal Justification |
---|---|---|
Customer Relationship Management (CRM) | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's privacy policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
Purpose | Personal Data Category | Legal Justification |
---|---|---|
Accounts Payable | Contact Details, Financial Data | Contractual Obligations |
Internal Communication | Communications Data, Contact Details | Legitimate Interest |
Password and Credential Safekeeping | Financial Data, Identifiers and Legal Documents, Technical Identifiers | Contractual Obligations |
Purpose | Personal Data Category | Legal Justification |
---|---|---|
Authenticating Users | Contact Details, Technical Identifiers | Contractual Obligations |
Business Intelligence & Analytics | Technical Identifiers | Legitimate Interest |
Consent Management | Contact Details, Financial Data, Household and Relationships, Identifiers and Legal Documents, Images and Recordings, Location Data, Technical Identifiers | Legal Obligations |
Customer Relationship Management (CRM) | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
Customer Support | Contact Details, Personal Characteristics, Views and Opinions | Legitimate Interest |
Lead Generation | Technical Identifiers | Consent |
Publish App to App Store | Activity and Behavioural, Contact Details, Technical Identifiers | Contractual Obligations |
Publish App to Google Play Store | Activity and Behavioural, Contact Details, Technical Identifiers | Contractual Obligations |
Targeted Advertising | Technical Identifiers | Legitimate Interest |
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's privacy policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
Purpose | Personal Data Category | Legal Justification |
---|---|---|
Customer Relationship Management (CRM) | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's privacy policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
Purpose | Personal Data Category | Legal Justification |
---|---|---|
Business Intelligence & Analytics | Technical Identifiers | Legitimate Interest |
Consent Management | Activity and Behavioural, Technical Identifiers | Legal Obligations |
Customer Relationship Management (CRM) | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
Lead Generation | Technical Identifiers | Consent |
Navigation & Map Display | Location Data, Technical Identifiers | Consent |
Targeted Advertising | Activity and Behavioural, Contact Details, Location Data, Personal Characteristics, Technical Identifiers | Legitimate Interest |
Website Hosting | Contact Details, Technical Identifiers | Legal Obligations |
Website Tracking/Webapp tracking | Activity and Behavioural, Technical Identifiers | Consent |
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's privacy policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
We use different methods to collect data from and about you including through:
Direct interactions - you may give us information on your Contact Details, Identifiers, Financial Data... (all the categories that come through direct interactions) by filling in forms or by corresponding with us by post, phone, email, via our website or otherwise. This includes personal data you provide when you:
- apply for our products or services;
- create an account with us;
- subscribe to publications;
- request marketing to be sent to you; or
- give us feedback or contact us.
Automated technologies or interactions. - As you interact with our website and services, we will automatically collect Technical, Profile and Usage Data about your equipment, browsing actions, and patterns.
Third parties or publicly available sources. - We might receive personal data about you from various third parties or publicly available sources like the ones set below.
- Work-related data from online recruitment platforms or professional networks.
- Identity and Contact Data from publicly available sources.
We might store or send personal data about you to various third parties set out below.
Third Party | Encryption | Data Residency |
---|---|---|
Facebook Pixel | Encryption in Transit, Encryption at Rest | United States |
Grav | - | Global |
Appsflyer | Encryption in Transit, Encryption at Rest | Global |
Google Tag Manager | Encryption in Transit, Encryption at Rest | United States |
DoubleClick Ad | Encryption in Transit, Encryption at Rest | European Economic Area |
Google Analytics | Encryption in Transit, Encryption at Rest | United States |
Google Ads | Encryption in Transit, Encryption at Rest | European Economic Area |
Quickbooks | Encryption in Transit, Encryption at Rest | United States |
Google Sign-in | Encryption in Transit, Encryption at Rest | United States |
Digital Ocean | Encryption in Transit, Encryption at Rest | United States |
Freshdesk | Encryption in Transit, Encryption at Rest | United States |
Ondato | Encryption in Transit, Encryption at Rest | European Economic Area |
Bitwarden | Encryption in Transit, Encryption at Rest | United States |
App Store | Encryption in Transit, Encryption at Rest | United States |
Google Play Store | Encryption in Transit, Encryption at Rest | United States |
TrueLayer | Encryption in Transit, Encryption at Rest | European Economic Area |
Checkout | Encryption in Transit, Encryption at Rest | United Kingdom |
Google Fonts | Encryption in Transit, Encryption at Rest | United States |
Trustpilot | Encryption in Transit, Encryption at Rest | European Economic Area |
Google Maps Places | Encryption in Transit, Encryption at Rest | European Economic Area |
Moneyto app | Encryption in Transit, Encryption at Rest | United Kingdom |
Usercentrics Consent Management Platform | Encryption in Transit, Encryption at Rest | Germany |
RingCentral | Encryption in Transit, Encryption at Rest | Global |
Google Firebase | Encryption in Transit, Encryption at Rest | European Economic Area |
MaxMind | Encryption in Transit, Encryption at Rest | United States |
Privasee | Encryption in Transit, Encryption at Rest | Ireland |
Dun & Bradstreet | Encryption in Transit, Encryption at Rest | United States |
YouTube | Encryption in Transit, Encryption at Rest | United States |
Bitbucket | Encryption in Transit, Encryption at Rest | Australia |
TravelPerk | Encryption in Transit, Encryption at Rest | European Economic Area |
Calendly | Encryption in Transit, Encryption at Rest | United States |
Freshsales | Encryption in Transit, Encryption at Rest | United States |
Anymailfinder | Encryption in Transit, Encryption at Rest | United States |
Grafana | Encryption in Transit, Encryption at Rest | United States |
Some of our external third parties are based outside the UK and EEA so their processing of your personal data will involve a transfer of data outside the UK and EEA. Whenever we transfer your personal data out of the UK and EEA, we ensure a similar degree of protection is afforded to it by ensuring at least one of the following safeguards is implemented:
- the country to which personal data is being transferred has been deemed to provide an adequate level of protection for personal data by the European Commission; or
- we use specific contracts approved by the European Commission which give personal data the same protection it has in the UK and Europe.
We have put in place appropriate security measures to prevent your personal data from being accidentally lost, used, or accessed in an unauthorised way, altered, or disclosed. In addition, we limit access to your personal data to those employees, agents, contractors, and other third parties who have a business need to know. They will only process your personal data on our instructions and they are subject to a duty of confidentiality.
We have put in place procedures to deal with any suspected personal data breach and will notify you and any applicable regulator of a breach where we are legally required to do so.
Where you have chosen a password that enables you to access certain parts of our applications, you are responsible for keeping this password confidential. We ask you not to share the password with anyone.
We will only retain your personal data for as long as reasonably necessary to fulfil the purposes we collected it for, including for the purposes of satisfying any legal, regulatory, tax, accounting, or reporting requirements. We may retain your personal data for a longer period in the event of a complaint or if we reasonably believe there is a prospect of litigation with respect to our relationship with you.
To determine the appropriate retention period for personal data, we consider the amount, nature, and sensitivity of the personal data, the potential risk of harm from unauthorised use or disclosure of your personal data, the purposes for which we process your personal data and whether we can achieve those purposes through other means, and the applicable legal, regulatory, tax, accounting, or other requirements.
In specific scenarios where our role is designated as a data processor, the duration for which data is retained is not determined by us. Instead, this time period is set and mandated by the data controller, in accordance with their policies and regulatory requirements. This ensures a clear understanding and compliance with the data controller's guidelines and legal obligations.
Your personal data is not used in any automated decision making (a decision made solely by automated means without any human involvement) or profiling (automated processing of personal data to evaluate certain conditions about an individual).
You have the right to:
Request access to your personal data (commonly known as a "data subject access request"). This enables you to receive a copy of the personal data we hold about you and to check that we are lawfully processing it.
Request correction of the personal data that we hold about you. This enables you to have any incomplete or inaccurate data we hold about you corrected, though we may need to verify the accuracy of the new data you provide to us.
Request erasure of your personal data. This enables you to ask us to delete or remove personal data where there is no good reason for us to continue to process it. You also have the right to ask us to delete or remove your personal data where you have successfully exercised your right to object to processing (see below), where we may have processed your information unlawfully or where we are required to erase your personal data to comply with local law. Note, however, that we may not always be able to comply with your request of erasure for specific legal reasons which will be notified to you, if applicable, at the time of your request.
Object to processing of your personal data where we are relying on a legitimate interest (or those of a third party) and there is something about your particular situation which makes you want to object to processing on this ground as you feel it impacts on your fundamental rights and freedoms. You also have the right to object where we are processing your personal data for direct marketing purposes. In some cases, we may demonstrate that we have compelling legitimate grounds to process your information which override your rights and freedoms.
Request restriction of processing of your personal data. This enables you to ask us to suspend the processing of your personal data in the following scenarios:
- If you want us to establish the data's accuracy.
- Where our use of the data is unlawful, but you do not want us to erase it.
- Where you need us to hold the data even if we no longer require it as you need it to establish, exercise, or defend legal claims.
- You have objected to our use of your data, but we need to verify whether we have overriding legitimate grounds to use it.
Request the transfer of your personal data to you or to a third party. We will provide to you, or a third party you have chosen, your personal data in a structured, commonly used, machine-readable format. Note that this right only applies to automated information which you initially provided consent for us to use or where we used the information to perform a contract with you.
Withdraw consent at any time where we are relying on consent to process your personal data. However, this will not affect the lawfulness of any processing carried out before you withdraw your consent. If you withdraw your consent, we may not be able to provide certain products or services to you. We will advise you if this is the case at the time you withdraw your consent.
Make a complaint you have the right to make a complaint at any time to the relevant regulator
You will not have to pay a fee to access your personal data (or to exercise any of the other rights). However, we may charge a reasonable fee if your request is clearly unfounded, repetitive, or excessive. Alternatively, we could refuse to comply with your request in these circumstances.
We may need to request specific information from you to help us confirm your identity and ensure your right to access your personal data (or to exercise any of your other rights). This is a security measure to ensure that personal data is not disclosed to any person who has no right to receive it. We may also contact you to ask you for further information concerning your request to speed up our response.
We try to respond to all legitimate requests within one month. Occasionally it could take us longer than a month if your request is particularly complex or you have made several requests. In this case, we will notify you and keep you updated.
This website may include links to third-party websites, plug-ins and applications. Clicking on those links or enabling those connections may allow third parties to collect or share data about you. We do not control these third-party websites and are not responsible for their privacy statements. When you leave our website, we encourage you to read the privacy policy of every website you visit.