Introduction

Chester Prosperity PLC is committed to protecting the privacy and security of your personal information. This Privacy Policy outlines how we collect, use, disclose, and protect your information when you use our services or interact with our website.

By accessing our services or providing us with your personal information, you consent to the practices described in this Privacy Policy.

Information We Collect

We may collect various types of information, including but not limited to:

– Personal Information: Name, contact details, identification information, and other relevant details necessary for our services.

– Financial Information: Account details, transaction history, credit information, and other financial data required for operations.

– Technical Information: IP address, device information, and browsing history when you interact with our website or mobile applications.

– Cookies: We use cookies to enhance your online experience and gather information about how our website is used.

How We Use Your Information

We use your information for the following purposes:

– Providing Financial Services: Managing your accounts, processing transactions, and delivering other services.

– Improving Services: Analyzing data to enhance and personalize our services, troubleshoot issues, and optimize user experience.

– Legal and Regulatory Compliance: Complying with applicable laws, regulations, and fulfilling legal obligations.

– Marketing and Communications: Sending you information about our products, services, and promotions with your consent.

Information Sharing

We may share your information with:

 

– Third-Party Service Providers: Companies or individuals who help us provide services, including but not limited to payment processors, fraud prevention, and customer support.

 

– Legal and Regulatory Authorities: In response to legal requests, court orders, or to comply with legal obligations.

Security Measures

We implement security measures to protect your information from unauthorized access, disclosure, alteration, and destruction. However, no data transmission or storage system can be guaranteed to be 100% secure.