![]() ![]() The Operator, with the approval of respective Users (Funder and/or Beneficiary) accesses, acquires, stores, administers, and/or uses the Users’ personal data of Users (“Data Utilization”) on or inside objects, electronic devices (including smartphones or phone cellular), hardware, software, electronic documents, applications, or electronic systems belonging to Users or controlled by the Users, by notifying the purpose, limitations and mechanisms of the Data Utilization to the Users concerned before obtaining such consent. ![]() No national entity or authority is responsible for any such risks. Every Funder is fully responsible for all credit risks of late or default payments.The sharia-compliant, information technology-based peer-to-peer financing service is a civil agreement between Funder and Beneficiary, so that all risks arising from the agreement are borne entirely by each party. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |