Benefits of Mobile Loans in Kenya

Privacy Policy

At Mobile Loans Kenya, we take your privacy seriously. This Privacy Policy outlines the types of personal information we collect and how we use and protect that information.

Information We Collect

When you visit our website, we may collect personal information such as your name, email address, phone number, and location. We may also collect information about your device, IP address, and browsing history.

  • We collect information you provide when applying for a loan or signing up for our services.
  • We use cookies to track your online activity and improve your user experience.
  • We may collect information from third parties to verify your identity and assess your creditworthiness.

We may also collect information from social media platforms if you choose to connect with us through those channels.

How We Use Your Information

We use the information we collect to provide you with the products and services you request. This may include processing loan applications, verifying your identity, and communicating with you about your account.

We may also use your information to personalize your experience on our website, send you marketing communications, and improve our products and services.

Sharing Your Information

We may share your personal information with third-party service providers who help us process loan applications, verify identities, and improve our services. These service providers are bound by confidentiality agreements and are prohibited from using your information for any other purpose.

  • We may share your information with law enforcement agencies or regulatory authorities if required by law or to prevent fraud or other illegal activities.
  • We do not sell or rent your personal information to third parties for their marketing purposes.

Security Measures

We take the security of your personal information seriously and have implemented technical and organizational measures to protect it from unauthorized access, disclosure, alteration, and destruction.

We use encryption, firewalls, and secure server technology to safeguard your information during transmission and storage.