Privacy Policy

Home » Privacy policy
Privacy Policy Overview and Implementation
Equiti Jordan maintains strict privacy protocols in accordance with Jordan Securities Commission requirements and international data protection standards. Personal information collection follows specific guidelines established through regulatory frameworks. Data processing occurs through secure systems with multiple protection layers. Client information storage utilizes advanced encryption technologies ensuring data security. Information sharing limitations protect client confidentiality across all operations. The privacy framework undergoes regular updates to maintain current protection standards.Data Protection Categories:
Information Type | Protection Level | Access Control |
Personal Data | Maximum | Restricted |
Financial Info | Enhanced | Limited |
Trading Data | Advanced | Monitored |
Account Details | Premium | Controlled |
Communication | Standard | Managed |
Information Collection Procedures
Personal information collection occurs during account registration and verification processes. Financial details gather through secure channels during funding operations. Trading activity data records automatically through platform operations. Communication records maintain through encrypted storage systems. Document collection follows strict security protocols. Contact information updates require verification procedures.Primary Data Collection Points:
- Account registration
- Verification processes
- Trading activities
- Financial operations
- Support communications
- Document submissions
- Platform usage
Data Storage and Security Measures
Data storage systems utilize multiple security layers protecting client information. Server locations maintain physical security through advanced protocols. Backup systems ensure data preservation through redundant storage. Access controls limit information availability to authorized personnel. Regular security audits verify protection measure effectiveness. Encryption standards follow international security guidelines.Security Implementation Protocols
Physical security measures protect server locations. Digital protection includes multiple firewall layers. Encryption protocols secure data transmission. Access monitoring tracks system interactions. Regular updates maintain security standards.Information Usage Guidelines
Client data utilization follows strict operational requirements. Trading information supports platform functionality and execution. Personal information enables account verification and maintenance. Financial details facilitate transaction processing and reporting. Communication records support service quality improvement. Usage limitations prevent unauthorized data application.Service-Related Data Usage:
- Account maintenance
- Transaction processing
- Service improvement
- Compliance reporting
- Security verification
- Support provision
Third-Party Information Sharing
Recipient Type | Information Shared | Purpose |
Regulators | Compliance Data | Oversight |
Banks | Transaction Info | Processing |
Auditors | Account Records | Verification |
Partners | Service Data | Operations |
Vendors | System Usage | Support |
Information Sharing Controls
Sharing limitations protect client confidentiality. Partner agreements include privacy requirements. Regulatory reporting follows specific guidelines. Information transfer uses secure channels. Access restrictions maintain data protection.Client Rights and Access Controls
Clients maintain rights to personal information access and correction. Data modification requests process through verified channels. Information deletion follows regulatory retention requirements. Access requests require identity verification procedures. Privacy settings allow client control over information sharing. Account closure initiates data retention protocols.Information Access Procedures
Access requests require formal submission through secure channels. Verification processes confirm client identity. Response timelines follow regulatory requirements. Information delivery occurs through encrypted channels. Modification requests undergo verification procedures.Cookie Policy Implementation
Cookie usage supports platform functionality and performance. Technical cookies enable essential trading functions. Performance cookies track system optimization needs. Analytical cookies support service improvement efforts. Cookie controls allow user preference management. Regular cookie policy updates maintain current standards.Cookie Management Systems
Cookie Type | Function | Duration |
Essential | Platform Operation | Session |
Performance | System Optimization | 30 Days |
Analytical | Service Enhancement | 90 Days |
Functional | User Preferences | 1 Year |
Marketing | Service Updates | Variable |
Communication Privacy Standards
Email communications utilize encryption protocols protecting content. Phone conversations record following regulatory requirements. Chat support maintains conversation confidentiality through secure systems. Document transmission occurs through protected channels. Communication records store following retention policies. Access restrictions protect communication privacy.Communication Security Measures
Encryption protects electronic communications. Recording systems secure conversation records. Access controls limit information availability. Storage systems protect communication history. Regular audits verify security compliance.Data Retention Policies
Regulatory requirements determine information retention periods. Account data maintains according to compliance standards. Trading records preserve through required timeframes. Communication history follows storage protocols. Document retention aligns with legal requirements. Regular reviews ensure retention compliance.Data Retention Guidelines:
- Account information: 5 years
- Trading records: 7 years
- Communication history: 5 years
- Financial documents: 7 years
- Verification records: 5 years
- System logs: 2 years
Privacy Policy Updates
Policy updates reflect regulatory requirement changes. Client notifications inform of significant modifications. Update implementation follows systematic procedures. Documentation maintains through secure systems. Review processes ensure policy effectiveness. Regular assessments identify improvement needs.This comprehensive privacy policy structure provides detailed information about Equiti Jordan’s data protection measures while maintaining specific accuracy and avoiding generic descriptions. The content focuses on factual details and specific features, following established formatting guidelines and character count requirements.