Privacy policy

How Zentra collects, processes, and protects information across consumer and business workflows.

  • Data minimization
  • Scoped internal access
  • Retention tied to legal basis
Structured evidence interface illustrating security and compliance visibility.
Trust Evidence
Evidence layerAudit posture

Controls, evidence, and reviews aligned to runtime truth.

Personal Data

No Sale

Customer information is not sold to third parties.

Access Control

Scoped

Internal access is bounded by role and tenant context.

Data Protection

Encrypted

Transport and storage safeguards are applied by default.

Sensitive Workflows

Auditable

Operational traces support investigation and review.

Section 01

Information We Collect

Zentra collects information required to operate regulated financial workflows, including account profile data, identity verification records, transaction metadata, and support context tied to platform usage.

Collection is constrained to service delivery, compliance obligations, fraud prevention, security operations, and supportability. We do not collect information for unrelated advertising use.

  • Profile data such as names, business identifiers, emails, and workspace role context.
  • Identity and compliance data such as KYC, sanctions, and verification outcomes where required.
  • Operational data such as request metadata, event histories, transaction records, and support interactions.

Section 02

How We Use Information

Data is used to provide services, verify identities, detect fraud, maintain compliance, support customer operations, and investigate incidents that affect platform integrity.

Internal access is limited by role, tenant context, and operational need. Sensitive data is not exposed broadly to support or engineering surfaces.

Section 03

Information Sharing and Processing

We do not sell personal information. Data sharing is limited to licensed partners, regulated processors, and infrastructure providers required to operate the service or satisfy legal obligations.

Service providers and subprocessors are bound by contractual confidentiality, security, and data handling obligations appropriate to the role they perform.

Section 04

Retention and Data Security

Zentra applies defense-in-depth controls for data protection, including encryption in transit and at rest, scoped access boundaries, monitoring, and restricted handling of sensitive information.

Retention periods depend on legal, regulatory, operational, and fraud-prevention requirements. We do not treat deletion requests as permission to discard records we are required to retain.

Section 05

User Rights and Requests

Depending on jurisdiction, users may request access, correction, or deletion of personal information, subject to legal, regulatory, and security retention obligations.

Requests can be submitted to our privacy team for review and will be handled according to the user's relationship to the relevant tenant or service context.

Questions about this document can be directed to privacy@usezentra.com.