Data Protection
Privacy policy
This policy explains how personal data is processed when you use the platform.
Purpose limitation
We process data to operate the service, improve safety, and enforce legal obligations.
Safety first
Data is used to prevent fraud, abuse, illegal activity, and exploitation.
User control
You can request access, correction, or deletion of eligible personal data.
Applicable legal context in Cameroon
Data processing is organized to remain consistent with applicable cybersecurity, criminal, and evidence-preservation obligations under Cameroonian law.
- Data may be retained or disclosed when required by legal process, law-enforcement request, or judicial order.
- Abuse-prevention and anti-trafficking controls are mandatory platform safety measures.
- Users remain responsible for lawful publication of personal data and images.
1. Who controls your data
Pimenterie acts as the data controller for account, profile, moderation, and platform-security operations.
When third-party processors are used, they are selected for operational reliability and contractual confidentiality.
- This policy applies to website, webview, and related support channels.
- It applies to visitors, registered users, and moderation or support interactions.
2. Data categories collected
We may collect identity and contact data, account credentials, profile information, media uploads, geolocation signals, device/browser metadata, and technical logs.
If payments are used, transaction references and anti-fraud signals may also be processed.
- Profile and listing data: display name, city, media, service preferences.
- Security data: IP address, timestamps, session identifiers, abuse reports.
- Location data: GPS consent status and location points required for service operation.
3. Why we process data
Processing is required to provide core features, publish lawful listings, localize content, and secure user sessions.
Data is also used for moderation decisions, policy enforcement, fraud detection, and legal-compliance response workflows.
- Account creation and authentication.
- Content publication and browsing relevance.
- Safety, moderation, and dispute handling.
- Service analytics and performance improvement.
4. Legal bases and user consent
Depending on context, processing may rely on user consent, contractual necessity, legitimate safety interests, or legal obligations.
Where consent is required, users may withdraw it, although some features may stop functioning.
- GPS consent is required for location-dependent features.
- Age-consent and legal-compliance confirmations are required for account access and publication flows.
5. Sharing and disclosures
Data may be shared with hosting providers, technical operators, payment partners, and anti-fraud service providers only when necessary for service operation.
Data may also be disclosed to competent authorities when required by law or to protect legal rights and safety.
- We do not sell personal data as a standalone business model.
- Only authorized personnel and contracted processors may access personal data on a need-to-know basis.
6. Retention periods
Data is retained only for the period needed to fulfill service purposes, enforce terms, and satisfy legal or evidentiary obligations.
Retention may be extended when a dispute, abuse report, regulatory request, or legal hold applies.
- Inactive accounts may be anonymized or deleted according to internal retention rules.
- Security logs may be retained longer when necessary for fraud prevention and auditability.
7. Your rights
Subject to applicable law and identity verification, you may request access to your data, correction of inaccurate data, or deletion of eligible data.
You may also object to certain processing activities or request limits where legally available.
- Requests are reviewed case by case, including legal exceptions.
- Some data may be preserved despite deletion requests when required by law.
8. Security controls
We apply organizational and technical safeguards designed to reduce unauthorized access, loss, misuse, and abuse of data.
No digital system is absolutely secure, and users must also protect their own credentials and devices.
- Use strong passwords and avoid credential sharing.
- Report suspected account compromise immediately.
9. Policy updates
This privacy policy may be updated when legal requirements, platform architecture, or security practices change.
The effective update date appears at the top of this page.
- Continued use after update indicates acceptance of revised terms.