Privacy Terms

Welcome to our privacy policy. This document provides information on how we protect your privacy and why it is important to us, presented without complex legal jargon.

At Maal Data Lab, we've created GenZ - a revolutionary mobile application designed to put the power of digital asset management directly in your hands. Our secure platform seamlessly connects you with the world of cryptocurrencies and blockchain technology, allowing you to send, receive, and manage your digital assets with unprecedented ease and security.

What sets GenZ apart is its commitment to true user autonomy. As a self-custodial wallet, it ensures that you maintain complete control over your digital assets and private keys. This means your assets are truly yours - no third party, including our team at Maal Data Labs, has access to your private keys or can control your funds.

Beyond basic cryptocurrency management, GenZ opens the door to the broader blockchain ecosystem. Whether you're looking to explore decentralized applications or connect with trusted third-party blockchain services, our platform provides a secure gateway to these innovations while maintaining your autonomy and privacy.

With this freedom comes responsibility - as the owner of your wallet, you're in charge of safeguarding your private keys and managing your digital assets. This level of control empowers you to take full ownership of your digital financial future while ensuring your assets remain exclusively under your protection.

The Website’s content is presented for informational purposes only. Maal Data Lab does not provide any investment or financial advice whatsoever. As with any financial or investment decisions, you should conduct your own research and due diligence investigation to properly evaluate the benefits and risks of any investment or financial transaction. You should also seek the advice and guidance of qualified accountants, financial advisors, tax advisors, legal counsels and investment advisors, in connection with any investment or financial transaction.

Use of Third-Party Platforms

As you explore the blockchain ecosystem through GenZ, you'll discover a world of financial opportunities made possible through our partnerships with trusted third-party platforms. Your GenZ wallet serves as your personal bridge to these services, enabling you to do everything from purchasing cryptocurrency with your regular bank funds to earning interest on your digital assets through specialized smart contracts.

When you decide to use any of these integrated services, you'll be seamlessly connected to the platform of your choice. While we facilitate this connection, it's important to understand that each platform operates as an independent entity with its own set of rules and requirements. Think of it like using your GenZ wallet as a digital passport – we help you reach your destination, but once there, you'll need to follow the local customs and procedures.

These platforms will guide you through their own verification process, known as Know-Your-Client (KYC), and ask for your agreement to their specific terms. They'll collect the necessary information, like your wallet address, to provide their services effectively. Once you've completed their requirements, they'll handle your transactions and eventually send any resulting assets directly back to your GenZ wallet.

We've designed this system with your privacy in mind. Each platform maintains its own separate relationship with you, processing and protecting your personal information according to their policies. They operate independently of GenZ and don't share your personal information with us. This separation ensures that you maintain control over your data while still enjoying access to the full spectrum of blockchain services.

Our Promise to You

When you visit Maal Data Lab, you're putting your trust in us. This document explains how we honor that trust. While we've written this in plain language, it's still a legal agreement between us, so we encourage you to read it carefully.

Getting to Know Each Other

Just as you get to know someone over time, we learn about you gradually through your interactions with our website. Some of this happens naturally like noticing when you visit, what interests you on our site, and how you found us. It's like a shopkeeper noticing your preferences each time you visit their store.

We also learn more when you choose to share. Perhaps you'll sign up for our newsletter or reach out for our services. In these moments, you might tell us your name or email address, just as you would when meeting a new business partner.

If you represent a company, you might share some details about your organization. We treat this information with the same care as your personal details.

The Legal Foundation of Our Relationship

We believe in being transparent about why we collect and use your information. When you use our app, we need to process some of your information – that's part of our agreement with you. It's like having a membership of a club; we need to know who you are to let you in. When you use face recognition, that's completely your choice – we only use it because you've given us permission.

Sometimes we'll send you updates about GenZ. We do this because we think it's important to keep you informed about your digital wallet – it's part of running a good service. When we check your identity or prevent fraud, we're not just protecting you; we're following the law and keeping everyone's assets safe.

Just as every house needs a solid foundation, our handling of your information rests on clear legal grounds. Let's explore how and why we process your information:

When You Give Us Permission

Most commonly, we process your information because you've given us permission to do so. Like accepting an invitation to dinner, you choose to share your information when signing up for newsletters or creating an account. You can withdraw this invitation at any time.

When We Need to Fulfill Our Promises

Sometimes we process your information because it's necessary to provide the services you've requested like needing your address to deliver a package. This processing is based on our contractual obligations to you.

When We Have a Good Reason

There are times when we process your information based on our legitimate interests like protecting our website from fraud or improving our services. We carefully balance our interests against your privacy rights, like a neighbor considering how home improvements might affect those living nearby.

When the Law Requires It

Sometimes we must process your information to comply with legal obligations, such as tax laws or court orders. Think of it as following building codes necessary for everyone's safety and proper operation.

Crossing Borders with Your Data

When your information travels from Europe to other parts of the world, we treat it like precious cargo. We only send it to countries that the European Commission says have good privacy protection, or we put special safeguards in place to keep it safe.

Biometric Data: Understanding Our Face Recognition Technology

We maintain strict privacy protections for all facial verification processes and want to be completely transparent about how we handle your data. Our core commitment is that we do not retain any face data whatsoever, either on our servers or on your device.

We believe in being completely transparent about how we handle your biometric information. Our practices align with the European General Data Protection Regulation on Biometric Data, and we want you to understand exactly what information we collect and how we use it.

Why we store face data

We process facial data only for essential identity verification purposes, and this processing is strictly limited in scope and duration. Our specific reasons for processing facial data are:

Identity Verification and Security:

  • • To verify your identity during account access attempts
  • • To protect your account from unauthorized access and impersonation
  • • To prevent identity fraud and maintain platform security
  • • To ensure the person attempting access is physically present (liveness detection)

Account Protection

  • • To enable secure account recovery when needed
  • • To protect sensitive account features and transactions
  • • To provide an additional layer of security beyond traditional passwords
  • • Regulatory and Legal Requirements
  • • To comply with know-your-customer (KYC) regulations
  • • To meet anti-money laundering (AML) requirements
  • • To fulfill legal obligations for identity verification
  • • To maintain compliance with applicable privacy and security laws

Your Privacy Rights - A User's Toolkit

Think of your privacy rights as a toolkit that includes:

  • • The Access Tool: Want to see what information we have about you? Just ask.
  • • The Correction Tool: If something's wrong, you can fix it.
  • • The Portability Tool: Need to take your data elsewhere? We'll help you pack.
  • • The Consent Tool: Changed your mind about something? You can withdraw your permission.
  • • The Objection Tool: Don't like how we're using your information? You can object.
  • • The Restriction Tool: Want us to stop processing your data for a while? You can put it on pause.
  • • The Deletion Tool: In many cases, you can ask us to erase your data.

What Face Data We Collect

When you choose to use our facial recognition features, we collect three types of data:

3D Face Maps/Face Scans:

  • • These are three-dimensional representations of your face
  • • They contain both biometric data and liveness data
  • • Think of them as a secure digital map of your facial features

Audit Trail Images

  • • These are 2D images of your face in an unzoomed position
  • • They serve as a verification record

Photo ID Document Images

  • • When you use ID verification
  • • Used to verify your identity against official documents

How We Use Your Face Data

We use your face data in several specific ways to ensure security:

Face Matching/Authentication:

  • • 3D:3D Face Matching (comparing 3D FaceMaps)
  • • 3D:2D Face Matching (comparing 3D FaceScan to 2D images)
  • • Photo ID Matching (comparing 3D FaceScan to ID document photo)

3D Liveness Detection

  • • Determining if it's a live human vs spoof attempt
  • • Includes 2D Liveness Detection
  • • Provides an extra layer of security against fraud

Additional Security Measures

  • • 1:N Searches (checking for duplicate FaceMaps)
  • • Photo ID OCR (extracting text from ID documents)
  • • Photo ID Presentation Attack Detection (verifying ID document authenticity)

Biometric Authentication for App Access

To enable the wallet backup feature in our App, you have the option to use facial recognition technology. This involves creating a secure mathematical representation of your facial features. While providing biometric data is entirely optional, this enhanced security feature will only be available if you choose to enable it.

If you opt for facial recognition, our team and authorized service providers will use your biometric data solely for identity verification when accessing your wallet. This adds an extra layer of security to protect your assets from unauthorized access. You can always choose alternative authentication methods available in the app if you prefer not to use biometric features.

Before collecting any biometric information, we will obtain your explicit consent and ensure compliance with our privacy policy. You maintain control over your authentication preferences and can modify them at any time through your account settings.

Length of time face data is stored

We follow strict data minimization principles regarding facial data. Our retention policy is designed to protect your privacy while ensuring secure verification:

Real-Time Processing and Immediate Deletion During verification sessions, facial data is processed in real-time and exists only in temporary memory. Once your identity is verified, typically within seconds, all facial data is automatically and permanently deleted from our systems. No backups or copies are retained.

Compliance with Privacy Standards Our retention practices strictly adhere to global privacy regulations including GDPR and specific retention timeframes:

  • • Active Verification: during the live verification process
  • • Post-Verification: Immediate deletion upon completion
  • • System Logs: containing only verification timestamps (no facial data)

We maintain detailed records of verification attempts and outcomes for security and compliance purposes, but these records never include actual facial data or biometric information. Our systems are designed to technically prevent any long-term storage of facial data, ensuring your privacy is protected by default.

Keeping Your Face Data Safe

We take extraordinary measures to protect your biometric information

Secure Storage

When we must store face data, the reasons are:

  • To activate user account backup features
  • To confirm identity and prevent fraud
  • Legal and regulatory compliance
  • We store customers' biometric data separately and independently from any data storage accessible to other third parties/customers
  • We do not cross-reference or utilize biometric data across different customers
  • Only anonymized usage logs are used for monitoring usage, creating invoices, and improving the software
  • Third parties do not receive any personally identifiable information or private user data

Limited Access

  • Only authorized personnel can access your data
  • Strict access controls are in place
  • Regular security audits and updates

Third parties we share face data

We only share face data with our service providers to undertake compliance requirements, and identification purposes only under strict data controls. Competent authorities if laws are violated, and judicial, governmental, or regulatory authorities if legally required. However, we will not share the user information with third parties, except in these events or when the user provides us with explicit and informed consent.

Sharing face data with third parties

We share facial data with our identity verification service provider for essential security and compliance purposes only. This sharing occurs during active verification sessions when you first set up your account and during subsequent logins to confirm your identity and prevent unauthorized access. Our service provider helps us maintain strong security standards by detecting potential fraud and ensuring compliance with identity verification requirements.

We share face data with our identity verification service provider solely for the following specific purposes:

  • • To verify user identity during initial account setup and subsequent logins
  • • To prevent fraud and ensure account security
  • • To comply with required identity verification standards
  • • When legally obligated by court orders or regulatory requirements

The facial data is only processed during active verification sessions and is not automatically transmitted or stored by our service providers. Any additional sharing of facial data would require user explicit consent.

Sometimes, we may need to share facial data to comply with legal obligations, such as valid court orders or regulatory requirements. However, this sharing is strictly limited - the data is only processed during live verification sessions and is not automatically stored or transmitted by our service providers at any other time.

We respect your privacy and control over your data. Any sharing of facial data beyond these specific purposes would occur only with your explicit consent. Our service provider operates under strict data protection protocols, ensuring your facial data is handled securely and used solely for verification purposes. The facial data is only processed during active verification sessions and is not automatically transmitted or stored by our service providers. Any additional sharing of facial data would require user explicit consent.

Third party storage practices

Our identity verification process relies on a trusted service provider who acts strictly as a technology processor. They operate under clear limitations: they cannot store, process, or use your biometric data for any purpose beyond immediate identity verification. The verification process is designed for maximum privacy and security.

We use a service provider for identity verification processing. Our service provider acts solely as a technology processor and does not independently store, process, or use your biometric data for their own purposes. This service provider does not automatically store or retain any biometric data. During identity verification:

  • • The verification process only occurs during active sessions
  • • No automatic transmission or storage of face data takes place
  • • Face data is only processed for verification purposes
  • • Any data storage would require explicit user written agreements and consent

During active verification sessions, facial data is processed in real-time with no automatic storage or transmission. The entire process is confined to the active session and focused solely on verifying your identity. Our service provider has no ability to retain your biometric data, and any potential storage would require your explicit written consent.

This controlled approach ensures your facial data remains protected and is used exclusively for its intended purpose - confirming your identity securely.

Face Data Retention

We do not retain any face data. Face data is collected and processes facial image information as "a mathematical representation the users for account backup functionality. Face data is used during verification and only processed as needed to complete identity verification, after which it is permanently deleted with no backup copies retained.

The reasons for storing face data

When we must store face data, the reasons are:

  • • To activate user account backup features
  • • To confirm identity and prevent fraud
  • • Legal and regulatory compliance.

Data Retention

We store face data in accordance with GDPR guidelines of:

  • Data should be retained only for the duration necessary for verification
  • Storage should be limited to compliance requirements
  • Indefinite storage is not permitted

We maintain your data throughout your active account period:

  • Retain it for three (3) years after your wallet becomes inactive
  • This period is designed to be as short as possible while allowing wallet recovery
  • Complies with biometric data retention minimization principles

Disclosure of Biometric Information

We will not automatically transmit or share your biometric information with any third party, except for our service providers who assist in facilitating your access to your wallet, unless:

  • You provide explicit consent for the disclosure in writing
  • The disclosure is necessary to complete a financial transaction requested or authorized by you
  • The disclosure is required by law, or municipal ordinance
  • The disclosure is mandated by a valid warrant or subpoena issued by a court of competent jurisdiction

Our Digital Housekeeping: Cookies and Tracking

Just as a well-run household keeps track of regular visitors' preferences, our website uses various digital tools to remember you and serve you better:

Essential Helpers

Some cookies are like the basic utilities of a house necessary for everything to function. These essential cookies keep you logged in and remember your basic preferences. We can't run our website without them, just as a house can't function without electricity.

Performance Monitors

Other cookies help us understand how people use our website, like having sensors that show which rooms people use most. These analytics cookies help us improve your experience, but you can ask us not to use them.

Comfort Features

Some cookies remember your preferences to make your visits more comfortable like remembering how you like your coffee. These preference cookies are optional but make your experience smoother.

Outside Services

We sometimes work with trusted partners who may place their own cookies, like having specialized contractors visit your home.

Age and Responsibility

Our services are designed for adults those 18 and older. If you're younger, we'll have to ask you to wait. It's like a movie rating; we need to ensure our service is appropriate for its audience. If we discover we've accidentally collected information from someone under 18, we'll promptly remove it.

Our Trusted Partners

Just as we carefully choose who enters our home, we're selective about the companies we work with. Here's who helps us provide our services:

Our Service Providers

We work with companies that help us:

  • Process payments securely (like trusted banks)
  • Analyze website performance (similar to energy efficiency experts)
  • Send newsletters (think of them as our postal service)
  • Host our services (our digital property managers)

How We Choose Partners

Each partner must meet our strict privacy standards like checking references before hiring a contractor. We only share what they need to know to do their job, and they can't use your information for their own purposes without your permission.

Keeping Your Information: Our Storage Policies

Think of how you decide what to keep in your home and for how long. We apply similar thoughtful consideration to your information:

Website Analytics

  • We keep website usage data for 26 months
  • Long enough to understand patterns and improve our service
  • Not indefinitely

Account Information

  • Active while you're using our services
  • Plus six months after your last activity
  • Like keeping your room ready for a while after you've gone away

Legal Requirements

  • Some information we must keep longer to comply with laws
  • Like keeping tax records for several years
  • We'll always let you know if we need to keep something longer than usual.

Marketing Preferences

  • Your communication preferences we keep until you change them.
  • Like remembering whether you prefer phone calls or emails.
  • Until you tell us otherwise.

Making Changes and Solving Disagreements

When We Make Changes

We may need to update this policy as our services evolve. When we do, we'll post the changes on our website and update the "Last Updated" date above. For significant changes, we'll send you a personal note, informing a neighbor about major renovations.

If We Disagree

We hope to resolve any concerns directly with you, but if we can't, this policy is governed by Malaysia law. Any disputes will be resolved in the courts of Malaysia, though this doesn't limit your right to file complaints with your local data protection authority.

Staying Connected

Privacy isn't just a policy for us it's a relationship built on trust. If you ever have questions, concerns, or ideas, we're here to listen. Reach out to our privacy team at compliance@maaldatalabs.com, and we'll respond within 30 days.

Remember, while we've written this policy conversationally, it's still a legal document that protects both of us. By using our services, you're agreeing to these terms, just as you'd agree to the rules when joining any community.

Legal Protection and Disclosure

There may be times when we need to share information to protect our community or comply with the law. We'll handle these situations as transparently as possible while respecting legal requirements and protecting everyone involved.

Our Final Promise

We treat your privacy as we would want our own privacy treated with respect, care, and transparency. This isn't just a policy; it's our commitment to maintaining your trust.