Skip to content

Privacy Policy

Effective starting: May 28, 2022

Privacy is important to us, and so is being transparent about how we collect, use, and share data when you visit or use www.dojah.io

What this policy covers

Dojah Technologies LTD recognizes your privacy rights as guaranteed under the 1999 Constitution of the Federal Republic of Nigeria; the Nigerian Data Protection Regulation 2019 issued by the National Information Technology Development Agency (NITDA), and the privacy provisions in other relevant laws applicable to our business in Nigeria. It is vital for us at Dojah that your personal information is processed, managed, and protected under the provision of applicable laws in the country.

While engaging business with us and with third parties through our Platforms (this includes but is not limited to our website, digital platform, physical operations, and offices), we may use your data, subject however to the terms of this Policy. Therefore, this Privacy Policy explains our privacy practices concerning how we process your data and describes your rights as a user of any of our services and platform.

This Privacy Policy describes how your personal information is collected, used, and shared when you visit or select a service from www.dojah.io

This policy is intended to help you understand that:

  • Information will be protected against unauthorized access or misuse.
  • Confidentiality of information will be secured.
  • The integrity of information will be maintained.
  • Availability of information/information systems is maintained for service delivery.
  • Business continuity planning processes will be maintained.
  • Regulatory, contractual, and legal requirements will be complied with.
  • Physical, logical, environmental and communications security will be maintained.
  • Infringement of this Policy may result in disciplinary action or criminal prosecution.
  • When information is no longer of use, it is disposed of suitably.

Information refers to:

  • Electronic information systems (software, computers, and peripherals) owned by Dojah.io whether deployed or accessed on or off-site.
  • Dojah.io computer network is used either directly or indirectly.
  • Hardware, software, and data are owned by Dojah.io.
  • Paper-based materials.
  • Electronic recording devices (video, audio, CCTV systems).

Our Security Policy

Dojah Incorporated requires all users to exercise a duty of care concerning the operation and use of its information systems.

Authorized users of information systems except for information published for public consumption, all users of Dojah.io information systems must be formally authorized by appointment as a member of staff or contractor.

Authorized users will pay due care and attention to protect Dojah's incorporated information in their possession. Confidential, personal, or private information must not be copied or transported without consideration of:

  • Permission of the information owner.
  • The risks associated with loss or falling into the wrong hands
  • How the information will be secured during transport and at its destination.

Acceptable use of information systems use of Dojah Incorporated information systems by authorized users will be lawful, honest, and decent and shall have regard to the rights and sensitivities of other people.

Dojah Information System Directors who are responsible for information systems are required to ensure that:

  • Systems are adequately protected from unauthorized access.
  • Systems are secured against theft and damage to a level that is cost-effective.
  • Adequate steps are taken to ensure the availability of the information system, commensurate with its importance (Business Continuity).
  • Electronic data can be recovered in the event of loss of the primary source. I.e. failure or loss of a computer system. It is incumbent on all system owners to backup data and to be able to restore data to a level commensurate with its importance (Disaster Recovery).
  • Data is maintained with a high degree of accuracy.
  • Systems are used for their intended purpose and procedures are in place to rectify discovered or notified misuse.
  • Any electronic access logs are only retained for a justifiable period to ensure compliance with the data protection, investigatory powers, and freedom of information acts.
  • Any third parties entrusted with Dojah Incorporated data understand their responsibilities concerning maintaining its security.