Privacy Policy
SECTION 2 DATA POLICY

SECTION 2 DATA POLICY

2.1 Data We Collect

2.1.1 Account Information

Email, username, password, and any information required to create or maintain an account.

2.1.2 Seller Verification Data

Information submitted through third‑party verification providers for identity checks.

2.1.3 Transaction Data

Purchase history, payout information, and records required for financial operations.

2.1.4 Listing Data

Content uploaded by sellers, including descriptions, media, and metadata.

2.1.5 Technical Data

IP address, device type, browser version, usage logs, and security signals.

2.1.6 Security & Fraud Signals

Information used to detect abuse, prevent scams, and protect platform integrity.


2.2 How We Use Data

2.2.1 Platform Operation

Operating accounts, listings, purchases, payouts, and core marketplace functions.

2.2.2 Verification & Compliance

Ensuring sellers meet verification requirements and complying with legal obligations.

2.2.3 Fraud Prevention

Detecting suspicious activity, preventing abuse, and enforcing platform rules.

2.2.4 Platform Improvement

Improving performance, stability, and user experience.

2.2.5 Customer Support

Resolving issues, responding to inquiries, and assisting users.


2.3 Data Storage & Protection

2.3.1 Security Measures

Encrypted storage, secure transmission, access controls, and monitoring.

2.3.2 Limited Access

Only authorized personnel and systems may access necessary data.

2.3.3 Retention Periods

Data is retained only as long as required for legal, operational, or security purposes.


2.4 Third‑Party Services

2.4.1 Payment Processors

Used for handling payments and payouts securely.

2.4.2 Verification Providers

Used for identity checks and compliance.

2.4.3 Hosting & Infrastructure

Cloud services required to operate the platform.

2.4.4 No Advertising Partners

We do not sell data or share it with advertisers or data brokers.


2.5 User Rights

2.5.1 Access Requests

Users may request access to their stored data.

2.5.2 Correction Requests

Users may request corrections to inaccurate information.

2.5.3 Deletion Requests

Users may request account deletion where legally permitted.

2.5.4 Data Copies

Users may request a copy of their data where applicable.


2.6 Data Retention

2.6.1 Operational Retention

Data kept as long as needed to operate the account.

2.6.2 Legal Retention

Certain data may be retained for compliance, fraud prevention, or audit requirements.

2.6.3 Secure Deletion

Data is securely deleted when no longer required.


2.7 Children’s Data

2.7.1 Age Restrictions

BuyandSell.market is not intended for individuals under the legally required age.

2.7.2 No Knowing Collection

We do not knowingly collect data from minors.


2.8 Policy Updates

2.8.1 Notice of Changes

Updates will be posted with a new “Last Updated” date.

2.8.2 Continued Use

Continued use of the platform after updates constitutes acceptance of the revised policy.

2.9 Account Protection

2.9.1 User Responsibility for Account Security

Users are fully responsible for maintaining the confidentiality of their Zophos account credentials, including their email address, password, and any authentication methods connected to their account.

2.9.2 Prohibition on Sharing Account Information

Users may not share, transfer, sell, or disclose their account login information to any other individual or entity. Sharing account credentials is strictly prohibited and may result in immediate account suspension or permanent termination.

2.9.3 Unauthorized Device Access

Accounts may only be accessed by the account owner. Login attempts from unknown, suspicious, or unauthorized devices may be blocked automatically for security reasons. Repeated unauthorized access attempts may result in temporary locks or permanent account restrictions.

2.9.4 Email Account Security

Users must not share the password or security details of the email account associated with their Buyandsell profile. Compromised email accounts may lead to unauthorized access, and Zophos is not responsible for breaches caused by insecure email practices.

2.9.5 Reporting Suspicious Activity

Users must immediately report any unauthorized access, suspicious login attempts, or potential account compromise. Zophos may require identity verification before restoring access.

2.9.6 Enforcement

Violations of this section may result in: temporary account lock removal of platform access permanent account termination revocation of seller or buyer privileges Zophos reserves the right to enforce strict security measures to protect users and the platform.

2.9.7 Beta‑Stage Limitations

Buyandsell is currently operating in a beta phase. During this period, certain security systems, recovery tools, and automated protections may not be fully developed or available. While we will make reasonable efforts to assist users in the event of unauthorized access or account compromise, we cannot guarantee full recovery of data, listings, balances, or account access. Users acknowledge that beta‑stage services may include limitations, incomplete features, and reduced support capabilities.

We may update this Privacy Policy at any time. Updates will be posted on Section 1 with a new “Last Updated” date. Continued use of the Platform means you accept the updated policy.