Transforming Digital Trust
Privacy Policy
Udara Africa's Approach to Privacy
At Udara Africa, we are deeply committed to upholding the highest data protection standards throughout our organization, including at the Board level.
Our primary goal is to ensure compliance with relevant legislation and maintain the secure processing of data. However, we believe that ethical data use goes beyond mere compliance. Therefore, we place individuals at the center of everything we do, fostering trust with all stakeholders, including individuals, customers, suppliers, team members, investors, and regulators.
​
We have made significant investments in our global privacy program to provide you with the confidence that your data is in safe hands when working with Udara Africa.
​
Identity Verification Services
Our company offers identity verification services worldwide, leveraging a trusted network of data sources to assist our clients in verifying their users, detecting fraudulent activities, and complying with anti-money laundering (AML) and Know Your Client (KYC) regulations. We have established connections with various sources, including government and national ID registries, electoral rolls, consumer credit agencies, mobile network providers, utility companies, and other reliable data providers.
The specific personal information involved in the verification process may vary depending on the user's location and the services selected by our clients. It can include details such as name, date of birth, contact information (such as email address, residential address, and telephone number), national ID number, information extracted from a utility bill provided by the user, or other relevant information obtained from the data sources.
​
Document Verification Services
As part of our offerings, we provide document verification services to enable our clients to authenticate the validity of identity documents (IDs) and confirm the identity of their users. To conduct a document verification check, users are required to submit photographs of both the front and back of their ID, as well as a live photograph (selfie). We extract data from the ID, including facial scan data from the ID photo, and compare it to the selfie to assess if they belong to the same individual. We also employ fraud detection techniques, such as real-time image capture validation and checks for any tampering or inconsistencies in the provided data. Based on these assessments, we inform our clients whether the user's identity has been verified or if any indicators of fraud have been detected.
During the document verification process on behalf of our clients, we collect and process personal information that includes government-issued IDs (e.g., passport, driver's license, or identity card), personal details captured on the ID (e.g., name, date of birth, address, document number, and photo), and the user's photograph or selfie. We may also process facial scan data derived from the ID photo and selfie, which may be classified as "biometric data" or "biometric information" in certain jurisdictions. For more details, we recommend referring to the privacy policy provided by the company utilizing our document verification services.
For customers in the United States, please consult our Facial Scan and Biometric Information Policy for additional information regarding the processing of your biometric personal information within our document verification services.
​
Business Verification Services
To assist our clients in meeting their Know Your Business (KYB) compliance requirements, we offer business verification services. These services involve verifying company information, including details about key personnel such as directors, officers, and beneficial owners. We access information from government registries, credit data, and other public records to provide comprehensive verification.
The collected information may include company ownership or directorship details, company address, position held (e.g., director), and current status (e.g., active, resigned, start date, end date).
​
Watch-List Screening Services
Our watch-list screening services enable clients to screen individual or business information against global sanction lists, politically exposed person (PEP) lists, and adverse media sources. We generate reports containing publicly available information from these lists and sources. If requested by a client, we can provide ongoing watch-list screening services to meet regulatory obligations that require continuous monitoring.
We collect personally identifiable information (PII) from our users, which includes their name, contact information (email address and/or phone number), date of birth, and any other necessary information required for the chosen verification checks determined by our clients.
For example, if a client opts for face verification, we will also collect an image (selfie) or video (short clip showing the end-user's face) from the individual. In the case of document verification, we will require an image or video of the relevant document. Similarly, if a client selects our AML screening service, we will need the end-user's name and date of birth to compare them against AML databases, sanctions lists, and watch lists.
After the verification process, whether successful or unsuccessful, we may collect and use your personal data, including your name and email address, for the purpose of rating or reviewing your experience with us or our website and services. We may utilize third-party platforms, such as Trustpilot, LinkedIn, Google Maps, Twitter, Facebook, Instagram, and others, to facilitate this feedback process.