[{"data":1,"prerenderedAt":9},["ShallowReactive",2],{"landing-contact-en":3,"landing-privacy-en":8},{"email":4,"phone":5,"address":6,"social_linkedin":7,"social_instagram":7,"social_facebook":7,"social_x":7},"Support@missionksa.com","0551159699","JEDDAH - ALBASATEEN des.",null,"\u003Cp dir=\"ltr\" data-start=\"248\" data-end=\"376\">\u003Cstrong data-start=\"248\" data-end=\"280\">Article (19): Data Collected\u003C/strong>\u003Cbr data-start=\"280\" data-end=\"283\" />The Application collects various types of data, including, but not limited to, the following:\u003C/p>\r\n\u003Col dir=\"ltr\" data-start=\"378\" data-end=\"747\">\r\n\u003Cli data-start=\"378\" data-end=\"543\">\r\n\u003Cp data-start=\"381\" data-end=\"543\">Personal data such as: name, email address, mobile number, National Address, professional licenses, qualifications, and any documents required for verification.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"544\" data-end=\"588\">\r\n\u003Cp data-start=\"547\" data-end=\"588\">Payment and financial transaction data.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"589\" data-end=\"695\">\r\n\u003Cp data-start=\"592\" data-end=\"695\">Usage data such as: in-application browsing history, device type, and Internet Protocol (IP) address.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"696\" data-end=\"747\">\r\n\u003Cp data-start=\"699\" data-end=\"747\">Any other data voluntarily provided by the User.\u003C/p>\r\n\u003C/li>\r\n\u003C/ol>\r\n\u003Cp dir=\"ltr\" data-start=\"749\" data-end=\"795\">\u003Cstrong data-start=\"749\" data-end=\"793\">Article (20): Methods of Data Collection\u003C/strong>\u003C/p>\r\n\u003Col dir=\"ltr\" data-start=\"797\" data-end=\"969\">\r\n\u003Cli data-start=\"797\" data-end=\"898\">\r\n\u003Cp data-start=\"800\" data-end=\"898\">Data is collected upon registration or when using the services available within the Application.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"899\" data-end=\"969\">\r\n\u003Cp data-start=\"902\" data-end=\"969\">Certain data is collected automatically through the use of cookies.\u003C/p>\r\n\u003C/li>\r\n\u003C/ol>\r\n\u003Cp dir=\"ltr\" data-start=\"971\" data-end=\"1072\">\u003Cstrong data-start=\"971\" data-end=\"1009\">Article (21): Purposes of Data Use\u003C/strong>\u003Cbr data-start=\"1009\" data-end=\"1012\" />The collected data shall be used for the following purposes:\u003C/p>\r\n\u003Col dir=\"ltr\" data-start=\"1074\" data-end=\"1360\">\r\n\u003Cli data-start=\"1074\" data-end=\"1128\">\r\n\u003Cp data-start=\"1077\" data-end=\"1128\">Providing services and operating the Application.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"1129\" data-end=\"1184\">\r\n\u003Cp data-start=\"1132\" data-end=\"1184\">Improving user experience and developing features.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"1185\" data-end=\"1246\">\r\n\u003Cp data-start=\"1188\" data-end=\"1246\">Processing payments and managing financial transactions.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"1247\" data-end=\"1307\">\r\n\u003Cp data-start=\"1250\" data-end=\"1307\">Communicating with Users regarding requests or updates.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"1308\" data-end=\"1360\">\r\n\u003Cp data-start=\"1311\" data-end=\"1360\">Compliance with legal and regulatory obligations.\u003C/p>\r\n\u003C/li>\r\n\u003C/ol>\r\n\u003Cp dir=\"ltr\" data-start=\"1362\" data-end=\"1413\">\u003Cstrong data-start=\"1362\" data-end=\"1411\">Article (22): Sharing Data with Third Parties\u003C/strong>\u003C/p>\r\n\u003Col dir=\"ltr\" data-start=\"1415\" data-end=\"1652\">\r\n\u003Cli data-start=\"1415\" data-end=\"1577\">\r\n\u003Cp data-start=\"1418\" data-end=\"1577\">Data may be shared with payment service providers, shipping companies, or technical service providers, solely to the extent necessary to provide the service.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"1578\" data-end=\"1652\">\r\n\u003Cp data-start=\"1581\" data-end=\"1652\">User data shall not be sold to any third party under any circumstances.\u003C/p>\r\n\u003C/li>\r\n\u003C/ol>\r\n\u003Cp dir=\"ltr\" data-start=\"1654\" data-end=\"1714\">\u003Cstrong data-start=\"1654\" data-end=\"1712\">Article (23): Data Protection and Information Security\u003C/strong>\u003C/p>\r\n\u003Col dir=\"ltr\" data-start=\"1716\" data-end=\"2010\">\r\n\u003Cli data-start=\"1716\" data-end=\"1885\">\r\n\u003Cp data-start=\"1719\" data-end=\"1885\">The Application Management shall take all necessary technical and organizational measures to protect Users&rsquo; data against unauthorized access, loss, or manipulation.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"1886\" data-end=\"2010\">\r\n\u003Cp data-start=\"1889\" data-end=\"2010\">The Application Management shall not be liable for any breach beyond its control or resulting from the User&rsquo;s negligence.\u003C/p>\r\n\u003C/li>\r\n\u003C/ol>\r\n\u003Cp dir=\"ltr\" data-start=\"2012\" data-end=\"2069\">\u003Cstrong data-start=\"2012\" data-end=\"2067\">Article (24): User Rights in Relation to Their Data\u003C/strong>\u003C/p>\r\n\u003Col dir=\"ltr\" data-start=\"2071\" data-end=\"2441\">\r\n\u003Cli data-start=\"2071\" data-end=\"2168\">\r\n\u003Cp data-start=\"2074\" data-end=\"2168\">The User has the right to request access to, correction, or updating of their personal data.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"2169\" data-end=\"2317\">\r\n\u003Cp data-start=\"2172\" data-end=\"2317\">The User has the right to request deletion of their data in accordance with the applicable laws and regulations in the Kingdom of Saudi Arabia.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"2318\" data-end=\"2441\">\r\n\u003Cp data-start=\"2321\" data-end=\"2441\">The User may exercise these rights by contacting the Application Management through the official communication channels.\u003C/p>\r\n\u003C/li>\r\n\u003C/ol>\r\n\u003Cp dir=\"ltr\" data-start=\"2443\" data-end=\"2498\">\u003Cstrong data-start=\"2443\" data-end=\"2496\">Article (25): Intellectual Property Rights Policy\u003C/strong>\u003C/p>\r\n\u003Col dir=\"ltr\" data-start=\"2500\" data-end=\"2965\">\r\n\u003Cli data-start=\"2500\" data-end=\"2622\">\r\n\u003Cp data-start=\"2503\" data-end=\"2622\">The Professional warrants that the delivered content is original and does not infringe the rights of any third party.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"2623\" data-end=\"2857\">\r\n\u003Cp data-start=\"2626\" data-end=\"2857\">The Professional alone shall bear all legal consequences arising from infringement of any third-party content, without any liability whatsoever on the Application, the Application Management, or the entity owning the Application.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"2858\" data-end=\"2965\">\r\n\u003Cp data-start=\"2861\" data-end=\"2965\">Ownership of the deliverables shall transfer to the Client upon full payment and completion of the Task.\u003C/p>\r\n\u003C/li>\r\n\u003C/ol>\r\n\u003Cp dir=\"ltr\" data-start=\"2967\" data-end=\"3041\">\u003Cstrong data-start=\"2967\" data-end=\"3039\">Article (26): Compliance with the Saudi Personal Data Protection Law\u003C/strong>\u003C/p>\r\n\u003Cp dir=\"ltr\" data-start=\"3043\" data-end=\"3275\">The Application shall comply with all Saudi laws and regulations relating to personal data protection, including the Personal Data Protection Law and its Implementing Regulations, as well as any subsequent amendments or regulations.\u003C/p>\r\n\u003Cp dir=\"ltr\" data-start=\"3277\" data-end=\"3318\">\u003Cstrong data-start=\"3277\" data-end=\"3316\">Article (27): User Responsibilities\u003C/strong>\u003C/p>\r\n\u003Col dir=\"ltr\" data-start=\"3320\" data-end=\"4285\">\r\n\u003Cli data-start=\"3320\" data-end=\"3498\">\r\n\u003Cp data-start=\"3323\" data-end=\"3498\">The User (Professional / Client) undertakes not to share login credentials with third parties and shall bear full responsibility for any loss or sharing of such credentials.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"3499\" data-end=\"3623\">\r\n\u003Cp data-start=\"3502\" data-end=\"3623\">The User (Professional / Client) undertakes to immediately report any suspicious activity or attempted security breach.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"3624\" data-end=\"3719\">\r\n\u003Cp data-start=\"3627\" data-end=\"3719\">The Application Management shall not request the User&rsquo;s password in any manner whatsoever.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"3720\" data-end=\"3814\">\r\n\u003Cp data-start=\"3723\" data-end=\"3814\">The Application Management undertakes to use modern security and encryption technologies.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"3815\" data-end=\"3920\">\r\n\u003Cp data-start=\"3818\" data-end=\"3920\">The Application Management undertakes to monitor system activities and periodically analyze threats.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"3921\" data-end=\"4109\">\r\n\u003Cp data-start=\"3924\" data-end=\"4109\">The Application Management undertakes to immediately report any security breach, and affected Users shall be notified within twenty-four (24) hours, unless prevented by force majeure.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"4110\" data-end=\"4169\">\r\n\u003Cp data-start=\"4113\" data-end=\"4169\">Security systems shall be updated on a periodic basis.\u003C/p>\r\n\u003C/li>\r\n\u003Cli data-start=\"4170\" data-end=\"4285\">\r\n\u003Cp data-start=\"4173\" data-end=\"4285\">This policy shall be reviewed annually to ensure compliance with the latest threats and regulatory requirements.\u003C/p>\r\n\u003C/li>\r\n\u003C/ol>",1778420560438]