Privacy Center

This Privacy Center explains the kinds of data Kiim may process to operate the marketplace (accounts, messaging, listings, and checkout). It is written to be understandable. For cookie controls, see Cookie Settings.

What data we collect (typical examples)

  • Account data: email, login identifiers, and basic profile fields you provide.
  • Marketplace data: listings, photos you upload, offers, and purchase activity.
  • Messages: conversation content to enable chat and prevent abuse.
  • Device/usage signals: IP address, browser information, and basic analytics events (when enabled).

The exact set depends on features you use and your settings.

Why we process data (purposes)

  • Provide the service: login, listings, search, messaging, checkout.
  • Keep the platform safe: fraud prevention, abuse detection, moderation.
  • Improve the product: fix bugs, measure performance, understand feature usage.
  • Support: respond to requests and resolve disputes.

Legal bases (high level)

Depending on context, processing may rely on contract necessity (to provide Kiim), legitimate interests (platform safety and improvements), legal obligations, and consent (for optional analytics/marketing cookies).

Data sharing

Kiim may use service providers to operate the platform (for example, authentication, hosting, analytics, payment processing). Providers should only process data on our behalf, under appropriate agreements.

We do not sell personal data. If this changes, we will update this page.

Data retention

We keep data for as long as needed to provide the service, comply with legal obligations, prevent abuse, and resolve disputes. Retention periods may vary by data type.

Your choices and rights

  • Access and update your profile settings.
  • Control cookies via Cookie Settings.
  • Request assistance via support@kiim.app.

Depending on jurisdiction, you may have additional rights (access, deletion, portability, objection). We’ll respond according to applicable law.

Security

We use modern security practices (secure transport, access controls, monitoring). No system is perfect—use strong passwords and never share verification codes.