Welcome to JISALA, an online fashion marketplace and a product of JisExpats Solutions LTD. By accessing or using our platform, you agree to comply with and be bound by the following terms and conditions. Please read them carefully before using our services.
1.1. These terms and conditions ("Terms") govern your access and use of JISALA's website and services.
1.2. By using JISALA, you agree to these Terms, our Privacy Policy, and any other policies or guidelines posted on the platform. If you do not agree, please discontinue use of the site.
- "We," "Us," or "Our" refers to JISALA, the Nigerian fashion marketplace.
- "Vendor" refers to individuals or businesses that sell products through JISALA.
- "Customer" refers to individuals purchasing products from vendors on JISALA.
- "Platform" refers to JISALA’s website and associated services.
3.1. You must be at least 18 years old and capable of entering into legally binding contracts to use JISALA. By using the platform, you represent that you meet this eligibility requirement.
3.2. Vendors must have valid and verified business registrations to sell on JISALA.
4.1. To access certain features of JISALA, including making purchases or listing items for sale, you must create an account. You agree to provide accurate and up-to-date information during the registration process.
4.2. You are responsible for maintaining the confidentiality of your account credentials. Any activity conducted through your account will be deemed as your responsibility.
5.1. Vendors must provide accurate descriptions, images, and pricing for products listed on JISALA.
5.2. All products must comply with local and international laws, including those related to counterfeit goods, intellectual property rights, and safety regulations.
5.3. Vendors are responsible for fulfilling orders within the agreed timeframe and handling returns or disputes in line with JISALA’s policies.
5.4. Vendors must comply with JISALA’s Know Your Customer (KYC) and Anti-Money Laundering (AML) policies by providing necessary documentation and information as requested.
6.1. Customers can browse products, place orders, and make payments through the platform.
6.2. By placing an order, you agree to pay the total amount of the product, including any applicable taxes and shipping costs.
6.3. Once an order is placed, you will receive confirmation via email. The vendor is responsible for delivering the product within the specified timeframe.
6.4. If you have any issues with the product received (such as damaged goods or incorrect items), you must contact the vendor directly to initiate a return or refund.
7.1. All payments are processed through JISALA’s third-party payment providers. Customers agree to use legitimate payment methods (e.g., credit/debit cards, bank transfers).
7.2. Vendors agree to pay any service fees associated with selling on JISALA, including commissions on sales or listing fees.
7.3. JISALA reserves the right to change its fee structure and will notify vendors in advance of any changes.
8.1. Vendors are responsible for ensuring that products are delivered to customers in good condition and within the specified delivery time.
8.2. Customers are required to provide accurate shipping information. JISALA is not responsible for delays or issues caused by incorrect shipping details provided by customers.
8.3. Shipping costs are determined by the vendor and may vary based on location, size, and weight of the product.
9.1. Vendors must provide clear return and refund policies for their products. Customers have the right to return items based on these policies.
9.2. Customers are entitled to a refund if the product is defective, damaged, or not as described by the vendor.
9.3. Vendors are responsible for handling refund requests and returning the payment to the customer within a reasonable timeframe after the return is completed.
10.1. All content on JISALA, including logos, designs, text, graphics, and images, are the intellectual property of JISALA or its licensors.
10.2. Vendors are responsible for ensuring that the products they list on JISALA do not infringe on the intellectual property rights of others. JISALA reserves the right to remove listings that violate intellectual property laws.
11.1. Users of JISALA (both customers and vendors) agree not to engage in the following prohibited activities:
Listing or purchasing illegal products.
Engaging in fraudulent activities, including money laundering or terrorism financing.
Infringing on the intellectual property rights of others.
Using the platform to harm, threaten, or harass others.
Circumventing fees or attempting to conduct transactions outside the JISALA platform.
11.2. JISALA reserves the right to suspend or terminate accounts found in violation of these rules.
12.1. JISALA provides the platform "as-is" and makes no guarantees regarding the availability, accuracy, or performance of the platform.
12.2. Vendors are responsible for the quality and legality of the products they sell. JISALA is not liable for any disputes arising from transactions between vendors and customers.
12.3. JISALA will not be held responsible for any losses, damages, or liabilities arising from the use of the platform.
13.1. JISALA reserves the right to terminate or suspend your account at any time, with or without notice, if you violate these Terms or engage in any activities that may harm the platform or its users.
13.2. Upon termination, you must cease all use of the platform and remove any content or data associated with your account.
14.1. JISALA may amend these Terms from time to time by posting updates on the platform. Users are responsible for reviewing these updates and remaining in compliance with the latest version of the Terms.
15.1. These Terms are governed by and construed in accordance with the laws of Nigeria.
15.2. Any disputes arising from or related to these Terms will be subject to the exclusive jurisdiction of the courts of Nigeria.
For any questions or concerns regarding these Terms or other JISALA policies, please contact us at:
Email: support@JISALA.com
Phone: +234 (0)7-033-470-039
By using JISALA, you agree to abide by these Terms and Conditions.
Effective Date: 6th of October, 2024
Jisala ("we," "us," or "our") respects your privacy and is committed to protecting the personal information you share with us. This Privacy Policy outlines how we collect, use, disclose, and safeguard your data when you visit our website, use our platform, or engage with our services. By using our services, you agree to the terms of this Privacy Policy.
We collect various types of information to provide better services and enhance your experience on our platform:
A. Personal Information
Personal information refers to data that can be used to identify you. This may include:
- Name
- Email address
- Phone number
- Billing and shipping address
- Payment information
- Any other information you voluntarily provide when registering on the platform or contacting us
B. Non-Personal Information
We may collect non-identifiable information, such as:
- Browser type and version
- Device type (e.g., mobile or desktop)
- Operating system
- IP address
- Referring website
- Pages viewed on our platform
- Date and time of access
C. Cookies and Tracking Technologies
We use cookies and similar tracking technologies to improve your experience, remember your preferences, and analyze site traffic. Cookies help us personalize your experience on Jisala, but you can opt out through your browser settings.
We use the information collected for various purposes, including:
- Processing your transactions and delivering your orders.
- Communicating with you regarding updates, promotions, and customer service inquiries.
- Improving and personalizing your user experience on Jisala.
- Preventing fraud and ensuring platform security.
- Analyzing user behavior to improve our services and offerings.
We may share your personal information in the following situations:
- Third-Party Service Providers: We may share your data with third-party vendors (e.g., payment processors, shipping companies) to facilitate our services.
- Legal Obligations: We may disclose your information if required by law, regulation, or legal process.
- Business Transfers: In the event of a merger, acquisition, or sale of assets, your data may be transferred as part of the business transaction.
We will never sell your personal information to third parties for marketing or other purposes.
We implement robust security measures to protect your personal data from unauthorized access, alteration, disclosure, or destruction. This includes encryption, firewalls, and access controls.
However, please note that no method of data transmission over the internet or electronic storage is 100% secure. While we strive to protect your personal data, we cannot guarantee absolute security.
Depending on your location, you may have the following rights:
- Right to Access: You can request a copy of the personal data we hold about you.
- Right to Rectification: You can ask us to correct any inaccurate or incomplete information.
- Right to Deletion: You can request the deletion of your personal data under certain conditions.
- Right to Restrict Processing:** You can request that we limit the processing of your data.
- Right to Object: You can object to our use of your data.
- Right to Data Portability: You can request that we transfer your data to another service provider.
If you wish to exercise any of these rights, please contact us at [email address].
We retain your personal information only for as long as necessary to fulfill the purposes for which it was collected, or as required by law. Once we no longer need your data, we will securely delete or anonymize it.
If you are located outside Nigeria, your information may be transferred to, processed, and stored in Nigeria or other countries where we operate. By using our services, you consent to the transfer of your information to these countries, which may have different data protection laws than your country of residence.
Our platform may contain links to third-party websites or services. We are not responsible for the privacy practices or content of these external sites. Please review the privacy policies of these third parties before sharing your personal information.
Jisala does not knowingly collect or solicit personal information from children under the age of 13. If we become aware that we have collected personal information from a child under 13 without parental consent, we will take steps to delete that information promptly.
We may update this Privacy Policy from time to time to reflect changes in our practices or applicable laws. We will notify you of any significant changes by posting the updated policy on our website with a new effective date.
If you have any questions or concerns about this Privacy Policy or our data practices, please contact us at:
Email: info@jisala.com
Address: No. 2, Upper Akinleye Martins Street, Off Ilesha Road, Akure, Nigeria.
This Privacy Policy is designed to ensure transparency in how we handle your data while providing you with the best possible service on Jisala.
The security of JISALA's platform, its users, and its data is a top priority. This document outlines the security policies, procedures, and practices implemented to protect the confidentiality, integrity, and availability of our information assets. All employees, vendors, and stakeholders must adhere to these policies to ensure a secure environment for JISALA’s operations.
The purpose of this policy is to establish a framework for protecting the data and assets of JISALA against unauthorized access, data breaches, and cyber threats. This policy covers all users, including employees, vendors, and customers.
This policy applies to all systems, networks, devices, and data managed by JISALA, including cloud services, databases, vendor systems, and communication networks.
- Protect sensitive customer and vendor information.
- Prevent unauthorized access and data breaches.
- Ensure data integrity and availability for all authorized users.
- Comply with relevant laws and regulations, including GDPR, Nigerian Data Protection Regulation (NDPR), and any other applicable standards.
All data within JISALA is classified into the following categories:
Public: Accessible by all users and external parties.
Internal: Only accessible by JisExpats Solutions staff.
Confidential: Accessible by specific authorized personnel.
Sensitive: Restricted data, including personal information (PII) and payment information.
Access to data is controlled based on the user's role within the organization. Only authorized personnel will have access to sensitive data.
All sensitive data, such as customer PII and payment details, must be encrypted using industry-standard encryption algorithms (AES-256 or equivalent) both in transit (SSL/TLS) and at rest.
JISALA uses secure HTTPS protocols for all communications on the platform.
Data will be retained only for as long as necessary to fulfill its purpose. Customer and vendor data will be securely deleted or anonymized after a defined retention period, as per legal and regulatory requirements.
When data is no longer needed, it must be securely destroyed using appropriate methods (e.g., data wiping, shredding of physical documents).
JISALA employs firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS) to monitor network traffic and prevent unauthorized access to its systems.
All network devices and servers must be regularly updated and patched to mitigate vulnerabilities.
Only authorized personnel are allowed to access JISALA's internal network. Remote access is strictly controlled using VPNs and multi-factor authentication (MFA).
All users accessing JISALA's systems are required to use strong passwords and change them regularly.
Multi-factor authentication (MFA) must be enabled for all critical systems, including vendor and customer dashboards.
User accounts will be deactivated immediately upon termination of employment or the end of a vendor contract to prevent unauthorized access.
All vendors providing services to JISALA must undergo a security risk assessment before being granted access to the platform. This includes third-party payment processors, shipping companies, and marketing partners.
Vendors must comply with JISALA’s data security policies, including encryption, data access, and retention policies.
Vendors are required to comply with local and international data protection regulations, such as GDPR and NDPR, as well as JISALA’s internal security guidelines.
Regular audits will be conducted to ensure vendors adhere to these standards.
All employees, vendors, and users must immediately report any suspected security incident or breach to JISALA’s security team.
The security team will investigate the incident and take appropriate action to contain the breach, assess the damage, and mitigate further risks.
JISALA’s Incident Response Team (IRT) is responsible for coordinating the investigation and remediation of security incidents.
The IRT will assess the scope of the incident, communicate with relevant stakeholders, and ensure that the affected systems are restored to a secure state.
- After every security incident, a review will be conducted to identify the root cause, document lessons learned, and implement any necessary improvements to prevent future incidents.
All employees must undergo regular security awareness training to recognize security threats such as phishing, social engineering, and malware attacks.
Employees are required to follow JISALA's data protection policies, password management guidelines, and secure communication practices.
Vendors and third-party partners with access to JISALA's platform will receive training on secure data handling, incident reporting procedures, and compliance with JISALA’s security policies.
All software development for JISALA must adhere to secure coding practices, including input validation, secure authentication mechanisms, and protection against common threats such as SQL injection and cross-site scripting (XSS).
Regular code reviews and vulnerability assessments must be conducted to identify and mitigate potential security risks.
Periodic penetration tests will be conducted by third-party security experts to identify weaknesses in JISALA’s platform and infrastructure.
Any identified vulnerabilities must be addressed and patched within a reasonable time frame.
JisExpats Solutions complies with all applicable Nigerian and international laws and regulations governing data privacy and security, including GDPR, NDPR, and PCI-DSS for payment processing.
JISALA will regularly review and update its policies to ensure compliance with evolving legal requirements.
JisExpats Solutions Ltd will designate a Data Protection Officer (DPO) responsible for ensuring compliance with data protection regulations and addressing privacy concerns from customers, vendors, or regulators.
Access to JisExpats Solutions Ltd offices and any data centers where sensitive data is stored is restricted to authorized personnel only.
Physical security controls such as security cameras, access badges, and security personnel are in place to monitor and protect these environments.
All company devices, including laptops and mobile phones, must be protected with strong passwords and encryption. Remote wipe functionality will be enabled on all devices in case of loss or theft.
JisExpats Solutions Ltd implements continuous monitoring tools to detect unusual activities, unauthorized access, and potential security threats across its systems.
Regular internal security audits will be conducted to ensure adherence to the security policies and procedures outlined in this document.
JisExpats Solutions Ltd may engage independent auditors to review its security practices and provide recommendations for improvements.
This security policy will be reviewed at least annually or when significant changes occur in the business or regulatory environment.
Any updates to this policy will be communicated to all stakeholders, including employees, vendors, and customers, and implemented promptly to maintain security standards.
JisExpats Solutions Limited is committed to maintaining the highest level of security to protect its users, data, and systems. All employees, vendors, and users play a crucial role in maintaining this secure environment, and adherence to these policies is mandatory.