Green Leaf Environment Limited (“Company”) respects your privacy concerns. This Privacy Policy describes the types of information we collect on https://green-leaf.dev/ (the “Website”), how we use the information, with whom we share it, and the choices available regarding our use of the information. The Privacy Policy also describes the measures we take to safeguard information, how long we retain it, and how you can contact us about our privacy practices and exercise your rights.

INFORMATION WE COLLECT

Green Leaf collects data to provide you with direct feedback in respect of our services. You provide some of this data directly. We get some data using technologies like cookies and receiving error reports or usage data from software running on your device. When completing our online registration form, you agree to provide us with information about your company (you), such as your company name and contact details. You must provide complete, accurate and correct information, and you hereby certify that the information you have provided is correct. You are not required by law to provide the Company with your details. Providing inaccurate, incomplete, outdated information may interfere with our ability to contact you.

The data we collect can include Website data. We collect data about how you interact within the Green Leaf website. For example, we collect:

– Details of visitor behaviour patterns, i.e. data about the website sections you visit and how much time you spend there.

– Configuration data. We collect data about the network you use to connect to our website. It includes your IP address.

Error reports and performance data. We collect data about problems you experience with our services. This data helps us to diagnose problems and to provide solutions. Depending on your browsing environment and settings, error reports can include such data as the type or the severity of the problem, details of the software or the hardware related to the error, the contents of the files you were using when the error occurred, as well as the data about other software on your device. We may also collect personal data from third parties who have your consent to pass your details to us or from publicly available sources.

HOW WE USE OF COLLECTED INFORMATION

The information collected will be stored in our database (“Database”). We will use information in accordance with this Policy and any applicable law, including for the following purposes:

1) To provide high-quality services on the Website and the possibility of their full use.

2) To develop and improve our products and services as a whole to improve and expand the services and content offered on the Website, to create new services and content which correspond to the requirements and expectations of the users of the Website and our customers and to modify or cancel existing services and content. Based on this information, the company will create statistics.

3) To contact the contact person from time to time to provide (by sending emails, SMS messages, and calls) information related to our services and products.

4) To conduct research, surveys, and other similar activities related to product and service development.

5) For correction of possible errors and development of the Site.

6) To any other purpose specified in this Policy or the Website’s Terms of Use.

TRANSFER OF INFORMATION TO THIRD PARTIES

Information may be transferred to other persons in the following cases.

1) To our service providers to operate, maintain and improve the Website and to facilitate our communication with you.

2) If you abused your rights to use the Website or violated any applicable law, your information may be shared with authorities or other third parties if we believe it is necessary or justified.

3) With attorneys, courts and relevant third parties, in any case of dispute or legal proceeding of any kind involving you concerning the Website.

4) If the operation of the Website is organised within a different framework or through another legal structure or entity (such as due to a merger or acquisition), provided that those entities agree to be bound by the provisions of this policy, with reasonably necessary changes taken into consideration.

5) We may share your information with our corporate group entities (companies we control, control, or are under common control, whether directly or indirectly). Still, their use of such information must comply with the policy.

In any case, other than the above, your information will be shared with others only if you provide your explicit prior consent.

ACCESSING, UPDATING OR DELETING YOUR INFORMATION AND OBTAINING A COPY OF IT

We respect your privacy rights so that you can contact us at any time with the following requests:

1) To change information: to access, delete, change or update any information relating to you (for example, if you think your business information is incorrect, you can ask to correct or delete it).

2) That we will cease any further use of your business information or that we shall remove your business information. Please note that unless you instruct us otherwise, we retain the information we collect for as long as needed to provide the services, comply with our legal obligations, resolve disputes, and enforce our agreements. We may rectify, replenish or remove incomplete or inaccurate information at any time and at our discretion. If you wish to raise a complaint about handling your business information, please contact us directly at info@green-leaf.dev. Suppose you are unsatisfied with our response or believe we collect or process your business information, not by the laws. In that case, you can complain to the applicable data protection authority.

GOVERNING LAW

The laws of the United Kingdom govern this Privacy Policy without regard to its conflict of laws provision. You consent to the exclusive jurisdiction of the courts in connection with any action or dispute arising between the parties under or in connection with this Privacy Policy.

The laws of the United Kingdom, excluding its conflicts of law rules, shall govern this Agreement and your use of the website. Your website use may also be subject to other local, state, national, or international laws.

Using Green Leaf or contacting us directly signifies your acceptance of this Privacy Policy. If you do not agree to this Privacy Policy, you should not engage with our website or use our services. Continued use of the website, direct engagement with us, or following the posting of changes to this Privacy Policy that do not significantly affect the use or disclosure of your business information will mean that you accept those changes.

GDPR DATA PROTECTION RIGHTS

We also want to ensure you fully know your data protection rights. Each user is entitled to the following:

  • Right of access. You have the right to request copies of your business data. This service may be chargeable.
  • The right to rectification – You have the right to request that we correct any information you believe is inaccurate. You also have the right to request that we complete the information you think is incomplete.
  • The right to erasure – You have the right to request that we erase your business data under certain conditions.
  • The right to restrict processing – You have the right to request that we restrict your business data processing under certain conditions.
  • The right to object to processing – under certain conditions, you have the right to object to our processing of your business data.

The right to data portability – You have the right to request that we transfer the data collected to another organisation or directly to you under certain conditions.

We have a month to respond to any of your requests. Please contact us if you would like to exercise any of these rights.

COOKIE AND OTHER TRACKERS

Cookies are small files that a site or its service provider transfers to your computer’s hard drive through your Web browser (if you allow), enabling the site’s or service provider’s systems to recognise your browser and capture and remember certain information.

We use cookies to help us compile aggregate data about site traffic and interaction to offer better site experiences and tools in the future.

We use cookies to:

  • Understand and save users’ preferences for future visits.
  • Keep track of advertisements.
  • Compile aggregate data about site traffic and interactions to offer better site experiences and tools in the future. We may also use trusted third-party services to track this information.

You can have your computer warn you each time a cookie is being sent, or you can turn off all cookies.

You do this through your browser settings. Since the browser is a little different, look at your browser’s Help Menu to learn the correct way to modify your cookies.

If you turn cookies off, some features that make your site experience more efficient may not function properly. It won’t affect the user’s experience, making your site experience more efficient and may not function properly.

HOW WE CHANGE THIS PRIVACY POLICY

We will update this privacy statement to amend its terms or reflect customer feedback when necessary. When we post changes to this statement, we will revise the “last updated” date at the top of the statement if there are material changes. In that case, we will notify you by prominently posting a notice of such changes before they take effect or by directly sending you a notification.

CONTACT US

If you have any questions about these Terms, please contact us at 1 Kings Avenue, London, England, N21 3NA.

You can also contact us via email at: go@green-leaf.dev or by phone: at +442045772459.

Streamline document signing securely.

RightSignature, developed by Citrix, offers a secure and legally binding solution for electronic signatures on contracts and documents. Say goodbye to cumbersome paperwork and hello to a streamlined, digital signing process that ensures security and compliance.

Ensure legal compliance effortlessly.

With RightSignature, businesses can ensure legal compliance with electronically signed documents, saving time and resources. Say goodbye to manual signatures and hello to a digital solution that meets regulatory standards effortlessly.

Accelerate contract workflows.

RightSignature streamlines contract workflows by eliminating the need for physical signatures and paperwork. Say goodbye to delays and hello to accelerated contract processes that drive efficiency and productivity.

Secure digital identity verification.

Onfido specialises in digital identity verification and authentication, utilising AI to securely analyse government-issued IDs and facial biometrics. Say goodbye to manual verification processes and hello to a streamlined, secure solution.

Rapid, accurate identity checks.

With Onfido, businesses can perform rapid and accurate identity checks for online platforms, ensuring a seamless user experience while maintaining the highest security standards. Say goodbye to lengthy verification processes and hello to swift, secure authentication.

Stay ahead of fraudsters.

Onfido’s advanced AI algorithms help businesses stay ahead of fraudsters by continuously analysing and adapting to emerging threats. Remember that your identity verification processes are fortified against evolving fraud tactics.

Empower your business with comprehensive CRM.

Zoho CRM offers a comprehensive tool suite to streamline sales, marketing, customer support, and inventory management. Say goodbye to scattered data and hello to a centralised platform that empowers your business to thrive.

Flexible, affordable, and integrative.

Zoho CRM is renowned for its flexibility, affordability, and extensive integration capabilities. Whether a small startup or a large enterprise, Zoho CRM adapts to your needs and scales with your business effortlessly.

Drive growth with actionable insights.

Zoho CRM provides actionable insights that empower businesses to make informed decisions and drive growth. Say goodbye to guesswork and hello to data-driven strategies that propel your business forward.

Streamline compliance with ease.

Sumsub offers an all-in-one platform for KYC/AML, identity verification, and fraud prevention, revolutionising business compliance processes worldwide. Say goodbye to manual paperwork and hello to automated compliance solutions.

Utilise AI for comprehensive verification.

Sumsub leverages the power of AI and machine learning to perform document analysis, biometric checks, and background verifications seamlessly. Enjoy rapid and accurate verification processes that meet legal compliance standards effortlessly.

Stay ahead of emerging threats.

With Sumsub, businesses can stay ahead of emerging threats thanks to its adaptive machine-learning algorithms. Remember that your compliance and verification processes are continuously updated to combat evolving fraud tactics.

Enhance fraud prevention effortlessly.

AcuityTec delivers comprehensive risk management and fraud prevention solutions tailored to the needs of modern businesses. From identity verification to IP geolocation, AcuityTec equips you with the tools to safeguard your operations easily.

Customise protection to your needs.

With AcuityTec, fraud professionals can customise protection to suit their specific requirements, ensuring a tailored approach to risk management. Say goodbye to one-size-fits-all solutions and hello to a personalised defence against fraud.

Boost security and compliance.

AcuityTec’s suite of solutions enhances security and ensures compliance with regulatory standards. Rest easy knowing that your business is protected against fraud while maintaining regulatory compliance effortlessly.

Maximise identity verification efficiency.

Au10tix offers cutting-edge automated identity verification and KYC processes driven by advanced machine learning algorithms. This solution is designed to streamline your verification procedures without sacrificing accuracy.

Harness the power of facial biometrics.

Au10tix utilises state-of-the-art facial biometrics technology to enhance identity checks, providing robust security for businesses across various sectors. Say goodbye to cumbersome manual processes and hello to swift, reliable verification.

Combat fraud with confidence.

Au10tix empowers businesses to combat fraud effectively by leveraging machine learning techniques that continuously adapt to emerging threats. Remember that your identity verification processes are fortified against evolving fraud tactics.

A Simple and Secure Way to Get Documents Signed

HelloSign allows you to electronically request and add legally binding signatures to any document, from new hire agreements to loans, to NDAs. HelloSign is available in an intuitive web interface, a developer-friendly API, or as a Salesforce add-on.

  • Get Documents Signed Fast

With HelloSign, contracts are signed up to 80% faster than traditional paper-based contracts.

  • Improved Completion Rates

Built-in reminders and advanced signer options significantly improve document completion rates.

  • Personalized Signature Requests

Easily add your company logo, tagline, and custom messaging to stay on-brand with our business plans.

Templates

Documents that you send out frequently can be saved as reusable templates. Templates are excellent to speed up the signing process and streamline data entry.

Audit Trail

A non-editable Audit Trail is affixed to each signature request to ensure every action is thoroughly tracked and time-stamped. It provides proof of document access, review, and signature.

Team Management

Account admins have the power to manage document permissions and configure team settings from a centralized dashboard, keeping everything more organized and secure.

Products:

A robust set of eSignature features used by millions of customers around the world. Get your agreements signed fast and secure, with the features you want.

  • Get Documents Signed Fast
  • Improved Completion Rates
  • Personalized Signature Requests

Fast, Easy eSignature API Integration.

Integrate eSignatures into your application in days, not months. 

  • Fast, Reliable Implementation
  • Configurability Comes Standard
  • Collect eSignatures Securely

Ditch the PDF with mobile-friendly forms.

HelloWorks lets you turn PDFs into Mobile Friendly Forms and triple your completion rates.

HelloWorks is an eSignature solution designed for mobile.

  • Improve completion rates

Transform clunky PDFs into a simple, guided experience – no pinching, no zooming, no headache.

  • Immediate access to data

Easily download bulk form data in a CSV or use our API to directly import it into your system of choice for storage and analysis.

  • Safe and secure

Our eSignatures are SOCII and GDPR compliant, and come with court-admissible audit trails.

Send faxes without the fax machine.

Send and Receive Faxes Online

Incoming faxes go directly to the recipient’s inbox and outgoing faxes are sent online, all from your computer. No fax machine needed! 

Keep your fax number

Your customers can still send faxes to the same number the same way they always have. You can transfer your number to us and start receiving faxes electronically without any downtime or risk of losing any faxes. This service is available in the US and Canada.

  • Confidential & Secure

Without paper there’s no sensitive information left out in the open. All transmissions are encrypted for your security.

  • Customizable

Set up as many fax lines and users as needed, and route inbound faxes any way you like. Within minutes, everyone in your organization can send and receive faxes.

  • Paperless

When you receive a fax, we send it to you as a PDF. To send a fax, upload the file, enter the fax number and click Send. That’s it. There’s no paper involved.

  • Access from Anywhere

Send, retrieve and manage your faxes from the cloud. We’re integrated with Google Drive, Dropbox, Box, OneDrive, and Evernote for your convenience.

Building trust in blockchains

Chainalysis provides data, software, services, and research to government agencies, exchanges, financial institutions, and insurance and cybersecurity companies in over 60 countries. This data platform powers investigation, compliance, and risk management tools to solve some of the world’s most high-profile cybercriminal cases and safely grow consumer access to cryptocurrency.

Compliance software to monitor transactions in real-time:
  • Intuitive dashboard
  • Actionable alerts 
  • Real-time updates 
  • Case management
  • User profile view
  • Transfer-level data
  • Granular data via API
  • Customisable parameters

Chainalysis products:

Chainalysis Business Data provides an additional layer of customer intelligence to cryptocurrency businesses, helping them to understand customers better, tailor product offerings, and identify new revenue streams.

Chainalysis KYT (Know Your Transaction) combines industry-leading blockchain intelligence, an easy-to-use interface, and a real-time API. It helps organisations reduce manual workflows, stay compliant with local and global regulations, and safely interact with emerging technologies such as DeFi.

Navigate the cryptocurrency landscape and vet new opportunities. Chainalysis Kryptos provides in depth on-chain metrics of cryptocurrency businesses based on the industry’s most trusted blockchain data.

Chainalysis Market Intel leverages the transparency of the blockchain to provide real-world data and the unique insights needed to conduct cryptocurrency research and make investment decisions.

Explore. Investigate. Take Action. Reactor is the investigation software that connects cryptocurrency transactions to real-world entities. Examine criminal activity, such as the movement of stolen funds and legitimate activity like flash loans and NFT transfers.

Supercharge your investigations

Chainalysis’ professional services team conducts in-depth cryptocurrency analysis and investigations to deliver customized reporting and case response to clients across financial institutions, cryptocurrency businesses, government agencies, and other verticals.

The team has the expertise and data access to deliver exceptional analysis supporting a range of investigation scenarios, including exchange hacks, ransomware attacks, complex money laundering techniques, and more.

Complete Identity Verification and KYC platform

KYC requirements are unique to each business. Veriff’s tools customise the verification flow for business— optimising for the identity checks, supported regions, and documents required to keep business compliant and secure— all while fighting fraud and stopping bad actors. Then deploy with a single integration.

Veriff’s cutting-edge user experience makes onboarding simple, providing users real-time feedback to get verified on the first try without sacrificing identity fraud prevention.

AI-powered identity verification software from Veriff in web, iOS, and Android SDKs includes:

  • Real-time end-user feedback
  • Barcode scanning
  • NFC Security
  • Device and network analytics
  • Document tampering and synthetic fraud detection
  • Biometric analysis and synthetic fraud detection
  • Biometric analysis and authentication

Deploy Veriff’s full-stack AML and KYC solution for PEP and sanctions checks, adverse media screening, and ongoing monitoring on top of rigorous document verification. Veriff connects to thousands of databases and watchlists that are updated in real-time.

Use faces for authentication and verification

Whether a user is trying to log in, recover account access, or make a significant transaction, leverage facial biometric technology for identity access management and authentication to keep user accounts safe.

Build trust online by fighting identity fraud

Bad actors and fraudsters adapt at an exponential rate. What stops them today may not stop them tomorrow. Veriff and its exceptional fraud team work around the clock to stay ahead of fraudsters. We continue to invest in innovation to have leading identity fraud prevention technology.

  • Stop known bad actors.

Act on collected behavioural information to flag or block individuals with device and network fingerprinting.

  • Flag repeat attempts.

Velocity abuse technology identifies recurring attempts to verify identity and create new accounts, whether different people with the same device and network or the same person with fake IDs.

  • Analyse fraud patterns.

With a combination of machine learning and Veriff’s Fraud Team, discover fraud rings and repeat offenders by detecting patterns and similar behaviour to stay ahead of coordinated fraud attacks.

Tailored to your Industry

Identity verification is a requirement for companies across a range of industries. Veriff offers compliance, fraud prevention, and global scalability from the moment you integrate. Choose your industry to find out more.

  • Mobility

Keep your customers moving with quick and easy driving license verification.

  • Financial services

Helping you change the face of finance and keeping customers secure.

  • Crypto

Transparency is crucial for an emerging market, and Veriff can offer this.

Stripe Radar provides real-time fraud protection and requires no additional development time. Fraud professionals can add Radar for Fraud Teams to customise protection and get deeper insights.

Use ML that works.

Radar helps detect and block fraud for any type of business using machine learning that trains on data across millions of global companies. It’s built into Stripe and requires no additional setup to get started.

Stop blocking legitimate customers.

Old ways of combating fraud were never designed for modern internet businesses and can lead to lower acceptance rates and lost revenue. Radar can help you distinguish fraudsters from customers and apply Dynamic 3D Secure to high-risk payments.

Get protection that adapts to you.

The machine learning infrastructure lets retrain models—including ones customised for your business—every day. Radar’s algorithms adapt quickly to shifting fraud patterns and your unique business.

Smarter fraud protection with machine learning

Effective systems should identify fraud without blocking legitimate payments. Read a primer on how machine learning can produce predictive fraud models from large data sets.

Frictionless authentication with 3d secure

Additional authentication can help separate customers from fraudsters. Please read the guide on how the new version of 3D Secure can reduce fraud without compromising user experience.

Trained with hundreds of billions of data points.

Stripe processes payments from 195 countries for every industry, company size, and business model. Even if a card is new to your business, there’s an 89% chance it’s been seen before on the Stripe network.

Strength in numbers.

By learning from millions of global businesses processing billions in payments each year, Radar can assign risk scores to every payment and automatically block many high-risk payments.

Better ML outcomes with Stripe-scale data.

Radar scans every payment using thousands of signals from across the Stripe network to help detect and prevent fraud—even before it hits your business.

Better accuracy than third-party tools.

Radar ingests data from every layer of the financial stack and integrates data from checkout flows, rich payments data, and info from card networks and banks to assess fraud risk.

Data from financial partners.

Stripe’s partnerships with Visa, Mastercard, American Express, and leading banks let use data like TC40s, SAFE reports, and early dispute notifications to help identify fraudulent charges before they’re disputed.

Data from payments.

Radar is fully integrated with the rest of Stripe, so systems can instantly use rich payment information like customer details, shipping and billing addresses, and other properties to improve machine learning performance.

Data from checkout flows.

Stripe’s checkout tools automatically incorporate certain buyer patterns from your website and mobile app to help detect abnormal payments. Radar uses these signals to map a comprehensive customer path that is highly predictive of fraud.

Sophisticated signals engineered for impact.

Radar is built for global internet businesses facing evolving fraud threats. It constantly tweaks algorithms, tests which attributes are most relevant and generates compound signals to help precisely identify and block fraud.

Device fingerprints.

Tie multiple signals into a single device profile.

Historical snapshots.

Spot recurring patterns across years of historical data.

Proxy detection.

Identify IP spoofing and proxy usage.

Thousands more.

Radar scores every transaction by combining multiple signals to help determine whether a payment is fraudulent.

Radar for Fraud Teams.

Powerful tools to support fraud-fighting professionals.

Optimised customised reviews.

Surface the most relevant data for more efficient and accurate manual reviews.

Robust insights.

See rich analytics on fraud performance and dispute rates.

Custom rules.

Set precise rules to flag, block, or dynamically apply 3D Secure to certain transactions.

Block and allow lists.

Sync existing lists of trusted or blocked users.

Simple, transparent pricing.
Radar’s machine learning.

Fraud protection is powered by billions of data points across the Stripe network. Stripe’s SCA logic is built-in, helping maximise exemptions and protect your conversion rates.

Dow Jones powers businesses, governments and financial institutions with award-winning journalism, in-depth content archiving and indexing, robust data sets, and flexible information tools. Whether you want to uncover market advantage, integrate data into the workflow or manage risk, Dow Jones has a portfolio of solutions to meet your information needs.

At Dow Jones, consider that high-quality, well-maintained data is the lifeblood of effective screening engines and that the right combination of information and technology can deliver an efficient compliance program that doesn’t cut corners.

Built on the legacy of the world’s most trusted newsrooms, including The Wall Street Journal, the Dow Jones Risk & Compliance division combines the expertise of a multilingual team of 450 researchers and analysts with industry-leading automation and artificial intelligence tools.

Dow Jones delivers reliable, actionable information and applications explicitly developed for compliance requirements and workflows related to anti-money laundering and counter-terrorism financing, sanctions, anti-bribery and corruption, and international trade compliance.

Risk & Compliance Solutions

Financial Crime Compliance

Conduct comprehensive due diligence on your customers and connected parties as part of a robust Know Your Customer (KYC) program, with tools for:

Customer due diligence and enhanced due diligence
  • Beneficial ownership
  • Politically exposed persons (PEPs)
  • Sanctions
  • Adverse media coverage
  • Source of wealth
  • Specialist lists
  • Customized investigative research
Ongoing monitoring of customers
  • Politically exposed persons (PEPs)
  • Sanctions
  • Adverse media coverage
  • Event-driven investigative research

Third-Party Risk Management

Verify the integrity of your supply chain and business partners by assessing risks, such as bribery, corruption and dealings with sanctioned parties. Explore solutions for:

End-to-end third-party onboarding and ongoing monitoring

Integrity checks and due diligence:

  • Beneficial ownership
  • Politically Exposed Persons (PEPs)
  • Sanctions
  • Adverse media coverage
  • Other high-risk factors

Sanctions Compliance

Even as international and national regimes shift rapidly, keep pace with sanctions developments and requirements. Dow Jones provide consolidated, timely sanctions screening solutions for:

  • One-off and ongoing automated batch screening against global sanctions lists
  • Filterable lists and specialist watchlists for customised screening
  • Flexible parameters to enable effective management of screening results and alerts

Trade Compliance

Increasingly, criminals use international trade to move illicit funds and goods across jurisdictions and exchange goods with sanctioned parties. Identify red flags with  tools to:

  • Complete transaction-specific due diligence
  • Screen for sanctioned counterparties, locations, and vessels
  • Complete dual-use goods checks
  • Track the movement of goods and vessels in real-time

World-Check is a database of Politically Exposed Persons (PEPs) and heightened risk individuals and organisations used around the world to help to identify and manage financial, regulatory and reputational risk.

The world’s trusted and accurate Risk Intelligence source uses intensive research conducted by hundreds of qualified analysts using credible sources of information delivered to your business via partners and platforms. Used by law enforcement agencies, regulators, banks and corporations globally, regionally and locally, World-Check Risk Intelligence supports your Know Your Customer and Third-Party Risk compliance processes, helping you meet your regulatory obligations, make informed decisions, and help prevent your business from inadvertently being used to launder the proceeds of crime or association with corrupt business practices.

WorldCheck will benefit you by allowing you to better:
  • Understand who your customers are
  • Understand the nature of hidden threats
  • Reveal links to associated individuals and entities
  • Highlight cases that require further scrutiny
Coverage includes:
  • Politically exposed persons (PEP), close associates, and family members.
  • State-owned entities and state-invested enterprises.
  • Global sanctions lists.
  • Narrative sanctions (sanctions ownership information).
  • Global regulatory and law enforcement lists.
  • Adverse media.
  • Iran economic interest (IEI).
  • UBO.
  • Sanctioned securities.
  • Vessels information.
Additional specific data sets available include:
  • Marijuana-related business.
  • Sanction Sets for payment screening.
  • US SAM.

Thank you for reaching out!

Please complete the form below to inquire about Green Leaf service tariffs.
Our team will promptly get in touch with you to discuss your requirements further.