Scroll Top

Privacy Policy

Privacy Policy

Cookie Policy

Cookie Policy

2.1 In the Google Chrome browser, the Tools menu contains an option to Clear Browsing Data. You can use this option to delete cookies and other sites and plug-in data, including data stored on your device by the Adobe Flash Player (commonly known as Flash cookies).

Note: Be aware that disabling cookies will affect the functionality of this Portal and many other websites that You visit. Therefore, it is recommended that You do not disable cookies.

Privacy Protection

Privacy Protection

Phishing attacks typically involve fraudulent emails, websites, or messages designed to deceive individuals into revealing confidential details such as login credentials, financial information, or personal data. Common phishing tactics include:

Fake Emails and Messages: Attackers send fraudulent emails pretending to be from Walaa, urging Users to verify accounts or update sensitive details.

Spoofed Websites: Fraudulent sites that imitate official Walaa pages to trick Users into entering login credentials.

Malware and Attachments: Malicious links or files embedded in emails that can compromise security when accessed.

Privacy Policy

Breach Notification

Right to Access

Right to Confidentiality

Right to be Forgotten

Privacy by Design

Data Protection Officer

Collection Using this Platform

Online Payment

Online Privacy Policy Only

Security

Third-Party Links

Cookie Policy

Managing Cookies

More Information

Representation and Warranties

Termination of Account

Damages & Indemnificaion

Disclaimer of Liability

General Release

Governing Law

Policy Revision

Your Consent

Contact Us

Phishing Attack Disclaimer

At Walaa, we prioritize the safety of all Vendors, Customers, and Users. Phishing attacks are fraudulent attempts to obtain sensitive information by impersonating trusted entities. We strongly urge all visitors, clients, and stakeholders to remain cautious of phishing attacks—malicious attempts by cybercriminals to steal sensitive information by impersonating trusted entities.

How Phishing Works?

How to Identify Phishing Attempts?

How Walaa Ensures Your Security?

Steps to Protect Yourself:

Reporting Phishing Incidents