CLOUD PROTOCOL

WHITEPAPER

CLOUD PROTOCOL GROUP

The cloud has been removed by 2021, Big Four professionals and for security reasons. It is a full-fledged cybersecurity ecosystem against market hackers. This until 2021 Developing a sustainable business development: Security deployment for the blockchain and crypto industry Provides high quality against major risks for the B2B space

How is it designed?

Digital cryptoland.
Creates B2C products for individual comprehensive legal protection.

Ethics on the education path resides in the burden of a Cloud and relationship
Blockchain security units will be the leader, but also the biggest cryptocurrency way

VISION AND MISSION

VISION AND MISSION

Next to the Cloud is to protect the time and its applications from legal and enforcement and I will say it threats. We do not aim to build a solid foundation for full-fledged products, develop and ground new and existing products.
Collectively praise and support C for you and as our local utility token.
In our first year, they are our complementary and complementary elements in a sustainable business organization.
New products, services and network relations.
In 10 years, we plan to continue to plan our future from 2021-2031.
It will be backed by our CPRO coin and used in rules use and purchases.
This local utility coin will also serve as a special payment option for our upcoming payments.
Cloud Firm; A marketplace located where children are legal and free movement can list and sell.

The vision of our local CPRO

CPRO COIN HISTORY

CLOUD PROTOCOL’s CPRO

Icon is a global economy icon for all economic uses.

CLOUD Ecosystem.

CPRO COIN can be used for life attendees, CLOUD Club membership purchase, even corporate purchase and crypto, Legal security enclosure in the Cloud Ecosystem.

MANAGEMENT

Management needs to be critical for a decentralized project and a strong early age.
Sound governance is the foundation. We believe that Cpro expects the most advanced and the bigger in this regard. Using a progressive decentralized governance.

The Cloud Protocol team
You can delegate the controls of a number of jobs to make users even more powerful and powerful. Present and make communities more active.

The first part of project development is the clear and well-coordinated work of a team. The product needs thoughtful leadership to test and update acceptances and research. They are fast at the moment, achieve the goal of achieving – its full purpose and promotional,


Small population base, small community, small market etc.
We are ready for a “control transfer device” from the project investor to the project system.
We decided to prepare this process with a Community Pack. This fund
based on cloud development performance over the next six months and their CLOUD will decide how these funds will be managed.

It will be included in your cloud and will contribute to your city.

The information provided in this document,investment advice, financial advice, trading advice or any otherone kind of advice and you shouldn’t treat any of the website.such is the content. Do your own due diligence and consultConsult your financial advisor before making any investment decisions.

Non-Membership

CloudPayandor Cpropay.io are not affiliated with, endorsed by or backed by any other company. No CloudPay and $CPROPAY affiliation with any other product or company; or similar to its name. Any link, sponsorship or any partnership with any registered trademark.

CLOUD PROTOCOL MARKET ANALYSIS
THE EMERGING DIGITAL MARKET PLACE

Despite the devastating effects of Covid-19 on traditional businessesrestaurants and cafes, real-life retailers and major events, and conferences based on face-to-face interactions, pandemic boon in disguise for digital service providers.

United Nations Conference
Trade and Development, e-commerce share of global retail trade it rose from 14% in 2019 to about 17% in 2020.
In many countries, e-commerce transactions are shifting from luxury goods and services for daily needs.
Not surprisingly, the rise of digital services has led to rapid adoption of digital services. As businesses migrate to provide online services, they can no longer rely.

We have established a digital payment infrastructure to process and completely based on cash transactions. To create a more reliable infrastructure of this infrastructure, to provide companies and individuals and institutions with reliability certificate and license opportunities for funding tools.

CONSUMER PAYMENTS

At the same time, consumers are actively digital payment services despite initial concerns about security and privacy.  Businesses and consumers now see the vital benefits of digital payments such as contactless payment transactions and the ability to pay from anywhere. Serves as a critical way to reduce. Physical interactions at the point of sale and physical interaction with shared devices. More importantly, this trend is not a trend, especially for contactless transactions. BROTHER Research, a global technology market advisory firm, is saying that contactless technology will eventually. It is becoming the de facto type of digital payment of the future. According to McKinsey’s 2021 payment market, report on relevant in-store transaction volume.

Contactless payment via physical card and mobile wallet has increased significantly since then the onset of Covid-19 and it will continue to progress. To support the infrastructure with crypto accounting programs that will be formed together with the constitutional law principles of existing governments and to take the necessary steps together with the community.

The Potential of Mobile Wallet The wide availability of contactless credit cards kickstarted the initial wave of contactless payment. The popularity of contactless credit cards continues to grow in countries with mature digital payment systems, as consumers typically stick to the payment methods that they are familiar with due to security concerns and ease of use. However, the scenario is very different in developing markets with less mature digital payment infrastructure. As a result, alternative forms of digital payment play a critical role, particularly mobile wallets.

China is a prime example as Alipay and WeChat Pay are the two top global leaders in mobile wallet technologies. In
developed markets, tech giants such as Apple, Google, and Samsung are playing catch-up after sensing the enormous market potential of mobile wallet technologies. They are actively acquiring merchants and expanding their user base to compete with the top Chinese vendors.

Basically, three main trends have triggered the popularity of mobile wallets:
Mass adoption of smartphones in the global population as people navigate with their smartphones, mobile wallets. Frees people from carrying the need for a physical wallet on a smartphone and significantly reduces payment friction. More than 80% of the world in 2021
The population will have at least one smartphone in their pocket Deloitte. The percentage is much higher in developing countries. The smartphone is the primary means of Internet access for many.

Tight integration with a wide range of services

Compared to debit and credit cards offered by financial institutions, technology vendors that engage in the platform economy provide mobile Market Analysis wallet services. These vendors, such as WeChat, Alipay, GrabPay, and Line, develop their multipurpose app that serves as a single portal to a wide range of virtual products and services. The diversity of services offered by these companies have become an industry norm, resulting in other specialised mobile wallet vendors expanding their in-app services through partnerships and collaborations.

CLOUDPAY (PAYMENT)

CLOUDPAY (PAYMENT)

CPROPay (CPROPay) is a decentralized EIP-2718 payable, built on the trusted Ethereum network. It is built for crypto systems involving private trading. CLOUDPay will create a universal payment platform that offers cities around the world and their users to request and do business with it cheaper.

FUTURE CLOUDPAY

By reducing transaction costs, CloudPay can be made more affordable and accessible worldwide, available for purchase on Ethereum. We plan to do this with the EIP-2718 contract and our own custom prophecies to keep job fees low and fast. Using this technology, think of our own thinking about a very small system.

REALITY CLOUDPAY

CloudPay Protocol. With this protocol, you can make a crypto billing system service, payment network fee and mass sale with token payment.

TRADERS / BUSINESS

Willingness to capitalize on the booming cryptocurrency industry Merchants, businesses, whether offline or online, eagerly seek technology or platforms that allow them to start accepting crypto currency. Payment integration solution for existing Enterprise Resource Planning (ERP)
Accepting cryptocurrency payment is not just about payment possibilities. Established businesses are looking for a system that can be.
It is easily integrated into their company’s ERP to streamline their tax returns and accounting.

MARKET ANALYSIS

Protection against credit card chargebacks. Unfortunately, traders do not have enough protection.
Coming to tackle chargebacks. Even if a merchant does not have a ‘refund’ policy, a credit card chargeback policy allows consumers to still file chargebacks.

As a result, traders are always on the losing side.When it comes to credit card fraud. If a business has too many chargebacks, accounts as a percentage of their total transactions may be closed or costs per transaction may increase significantly

EIP-2718 Protocol: ERC-1363 Coin Payable

After a BEP-20 transfer or approval (i.e. apayment), you need to send another transaction and pay GAS to be able to trade.

The EIP-2718 protocol was proposed and created to address this shortcoming. We have included EIP-2718 in the CPROPay ecosystem to make token payments
It’s easier and works without using any other listeners.

Allows to create a callbackafter a transfer or approval in a single transaction.Many suggested uses can accept BEP-20 payments.

Examples could be:
To create a crowd sale payable with tokens
Sales services for tokens
Paying bills
Don’t subscribe
For these reasons, it was named “Payable Token”.

CLOUDPAY ECOSISTEM

Purpose, underlying protocol and cryptocurrency CloudPAY is the future of decentralized, scalable cryptocurrency payment. Merchant transactions. CloudPay includes the ERC-1363 protocol to enable users Paying for daily expenses using CloudPAY Coin and other ERC tokens built on it Ethereum network (ERC).

On top of that, users are rewarded with CloudPAY coins.
They spend ERC coins.The base currency used for all transactions on the CloudPAY platform, $CloudPAY. Investors can buy this cryptocurrency through UniSwap. Inside in the future, investors will be able to purchase $CPRO on other cryptocurrency exchanges.
Unlike other cryptocurrencies, $CPRO cannot be mined and its total supply is limited (4 billion)

PRODUCT- DAPPS: CloudPay Decentralized Apps Payment Processing DApp
– This DApp allows payment and funds transfer to take place almost instantaneously.
– DApp decides vendor payment currency (CPRO, BUSD /USDT/  other tokens) according to trader preferences.
– We hope to make more use of DApp to support daily transfers, cross-border transfers and payment transfers.

Merchant Dapp: – This DApp is used to store the merchant information, status, and merchant fees if applicable.
– It will also store the ongoing promotion or rewards with any participating token and define the discount and perks.

Ledger DApp – Ledger DApp will be used to store all the payment information. – DApp will store items purchased, item details, quantity, price, and discounts. – Data can be exported through the CloudPay Merchant platform.
Trezor DApp Trezor DApp will be used to store all the payment information.
– DApp will store items purchased, item details, quantity, price, and discounts.
– Data can be exported through the CloudPay Merchant platform.
PRODUCT- Websites: Cloudpay Platform
Merchant Portal
– This merchant portal allows the merchant to sign-up and start accepting cryptocurrency in e-commerce. – Merchants can manage API’s with the integration module to integrate reports and accounting reports to their existing ERP. – It will be a one-stop place to manage offers, discounts, and print reports.

CLOUDPAY WEB WALLET

-This is a stripped-down version of the full CloudPay Wallet in the web browser. – Users can make payments easily to any e-commerce website in just a few clicks.
Product – Mobile Apps: CloudPay Wallet CloudPay Wallet (iOS + Android)
– This main CloudPay product allows users to create wallets easily, get CPROPAY and make payments using CPRO. -Users can stake CPRO to earn interest through the wallet app. – Users can track their cryptocurrency expenses easily and can export data for tax filing purposes. – Wallet enables users to scan QR to make the payment instantly at café, restaurants, shops, and e-commerce websites

CLOUDPAY POS (Payment Terminal / POS Terminal)

– CLOUDPay POS Terminal is a standalone payment terminal for cafes, restaurants, retailers and businesses on the go. – CPROPay POS Terminal will be a plug-and-play device that supports any modern POS system. – Merchants can start accepting crypto payment by purchasing the CloudPay standalone POS terminal. CPROPAY System Architecture The core of CLOUDPay heavily relies on platform development. Four primary considerations in choosing our tools and platforms have been identified. They are Security, Scalability, Ease, and Extensibility; these have been amalgamated into our core values: Security – Protect against cyber-attacks. Scalability – Accommodate high user traffic. Extensibility – Allow the addition of modules in the future Ease – Ensure least development effort.

CLOUDPAY PAYPAL(OTHERS) BANKS

 

Fees : Low, Fixed (US$0.05 -US$0.30) Typical MDR above 3% per transaction depends on the volume Typical MDR above 1.5% per transaction depends on the volume
Processing Speed :
Near-instant (Average between 1-5s)
Security :
Secured, immutable, tamper-proof
PCI DSS Level 1
Identity Protection : Pseudonyms, shield identity and protect personal privacy Identity is linked, identifiable, and monitorable Identity is linked, identifiable, and monitorable
Interest Earning
Yes, stake to earn high interest
No interest
Less than 1%

CLOUD PROTOCOL LEGAL SERVICES AND INFORMATION EXPLANATION TEXT ON THE PROCESSING OF PERSONAL DATA

 

This clarification text has been prepared by CLOUD PROTOCOL TEKNOLOJİ ANONİM ŞİRKETİ (CLOUD Turkey) as the data controller within the scope of Article 10 of the Personal Data Protection Law No.
Dear customers: Personal data within the scope of the Law No. 6698 on the Protection of Personal Data (“Law”), which entered into force on April 7, 2016; It is defined as any information relating to an identified or identifiable natural person, and protecting your personal data and being informed about your personal data are among your fundamental rights as per the Constitution of the Republic of Turkey (“Constitution”). In this respect, as ensuring the security and processing of your personal data is an obligation as well as being of great importance and sensitivity for Cloud Protocol, your
data is processed and protected by Cloud Protocol within the framework of the Constitution, the Law and the General Data Protection Regulation (“GDPR”).

With Article 10 of the Law, “To the Data Controller”; Obligation to inform the data subjects about the identity of the data controller and its representative, if any, during the collection of personal data, the purposes for which personal data will be processed, to whom and for what purposes the processed personal data can be transferred, the method and legal reason for collecting personal data, and other rights listed in Article 11 of the Law. It is aimed to inform you by making explanations about the personal data processing activities carried out by Cloud Protocol which will have the title of data controller within the scope of the “Law” with this lighting text.


1-CLOUD Turkey’s Data Controller
Data controller 3 of the Law. Cloud Turkey is the data controller for the data relating to you, our valued customers/potential customers.
2- Purpose of Processing Your Personal Data
Name-surname, date of birth, place of birth, mother’s name and father’s name, mobile phone number, e-mail address, identity number(s), other identification information, photo, bank account numbers, address, profession information, device belonging to you, our valued customers. type and identity, tracking information about usage, IP address and information obtained from WLAN (Wireless Local Area Network), transaction history, access date and time, browser type and version, personal data in the form of location information, conclusion and fulfillment of agreements you will make It will be processed by Cloud Protocol, which is the data controller, in accordance with Article 20 of the Constitution of the Republic of Turkey and Article 4 of the Law, at all stages, including termination and termination;
2.1 Providing our services and verifying your customer identity within this scope,

2.2 Preservation of customer accounts and archives,
2.3 In order to comply with legal and administrative measures,
2.4 To be used in the products and services you have bought/will receive, to be able to send new product and service offers to you,
2.5 Keeping customer satisfaction at the highest level by measuring the performance of our systems.
2.6 Planning of commercial/business strategies.
2.7 Ensuring the security of our website, mobile applications, other online applications and products.
2.8 Modelling, reporting, scoring, risk monitoring, intelligence, existing or new product studies and potential customer identification.
2.9 Issuing information and documents that will be the basis for the work and transactions to be carried out.
2.10 Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.
2.11 Notifying these authorities in order to investigate, detect and prevent violations of the contract and the law.
2.12 Resolution of current and future legal disputes.
2.13 Ensuring system security with customer account security; Fulfilling our legitimate interests, such as fulfilling obligations under money laundering legislation and preventing fraud and crime.
2.14 Ensuring that our systems, services and interface are accessible to users using all platforms (IOS, Android).
3- Transfer of Your Personal Data
Cloud Protocol for personal non-use purposes and situations used in Turkey
Personal, Cloud Protocol Turkey can be designed by business partners, consultants, authorized courts and/or institutions and public institutions and organizations such as legal and financial audits in Turkey.
In addition, our personal use may be directed by Cloud Protocol Turkey or specifically for certain personal data processing purposes and purposes, by any person, institution and institution that receives or supports project progress.
Cloud Protocol Turkey can receive personal, process and store with its own persons;
Arrangement/allowance of the preparation of laws and regulations, institutions and/or institutions,
All kinds of public legal entities that have personal authority, authorities,
Cloud Protocol Turkey, general company,
law, tax, etc. to represent our activities. Support, guidance training and accompanying walk,
cooperation, program partner, applications, daily/abroad, funds, cooperation organizationsa,
Local/domestic/international organizations that receive service/support/consultancy or project/program/financing and institutions that receive independent audit and support services
Preservation in personal computer environment, virtual environment, preservation in computer environment, archiving, electronic hosts, hosting, hosting, cloud computing etc. in computer environment.
 
They are legally acceptable.
Cloud Protocol can be personally trained in Turkey. The activity of the data on the way to transition will be carried out with the “explicit consent” of individuals. Cloud Protocol will use reasonable efforts to provide necessary and corrective measures to protect personal data from such children.
4- Collection Method and Legal Reason of Your Personal Data
Your personal preference; with all contracts/delivery forms and other documents,advices,
our website, mobile applications, customer service applications and our students,with our call center or service center,through service providers with children,
By means of KPS, SMS, e-mail, provided that it is a written or electronic design.
Everyone outside of Cloud Protocol Turkey, including only or automatic or non-automatic as part of any data recording system, our foreign members, cooperation program mediums and organizations, official institutions/abroad and third parties, is planned in detail and within the periods to be determined by the regulations. is stored.
This can be applied at reasonable prices, can be designed as required by the standard rules in the law, 5th and 6th of the law can be designed here, and can be processed and transferred by Turkey in accordance with it.
Your personal preference;
With its rise as a member, control and performance (KVKK art.5/2-c)
It is processed pursuant to legal reasons (KVKK art.)
In addition, the data processing activities to be transferred to the dormitory will be carried out with the plans to be “announced”.
Cloud Protocol Turkey will be designed by individuals and processed in a way that prevents the repeal of the law, and will be removed from the target of destruction as requested or re-made.
5- Your Rights Pursuant to Article 11 of the Law
About you by applying to Cloud Protocol Turkey;
5.1 Learning whether personal data is processed or not.
5.2 If personal data has been processed, requesting information about it.
5.3 Learning the purpose of processing personal data and whether they are used in accordance with the purpose.
5.4 Knowing the third parties to whom personal data is transferred at home or abroad.
5.5 Requesting correction of personal data in case of incomplete or incorrect processing.
5.6 Requesting the deletion or destruction of personal data within the framework of the conditions stipulated in Article 7 of the Law.
Requesting notification of the transactions made pursuant to clauses 5.7 (5.5) and (5.6) to third parties to whom personal data has been transferred.
5.8 Objecting to the emergence of a result against you by analyzing the processed data exclusively through automated systems.
5.9 You have the right to demand the compensation of the damage in case of loss due to unlawful processing of personal data.
 

5- Your Rights Pursuant to Article 11 of the Law

About you by applying to Cloud Protocol Turkey;
5.1 Learning whether personal data is processed or not.
5.2 If personal data has been processed, requesting information about it.
5.3 Learning the purpose of processing personal data and whether they are used in accordance with the purpose.
5.4 Knowing the third parties to whom personal data is transferred at home or abroad.
5.5 Requesting correction of personal data in case of incomplete or incorrect processing.
5.6 Requesting the deletion or destruction of personal data within the framework of the conditions stipulated in Article 7 of the Law.
5.7 Requesting notification of the transactions made pursuant to clauses 5.7 (5.5) and (5.6) to third parties to whom personal data has been transferred.
5.8 Objecting to the emergence of a result against you by analyzing the processed data exclusively through automated systems.
5.9 You have the right to demand the compensation of the damage in case of loss due to unlawful processing of personal data.
6- Data Supervisor you can apply to
Your requests within the scope of your rights specified in the previous article (within the framework of Article 11 of the Law);
6.1 Personally, with the information certifying your identity to Cloud Protocol address written below,
 
6.2 You can send it to Cloud Protocol’s info@cloudprotocol.io address via secure electronic signature, mobile signature or your current e-mail address that has been notified to Cloud Protocol and registered in Cloud Protocol system.
In your applications that you will make with the above-mentioned method;
1. Your name, surname, date and signature if the application is written
2. T.C. If you are a citizen of the 11-digit T.C. identification number
3. T.C. If you are not a citizen, your residence permit and ID number
4. Your residential or workplace address based on notification
5. Your e-mail address and telephone number, if any, as a basis for notification
6. Subject of the request
must be stated absolutely, and all kinds of information and documents related to the subject of your request must be legibly attached to your application.
Your applications will be accepted after the identity verification by Cloud Protocol Turkey and will be answered in writing or electronically within the legal period. We would like to emphasize that in written applications, the date the documents reach Cloud Protocol Turkey, and the application date in Cloud Protocol Turkey in applications made by other methods, will be taken as the application date. Answering your applications is essentially a free process, and if the response process requires a cost, the fee in the tariff determined/to be determined within the scope of the legislation or administratively will be reflected to you.
CHAPTER FOUR
Application, Complaint and Data Controllers Registry
Application to data controller
ARTICLE 13- (1) The person concerned shall submit his/her requests regarding the implementation of this Law in writing. or by other methods to be determined by the Board, to the data controller.
(2) The data controller shall submit the requests included in the application as soon as possible and according to the nature of the request.
finalize it free of charge within thirty days at the latest. However, the process also has a cost.
If required, the fee in the tariff determined by the Board may be charged.
(3) The data controller accepts the request or rejects it by explaining its reason and gives its answer.
notifies the person concerned in writing or electronically. Acceptance of the request in the application
In the event of a request, the data controller will fulfill its requirements. Data controller of the application
In case of error, the fee will be refunded to the person concerned.
This personal consent and enlightenment text has been prepared in a way that will be explanatory in international platforms and legal courts, and its addressee is the Judiciary units of the Republic of Turkey.
It supports international platforms and judicial units.