PRIVACY POLICY
Privacy Policy
1. Introduction
Your security is of utmost importance to us, and we are committed to protecting and respecting it. This Protection Strategy makes sense of how we gather, use, disclose and defend your data when you access our site [URL], utilize our versatile applications or engage with our services (generally, the “Services”).
By utilizing our Administrations, you agree to the variety and utilization of data as outlined in this approach. In the event that you can't avoid contradicting any part of this strategy, kindly renounce utilizing our Administrations.
2. Data we collect
2.1 Individual data
We may collect individual data that you knowingly provide when registering a record, participating in games or cooperating with our administrations. This data may include
Name
E-mail address
Date of birth
Installment data (for in-app purchases)
Usernames and passwords
Profile picture
Contact details
2.2 Non-individual data
We may collect non-individual data that does not directly identify you, including:
Gadget data (e.g. IP address, gadget ID, program type)
Usage information (e.g. game scores, game inclinations)
Area information (where enabled)
2.3 Cookies and tracking innovations
We use cookies, web guides and other tracking advancements to gather data about your connections to our Services.
3. How we use your data
We use the data collected to:
Process exchanges and send related data
Speak to you, including responding to requests and providing updatesPersonalize your experience and send you customized content and noticesInvestigate usage and patterns to work on our administrationsRecognize, prevent and address specialized issues and security breachesAgree to legitimate commitments and uphold our terms of administration4. How we provide your data
We may pass on your data to:
Specialist cooperatives: external organizations that help with administrative arrangements, parcel handling and examinations.Legitimate consistency: To comply with legal commitments, implement our terms or safeguard our freedoms and well-being.5. Information Security
We carry out different security efforts to protect your own data, including:
Encryption of confidential information
Normal security reviewsAccess control measuresUse of secure associations (SSL/TLS)Despite these actions, no web transmission or electronic storage strategy is completely secure, and we cannot guarantee total security.
6. Your independence
Depending on your competence, you may have the following privileges in relation to your own data:
Access: Request for a duplicate of the individual information we hold about you.
Amendment: Request to rectify incorrect or inadequate information.Cancellation: Requesting the deletion of your own information.
Objection: Objection to the handling of your information for explicit purposes.Versatility of information: Request to move your information to another specialized organization.
7. Changes to this Security StrategyWe may update this Security Strategy from time to time. Changes will be published on our website with an updated “Power Date”.We recommend that you routinely audit this approach for any updates.