Security & Data Protection Policy

1. Commitment to Security

We take the protection of your data seriously. Our platform uses modern security measures to safeguard user information from unauthorized access, misuse, or disclosure.

2. Data Storage & Encryption

Your data is stored using:

  • Encrypted communication via HTTPS/TLS 1.2+
  • Industry-standard database encryption at rest (AES-256 where supported)
  • Secure credential and token handling

Passwords and authentication tokens are never stored in plain text.

3. Authentication & Access Control

Access to user accounts and data is strictly controlled. We use:

  • Secure session cookies
  • Verified login authentication
  • Server-side validation for protected actions
  • Role-based access restrictions where applicable

4. Device & Security Logging

To prevent abuse, fraud, and unauthorized access, we maintain security logs that may include:

  • IP address and region
  • Browser and device information
  • Login and acceptance timestamps
  • Hashed device fingerprint identifiers

Fingerprints are stored in hashed form and cannot identify you personally without additional data.

5. Legal Acceptance Logging

When you accept legal terms, we store a secure audit record including:

  • Version accepted
  • Timestamp
  • IP address
  • Hashed device fingerprint
  • Chained acceptance hash for verification

This protects both users and the platform by proving consent history.

6. Data Minimization

We collect only the data necessary to operate the service and maintain safety. We do not request sensitive personal details such as government IDs, financial information, or addresses.

7. Data Deletion & Account Removal

Users may request deletion of their account and associated data. Upon deletion:

  • Account credentials are removed
  • Stored avatars and user content are deleted
  • Access tokens are invalidated

Certain security logs may be retained as required by law or fraud prevention policies.

8. Third-Party Services

We may use trusted service providers for hosting and infrastructure. These providers are required to maintain strong security standards and do not have permission to use your data for their own purposes.

9. No Guarantee of Absolute Security

While we use industry-standard protections, no online system can guarantee complete security. Users should avoid sharing sensitive personal information within the platform.

10. Reporting Security Issues

If you believe your account has been compromised or notice suspicious behavior, contact us immediately at: [Your Support Email]