BTCBoss Exchange Privacy Policy

1. Application of personal data

When registering on our web resource and obtaining a permanent use account, you must provide the following information: digital wallet, email , card number and its validity period. All information provided by the user is stored on the portal and is fully protected.

2. How can the company use your information?

The information provided during registration is used for the purpose of:

  • uninterrupted functioning of the technical department;
  • work of services in a continuous mode;
  • analysis of customer service to find problems;
  • prompt interaction with customers in order to prevent the actions of fraudsters;
  • transfer to users of important information regarding services, updates and rules of the company and its resource.

3. Who gets access to the client"s personal data?

The personal data of users of our resource is confidential, they are not transferred to third parties. Client data may be transferred only in cases prescribed by law (for example, by court order, request by regulatory authorities or law enforcement authorities during the restructuring (liquidation) of the company).

4. How are cookies used ?

4.1. Cookie : application features
Cookies (cookie) are a piece of data sent by the server and stored on the gadget. Such files contain information that is collected directly from a personal digital device and transferred back to the online resource on a subsequent visit to the same site. Cookies help the system to remember user actions and obtain prioritized information for users of this website.
The web portals use different types of cookies :

  • technical files (technical cookies) - open access to various online services and determine the software that the user uses, the type of browser, and also explore the functionality of new options, identifying possible network errors and increasing the efficiency of the online resource;
  • analytical files (analytical files) - designed to identify each user, therefore, they collect complete information (duration of presence on the site, features of movement);
  • functional files (functional files) - explore the user"s preferences (location, age, gender), therefore, they simplify Internet surfing on the resources that the user visits;
  • advertising files (advertising files) - collect information about how many users visit a particular web resource, what kind of advertising should be shown (advertising cookies show ads to a select audience that is interested in a product or service).

4.2. How long are cookies stored on the device?
The information collected about the user can be stored in the system for a long time (depending on the type of file). The storage period should not be longer than the period used to solve the tasks. Once the specified time period has elapsed, the information is deleted automatically.
4.3. Who is granted access to cookies ?
The Service has the right to use data collection systems and analytics systems of third parties (third parties) on the website in order to improve the services provided and the quality of the website. The data collected by such systems is used by them in accordance with their regulations.
As soon as the data is cleared, then the automatic offer to use the cookie appears again if the user visits the resource next time. If such a suggestion is ignored, some actions may be blocked.
Yandex search bots use web beacons to access cookies that are stored on the device. The use of such tags is necessary for:

  • analysis of data on the operation of the resource and its services;
  • definitions of user operations carried out on the resource.

5. Security of user data

The developers of the service have resorted to effective means of protecting personal information. Such a comprehensive system allows you to prevent third parties from accessing personal information.

There is a small risk that such information may get to scammers who use modern IT technologies to perform malicious tasks. In order to prevent this, clients must generate complex passwords to create their entry on the resource and not share them with anyone. As soon as the fact of hacking is recorded, you should immediately contact the specialists of the technical department of the company.