# Privacy Policy
Please note that this privacy statement will gularly be updated to reflect any change in the way we handle your personal information or any changes in applicable laws.
This Privacy Notice describes the policies and procedures of DApps Platform, Inc., (“we,” “our,” or “us”) pertaining to the collection, use, and disclosure of your information on and related mobile applications and products we offer (the “Services” or “Chain Gate”).
OVERVIEW Your right to privacy and the protection of your personal data is important to us. The following sections provide further details as to how we process your personal information through Chain Gate. We don’t share your information with third parties except to deliver you our Services and products, comply with the law, make Chain Gate better, protect our rights, or effectuate a business transfer. We’re not a huge, faceless corporation. We’re just developers trying to deliver an incredible product. If you have any questions or concerns about this policy, please reach out to us at support@chain-gate.net
HOW DO YOU ACCEPT THIS POLICY?
By using Chain Gate, including downloading one of our mobile applications or visiting our website, you agree to the use, disclosure, and procedures outlined in this Privacy Policy.
WHAT PERSONAL INFORMATION DO WE COLLECT FROM OUR USERS?
We do our best to minimize the amount of Personal Information that we collect from Chain Gate users. Your contact information, such as your phone number, or email address (depending on how you contact us), may be collected when you communicate with us for support, or if you report a bug or other error related to Chain Gate or when you interact with us through social media. When you use our Services, we process PUBLIC addresses that you generate through Chain Gate.
We collects, processes, and stores Personal Data collected from you via your use of the Service or where you have given your consent. This Personal Data may include contact details, copies of identification documentation provided by you or derived from publicly accessible databases, your government identification number as well as information relating to your device or internet service (such as an IP address and a MAC number).We collect information you provide during the onboarding process, which may be a completed, incomplete, or abandoned process:
- Face Data
- Email address
- Mobile phone number
- Full legal name (including former name, and names in local language)
- Nationality
- Passport number, or any government issued ID number
- Date of birth ("DOB")
- Proof of identity (e.g. passport, driver's license, or government-issued ID)
- Residential address
- Proof of residency
- Additional Personal Data or documentation at the discretion of our Compliance Team
Practices related to face data
What face data does your app collect? Our app utilizes facial recognition technology to collect and analyze specific facial features, such as the shape of the face, eye position, and mouth movement. We do not collect or store any personally identifiable information (PII) associated with the face data, such as names or unique identifiers.
How do you use the collected face data? The collected face data is solely used for the purpose of enabling certain features and functionalities within our app. This includes personalized user experiences, such as customized avatars or filters. The face data is processed locally on the user's device and is not transmitted or shared with our servers or any third parties.
Will the data be shared with any third parties? Where will this information be stored? We do not share or transmit the collected face data with any third parties. Additionally, the face data is stored locally on the user's device and is not uploaded or stored on our servers or any external storage.
How long will face data be retained? To prioritize user privacy and data minimization, we only retain the face data for the duration necessary to provide the requested features and functionalities within the app. Once the data is no longer required, it is immediately deleted from the user's device and cannot be recovered.
Where in your privacy policy do you explain your app's collection, use, disclosure, sharing, and retention of face data? Identify the specific sections in your privacy policy where this information is located. Our privacy policy contains a dedicated section that clearly explains the collection, use, disclosure, sharing, and retention of face data. You can find this information in the "Face Data Collection and Usage" section of our privacy policy, specifically under the "Data Collection and Storage" or "User Data" section.
Quote the specific text from your privacy policy concerning face data. "In compliance with privacy regulations, we collect and utilize face data solely for the purpose of enabling specific features and functionalities within our app. This includes personalized user experiences and does not involve the collection or storage of any personally identifiable information (PII) associated with the face data. The collected face data is processed locally on the user's device and is not transmitted or shared with any third parties. We retain the face data only for the duration necessary to provide the requested features and functionalities and promptly delete it once no longer required."
We are committed to maintaining the privacy and security of our users' data. If you have any further questions or concerns regarding our practices related to face data, please do not hesitate to contact us.
WILL WE SHARE YOUR PERSONAL DATA WITH THIRD PARTIES?
Information about our users is an important part of our business and we are not in the business of selling our users’ personal information to others. We may transfer personal data to our service providers or third parties in connection with Chain Gate’s operation of its business, as certain features on Chain Gate rely on various third-party products and services (collectively “Third Party Services”), . These third party services providers only have access to certain Personal Information, such as your public addresses, to perform their functions and may not use it for other purposes. Furthermore, they must process the personal information in accordance with our contractual agreements and only as permitted by applicable data protections laws. Business transfers: As we continue to develop our business, we might sell or buy other businesses or services. In such transactions, user information generally is one of the transferred business assets but remains subject to the promises made in any pre-existing Privacy notice (unless, of course, the user consents otherwise). Also, in the unlikely event that Chain Gate or substantially all of its assets are acquired, users' information will be one of the transferred assets. We may share non-personally identifiable information publicly and with our partners- like publishers, advertisers, developers, or right holders.
PUSH SDK 1.1. Function introduction (1) Basic functions: Give developers the ability to push messages and notifications (2) Extended functions: In order to meet the service requirements of developers in different dimensions, we provide extensions such as situational push, smart push, and link regulator Functions are available for developers to choose and use. 1.2. Information processed in the message push SDK service (1) Information processed by the Android side
Product function type | Product function name | Personal information type | Personal information fields | Use and purpose |
---|---|---|---|---|
basic function | Push message | Device information network information | Required information: device platform, device manufacturer, device brand, device model and system version, OAID, AndroidID, MAC, Advertising ID, Serial Number, ICCID, IP address, base station information, WIFI information, operator information. Optional information : IMEI , IMSI | Used to generate a unique push target ID (CID) and device ID (GID) to ensure accurate delivery of message push and accurate identification of message devices. |
extensions | Push on occasion | location related information | Required information: location-related information | Provides refined push for offline scenarios, can recommend push content that better meets your needs, and reduce the interruption of useless push messages. |
Smart push | Application list information | Required information: application list information | Recommend push content that better meets your needs and reduce the interruption of useless push information to you | |
link conditioner | Application list information | Required information: application list information | We use merged link technology for technology push. When a device has multiple APP push links active at the same time, we will randomly merge them into one link to save you power and traffic. When a device has offline push messages to be sent, offline messages can be sent through the association startup function. You can choose to turn on or off this service. When you turn off this service, the association startup will also be turned off at the same time. As a result, power and data consumption will increase, while the message reach rate will also decrease. |
(2) Information processed on the iOS side ① Device information: device identification code (IDFA, IDFV), device platform, and device manufacturer are used to generate a unique push target ID (CID) and device ID (GID) to ensure the accuracy of message push Accurate delivery and accurate identification of message devices. Device brand, device model and system version are used to optimize the effectiveness of channel resources and improve the arrival rate and stability of message push. ②Network information (including IP address, WIFI information, base station information, operator information) and location-related information : In order to maintain the stability of the network connection to the greatest extent and establish long links, we need to understand the network status and changes of the device to achieve stability Continuous push service. We provide a push function on occasion. Location-related information will help us provide you with refined push in offline scenarios. We can recommend push content that better meets your needs and reduce the interruption of useless push messages to you. In order to fulfill the mission of "technology for good", a number of Internet companies have taken the initiative to assume social responsibilities and formed the "Public Welfare Push Alliance". For the purpose of protecting your life, health and property safety, in accordance with the "Personal Information Protection of the People's Republic of China" Law, "Earthquake Prevention and Disaster Mitigation Law of the People's Republic of China" and other laws and regulations, when earthquakes, meteorological and other major disasters occur, Personal Promotion will require developers to obtain your full and clear authorization when you are in a situation that may be affected. Within the region and when personal push receives relevant information announced by relevant departments, relevant disaster notification information will be sent to you in real time through the developer's mobile application push channel. (3) Permission application
YOU | Permissions | scenes to be used |
---|---|---|
Android | INTERNET (required) | Telecommunication |
Android | ACCESS_NETWORK_STATE (required) | When the network changes, perform network switching communication |
Android | ACCESS_WIFI_STATE (required) | Check wifi connection status |
Android | VIBRATE (required) | Vibrate permission (required to use notification function) |
Android | SCHEDULE_EXACT_ALARM (required) | When calling the CID registration interface |
Android | BADGE_ICON (required) | When receiving a notification message |
Android | READ_EXTERNAL_STORAGE (optional) | When calling the CID registration interface |
Android | WRITE_EXTERNAL_STORAGE (optional) | When calling the CID registration interface |
Android | BLUETOOTH (optional) | When the situational push function is turned on and you authorize Bluetooth permissions |
Android | BLUETOOTH_ADMIN (optional) | When the situational push function is turned on and you authorize Bluetooth permissions |
Android | ACCESS_BACKGROUND_LOCATION (optional) | When the situational push function is turned on and you authorize location permissions |
Android | ACCESS_FINE_LOCATION (optional) | When the situational push function is turned on and you authorize location permissions |
Android | ACCESS_COARSE_LOCATION (optional) | When the situational push function is turned on and you authorize location permissions |
Android | READ_PHONE_STATE (optional) | When calling the CID registration interface |
iOS | Network access (required) | full life cycle |
iOS | IDFA (required) | When calling the CID registration interface |
iOS | Positioning (optional) | When the situational push function is turned on and you authorize location information |
2. User operation SDK service: 2.1. Function introduction We provide developers with professional data statistical analysis capabilities and user profiling capabilities to help developers provide content and services that are more in line with your preferences, reduce the interruption of unnecessary information to you, and improve Your user experience using the developer’s application. 2.2. Information processed in the user operation SDK service (1) Information processed by the Android side
Product function type | Product function name | Personal information type | Personal information fields | Use and purpose |
---|---|---|---|---|
basic function | Data analysis and user profiling capabilities | Device information, network information, location-related information, application list information | Required information: device platform, device manufacturer, device brand, device model and system version, OAID, AndroidID, Advertising ID, Serial Number, ICCID, IP address, WIFI information, base station information, operator information, application list information optional information : IMEI, IMSI, MAC, GPS location information | It is used to provide high-quality and stable data statistics, data analysis, portrait generation, portrait analysis services and other basic services and generate a unique device identification GTCID to effectively identify equipment and data deduplication. |
(2) Information processed on the iOS side ① Device information: Device identification code (IDFA, IDFV) will be used to generate a unique user identification, that is, GTCID. GTCID will be used for data deduplication and data statistics in different dimensions, and can be applied to scenarios such as advertising traffic distribution. Device platform, device manufacturer and brand, device model and system version, and device serial number help us help developers generate richer portraits, such as analyzing the advertising effects of different users and making corresponding adaptations based on different device information. Provide you with accurate products and services. ②Network information (including IP address, WIFI information, base station information, operator information) and location-related information : Network information helps us help developers determine the network status, thereby providing services such as preloading content only under wifi, reducing Loss of mobile traffic; location information helps us help developers provide content and services that are more in line with your preferences. (3) Permission application
YOU | Permissions | scenes to be used |
---|---|---|
Android | INTERNET (required) | Telecommunication |
Android | ACCESS_NETWORK_STATE (required) | When the network changes, perform network switching communication |
Android | ACCESS_WIFI_STATE (required) | Check wifi connection status |
Android | BLUETOOTH (required) | Provide you with content and services that match your preferences, and when you authorize Bluetooth permissions |
Android | BLUETOOTH_ADMIN (required) | Provide you with content and services that match your preferences, and when you authorize Bluetooth permissions |
Android | ACCESS_BACKGROUND_LOCATION (required) | To provide you with content and services that match your preferences and when you authorize location permissions |
Android | ACCESS_FINE_LOCATION (required) | To provide you with content and services that match your preferences and when you authorize location permissions |
Android | ACCESS_COARSE_LOCATION (required) | To provide you with content and services that match your preferences and when you authorize location permissions |
Android | READ_PHONE_STATE (optional) | When calling the GTCID registration interface |
iOS | Network access (required) | full life cycle |
iOS | IDFA (required) | When calling the GTCID registration interface |
iOS | Positioning (optional) | Provide you with content and services that match your preferences, and when you authorize location information |
3. One-click authentication SDK service: 3.1. Function introduction (1) Basic functions: Provide developers with professional authentication capabilities (2) Extended functions: In order to meet developers’ service requirements in different dimensions, we provide anti-fraud functions for developers Choose to use. 3.2. Information processed in the one-click authentication SDK service (1) Information processed on the Android side
Product function type | Product function name | Personal information type | Personal information fields | Use and purpose |
---|---|---|---|---|
basic function | One-click authentication authentication | Device information, network information | Required information: device platform, device manufacturer, device brand, device model and system version, OAID, AndroidID, MAC, Advertising ID, Serial Number, ICCID, base station information, WIFI information, operator information, IP address, de- identified Optional information for mobile phone number : IMEI, IMSI | Used to effectively identify devices, quickly respond to verification requirements to provide efficient, stable, and smooth one-click authentication services and generate a unique client ID, GYUID (also used for charge calculation) |
extensions | Anti-fraud | Location-related information , application list information, network information | Required information: location-related information , application list information, network information | It is used to analyze the risk level of the current device, effectively identify various cheating behaviors, and effectively identify risky devices. It can be used to evaluate channel quality, identify malicious brushing, malicious programs, protect user account security, etc. |
(2) Information processed on the iOS side ① Device information and mobile phone number : device identification code (IDFA, IDFV) and de-identified mobile phone number will be used to generate a unique client ID, that is, GYUID; device platform, device manufacturer, The device brand, device model and system version, device serial number and de-identified mobile phone number help us ensure effective identification and quick response for one-click authentication. To provide efficient, stable and smooth one-click authentication services, which will enhance our anti-fraud capabilities. ② Network information (including IP address, WIFI information, base station information, operator information) and location-related information : We analyze the risk level of the current device through the above information, which can effectively identify various cheating behaviors and risk equipment, which can be used for evaluation Channel quality, identify malicious brushing, malicious programs, and protect your account security. With the above information, we can help developers provide you with more secure services through our authentication and/or anti-fraud services. (3) Permission application
YOU | Permissions | scenes to be used |
---|---|---|
Android | INTERNET (required) | Telecommunication |
Android | ACCESS_NETWORK_STATE (required) | When the network changes, perform network switching communication |
Android | ACCESS_WIFI_STATE (required) | Check wifi connection status |
Android | ACCESS_BACKGROUND_LOCATION (optional) | When anti-fraud is turned on and you authorize location permissions |
Android | CCESS_FINE_LOCATION (optional) | When anti-fraud is turned on and you authorize location permissions |
Android | ACCESS_COARSE_LOCATION (optional) | When anti-fraud is turned on and you authorize location permissions |
Android | READ_PHONE_STATE (optional) | When calling the GYUID registration interface |
iOS | Network access (required) | When calling the GYUID registration interface |
iOS | IDFA (required) | When calling the GYUID registration interface |
4. Information processed during the process of providing personal portrait user profiling services by GeTui (only applicable to existing customers): 4.1. Device information: device identification code (including IMEI, IDFA, Android ID, MAC, OAID, Advertising ID, Serial Number, IMSI, UAID, ICCID, IDFV, CAID) will be used to generate a unique user identification, namely GIUID. Device platform, device manufacturer, device brand, device model and system version, and device serial number help us help developers identify different users and make corresponding adaptations based on different device information, so as to provide you with accurate products and services. For example, it can be applied to advertising distribution scenarios to analyze the advertising effects of different users. 4.2. Application list information: This information helps us help developers analyze your interests and hobbies, so as to provide content and services that are more in line with your preferences, such as helping you make decisions about advertising-related services and reducing the interruption of unnecessary information to you. . 4.3. Network information (including IP address, WIFI information, base station information, operator information) and location-related information : Network information helps us help developers determine the network status, thereby providing services such as preloading content only under wifi. For example, ad preloading reduces the loss of mobile traffic; location information helps us help developers provide content and services that are more in line with your preferences. We will use the above information to help developers obtain professional user profiling capabilities, provide you with more comprehensive and high-quality services through rich profiling information, reduce the interruption of useless information to you, and improve your user experience in using developer applications. 5. Information processed during the application statistics service provided by GeTui (only applicable to existing customers): 5.1. Device information: device identification code (including IMEI, IDFA, Android ID, MAC, OAID, Advertising ID, Serial Number, IMSI, UAID, ICCID, IDFV, CAID) will be used to generate a unique statistical identification ID, that is, GCID, for internal use of the system for data deduplication and quantity statistics in different dimensions; equipment platform, equipment manufacturer, equipment brand, equipment The model and system version, and device serial number will be used for multi-dimensional statistical calculations. 5.2. Application-related information: including but not limited to application list, channels, timestamps, page unique identifiers, and user click events. We use the above information to provide multi-dimensional statistical analysis and implement statistical functions including visualization and industry analysis. 5.3. Network information (including IP address, WIFI information, base station information, operator information) and location-related information : Network information is used to establish a connection with the number server. Location-related information helps us help developers optimize their products based on regional statistical analysis results and improve your experience. 6. Information processed when GeTui provides link regulator services (only applicable to existing customers): 6.1. Device information: device identification code (including IMEI, IDFA, Android ID, MAC, OAID, Advertising ID, Serial Number, IMSI, UAID, ICCID, IDFV, CAID) will be used to generate a unique push target ID, that is, CID. Device platform, device manufacturer, device brand, device model and system version, and device serial number are used to optimize the effectiveness of channel resources and improve the arrival rate and stability of message push. 6.2. Application list information: When an application pushes messages to you, the application can authorize us to adjust the link and mutually activate the closed SDK push process to ensure that you can receive the messages pushed to you by the application in a timely manner. 6.3. Network information (including IP address, WIFI information, base station information, operator information) and location-related information : Network information will be used to establish a connection with the personal push server. Location information will be used to control regional push and reduce the interruption of irrelevant information to you.
AD SDK
We automatically collect certain information from you when you use the Platform, including internet or other network activity information such as your IP address, geolocation-related data, unique device identifiers, browsing and search history (including content you have viewed in the Platform), and Cookies.
- Usage Information. We collect information regarding your use of the Platform and any other User Content that you generate through or upload to our Platform.
- Device Information. We collect certain information about the device you use to access the Platform, such as your IP address, user agent, mobile carrier, time zone settings, identifiers for advertising purposes, model of your device, the device system, network type, device IDs, your screen resolution and operating system, app and file names and types, keystroke patterns or rhythms, battery state, audio settings and connected audio devices. We automatically assign you a device ID and user ID. Where you log-in from multiple devices, we will be able to use information such as your device ID and user ID to identify your activity across devices. We may also associate you with information collected from devices other than those you use to log-in to the Platform.
- Location Data. We collect information about your approximate location, including location information based on your SIM card and/or IP address. In addition, we collect location information (such as tourist attractions, shops, or other points of interest) if you choose to add the location information to your User Content. Current versions of the app do not collect precise or approximate GPS information from U.S. users. If you are still using an older version that allowed for collection of precise or approximate GPS information (last release in August 2020) and you granted us permission to do so, we may collect such information.
- Cookies. We and our service providers and business partners use cookies and other similar technologies (e.g., web beacons, flash cookies, etc.) (“Cookies”) to automatically collect information, measure and analyze how you use the Platform, including which pages you view most often and how you interact with content, enhance your experience using the Platform, improve the Platform, provide you with advertising, and measure the effectiveness of advertisements and other content. We and our partners also use Cookies to promote the Platform on other platforms and websites. Cookies enable the Platform to provide certain features and functionality. Web beacons are very small images or small pieces of data embedded in images, also known as “pixel tags” or “clear GIFs,” that can recognize Cookies, the time and date a page is viewed, a description of the page where the pixel tag is placed, and similar information from your computer or device. To learn how to disable certain Cookies, see the “Your Choices” section below.
We may link your contact or account information with your activity on and off our Platform across all your devices, using your email or other log-in or device information. We may use this information to display advertisements on our Platform tailored to your interests, preferences, and characteristics.
We are not responsible for the privacy practices of our service providers and business partners, and the information practices of these service providers and business partners are not covered by this Privacy Policy.
We may aggregate or de-identify the information described above. Aggregated or de-identified data is not subject to this Privacy Policy.
HOW WE USE THE INFORMATION WE GATHER
We primarily use the limited information that we collect to enhance Chain Gate. Except if we sell all or a portion of our business, or as otherwise described below, we do not rent, trade, or sell your Personal Information. Some ways we may use your Personal Information are to: Contact you when necessary; Respond to your comments, questions, or issues related to bugs or errors with Chain Gate; Provide you with additional information; Send you information and marketing materials about services and products available through Chain Gate, using push notifications or other means; Train our team members; Other internal business purposes. Aggregated Personal Data and Non-Personal Information We may share or disclose aggregated Personal Data or Non-Personal Information with service providers or with other persons we conduct business with, including but not limited potential third-parties for the purpose of showcasing the performance of the company. These service providers and other persons may also share with us aggregated Non-Personal Information that they have independently developed or acquired. Additionally, we may combine aggregate information from the pixel tags, and web beacons, with similar data we collect from other visitors to help us improve our Services. When doing so, we do our best to ensure that aggregated information cannot be linked back to you. Agents or Third Party Partners We may provide your Personal Information to our employees, contractors, agents, service providers, and designees (“Agents”) to enable them to perform certain services for us, including improvement of website-related services and features, and performance of maintenance services. Business Transfers We may choose to buy or sell assets. In these types of transactions, customer information is typically one of the business assets that would be transferred. Also, if we (or our assets) are acquired, or if we go out of business, enter bankruptcy, or go through some other change of control, your Personal Information could be one of the assets transferred to or acquired by a third party. By accepting this Privacy Notice, as outlined above, you consent to any such transfer. Protection of Us and Others We will share personal information outside of Chain Gate if we have a reasonable belief that access, use, preservation, or disclosure of the information is reasonably necessary to comply with any applicable law, regulation, legal process, or enforceable governmental request; to cooperate with law enforcement; to enforce or apply our Terms of Use and other agreements; or to protect the rights, property, or safety of Chain Gate, our employees, our users, or others.
As explained below, we use your information to improve, support and administer the Platform, to allow you to use its functionalities, and to fulfill and enforce our Terms of Service. We may also use your information to, among other things, show you suggestions, promote the Platform, and customize your ad experience. We generally use the Information We Collect:
- To fulfill requests for products, services, Platform functionality, support and information for internal operations, including troubleshooting, data analysis, testing, research, statistical, and survey purposes and to solicit your feedback.
- To customize the content you see when you use the Platform. For example, we may provide you with services based on the country settings you have chosen or show you content that is similar to content that you have liked or interacted with.
- To send promotional materials from us or on behalf of our affiliates and trusted third parties.
- To improve and develop our Platform and conduct product development.
- To measure and understand the effectiveness of the advertisements we serve to you and others and to deliver advertising, including targeted advertising, to you on the Platform.
- To make suggestions and provide a customized ad experience.
- To support the social functions of the Platform, including to permit you and others to connect with each other (for example, through our Find Friends function), to suggest accounts to you and others, and for you and others to share, download, and otherwise interact with User Content posted through the Platform.
- To use User Content as part of our advertising and marketing campaigns to promote the Platform.
- To understand how you use the Platform, including across your devices.
- To infer additional information about you, such as your age, gender, and interests.
- To help us detect abuse, fraud, and illegal activity on the Platform.
- To promote the safety and security of the Platform, including by scanning, analyzing, and reviewing User Content, messages and associated metadata for violations of our Terms of Service, Community Guidelines, or other conditions and policies.
- To verify your identity in order to use certain features, such as livestream or verified accounts, or when you apply for a Pro Account, to ensure that you are old enough to use the Platform (as required by law), or in other instances where verification may be required.
- To communicate with you, including to notify you about changes in our services.
- To announce you as a winner of our contests or promotions if permitted by the promotion rule, and to send you any applicable prizes.
- To enforce our Terms of Service, Community Guidelines, and other conditions and policies.
- Consistent with your permissions, to provide you with location-based services, such as advertising and other personalized content.
- To train and improve our technology, such as our machine learning models and algorithms.
- To combine all the Information We Collect or receive about you for any of the foregoing purposes.
- To facilitate sales, promotion, and purchases of goods and services and to provide user support.
- For any other purposes disclosed to you at the time we collect your information or pursuant to your consent.
YOUR RIGHTS WITH RESPECT TO THE PROCESSING OF PERSONAL DATA
You are entitled (under the conditions, and subject to the exceptions, set out in applicable law) to: Request Access to the personal information we process about you: You can request access to the information we have collected from you. You can do this by contacting us at support@chain-gate.net We will provide you with a copy of the data we process about you. To comply with your request, we may ask you to verify your identity. We will fulfill your request by sending your copy electronically. For any subsequent access request, we may charge you an administrative fee. Request a rectification of your personal data: If you believe that the information we have collected is incorrect or incomplete, you may contact us so we can update it and keep your data accurate.
Object to the processing of your personal data: you may request that we no longer process your personal data. Request to erase your personal data: you may request the erasure of your personal data, including where such personal data would no longer be necessary to achieve the purposes for which it was collected. Any data that is no longer needed for purposes specified in the “How We Use the Information We Gather” section will be deleted after ninety (90) days. addresses created through the Chain Gate application cannot be deleted from the Ethereum blockchain, therefore we are unable to delete this personal information. If at any point you wish for Chain Gate to delete information about you, you may contact us at support@chain-gate.net Request the restriction of the processing of your personal data: you may request that Chain Gate only processes your personal data in limited circumstances, including with your consent. Under California Consumer Protection Act (“CCPA”) you also have the right not to be discriminated against because of the exercise of your rights. Please note that we do not sell your personal data.
DATA RETENTION
Please note that even If you delete your or addresses from the Chain Gate mobile application, uninstall Chain Gate mobile applications from your device, or request that your information be deleted, we still may retain some information that you have provided to us to maintain Chain Gate or to comply with the laws and regulations to which Chain Gate is subject. If you have any question or objection as to how we collect and process your personal information, please contact support@chain-gate.net
CHILDREN
We are especially sensitive about children’s information. Our Services are not targeted towards children, and our users must be at least eighteen (18) years old to use our services. We don’t knowingly collect information from children under the age of 13. If you are a parent or legal guardian of a minor child, we will treat any information that you provide us while using Chain Gate on behalf of your minor child as Personal Information as otherwise provided in this Privacy Policy. If you have questions concerning our information practices with respect to children, or if you learn that a child under the age of 13 has used Chain Gate, created a user account, or provided us with personal information, please email us at support@chain-gate.net
CONDITIONS OF USE, NOTICES, CHANGES AND UPDATES TO PRIVACY NOTICE
If you choose to use Chain Gate, your use and any dispute over privacy is subject to this Notice and our Terms of Use. If you have any concerns about privacy at Chain Gate, please contact us with a complete description, and we will try to resolve it. You also have the right to contact your local Data Protection Authority. We reserve the right to update and revise this Privacy Policy at any time. We occasionally review this Privacy Notice to make sure it complies with applicable laws and conforms to changes in our business. If we do revise this Privacy Notice, we will update the “Effective Date” at the top of this page so that you can tell if it has changed since your last visit and will do our best to notify you. Please review this Privacy Notice regularly to ensure that you are aware of its terms. Any use of Chain Gate after an amendment to our Privacy Notice constitutes your acceptance to the revised or amended terms.
QUESTIONS We’d be happy to answer them. Shoot us an email via support@chain-gate.net
Thanks for reading our Privacy Policy!