Try Your Luck Today!
Jackpot Joy Starts Here.
Your data is treated as our highest priority. Personal information, such as contact details, payment methods, and identification documents, is processed under the strict requirements set by the Lithuanian Data Protection Authority and complies with EU General Data Protection Regulation (GDPR). Access to your account details is secured through 256-bit SSL encryption and multi-factor authentication for every login attempt. Only certified personnel are permitted to review your data, and all activities are logged and frequently audited by third-party specialists. Cookies are limited to analytics, session management, and improving functionality; no unnecessary tracking is enabled. Users can easily customize cookie preferences at any moment by accessing profile settings. In accordance with Lithuanian legislation, data retention periods are strictly observed. Information is stored only as long as necessary to fulfill licensing obligations or legal requirements, then permanently erased from our servers. If you wish to access, edit, restrict, or remove your records, a dedicated support team responds to requests within five business days. All requests follow a double-verification process to confirm your identity and protect against unauthorized changes. Collaboration with payment providers and independent auditors guarantees ongoing compliance with both security protocols and financial regulations. Should any data irregularity be detected, immediate notification and guidance will be provided with clear instructions for resolution. For detailed inquiries about our information handling practices, contact our data representative using the form on the contact page or via the listed email address. Every effort is made to maintain a transparent, trusted environment you can count on.
Upon account creation, the platform obtains specific player information. This includes personal identification details such as full name, date of birth, residential address, phone number, and email. For transaction verification, financial data like payment method, account number, and transaction history is gathered. Technical data, such as device identifiers, browser type, operating system, and IP address, are automatically registered during interactions with the website. Personal data is processed to ensure legal compliance related to age verification, anti-money laundering obligations, and prevention of fraudulent activities. Advanced encryption protocols safeguard data transmission. In line with international standards, access to player data is strictly limited to authorized personnel tasked with account management, risk analysis, and regulatory reporting. The system collects behavioral information including gaming patterns, session duration, and site navigation paths. This allows for personalization of services, detection of irregular activity, and responsible gaming support. Cookies and similar tracking technologies are employed for session management, interface customization, and analytics, with clear opt-out options provided as required by law. Retention of information is governed by both operational necessity and statutory mandates. Data no longer needed for service provision, dispute resolution, or legal obligations is deleted using secure procedures. Players can request access, correction, or erasure of their records by contacting the support team using the dedicated privacy contact channels. All third-party partners and service providers are vetted to ensure compliance with strict confidentiality criteria. Data sharing occurs only when required for payment processing, identity verification, or regulatory oversight, and never for unsolicited commercial purposes.
Account security begins with multi-layer authentication. All user logins require both a password and a secondary verification step, such as a code sent via SMS or email. This two-factor requirement makes it much less likely that someone will be able to get in without permission. Managing passwords is very important. Passwords must have at least twelve characters, which can include letters (both upper and lower case), numbers, and symbols. The registration system will automatically reject weak or common passwords. Routine reminders to change passwords and detection of repeated failed attempts help keep accounts safe from brute-force attacks. We use strong encryption (AES-256) to keep all sensitive records safe, such as payment information and personal identification documents. Even if a server is hacked, encrypted data storage keeps people from getting to it without permission. Only authorised people can access decryption keys, and they are changed on a regular basis. Firewall protection and intrusion monitoring tools are active at all times. Real-time monitoring systems flag suspicious activities, such as repeated failed logins or access from unusual geographic locations, triggering instant protective actions–such as temporary account locking and administrative notification. User-initiated settings empower full control over personal information visibility. Through the account dashboard, individuals can select which items remain private or visible to support staff. Data minimization protocols ensure only the smallest necessary amount of information is processed per transaction or interaction. Session management limits exposure risks. Automatic logout occurs after 15 minutes of inactivity. Additionally, users receive alerts for account activities–including new device logins and profile changes–via email or app notification for rapid anomaly detection. Regular security awareness campaigns educate the community on phishing and social engineering threats. Practical advice is sent biannually, covering topics such as verifying official communications and never sharing credentials with anyone, including platform staff. Every technical and organizational measure meets or exceeds the standards set by recognized international data protection frameworks and local regulatory bodies, ensuring personal information remains shielded from both external and internal threats.
Data disclosure to external entities is limited to trusted service providers and collaborators that assist in payment processing, identity verification, risk assessment, marketing analytics, and customer support. Each recipient is legally required to only use personal information for the agreed-upon operational needs and to follow all relevant data laws, such as the General Data Protection Regulation (GDPR) and national licensing rules. When user data is sent, it is done so through secure channels and, if necessary, pseudonymized to protect the user's privacy. Marketing partners can't see sensitive information like government-issued ID or financial credentials. When industry partners get transactional or behavioural insights for reporting and compliance, the data sets are combined and made anonymous so that users can't be identified. Suppliers located outside the European Economic Area (EEA) are engaged only when suitable safeguards, such as Standard Contractual Clauses, are in place. All third parties undergo regular audits to ensure adherence to data confidentiality standards. Users may opt out of non-essential data sharing with affiliates for promotional purposes through their account settings. No personal information is sold or transferred for unrelated commercial advantage. Any cooperation with authorities or regulators involves only the minimum data necessary to fulfill legal or contractual obligations. Users may request details about specific data transfers and recipients via designated support channels.
All users have explicit rights related to their personal records processed within the platform’s infrastructure. Exercising these options is straightforward and follows applicable data protection regulations. Details for managing your own information are as follows:
Obtain a copy of the personal records gathered and stored. Request an overview of what categories of information are being processed, the sources, purpose of retention, and any data transfers. Initiate a formal access request by contacting support through the dedicated portal or official email channel. Verification procedures apply to safeguard the integrity of user requests.
Rectify inaccurate or outdated details such as contact or identification data. Amendments can be managed through the personal account dashboard or by submitting a written request. Supporting documents may be required to validate authenticity before updates are approved.
If you no longer need your personal record to be kept for legal or contractual reasons, you can ask for it to be completely removed from the system. Account closure and data deletion will happen within the time frames set by data retention rules, unless the law says otherwise. If legal compliance or fraud prevention protocols require continued retention, partial restrictions may be put in place.
To start any of the actions listed above, please send a written request through the support section. Responses are usually sent within thirty days, and if there is a delay or limit, the reasons for it are given. Please keep in mind that identification verification is always necessary to stop unauthorised access or changes. Data governance standards require full openness about user rights. If you need more help with your options, check out the resources in your account area or get in touch with our help team.
We use strong encryption protocols to keep sensitive data safe during all financial transactions and private user exchanges on our platform. TLS 1.2 and 1.3 protect communications by making sure that account credentials, personal information, and transaction details are sent in an encrypted form. Every session gets its own cryptographic key, which makes it almost impossible to intercept and decode. Extended Validation SSL certificates check the integrity of the payment page, and the padlock icon in the address bar of the browser confirms this. Payment gateway integrations support 3D Secure and tokenization for all major card providers, diminishing risks associated with unauthorized use or interception of card numbers. To further defend user funds, back-end servers are stored in physically secure environments and access is confined to specific personnel with multi-factor authentication. A regularly updated intrusion detection system monitors for unauthorized access attempts or anomalies during transaction processing. For withdrawal and deposit procedures, all requests are subject to dual verification. Users receive notifications via SMS or email, and confirmation is needed before any money is moved. Frequently changing dynamic codes are required for confirmation, blocking any attempt at unauthorized activity even if login data is compromised.
Security Measure | Description |
---|---|
TLS 1.2/1.3 | Encryption Ensures data transmitted is unreadable to unauthorized parties |
Tokenization | Payment card details are never stored or processed directly, only encrypted replacements |
3D Secure | Requires additional identity verification for online payments |
Multi-Factor Authentication | Limits store and staff access to sensitive servers and systems |
Intrusion Detection | Continuously monitors for unauthorized activity on the network |
To help preserve confidentiality, users are encouraged to regularly update passwords and activate optional authentication steps. Should you notice any irregular transaction or attempted login, immediate reporting to customer support is advised. Our monitoring team reviews all transactions in real-time to identify and mitigate abnormal activity.
If you believe your personal data has been compromised, or if you notice suspicious account activity, it is essential to report your concerns through the designated communication channels. The recommended procedure involves direct contact with the support desk via the secure contact form available in your profile settings.
Bonus
for first deposit
1000AUD + 250 FS
Switch Language