Privacy Policy

1. Scope and Application

This Privacy Policy governs the collection, processing, storage, and protection of information in connection with access to and use of the Biglott platform, including participation in prize pools, direct donations, and all related interactions.

This policy applies to all users, visitors, and participants across all supported jurisdictions.

2. Core Data Principles

Biglott operates under the following principles:

Data Minimization – Only essential data is collected

Purpose Limitation – Data is used strictly for defined purposes

Security by Design – Systems are structured to protect user data

User Autonomy – Users retain control over their information

Transparency – Clear communication of data practices

3. Categories of Data Collected

3.1 User Identifiers

Email address

Cryptocurrency wallet address

These identifiers are used exclusively for operational functionality.

3.2 Technical and Device Data

IP address

Device identifiers

Operating system and browser type

Network information

Session timestamps

3.3 Behavioral and Usage Data

Pages accessed

Navigation patterns

Interaction with pools and features

Time spent on platform elements

3.4 Transactional References

Pool participation records

Entry confirmations

Blockchain transaction references (hashes, timestamps)

Biglott does not store private keys or sensitive wallet credentials.

3.5 Voluntary Communications

Support inquiries

Feedback submissions

User-initiated correspondence

4. Legal Basis for Processing

Where applicable, data processing is conducted based on:

Performance of platform functionality

Legitimate operational interests

Compliance with legal obligations

User-initiated actions and consent

5. Purpose and Use of Data

Collected data is processed for the following purposes:

Enabling and managing participation in pools

Validating and recording entries

Executing reward distribution

Maintaining system integrity and uptime

Improving platform performance and usability

Monitoring for fraudulent or unauthorized activity

Enforcing platform policies and rules

Conducting internal analytics and system optimization

Data is not used for intrusive profiling or unrelated marketing purposes.

6. Blockchain Interaction and Public Ledger Disclosure

Biglott integrates with blockchain-based systems.

Users acknowledge and accept that:

Blockchain transactions are recorded on public, decentralized ledgers

Wallet addresses may be visible to external parties

Transaction data cannot be altered, reversed, or deleted

Blockchain transparency exists independently of Biglott systems

Biglott does not control or assume responsibility for the public nature of blockchain data.

7. Wallet Address Usage

Wallet addresses are used solely for reward distribution and verification

No association is made between wallet addresses and real-world identities beyond user-provided data

Users are solely responsible for the accuracy of submitted wallet addresses

Transactions sent to incorrect wallet addresses cannot be reversed

8. Winner Anonymity and Disclosure Controls

Winner identities remain confidential by default

No personal data is publicly disclosed without explicit consent

Public announcements, if any, exclude identifiable personal information

Voluntary disclosure is solely controlled by the user

This framework ensures both transparency of outcomes and protection of individual privacy.

9. Data Sharing and Disclosure Limitations

Biglott does not sell, trade, or monetize user data.

Data may be disclosed under limited circumstances:

9.1 Infrastructure and Service Providers

Data may be processed by third-party providers for:

Hosting and infrastructure

Data storage

Performance analytics

Security monitoring

All providers are bound by confidentiality and data protection obligations.

9.2 Legal and Regulatory Compliance

Disclosure may occur where required to:

Comply with applicable laws

Respond to lawful governmental requests

Enforce legal rights or obligations

9.3 Risk Mitigation and Enforcement

Data may be used internally to:

Detect suspicious behavior

Prevent fraud or abuse

Enforce platform rules

10. Cookies and Tracking Mechanisms

Cookies and related technologies may be used for:

Session management

User experience optimization

Traffic and usage analytics

Feature performance monitoring

Users may disable cookies via browser settings, which may impact certain functionalities.

11. Data Security Framework

Biglott employs layered security controls, including:

Encrypted data transmission (where applicable)

Secure server environments

Access control and authentication systems

Monitoring and anomaly detection

Regular system evaluations

Despite these measures, no infrastructure is entirely immune to risk.

12. Data Retention and Lifecycle Management

Data is retained only for as long as necessary to:

Fulfill operational requirements

Maintain system records

Comply with legal obligations

Resolve disputes

Upon expiration of retention periods, data may be securely deleted or anonymized.

13. User Rights and Control

Depending on jurisdiction, users may have rights to:

Access stored personal data

Request correction of inaccurate data

Request deletion where applicable

Restrict or object to certain processing activities

Requests are subject to operational and legal constraints.

14. User Responsibilities

Users are solely responsible for:

Providing accurate and up-to-date information

Maintaining the confidentiality of wallet credentials

Verifying wallet addresses before submission

Understanding the risks of blockchain transactions

Ensuring compliance with local laws and regulations

Biglott assumes no liability for losses arising from user-side actions or errors.

15. International Use and Jurisdictional Considerations

The platform is globally accessible.

Users acknowledge that:

Regulatory requirements differ across jurisdictions

Participation may be restricted in certain regions

Tax treatment of rewards varies by location

Users are responsible for ensuring lawful participation.

16. Third-Party Services and External Platforms

Biglott may interact with or link to external services.

Biglott does not control and is not responsible for:

Third-party data handling practices

External privacy policies

Content or security of external platforms

Independent review is recommended.

17. Fraud Prevention and Risk Monitoring

Data may be processed to:

Detect irregular or suspicious activity

Prevent multiple or abusive entries

Protect system integrity

Biglott reserves the right to restrict or suspend access where necessary.

18. System Integrity and Audit Controls

Internal systems may log and audit:

Entry records

Transaction references

System interactions

These controls support fairness, transparency, and operational reliability.

19. Automated Processing

Certain processes may be automated, including:

Entry validation

Pool participation tracking

Reward distribution triggers

Automation is used strictly for operational efficiency and consistency.

20. Children and Age Restrictions

The platform is not intended for individuals below the legally permitted age in their jurisdiction.

Biglott does not knowingly collect data from minors.

21. Policy Updates and Revisions

This Privacy Policy may be updated periodically to reflect:

Platform changes

Legal requirements

Security improvements

Continued use of the platform constitutes acceptance of revised terms.

22. Limitation of Responsibility

Biglott is not responsible for:

Blockchain network behavior

External wallet providers

User-side security failures

Third-party service disruptions

23. No Advisory or Fiduciary Relationship

Biglott does not provide:

Financial advice

Investment guidance

Legal or tax consultation

All participation decisions are made at the user’s discretion.

24. Acceptance and Acknowledgment

Use of the platform constitutes acknowledgment and acceptance of this Privacy Policy, including all terms related to data collection, processing, and usage.

25. Final Statement

Biglott maintains a structured, minimal, and security-focused approach to data handling, ensuring operational efficiency while prioritizing user privacy and system integrity.