Logo
Sign In

Chase Luck. Grab Glory.

Slide 1

Only Play. Only Win.

Slide 1

Bof Casino's Privacy Policy Explains How To Safely Handle And Protect User Information

How To Collect User Data And What It Means For Security

On the site, data acquisition channels include registration forms, activity logs, device fingerprinting, cookies, browser local storage, customer support emails, and payment processors. Each vector adds certain variables that affect privacy and security. Users must give personal information like their email address, phone number, and date of birth in order to register and manage their accounts. SSL/TLS encryption protects this process and keeps it private while it is in transit. Users should choose strong, one-of-a-kind passwords and turn on two-factor authentication whenever they can. Behavioural Tracking uses cookies and local storage to look at patterns in things like how people use their devices, how they navigate a site, and how they interact with it. These parts can make personalisation better, but if session tokens aren't refreshed regularly, they could let someone else see what the user is doing. To make it harder for people to track you, clear your cookies often and log out after using them. Third-party gateways are often used in payment data processing. The platform's own servers never keep cardholder information. All transactions go through PCI DSS-compliant systems, which make it less likely that they will be hacked. Only use trusted devices for money transactions, and keep an eye on your financial statements for transactions you don't recognise. Support Logs and Chats collect information from conversations with customer service. Sensitive topics are automatically hidden when possible, and transcripts are encrypted when they are not being used. Don't give out extra information that isn't asked for, and never share passwords or PINs over chat. Strict authentication rules control who can see all of the records that have been collected. Internally, only certain people who need to do their jobs have clearance. Regular audits, penetration tests, and anonymization routines further reduce unauthorized exposure risks. Users are encouraged to keep device software updated, adjust privacy settings according to comfort level, and review audit trails made available via account dashboards. Awareness of these mechanisms allows individuals to make informed choices balancing convenience and confidentiality.

How Cookies And Tracking Technologies Are Managed

Session and persistent cookies are used to recognize returning visitors, track user progress within the platform, and store preferences for smoother navigation. These technologies enable automatic log-ins, language selection, and personalized offers tailored to individual activity. Analytics tools, such as Google Analytics, deploy tracking scripts that monitor user interactions: page visits, duration spent on specific features, button clicks, and navigation paths. These metrics let you make data-driven changes to the website's usability and services. Insights that have been combined are looked at without revealing who they are. To help measure campaigns and show relevant promotions, advertising networks and third-party partners may put marketing pixels or tags on websites. Users can limit these technologies by changing their browser settings, using private browsing modes, or installing special extensions. But turning off some cookies might make it harder to use certain features that are only available to members and slow down transactions. Consent for non-essential cookies is requested via an accessible pop-up on the first visit. Users can withdraw permission or update settings at any time through the account management area. All tracking elements are regularly reviewed to comply with GDPR, ePrivacy Directive, and local legislation. No data collected through cookies or tracking modules is shared with anyone other than authorised processors. Encryption and strict access control keep people from using it wrong. Check out the platform's dedicated tracking overview section for a complete list of the technologies in use.

Actions Taken To Protect Financial Transactions

  1. Transport Layer Security (TLS) protocols with a minimum key length of 256 bits encrypt all financial transactions; This protects private payment information, like card numbers and authentication codes, from being intercepted while they are being sent.
  2. Advanced fraud detection software keeps an eye on every transaction as it happens; Machine learning algorithms look at patterns and mark odd ones right away; If someone tries to do something suspicious, their account will be put on hold and they will be notified until it can be checked manually.
  3. Servers handling payment processing are segmented from public networks and reinforced by intrusion detection systems; Connections are restricted using strict firewall rules, while dedicated infrastructure ensures isolation from non-financial systems.
  4. Account verification steps include two-factor authentication (2FA) prior to transfer approval; The one-time passcodes are delivered exclusively through out-of-band communication channels, such as SMS or biometric app tokens.
  5. Compliance with PCI DSS Level 1 requirements is maintained through regular vulnerability assessments and yearly independent security audits.
  6. All staff with access to transactional systems undergo extensive background checks and mandatory annual security training.
  7. Withdrawal and deposit attempts are recorded in immutable logs, protected by cryptographic hashing; Users can look at a full audit trail at any time under their account history, which shows all transactions that come in and go out.
  8. AES-256 encrypts payment record backups when they are not in use, and they are kept in data centres that are physically secure; People who manage these backups must use multi-factor authentication, which reduces the risk of unauthorized restoration or tampering.
  9. There are dedicated support teams ready to respond to incidents, so any problems will be dealt with right away.
  10. For extra protection, users should set strong, unique passwords and turn on biometric security features on their devices.

Sharing With Third Parties: Rules And Protections

Personal information is only shared with third parties in certain situations, like processing payments, following the law, or keeping up the technical infrastructure. We carefully evaluate each collaborator's risk based on their storage protocols, breach notification processes, and compliance certifications, like ISO/IEC 27001 or PCI DSS, if they apply. All contracts with outside partners spell out exactly what they have to do, such as only using the information for agreed-upon purposes, keeping audit logs of access, and reporting any security incidents right away. Data use rules for regions and countries are enforced by governing agreements that make sure everyone follows them. Standard Contractual Clauses or adequacy decisions by the European Commission are used for all data transfers outside the European Economic Area. A data minimisation strategy says that only the necessary fields are sent to marketing, analytics, or customer support providers, and direct identifiers are removed whenever possible. Transmission channels use end-to-end encryption (TLS 1.2 or higher), and multi-factor authentication makes it hard for people who aren't supposed to be able to access recipient side platforms.

Allowed Recipients By Category

Requirements for security Information about payment
Banks and licensed payment gateways PCI DSS Compliance; Tokenization
Technical Diagnostics Infrastructure Vendors
Data Encryption Standards ISO/IEC 27001 Certification
Marketing Preferences Email Service Providers
Data Protection and Anonymization Data masking; logging activities for regulatory investigations
Authorities in charge of supervision Secure File Transfer; Access Based on Role
Third-Party Compliance Oversight Regular audits are done to make sure that third parties are following the rules and that user records are still safe from being seen by people who shouldn't be able to see them. Incident response plans detail immediate revocation of data access and notification protocols should any partner fall short of contractual obligations. Users still have the option to ask for an updated list of partner organisations and to use their rights when it comes to onwards transfers, as long as there are no legal exceptions.

Rights Of The Data Subject: Access, Correction, And Deletion Requests

Users have full control over their personal records that are stored on this platform. The steps below explain how anyone can ask for access to, change, or delete their data.

Asking For Access:

Users can send in written requests to see the personal information that is stored. Before giving out data, requests will be checked to make sure the person who made them is who they say they are. After verification, a secure digital copy of all relevant data entries will be sent within 30 days, as required by law.

Correction Procedures:

Individuals may report inaccuracies or outdated details. Rectification requests must specify necessary changes and, where possible, submit documentation supporting the corrections. Updates to records will be implemented after verifying the legitimacy of the request, followed by confirmation to the individual.

Erasure Applications:

Requests for the erasure of personal records may be lodged at any time, subject to regional laws and contractual retention specifications. Deletion will not apply where legal or regulatory obligations necessitate data preservation; such exceptions will be communicated with an explanation for the denial. Following deletion, notification will be provided to the requester, along with guidance on the outcome and any remaining data points retained under statutory requirements.

All requests for these rights are handled through the official support channel. You may need to show identification to keep sensitive information from being shared or changed without permission. Requests should be clear and specific about what actions are wanted for the best processing. The support portal has contact information and step-by-step instructions for how to apply. The platform keeps detailed logs of all requests and actions taken that are related to them, in line with regulatory standards.

Rules For Being Open About Policy Changes

Notice In Advance:

Changes to data handling documents are sent out at least 10 business days before they go into effect. A notification banner shows up on user dashboards, giving a brief overview of the most important changes and linking to a chart that compares the old and new versions.

Version History Access:

Every update includes an appended changelog timestamped and archived for a minimum of 24 months. Users may compare past and current versions via a dedicated archive section, facilitating quick reference to historical language and obligations.

Direct Messaging:

Registered members receive individualized alerts via their chosen communication channel (email, SMS, or in-app message) highlighting substantial modifications, especially those affecting user rights, processing purposes, or third-party disclosures.

Feedback Window:

A seven-day comment period is provided for constructive input before certain substantial amendments take effect. During this interval, user suggestions are accepted via a secure contact form, with management required to document responses and decision rationale for transparency audits.

Mandatory Acknowledgement:

To keep using important platform features after making changes to a document, you must explicitly accept the changes. A simplified "click-to-consent" process keeps track of consent for each update, which users can get on request.

Regulatory Coordination:

Policy updates follow the most recent local and international rules, such as the GDPR, the ePrivacy Directive, and any other relevant jurisdictional frameworks. At the end of the updated document, there are detailed citations for statutory reference that users can check.

Ways To Get Help With Privacy-related Questions

Several different channels are used to directly engage users on issues of privacy, and a specialised data governance team keeps an eye on these channels. Specific request handling procedures ensure that all communications receive a documented response within 72 hours.

Email Contact:

Users can send detailed questions or concerns to the address [email protected]. Automated acknowledgement receipts confirm that the submission was received, and then a case number is given for reference.

Secure Messaging Portal:

After logging in, registered users can start encrypted conversations through the secure web interface. You can access this portal 24/7 and upload documents for specific cases.

Telephone Hotline:

There is a toll-free hotline for urgent matters that is open Monday through Friday from 9:00 AM to 6:00 PM GMT. For quality control, calls are recorded, and each user gets a unique ticket number.

Postal Requests:

You can send written requests to the Data Liaison Department. For traceability, registered letters and courier deliveries are the best options. All identity verification steps follow the strictest security rules, and account-related questions must go through multi-factor authentication. Only certain people who have been checked out and are allowed to see or respond to sensitive requests. Users should not share passwords or other private information through any support channel. Each written response includes a summary of the actions requested, the relevant timelines, and options for escalating concerns that haven't been resolved. Independent oversight tools, like audit logs of all interactions, help make things clear and hold people accountable.

Bonus

for first deposit

1000AUD + 250 FS

Switch Language

United Kingdom Australia Canada German Spanish French Dutch Italian Portuguese Polish