Compliance & Security
CoinCatch operates under the oversight of a team of compliance experts, adhering to stringent compliance standards and protocols. We have established a comprehensive compliance management framework to effectively identify, assess, implement, and evaluate compliance measures. CoinCatch proactively monitors and identifies both external and internal risks, taking necessary remedial actions as needed. Additionally, we collaborate with local regulatory authorities to ensure that our compliance standards align with applicable local requirements.
Blockchain Analysis
CoinCatch employs external blockchain analysis tools to closely monitor transactions on the platform, mitigating the risks of fraudulent activities and identifying high-risk users. The immutable and transparent nature of blockchain technology enables us to conduct comprehensive monitoring of all transactions on our platform.
High-risk users include, but are not limited to:
-
Customers from sensitive countries or regions
-
Government officials
-
Customers from sensitive industries (e.g., capital-intensive businesses)
Cybersecurity
CoinCatch consults independent cybersecurity experts to enhance the security and stability of the platform. Additionally, we conduct biannual penetration testing and vulnerability assessments to promptly identify and address potential threats.
Beyond these tests, CoinCatch encrypts all sensitive data to mitigate risks such as theft, unauthorized access, or tampering. All transmitted and stored data undergo encryption and are securely stored in fault-tolerant storage systems.
AML/KYC Policies and Procedures
CoinCatch is committed to supporting AML/KYC operations. In principle, we are dedicated to:
- Conducting due diligence when dealing with our customers and any individuals acting on their behalf;
- Developing our business in accordance with high ethical standards and preventing, to the greatest extent possible, the establishment of any business relationships associated with or facilitating money laundering or terrorist financing;
- Cooperating with and assisting relevant legal authorities to the fullest extent possible in preventing the threats of money laundering and terrorist financing.
CoinCatch Risk Assessment and Mitigation Approach
Risk Assessment
We anticipate that the majority of our customers will be retail clients, and as of the date of this policy, our primary operations will be based in the British Virgin Islands.
In this regard, we will:
a. Record and/or collect documentation related to the following:
- The identity of our customers;
- The country or jurisdiction of origin or residence of our customers; and b. Utilize our knowledge, expertise, and capabilities to assess and screen our customers, their associated persons, individuals appointed to act on their behalf, and their ultimate beneficial owners against designated lists of individuals and entities, which include (but are not limited to) the following categories:
-
Democratic People's Republic of Korea (North Korea)
-
Democratic Republic of the Congo
-
Iran
-
Libya
-
Somalia
-
South Sudan
-
Sudan
-
Yemen
-
UN 1267/1989 Al-Qaeda Sanctions List
-
UN 1988 Taliban Sanctions List
-
Individuals identified in Schedule 1 of the Terrorism (Suppression of Financing) Act (Cap. 325)
Risk Mitigation
If any individual or entity is identified on these designated lists, CoinCatch will not engage in any business relationship or transaction with them.
Privacy Statement
We respect your privacy and are committed to protecting your personal data. We take our data protection responsibilities with the utmost seriousness.
1. Data Controller
The data controller of your personal data is the legal entity that determines the “means” and “purposes” of any processing activities.
Linkbase Technology Limited, a company incorporated under the laws of the British Virgin Islands, acts as the data controller responsible for processing your personal data.
2. Complaints
If you have any concerns regarding the processing of your personal data, please contact us via email at support@coincatch.com.
Privacy Statement
What Data We Collect
Personal Data
Personal data or personally identifiable information refers to any information related to an identified or identifiable living individual. This includes information you provide to us, information automatically collected about you, and information obtained from third parties.
A “data subject” is an individual who can be directly or indirectly identified through personal data. This typically includes identifiers such as a name, identification number, location data, online identifier, or one or more factors specific to an individual’s physical, physiological, genetic, mental, economic, cultural, or social identity.
How We Collect Your Data
We collect your information through various methods, including:
Direct Interactions
You may provide us with identity data, social identity data, contact information, financial data, profile data, and marketing and communication data by interacting with us directly. This includes when you:
-
Visit our website or application;
-
Apply for our services;
-
Create an account;
-
Use any of our services;
-
Request marketing materials, such as subscribing to our newsletter;
-
Participate in competitions, events, or surveys, including through social media channels; or
-
Provide feedback or contact us.
Automated Technologies or Interactions
When you interact with our website or application, we automatically collect technical data about your device, browsing behavior, and usage patterns. We collect this data using cookies, server logs, and other online identifiers. Additionally, we collect transaction and usage data. If you visit other websites that use our cookies, we may also receive related technical, marketing, and communication data about you. You can manage your cookie preferences to learn more about our use of cookies.
Social Media Widgets and Links
Our website may contain links to social media platforms such as Facebook, X (Twitter), Instagram, Threads, Discord, LinkedIn, Reddit, and Telegram, as well as social media plugins, widgets, "Tweet," "Share," and "Like" buttons.
How We Use Your Data
Legal Basis
We only use your personal data when permitted by applicable laws. This means we must ensure that such use has a lawful basis.
We typically use your personal data in the following circumstances:
-
Contractual Obligation: When processing is necessary to fulfill a contract in which you are a party or to take steps at your request before entering into such a contract. This forms the basis for providing our services.
-
Legitimate Interest: When processing is necessary for our (or a third party’s) legitimate interests, provided that your rights and interests do not override these interests.
-
Legal Compliance: When processing is necessary to comply with legal obligations.
-
Consent: When you have given free, specific, informed, and unambiguous consent to the processing of your personal data through a statement or a clear affirmative action. In certain cases, explicit consent may be required, and we will obtain it when necessary.
Purpose of Using Your Personal Data
We present our intended uses of your personal data, along with the corresponding legal basis, in a tabular format. Where applicable, we also identify our legitimate interests.
Depending on the specific purpose of data usage, we may process your personal data under multiple legal grounds. If you require detailed information regarding the specific legal basis for processing your personal data, please contact us.
Marketing
We may use identity, contact, technical, transaction, usage, and profile data to determine what products, services, and offers may be relevant to you.
If you have requested information from us and agreed to receive marketing materials, or if you have purchased our products and have not opted out, you will receive marketing communications from us. We will process your marketing and communication data accordingly.
Third-Party Marketing
We will seek your consent before sharing your personal data with any third party for marketing purposes.
Opting Out
You can opt out of marketing communications at any time using the opt-out link included in any marketing message you receive.
Additionally, you can log in and adjust your notification settings to disable marketing messages.
Opting out of marketing messages does not apply to service-related communications, such as maintenance updates or changes to terms and conditions.
Cookies
You can configure your browser to reject all or some browser cookies or to alert you when websites set or access cookies. However, please note that disabling or rejecting cookies may affect the availability or functionality of certain parts of our services or website. For more information on our use of cookies, please review our cookie preference settings.
Purpose Changes
We will only use your personal data for the purposes for which we collected it unless we reasonably determine that it is necessary to use it for another purpose that is compatible with the original intent. If you require clarification on how the new processing aligns with the original purpose, please contact us.
If we need to use your personal data for an unrelated purpose, we will notify you and explain the legal basis permitting such use.
Business Sale or Transfer
In the event of a merger, financing, acquisition, bankruptcy, dissolution, transaction, or litigation involving all or part of our shares, business, or assets, we may process your data as necessary. This will be based on our legitimate interest in carrying out such transactions or to fulfill our legal obligations.
Data Disclosure
We may share your personal data with third-party service providers, agents, subcontractors, affiliated companies, and group entities to carry out tasks on our behalf and provide services or applications to you. Any third-party service provider must respect the security of your personal data and process it in compliance with the law.
Specific Notes on Blockchain Usage
Certain services we provide operate on blockchain technology, which functions on a decentralized network where transactions are recorded in an immutable and transparent manner. This ensures the integrity and security of data stored on the blockchain. However, this also means that once data is added to the blockchain, it is nearly impossible to remove or delete.
Data Security
While sharing any data over the internet involves inherent risks, we have implemented appropriate security measures to prevent accidental loss, unauthorized use, damage, access, alteration, or disclosure of your personal data.
Additionally, access to your personal data is restricted to employees, agents, contractors, and other third parties who have a legitimate business need. They will only process your personal data according to our instructions and are bound by confidentiality obligations.
To mitigate risks associated with processing your personal data, we implement the following security measures:
-
Organizational Measures: Including, but not limited to, employee training and policy enforcement.
-
Technical Measures: Such as physical data protection, pseudonymization, and encryption.
-
Availability, Integrity, and Accessibility Measures: Including adequate data backup to ensure continued availability of personal data.
We have established procedures to address any suspected data breaches and will notify you and any relevant regulatory authorities when legally required.
Data Retention
When determining the appropriate retention period for personal data, we consider factors such as:
-
The amount, nature, and sensitivity of the data.
-
The potential risks of unauthorized use or disclosure.
-
The purposes for which we process your personal data and whether we can achieve those purposes through other means.
-
Legal, regulatory, tax, accounting, or other requirements.
Examples of situations where we may retain data:
-
If a complaint arises.
-
If we anticipate legal proceedings related to our relationship with you.
-
If we need to retain data for legal compliance, such as email addresses, messages, and letters, which may be retained for up to 10 years depending on the applicable statute of limitations in your jurisdiction.
In certain cases, you have the right to request data deletion. We will fulfill such requests if they meet the necessary conditions.
CoinCatch Team
Disclaimer:
Digital asset prices carry high market risk and price volatility. You should carefully consider your investment experience, financial situation, investment objectives, and risk tolerance. CoinCatch is not responsible for any losses that may occur. This article should not be considered financial advice.
Comments
0 comments
Article is closed for comments.