Logo
Sign In

Bright Start. Big Wins.

Slide 1

Quick Luck. Quick Cash.

Slide 1

Privacy Policy For Casumo Casino

Keeping Players Safe And Their Data Safe For Safe Gaming

We commit to rigorous standards, ensuring personal data is handled with utmost diligence. All client details are encrypted using TLS 1.2 protocols, preventing unauthorized access throughout registration, transaction, and account management phases. This adherence aligns with regulations by the Malta Gaming Authority and complies with GDPR requirements. Collected information, such as identity verification and payment data, is only shared with trusted third parties for legal compliance and fraud prevention. We maintain detailed audit trails, monitor transactions round-the-clock, and store all documentation in ISO 27001-certified environments. Participants are encouraged to use multifactor authentication and frequently update passwords to enhance account protection. Requests regarding held information, or data removal, are processed within 30 days according to legal statutes. For independent advice, consult Data Protection Authorities in your jurisdiction. Children under 18 are prohibited from registering. Age verification checks are applied without exception. Suspicious activity results in immediate access restriction pending investigation. Responsible recreational use is actively promoted; support links and self-exclusion tools are always available.

How Data Is Gathered And Shielded

Collection Methods:

During profile creation, basic details such as email address, full name, date of birth, address, and payment preferences are required to fulfill legal and transactional obligations. Usage logs, device identifiers, session activity, transaction history, and location data may be recorded through encrypted channels to enhance performance and meet regulatory demands.

Authentication And Verification:

To make sure that a user is who they say they are and to keep unauthorised people from getting in, they have to submit documents like scans of their passport or driver's license. These checks follow anti-money laundering rules and happen at set points, like when someone asks to withdraw money or when suspicious activity is found.

Data Storage:

All user records are stored on separate, encrypted servers in data centres that are subject to both local and EU laws. Access is closely watched, and advanced authentication protocols make sure that only authorised staff with the right clearance levels can get sensitive information. Regular audits assess storage systems and encryption standards.

Transmission Security:

Every data transfer utilizes Transport Layer Security (TLS 1.2 or newer) to block interception, using cryptographic keys that are regularly updated. PCI DSS-certified providers handle payment information, so bank card details are never stored in plain text.

User Controls:

Customers can still see, change, or ask for the removal of their records through dashboard tools or by calling the dedicated support team. We check change requests in several steps to protect against social engineering risks.

Responding To An Incident:

Immediate alerts and active monitoring systems detect unusual activity patterns. In case of breach suspicion, account restrictions are enforced and affected users receive timely notifications with suggested protective steps. Ongoing staff training ensures security protocols address emerging threats without delay.

Encryption Methods Used For Secure Transactions

All financial operations within this platform rely on 256-bit SSL (Secure Socket Layer) encryption. This protocol scrambles data while it is being sent, so that people who aren't supposed to see it can't read it. This system works for all interfaces, such as deposits, withdrawals, and account verification. Transport Layer Security (TLS 1.2 and higher) keeps connections between user devices and site servers safe from being intercepted and changed. This advanced protocol makes cyber threats, like man-in-the-middle attacks, even less likely. Databases protected by AES (Advanced Encryption Standard) 256-bit technology hold personal and transaction information. This strong algorithm makes sure that only authorised staff, who are bound by strict confidentiality agreements, can temporarily access sensitive information like payment card numbers, identification documents, or e-wallet details. This happens every time these types of data are processed or accessed. Tokenisation is used to protect payment information by replacing real card numbers with randomly generated tokens when they are stored and when they are sent. These random tokens don't mean anything outside of the system, which reduces the risks that come with trying to get data out. Certified third-party experts do penetration tests, vulnerability scans, and patch management routines at least once every three months. We keep an eye on failure logs and anomaly detection systems all the time so that we can quickly fix any problems that might arise with encryption. To help keep their sessions safe, users should use the most recent browsers and keep their authentication methods up to date. Accounts can use two-factor authentication (2FA) to add an extra layer of security beyond just a password. When users turn on 2FA, they get extra protection against unauthorised access because data interception alone isn't enough to steal profiles or financial information.

How To Change Your Privacy Settings In Your Casumo Account

  1. To change the settings for your account information, log in and click on your profile icon in the top right corner to get to the User Dashboard.
  2. Go to the "Settings" section of your account.
  3. Find the "Data Preferences" tab in the control panel; you can change how you want to be contacted for marketing materials here; you can turn on or off email, SMS, and push notifications; real-time toggles let users see and change the permissions they have given for promotional messages.
  4. To see what data is stored, go to the "Access Your Information" module; you can get a copy of your personal data or ask for specific types of data by filling out the form in this section; the service responds in the time frame set by local and EU law, as well as the GDPR.
  5. Specify which details are shared during interactive events like tournaments or competitions to change visibility; you can either hide your leaderboard username or turn off leaderboard displays altogether by clicking the appropriate button.
  6. To manage sharing of data with third parties, go to the "External Integrations" section; look over the permissions given to payment and analytic partners; to take back your permission, uncheck the boxes next to the permissions you want to take back; it should take effect within 48 hours.
  7. Set up two-factor authentication and alter password credentials from the "Security & Access" menu; activating additional verification steps is strongly recommended to minimize unauthorized access risk.
  8. If erasure or account closure is required, select the "Data Removal" feature; initiate deletion by submitting an authenticated request; associated records will be eliminated in compliance with retention statutes and processed within 30 days.
  9. Each setting is accompanied by a short explanation describing its function.
  10. Confirmation prompts appear after significant modifications, and users are notified of successful updates by email.
  11. For further assistance, support representatives are available via live chat and email, as indicated on the contact page.

How To Share Data And Work With Third Parties

We can only share customer information with outside partners for specific reasons that are in line with service delivery, following the law, and stopping fraud. We carefully choose the recipients and do due diligence on them to make sure they are reliable and committed to protecting your data.

Type of Outside Partner Reason for Engagement Data Parts Shared Safeguards Applied
Payment Service Providers Processing deposits and withdrawals Name, account details, transaction history PCI DSS compliance, secure API protocols
Authentication Vendors User identity verification, Know Your Customer (KYC) checks Date of birth, identification documents, residential address ISO 27001 certification, encrypted data transfer
Analytics Services Website performance analysis, product optimization Device data, session logs, usage patterns Pseudonymization and limited access rights
Fraud Detection Firms Keeping an eye out for strange behaviour and assessing the risk of transactions Transaction records, device fingerprints, geolocation data Data minimization, contractual data handling restrictions
Authorities in charge of the law and rules Meeting statutory obligations, external audits, dispute resolution Personal information, account details, and past records Jurisdiction-based confidentiality agreements, audit trails

All engagements with outside entities are governed by binding agreements detailing usage limitations and storage terms. We only sell or give away information that is necessary to reach the goals we have set. Customers can ask for the most up-to-date list of active data processors at any time through support channels. To make things more open, we get permission to share information when it's needed, and we let users know about any big changes to partnerships that involve their information. Account settings include instructions on how to opt out of marketing messages from affiliates. You can change these settings without affecting your ability to use core services.

User Rights: Getting To, Fixing, And Deleting Your Data At Casumo

Players still have full control over their personal records that are stored on this platform. It is easy and clear to use these rights, as long as you follow the law, such as GDPR for users in certain areas.

Data Access:

Anyone can ask for a full report of the data that is stored. Go to the profile section, click "Download Data," and you'll get a detailed log with information about your registration, activity logs, transaction histories, and communication records. The time it takes to respond is no more than 30 days after the request is made.

Requests For Correction:

If any of the information is wrong or out of date, send a message through the account support dashboard to start the process of fixing it. You may need to show proof of correct information, like updated ID cards or proof of address, to make sure that changes are both correct and safe.

Erasure Procedure:

You can delete stored personal fields by clicking on the "Remove My Data" option. User records will be deleted from systems and processing logs after the required retention periods have passed (for example, financial data must be kept for up to five years to meet regulatory standards). Requests should be sent through safe channels to be checked. You can get help with any questions you have about these processes seven days a week through live chat or email. When there are rules that limit what can be done, there will always be a clear explanation of the data that can't be deleted (because of legal obligations or anti-money laundering rules).

Bonus

for first deposit

1000AUD + 250 FS

Switch Language

United Kingdom Australia Canada German Spanish French Dutch Italian Portuguese Polish