Privacy Policy
LuckyFun Company Limited ("we", "us", or "our") considers the protection of your personal information to be of utmost importance. This Privacy Policy ("Policy") sets forth the legal basis, methodologies, and purposes by which your personal data is collected, utilized, shared, stored, and protected when you interact with our mobile applications, websites, and associated services (collectively, the "Services").
By continuing to access or utilize our Services, you explicitly acknowledge that you have read, understood, and consented to the data processing practices detailed within this Policy. We are committed to absolute transparency regarding our data procedures and the mechanisms we employ to safeguard your privacy expectations. Should you disagree with any provision contained herein, we advise you to immediately discontinue the use and installation of our Services.
Data Minimization
We process strictly the minimal aggregate required for platform functionality
No Sale of Personal Data
Your private details and identifiers are never exchanged with external data brokers
Data Security Measures
All submitted data points are shielded utilizing industry-standard cryptographic protocols
User Data Rights
Exercise full authority to view, rectify, or request the erasure of your personal data
Information Collection and Processing
During your engagement with our platforms, we systematically record distinct data classifications necessary to optimize software execution and to uphold the operational stability of the application architecture.
Game Data and Usage Information
Through the course of your interaction with the Services, we inherently process data concerning your in-game activities and platform functionality. Processed information may include your assigned Player ID, progression milestones, Internet Protocol (IP) address, device identifiers, and supplementary telemetry essential for sustaining and refining the operational quality of the Services.
Furthermore, within applications featuring competitive frameworks, we process and publicly display specific metrics, including your selected username, acquired achievements, and ranking scores on community leaderboards. This display is intrinsic to the competitive nature of the software logic. By electing to participate in these competitive environments, you grant us authorization to process and exhibit your gameplay statistics to comparative users within the application ecosystem.
Device and Location Data
To facilitate technical troubleshooting and systematically evaluate aggregated user behavior, it is occasionally necessary to collect hardware attributes and regional metrics. Such data frameworks may encompass player aliases, Player IDs, distinct device fingerprints, operating system architectures, hardware models, advertising tracking IDs, IP addresses, and generalized geolocation vectors.
The aforementioned identifiers strictly serve to monitor user interactions with our Services, optimize targeted electronic advertisements, and evaluate broad content consumption trends. If you wish to revoke permissions facilitating customized advertisements, please consult the "Advertising Opt-Out Options" provision detailed below.
Specifically, subject to your explicit prior consent recorded within the application settings, we may process precise coordinate localization data. This explicit processing is restricted solely to the execution of location-dependent software features, including proximity-based regional matchmaking mechanics.
Third-Party Authentication
Should you choose to authenticate your account utilizing third-party services (e.g., Apple Game Center, Google Play Games), these external data controllers may actively transmit specific personal attributes to our internal servers. Modulated by the overarching privacy configurations of those specific third-party organizations, the transmitted datasets typically include user identification tokens and broad demographic parameters such as your geographic locality.
We process this transmitted data fundamentally to provision your digital profile, authenticate your login vectors, and enable comprehensive interaction with our software catalog. Frequently, these external platforms furnish functionalities permitting the publication of in-game milestones. If you necessitate the erasure of personal variables dynamically sourced from these third-party connections, we require a formal deletion request submitted via contact@luckyfungames.com.
Customer Service Interactions
When you voluntarily elect to communicate with our consumer support personnel, we extract relevant contextual data to address your technical inquiries effectively. This procedural collection conventionally incorporates operating system versions, device models, geolocators, designated nicknames, Player IDs, full nomenclature, electronic mail addresses, and the specific diagnostic details encompassing your service ticket. This data processing phase encompasses conflict resolution exclusively.
Payment Processing Information
In the event of initiating virtual micro-transactions or premium service subscriptions, we function strictly as an intermediary, capturing temporal payment logic entirely on behalf of our authorized third-party payment processors. This financial payload undergoes dynamic encryption during transmission, guaranteeing unreadability by our central databases. We expressly refuse to permanently retain, catalog, or warehouse direct financial credentials or banking attributes.
Community Features and Communications
To moderate community safety and platform engagement, we process alphanumeric content generated inside public forums and direct messaging conduits. A private communication is legally categorized as peer-to-peer correspondence executed utilizing our integrated messaging infrastructure. It is imperative to realize that any personally identifiable data explicitly disclosed within public community interfaces or unsanctioned network dialogues may be organically viewed, captured, and utilized by unaffiliated platform users. To arrange for the expunction of your public community footprint, immediately address our administrative team via contact@luckyfungames.com.
As an administrative prerequisite for forum authentication, registration invokes the obligatory provision of a valid email address. This contact vector serves as the primary distribution channel for relaying modifications to our legal policies, administrative alerts, and promotional disclosures regarding our operational software. In circumstances where you elect to withdraw authorization concerning optional promotional correspondence, please transmit a formal opt-out request utilizing the address contact@luckyfungames.com.
Web Analytics and Social Media Integrations
During your navigation across our corporate web portals, analytical subroutines process metadata engineered to diagnose overarching performance issues and tailor intuitive platform architectures. Typical analytical processing encapsulates your browser type, operative system metadata, coarse geographic markers, designated language preferences, referring HTTP origin headers, and temporal onsite navigational logic.
Concurrently, specific web properties may embed interoperable social media widgets, including "Like" mechanics and "Share" endpoints. These embedded social components may autonomously seize your active IP address and parse the specific URI hierarchy you are populating. These features frequently deposit operational cookies to authenticate persistent sessions. It is distinctly noted that your digital engagement with these social components is directly governed by the individualized privacy frameworks dictated by the proprietary third-party controlling organizations.
Disclosure of Personal Data
We maintain a rigorous institutional mandate against the unauthorized distribution of personal data. Your identifiable information resides confidentially and is solely released to overarching external entities under the specific scenarios detailed herein:
- Upon the acquisition of your explicit, unambiguous consent specifying the allocation of data to defined third parties for direct marketing applications.
- In circumstances mandating statutory compliance—primarily including formalized governmental subpoenas, prevailing legal directives, the enforcement of our binding Terms of Service, and the protection of operational sovereignty and user-base security.
- To formally contracted data sub-processors and auxiliary service intermediaries engaged strictly to execute delegable administrative and technological functions on behalf of the primary data controller.
- To affiliated strategic vendors, commercial publishers, or advertisement topologies solely utilizing anonymized, irrecoverably obfuscated aggregated statistical datasets.
- Consequent to complex corporate restructuring protocols involving acquisitions, entity mergers, or comprehensive financial liquidations. Impacted data subjects will be supplied with prompt electronic bulletins highlighting any substantive modifications relating to the controlling entities.
Cross-Border Data Transfers
Because our central server architecture maintains a decentralized, global presence, compiled personal data sets continually transfer across legally demarcated sovereign borders. Although jurisdictional data protection statutes characteristically lack uniform parity, we explicitly pledge to implement the exhaustive privacy criteria documented inside this singular Policy uniformly across all data housing nodes. We continuously deploy all legally obligatory technical safeguards validating structural data protection, irrespective of whether the importing territory lacks an adequacy decision ratified by the European Commission.
A foundational dependency within our operations relies heavily on international cloud storage vendors. As a direct result, precise data structures encompassing Player IDs, specific topological coordinates, and behavioral tracking IDs transit organically into Google Inc. server installations located across the United States. These files are securely retained in standard status until formal account termination.
Integration relative to Google Inc. underwrites our ubiquitous database synchronizations. Hence, acknowledging, understanding, and consenting to these precise cross-border permutations represents an irrevocable precondition governing all usage of the software platform.
Cookies and Tracking Technologies
Our system endpoints utilize web cookies, embedded pixel trackers, and comparable localization mechanics to formulate broad, non-personal analytical models. Broadly defined as constrained textual files installed within resident device memory by operational load balancers, these instruments prove essential in calibrating behavioral metrics, ultimately permitting UI refinement and holistic application enhancement.
Strictly Necessary Trackers
Categorized as mandatory structural objects, these logic protocols fortify module security. They administer vital processes evaluating abusive system intrusions, execute constraints codified in the Terms of Service, and insulate users against persistent cyber threats. Obfuscating or disabling these instruments equates to a fundamental rejection of system functionality.
Performance and Analytics Trackers
We authorize discrete investigatory cookies designed solely to chronicle the holistic velocity of end-user traffic and isolate prevalent device matrices. Information curated via this process ensures the generation of completely anonymized topographical reports acting to synthesize subsequent architectural overhauls.
Targeted Advertising Trackers
Commercial tracking algorithms are periodically injected to strategically tailor electronic advertising inventory showcased via native displays and subsequent third-party commercial networks.
Please note that auxiliary third-party data processors and advertising mediators retain distinct capabilities permitting the autonomous deployment of proprietary trackers across your graphical interactions. We inherently lack jurisdictional dominion encompassing external third-party methodologies. Pertinent inquiries focused on independent cookie deployment modalities must be systematically escalated toward the individual organizations initiating those operations.
Third-Party Advertising Partners
We maintain formalized commercial relationships with the following advertising arrays and networks:
- Firebase: Privacy Policy
- AppsFlyer: Privacy Policy
- Facebook: Privacy Policy
- MoPub: Privacy Policy
- Google AdMob: Privacy Policy
- IronSource: Privacy Policy
- Unity Ads: Privacy Policy
- Vungle: Privacy Policy
- AppLovin: Privacy Policy
- AdColony: Privacy Policy
- MOLOCO: Privacy Policy
- Twitter: Privacy Policy
- TikTok: Privacy Policy
Data Protection and Security
We integrate a sophisticated matrix encompassing multifaceted administrative, technological, and physically bounded barriers precisely structured to preserve the fundamental confidentiality, strict operational integrity, and unfettered availability concerning user personal datasets. Seeking to comprehensively deter illicit network penetration, logical file corruption, and arbitrary digital extraction, we have codified the succeeding layers of robust countermeasures:
Network Resilience and Encryption Protocols
We proactively marshal extensive algorithmic defenses explicitly calibrated to neutralize unapproved cyber intrusions (e.g., malware deployments, zero-day threat variants) while instituting 24/7 granular server telemetry monitoring. Substantive digital communications linking independent backend registries with external cloud hosts exclusively utilize advanced secure cryptology channels.
Corporate Governance and Data Privacy Operations
Designated personnel navigate rigorously audited instructional regimens highlighting international digital privacy structures and localized protections. Acting autonomously, our designated internal Data Protection Officer (DPO) presides comprehensively traversing all data compilation methods, meticulously eliminating isolated privacy exposure contingencies.
Access Control Stratification
Tangible storage centers and digitized backend hubs governing the cataloging of personally identifiable records undergo extreme topological restriction. Hierarchical access rights remain specifically allocated only towards administrative constituents owning explicit institutional clearance validation.
Data Retention Period
Data classified as personally identifiable remains sequentially banked solely for periods corresponding strictly with active account maintenance profiles, or practically aligned parallel to immediate software provisioning constraints. Generalized, non-indicative operational histories encompassing global scoreboard distributions might be preserved perpetually for statistical modeling contexts well after account closure proceedings. These records, however, routinely experience targeted deletion protocols or unrecoverable obfuscation methodologies upon explicit client prompting. Enforcing permanent personal deletion processes involves establishing correspondence directed specifically toward contact@luckyfungames.com.
Data telemetry submitted during Customer Service procedures (notably enclosing specific system architectures, software revisions, and rank allocations) is algorithmically directed toward standard cloud environments administered via Google Inc., functionally isolated solely to ensure swift bug amelioration. Subsequently following formalized ticket resolutions, archived diagnostic metrics transition into static retention modules explicitly configured to auto-terminate subsequent to an overarching thirty-six-month quarantine protocol.
Advertising Opt-Out Options
To legally withdraw authorization permitting externally targeted semantic digital marketing sequences encompassing portable application environments, relevant consumers should alter resident privacy configurations. Engaging specifically labeled "Limit Ad Tracking" directives inherent to Apple (iOS) operations or manually electing "Opt-out of interest-based ads" options localized inside Android matrices functionally curtails any tailored network advertising delivery vectors.
Accessing Your Information
Should specific core personal metrics require targeted calibration methodologies, or within events involving decisions strictly necessitating the severance of operational engagement tied utilizing our interfaces, affected users preserve inalienable rights demanding modifications encompassing the rectification, granular updates, or systemic digital purges using internal settings dashboard adjustments. Additionally, verifiable requests specifying parallel outcomes readily facilitate completion upon receipt utilizing contact@luckyfungames.com. Legal frameworks ensure that upon formal petition, we mandate identical provisioning encompassing systematic physical or standardized electronic carbon copies detailing captured systemic personal data matrices.
Your Data Protection Rights
Under converging definitions spanning fundamental global privacy legislations, every authenticated user intrinsically retains the enumerated statutory protections:
Right of Access
A formalized entitlement demanding unequivocal determination reflecting institutional processing encompassing uniquely personal datasets. Consumers fundamentally require unfettered systemic access spanning archived components. Formulate specific queries regarding this legal protection utilizing contact@luckyfungames.com or manually scanning the platform application setting UI.
Right to Rectification
This constitutes supreme functional jurisdiction enabling users to obligate swift rectifications concerning inherently inaccurate parameters affecting internal organizational databases, structurally ensuring exactness spanning contextual purposes relating to data collection routines. Forward requests addressing inconsistencies dynamically toward contact@luckyfungames.com.
Right to Erasure ('Right to be Forgotten')
Users singularly possess categorical authority concerning formalized legal invocations necessitating comprehensive digital profile obsolescence parameters alongside severely delimited architectural profiles. Transact formal notifications directed through contact@luckyfungames.com.
Right to Withdraw Consent
Concerning datasets distinctly handled utilizing preliminary operational approvals, subjects eternally maintain unilateral rights capable of severing previous stipulations without fundamentally corrupting previous periods governing lawful processing operations. Revoke consent mandates exclusively through communicating utilizing contact@luckyfungames.com.
Right to Data Portability
Defined clearly as unmitigated entitlements capable of unilaterally securing previously submitted internal data constructs formulated within uniformly ubiquitous architectural or universally readable programming syntax ensuring streamlined transmissions involving alternating organizational controllers. Expedite digital transmission requests using contact@luckyfungames.com.
Right to Object
Users eternally harbor autonomous capacities inherently contesting overarching strategic methodologies implemented during structured digital processing contexts precisely elaborated through policy constraints.
Right to Submit Complaints
In occurrences experiencing structural rights abridgments, individuals retain absolute protections ensuring petition escalations formally fielded locally using associated overarching Data Protection Authorities (DPAs). Corresponding citizens claiming legal origin traversing the European Union unconditionally inherit structural recourse directed functionally using specialized EU operational complaint registries.
Crucially, our operational entities vigorously repudiate and expressly forbid institutional configurations manifesting automated computational verdict formulation procedures, or opaque psychological character profiling mechanisms executed primarily leveraging individualized consumer variables.
Children's Privacy
Our complex technological interfaces absolutely abstain encompassing targets deliberately capturing metrics specifically attributed involving individual youth constituencies fundamentally beneath precisely specified thresholds encompassing 17 temporal years standard (respectively 16 cumulative years acknowledging European territorial borders). Exceptions exclusively demand indisputable verifiable authorization procured transparently from authenticated legal guardians. Youth representations existing demonstrably beneath mandated statutory guidelines unconditionally obligate total service abstention involving any active digital interactions. Variations intrinsically manifest regarding local maturity limitations; hence interactions legally require immediate deactivation where consumer profiles transgress locally sanctioned majority boundaries.
Assuming inadvertent technical anomaly manifestations result recording legally proscribed consumer age constraints, we unconditionally commit toward accelerating aggressive deletion strategies ensuring permanent topological erasure involving compromised server registries. In situations validating suspicions indicating unauthorized underage acquisitions exist, direct rapid institutional alerts regarding specific scenarios at contact@luckyfungames.com.
Legally instantiated parental configurations structurally require stringent oversight policies encompassing complete comprehension regarding digital consumer platforms, unconditionally assuring transparent review implementations governing both this specified privacy framework simultaneously combined with structural Terms of Service guidelines. We inherently champion robust guardian intervention overseeing holistic electronic data assimilation channels generated consistently utilizing our application.
U.S. State Privacy Rights
All ensuing structural directives function distinctively focused regarding residential citizens occupying contiguous spatial arrangements bounding United States geographic designations. Functionally governed explicitly leveraging decentralized state frameworks prioritizing individual structural integrities, American end-users fundamentally inherently possess unalienable protections explicitly forcing structural explanations corresponding with aggregate data methodologies executed. Corresponding structures inherently allow sweeping digital deletion protocols, absolute repudiations concerning systemic third-party allocations, and structurally fortified safeguards eliminating unconstitutional digital discriminatory implementations tied inextricably regarding core privacy protection. We transparently declare the absolute explicit systemic refusal involving transactional monetization regarding private consumer information arrays.
Right to Opt-Out
Informational distribution strictly mimics contextual requirements stipulated implicitly corresponding the fundamental boundaries defining this explicit policy doctrine. Consumers definitively sustain unconditional capacities restricting unapproved peripheral architectural data broadcasting directives.
Do Not Track Signals
Formal Californian statutory structures unconditionally dictate comprehensive policy declarations identifying corresponding mechanical interactions navigating web-browser-based "Do Not Track" electronic headers. Constrained effectively experiencing absent cross-industry consensus validating standardized protocols, corresponding logic configurations ignore specific automated DNT network streams fundamentally inside current architectures.
Invoking Your Rights
Individuals directing generalized administrative inquiries, or systematically forcing escalations executing authorized domestic U.S. fundamental state rights uniformly require standard communications targeting contact@luckyfungames.com.
Modifications to this Policy
We technically reserve autonomous operational entitlements implementing substantive textual modifications altering components existing completely dynamically inside this document independently encompassing shifting structural compliance metrics mirroring fluctuating international regulations. We aggressively engage deploying strategic communicative protocols accurately highlighting pivotal digital updates effectively restructuring overarching data paradigms concerning standard subjects. Utilizing platform endpoints post-amendment execution technically serves manifesting definitive authorization; however, individuals categorically opposing instantiated structural updates intrinsically secure unilateral alternatives demanding account termination completely alongside concurrent usage cessation.
Contact Us
Regarding distinct ambiguities specifically exceeding comprehensive definitions provided effectively utilizing structural documentation contained herewith, individuals must implement corresponding network communications exclusively addressing administrative intermediaries navigating the below-listed routing protocols:
LuckyFun Games Company Limited
contact@luckyfungames.com