Privacy and Cookie Policy

Global Performance Group LLC Privacy Policy and Cookie Policy

This Privacy Policy outlines how Global Performance Group LLC (“Company”) collects, processes, shares, retains, and uses personal data. As a licensed and regulated limited liability company, Global Performance Group LLC serves as the data controller for individuals engaging with its services, including all online platforms and mobile applications associated with the Company (“Platforms” and “Applications”).

By accessing our Platforms, Applications, or accepting terms during registration, users (“you”) consent to this Privacy Policy. We prioritize protecting your personal data and are committed to upholding all applicable data protection laws. This Policy governs the use of our services, participation in promotional programs, and any related communications.

Information Collected

In compliance with applicable regulations, Global Performance Group LLC collects a variety of personal data to provide high-quality, secure, and personalized services across our Platforms and Applications. This data collection occurs during user registration, throughout service interactions, and during ongoing use of our digital properties. “Personal Information” refers to any data that could identify or be used to identify an individual. This includes, but is not limited to, the following categories:

  1. Identification Information: This encompasses details like full name, contact information (e.g., phone number, email address), and business or professional affiliation. Such information helps us confirm user identity, communicate effectively, and tailor our services to meet specific professional or business needs.
  2. Technical Information: We collect IP addresses, login credentials, and device information to authenticate users, ensure secure access, and prevent unauthorized use of our Platforms and Applications. This technical data also allows us to monitor the integrity and reliability of our digital infrastructure and identify potential security risks.
  3. Behavioral and Interaction Data: To understand user preferences and improve user experience, we collect data on browsing behavior, interaction patterns, location, and feedback. This may include information about the features and content users engage with, page visit frequency, time spent on specific sections, and app interactions. Such insights enable us to optimize functionality, enhance navigation, and deliver more relevant content.
  4. Demographic Information: Details such as age and level of experience help us better understand our user base, allowing us to customize services, tailor educational content, and ensure that offerings meet the diverse needs of our audience. Demographic data may also be used in aggregated and anonymized forms for reporting and analysis purposes, contributing to product development and service improvements.

Purpose of Data Collection

The data we collect is used to support and improve our services in several key areas, ensuring a secure, efficient, and personalized experience for all users. Our purposes for using collected data include:

  1. Regulatory Compliance: We process personal data to adhere to applicable laws and regulatory requirements, ensuring our operations meet industry standards and legal obligations. This includes verifying user identities, conducting necessary due diligence, and maintaining accurate records for auditing purposes.
  2. Fulfilling Contractual Obligations: Data is essential to fulfilling our commitments to users and partners. This includes providing requested services, processing transactions, and ensuring seamless access and functionality across our Platforms and Applications. Accurate data helps us maintain service consistency and uphold service-level agreements.
  3. Data Analysis and Insights: By analyzing user data, we can better understand behavior patterns and preferences, allowing us to optimize the user experience on our Platforms and Applications. This analysis helps improve functionality, streamline navigation, and make informed business decisions that enhance our offerings.
  4. Marketing Communications (with User Consent): With explicit user consent, we use personal data to deliver tailored marketing communications about our products, services, promotions, and updates that may be relevant to the user’s interests. Users have control over these communications and can adjust preferences at any time.
  5. Risk Assessment and Management: To protect both users and the Company, we utilize data to conduct risk assessments, identify potential fraud, and enhance security measures across our services. By analyzing patterns and behaviors, we strengthen safeguards, detect suspicious activities, and take preventive actions to mitigate risk.
  6. Service Enhancement and Development: Data insights allow us to refine and improve our services, Platforms, and Applications continuously. By understanding user feedback and usage patterns, we can make updates that enhance user satisfaction, introduce new features, and ensure our Platforms and Applications remain cutting-edge, user-friendly, and aligned with evolving needs.

Disclosure of Information

Personal data may be shared with government authorities or regulatory bodies as required by law, for purposes such as compliance with legal obligations, responding to valid legal processes, or in connection with court orders, or other lawful requests. Such disclosures ensure that Global Performance Group LLC adheres to applicable regulations and safeguards our legal interests.

In certain instances, personal information may be transferred to third-party entities located in other countries to facilitate our services, conduct business operations, or comply with regulatory requirements. This may include cases where specific services are outsourced to external providers. However, even in instances of outsourcing, Global Performance Group LLC retains full responsibility for ensuring that your data is handled in compliance with all applicable data protection laws and with the highest standards of privacy and security.

To protect your personal information during these transfers, we implement safeguards, including contractual agreements, such as Standard Contractual Clauses approved by relevant regulatory authorities. These agreements help ensure that the data protection level in the recipient country aligns with that of your country of residence. We carefully select and work only with trusted third-party service providers who are committed to upholding these stringent data protection standards. This approach ensures that your personal information remains secure, private, and used solely for the intended purposes, regardless of the processing location or outsourcing arrangements.

User Rights

Users are entitled to a variety of rights regarding their personal data, enabling them to exercise control over how their information is managed and processed by Global Performance Group LLC. These rights, which are in alignment with applicable data protection laws, include:

  1. Right to Access: Users have the right to request access to the personal data we hold about them. This allows individuals to understand what information has been collected, how it is being used, and for what purpose. Upon request, we will provide a detailed record of the data we possess, as well as any third parties with whom it may have been shared.
  2. Right to Rectification: If any personal data is inaccurate or incomplete, users have the right to request corrections or updates. This ensures that all information held by Global Performance Group LLC remains accurate and up-to-date, reflecting the latest user-provided details.
  3. Right to Erasure (Right to Be Forgotten): Users may request the deletion of their personal data under certain circumstances, such as if the data is no longer necessary for the purposes for which it was collected, or if consent is withdrawn and no other legal grounds for processing apply. This right ensures that users can control the lifespan of their personal data within our systems.
  4. Right to Restrict Processing: Users can request a restriction on the processing of their data. This right applies in specific situations, such as when the accuracy of data is contested, or if the processing is deemed unlawful but the user prefers restriction over deletion. While processing is restricted, data will only be used with the user’s consent or as required by law.
  5. Right to Object to Processing: Users have the right to object to certain types of data processing, such as processing carried out for direct marketing purposes or for certain legitimate interests. This right allows individuals to limit the ways in which their data is used, depending on personal preferences and privacy concerns.
  6. Right to Data Portability: Users may request that their data be transferred directly to them or, where feasible, to another organization in a structured, commonly used, and machine-readable format. This enables users to reuse their personal data across different services without affecting its integrity.
  7. Right to Withdraw Consent: Where processing is based on user consent, individuals have the right to withdraw that consent at any time. Withdrawal of consent does not affect the lawfulness of processing conducted prior to the withdrawal but may limit certain functionalities or services.
  8. Right to Lodge a Complaint with Data Protection Authorities: If users believe their data has been mishandled or that their rights have been infringed, they have the right to file a complaint with relevant data protection authorities. This provides a formal channel for addressing data privacy concerns and ensures that individuals have recourse if issues arise.

For any inquiries or requests related to these rights, users may contact our Data Protection Officer (DPO) at [email protected]. Our DPO is dedicated to handling all requests promptly and in compliance with data protection regulations, ensuring that user rights are respected and upheld.

Data Retention

Personal data is retained for a minimum of five years to ensure compliance with relevant regulations and to facilitate any necessary administrative processes. This retention period allows us to adequately respond to inquiries and fulfill our obligations to stakeholders. In addition, extended retention may apply in circumstances where legal obligations necessitate a longer period of data retention, such as ongoing investigations, legal proceedings, or regulatory requirements. We continually assess the necessity of retaining personal data and take appropriate measures to ensure that any data kept beyond the minimum period is securely stored and protected. Once the retention period has elapsed and there are no further legal obligations to maintain the data, we will securely delete or anonymize it, ensuring that your privacy is preserved.

Data Storage

At our organization, we prioritize the security and integrity of personal data, ensuring that all information collected through our platforms and applications is stored and transmitted with the highest level of protection available.

  1. Secure Storage: Personal data is stored securely on protected servers that are equipped with advanced security measures. These servers are housed in facilities with stringent physical security protocols to prevent unauthorized access. We employ industry-standard security practices, including firewalls, intrusion detection systems, and regular security assessments, to safeguard stored data from potential threats.
  2. Data Transmission Security: While no method of online transmission can be entirely secure, we take significant steps to protect data during transmission. For all sensitive information exchanged through our platforms and applications, including payment details and personal data submissions, we utilize SSL (Secure Socket Layer) encryption. This technology establishes an encrypted link between the user’s browser and our server, ensuring that any data transmitted over the internet is encrypted and protected from eavesdropping or interception by unauthorized parties.
  3. SSL Encryption: SSL encryption is a widely accepted standard for securing online communications. It ensures that sensitive information such as credit card details, login credentials, and personal identification data is transmitted securely. This encryption creates a secure tunnel that protects the integrity and confidentiality of the data being shared, thereby reducing the risk of data breaches and unauthorized access.
  4. Ongoing Security Monitoring: We continuously monitor our systems for vulnerabilities and potential security threats. Regular security audits and penetration testing are conducted to identify and address any weaknesses in our infrastructure. Additionally, we stay informed about the latest security trends and best practices to enhance our data protection measures.
  5. Employee Training: All employees are trained on data protection policies and practices to ensure that they understand the importance of safeguarding personal information. We promote a culture of security awareness, encouraging employees to report any suspicious activities or potential security breaches immediately.
  6. Data Breach Response Plan: In the unlikely event of a data breach, we have established a comprehensive response plan to mitigate potential risks and impacts. This plan includes notifying affected individuals promptly and taking corrective actions to prevent future incidents. We also work closely with relevant authorities to ensure compliance with legal obligations in the event of a breach.
  7. User Responsibility: While we take extensive measures to protect personal data, we also encourage users to take precautions. Users should ensure that they access our platforms through secure connections and safeguard their login credentials. Using strong, unique passwords and being cautious about sharing personal information can further enhance security.

Cookie and Tracking Technologies

Why We Use Cookies

We utilize both first- and third-party cookies on our Website to serve various purposes. Some cookies are essential for the technical operation of our Website and are referred to as “essential” or “strictly necessary” cookies. Other cookies allow us to analyze user interests, enhancing your experience on our Website. Additionally, third parties may set cookies on our Website for purposes such as advertising, analytics, and other functionalities, as detailed below.

How to Manage Cookies

You have the right to control your cookie preferences. The Cookie Consent Manager on our Website enables you to accept or reject different categories of cookies based on your preferences. Essential cookies, which are critical to the core functionality of our services, cannot be disabled.

Access the Cookie Consent Manager through the notification banner or directly on our Website. If you choose to reject cookies, you may still access our Website, but certain features and areas may be restricted. Additionally, you can configure your browser settings to accept or decline cookies.

The table below provides information on the specific types of first- and third-party cookies used on our Website and their respective purposes. Please note that the specific cookies may vary depending on the site you visit.

Our Platforms and Applications use cookies and similar tracking technologies to enhance functionality and improve user experience. These technologies store specific data to create a seamless experience, identify potential errors, and gather statistical insights. They fall into three categories:

  • Strictly Necessary Cookies: Essential for authentication and secure access.
  • Performance Cookies: Collect anonymized data to optimize performance.
  • Functionality Cookies: Enhance user experience by remembering preferences and app-specific interactions.

Policy Updates

This Privacy and Cookie Policy is subject to updates. Any changes will be posted on our website and Applications, and users will be notified upon login if they have an active profile.

Effective Date: 27.10. 2024

 

Safety : CryptoPerformance operates under the rules of financial, operational and legal safety, as well as AML and KYC regulations. All transactions are processed via encrypted HTTPS connections with the use of safe TLS protocols and encryption algorithms.

Copyright ©️ 2019-2024 CryptoPerformance Group. All Rights Reserved.

Safety : CryptoPerformance operates under the rules of financial, operational and legal safety, as well as AML and KYC regulations. All transactions are processed via encrypted HTTPS connections with the use of safe TLS protocols and encryption algorithms.

Terms

Copyright ©️ 2019-2024 CryptoPerformance Group. All Rights Reserved.