Chainy is your go-to solution for instant crypto checks, keeping your digital assets clean and complian

Privacy policy

Last Updated: 20.11.2024

Introduction

Chainy ("we," "us," or "our") is committed to protecting your privacy. This Privacy Policy explains how we collect, use, share, and safeguard your personal information when you use our website, platform, and services.

1. Information We Collect

Personal Information: Includes your name, email address, job title, and other contact details you provide during account creation, inquiry, or registration.

Usage Data: Information collected automatically when you access or use our services, such as your IP address, browser type, operating system, and activity logs.

Transaction Data: Information on blockchain addresses, transaction records, and any KYT (Know Your Transaction) checks performed through our platform.

2. How We Use Your Information

Service Provision: To deliver and maintain our services, manage accounts, and provide customer support.

Compliance and Legal Obligations: To comply with laws and regulations, including anti-money laundering (AML) and sanction checks.

Improvements and Analytics: To enhance our platform’s functionality, run analytics, and improve user experience.

3. Legal Basis for Processing Personal Data

Consent: Where consent is required, we process your personal data on this basis.

Legitimate Interests: We may process personal data based on our legitimate interest in improving our services.

Compliance with Laws: To meet our legal obligations.

4. Data Sharing

Service Providers: We may share your information with third-party service providers to assist in delivering our services.

Compliance Requirements: We may disclose information if required by law or for regulatory purposes, including with law enforcement.

5. Security Measures

• We implement security measures to protect your personal information, including encryption, access controls, and regular audits.

6. Your Rights

Access: Request a copy of the personal data we hold about you.

Rectification: Correct inaccurate information.

Deletion: Request the deletion of your data.

Data Portability: Obtain your data in a structured format.

Contact Us: Reach out for privacy concerns at [contact information].

7. Changes to This Policy

We may update this Privacy Policy. The "Last Updated" date at the top indicates when the latest changes were made.

Cookie Policy

Last Updated: 20.11.2024

Introduction

This Cookie Policy explains how Chainy ("we," "us," or "our") uses cookies on our website and platform. By using our site, you consent to the use of cookies.

1. What Are Cookies?

Cookies are small text files stored on your device to collect information about your browsing activities. They help enhance your user experience.

2. Types of Cookies We Use

Essential Cookies: Necessary for our website's basic functionality.

Performance Cookies: Collect anonymous data to optimize our site performance.

Analytics Cookies: Help us analyze user behavior to improve our services.

3. Third-Party Cookies

We may use third-party cookies for analytics (e.g., Google Analytics). These cookies collect information anonymously to help us understand user interactions.

4. Managing Cookies

You can manage or disable cookies through your browser settings. Please note that disabling cookies may impact your experience.

5. Contact Us

For any questions about our use of cookies, please contact us at [contact information].

Data Processing Agreement (DPA)

Last Updated: 20.11.2024

Introduction

This Data Processing Agreement (DPA) is part of the agreement between Chainy ("Processor") and the client ("Controller") for the provision of data processing services.

1. Scope and Purpose

This DPA outlines Chainy's responsibilities as a data processor, including processing, security, and handling of personal data on behalf of the Controller.

2. Data Processing Details

Data Types: Personal data related to KYT checks, AML checks, and transaction histories.

Purpose: To enable compliance checks and secure data management as per the Controller's instructions.

3. Security Measures

Access Control: Limited access to authorized personnel only.

Encryption: Data is encrypted during transmission and storage.

Audit Logs: Regular security audits to ensure compliance.

4. Use of Sub-Processors

• We may engage sub-processors with Controller's prior consent. We will ensure that sub-processors meet equivalent security and privacy standards.

5. Assistance with Data Subject Requests

We will assist the Controller in fulfilling requests from data subjects related to their rights under data protection laws.

6. Data Breach Notification

In the event of a data breach, we will promptly notify the Controller and provide all relevant details.

7. Termination and Data Deletion

Upon termination of the agreement, we will securely delete all personal data unless required to retain it by law.