Tigerexch Privacy Policy
This tigerexch privacy policy explains what information is collected when you use the tigerexch app, why it’s collected, how it’s protected, and what choices you have.
Table of Contents
Table of contents
Who this policy applies to
This policy applies to users who access Tigerexch services through our website, mobile site, or app, and to anyone who contacts support. It covers information collected online and through customer service interactions.
What data we collect
We collect information you provide, information generated when you use the service, and information from technical logs.
| Category | Examples of data | Why it’s collected |
|---|---|---|
| Account & identity | Name, username, date of birth/age confirmation, verification details (KYC) | To create/manage accounts, meet legal/AML obligations, prevent fraud |
| Contact | Email, phone/WhatsApp number | To send service messages, security alerts, and support replies |
| Transaction & payments | Deposits/withdrawals records, payment references, UPI or wallet identifiers (as applicable), timestamps | To process payments, prevent fraud, maintain accounting records |
| Usage & device | IP address, device identifiers, browser type, app version, pages/screens viewed, clickstream | To operate the service, debug issues, improve performance and security |
| Support communications | Chat/WhatsApp messages, emails, call notes (if any) | To resolve requests, investigate incidents, improve support quality |
Where required by law or platform rules, additional data protection checks may apply (for example, verifying identity before withdrawals).
How we use your information
We use personal data for the following purposes:
- To provide the service: account creation, login, gameplay/betting functionality, settlement, and customer support.
- To process transactions: deposits, withdrawals, refunds (where applicable), and reconciliations.
- To protect users and the platform: fraud prevention, responsible use controls, and investigation of suspicious activity.
- To comply with legal obligations: anti-money laundering (AML) checks, record-keeping, and responding to lawful requests.
- To maintain and improve performance: monitoring uptime, fixing bugs, security testing, and analytics.
Legal bases for processing
Depending on your location, we process personal data under one or more of the following bases:
- Contract necessity: to deliver the services you request.
- Legitimate interests: to secure the platform, prevent fraud, and improve reliability (balanced against your rights).
- Legal obligation: to comply with applicable laws and regulatory requirements.
- Consent: for certain cookie categories or marketing preferences where required (you can withdraw consent).
Cookies and similar technologies
We use cookies and related technologies (such as local storage and similar identifiers) to keep the site working, maintain sessions, remember preferences, and help us understand how the service is used.
Common cookie categories:
- Strictly necessary: essential for login, security, and core functionality.
- Preferences: language and settings.
- Analytics: aggregated usage insights to improve performance.
- Security: detecting abuse, preventing fraudulent access.
You can manage cookies through your browser settings. If you disable certain cookies, parts of the service may not function correctly.
How we share data
We do not sell your personal data. We may share information in limited situations:
- Service providers (processors): hosting, security monitoring, analytics, customer support tools, and payment-related service providers—only as needed to perform services for us.
- Compliance and legal: regulators, law enforcement, courts, or other authorities when required by applicable law or a valid legal request.
- Business changes: if the business is reorganized, merged, or transferred, information may be shared as part of that transaction, subject to confidentiality safeguards.
When we use third parties, we aim to apply contractual and technical controls appropriate for data protection, including limitations on use and confidentiality requirements.
International transfers
Your information may be processed in countries other than where you live, depending on where our service providers and infrastructure operate. Where required, we use appropriate safeguards to protect personal data during cross-border transfers.
Data retention
We keep personal data only as long as necessary for the purposes described in this policy, including:
- Maintaining your account and providing services.
- Meeting legal, tax, AML, and audit requirements.
- Resolving disputes and enforcing agreements.
- Preventing fraud and ensuring security.
Retention periods can vary by data type and legal obligations. When data is no longer needed, we delete or anonymize it, subject to technical and legal constraints.
Your rights and choices
Depending on applicable laws, you may have the right to:
- Access the personal data we hold about you.
- Correct inaccurate or incomplete data.
- Request deletion (where legally permitted).
- Object to certain processing or request restriction.
- Request portability of certain information.
- Withdraw consent where processing is based on consent.
To protect users, we may need to verify your identity before acting on a request. Some requests may be limited where we must retain information for legal compliance or security purposes.
Helpful links:
- Review the main product overview on the tigerexch app.
- For account access steps, see login.
- For installing the app, visit download.
Security measures
We use administrative, technical, and organizational measures designed to protect personal data, including access controls and security monitoring. No method of transmission or storage is 100% secure, so we cannot guarantee absolute security; however, we work to prevent unauthorized access, alteration, disclosure, or destruction.
To help keep your account secure, use a strong password, do not share credentials, and contact support promptly if you suspect unauthorized activity.
Children’s privacy
Our services are not intended for individuals who are under the legal age required to use betting or casino services in their jurisdiction. We do not knowingly collect personal data from minors. If you believe a minor has provided personal data, contact us so we can take appropriate action.
Third-party links
Our services may include links to third-party websites or tools. Their privacy practices are governed by their own policies. We recommend reviewing those policies before providing personal data.
Changes to this policy
We may update this tigerexch privacy policy from time to time to reflect operational, legal, or regulatory changes. Updates will be posted on this page with a revised effective date where appropriate.
Contact us
For privacy questions, requests, or concerns, contact support:
Need help?
You can also use the Live Chat option available on the website. If you are making a data protection request, include the email/phone linked to your account and a clear description of your request.
FAQ
What personal data does Tigerexch collect?
We collect account details you provide (such as contact information), verification information where required, transaction records, and technical/usage data (such as IP address and device/app details) to operate the service, secure it, and comply with legal obligations.
Does Tigerexch sell my personal data?
No. We do not sell personal data. We may share limited information with service providers (for hosting, security, payments, support) and with authorities if legally required.
How are cookies used?
Cookies help keep you signed in, support security, remember preferences, and provide analytics to improve reliability. You can control cookies using browser settings, but disabling some cookies may affect site functionality.
How can I request access or deletion of my data?
Contact support and specify your request. For safety, we may ask you to verify your identity. Some data may need to be retained to meet legal, AML, tax, or security requirements.
How does Tigerexch protect my information?
We use security measures such as access controls and monitoring designed to protect data. However, no system is completely secure, so it’s important to use strong credentials and report suspicious activity quickly.