Effective Date: 01 June, 2023
1.1. This Policy represents an agreement between You (“You” or “Your”) and PT Agate International (“Agate”, “We”, “Us” or “Our”). This Policy sets out the ways that We use the personal information which We may gather in providing You with games, software, updates, add-ons (including virtual goods and virtual currency) and services that are offered to You by Us as well as any Agate website which You access to avail of any of the above (collectively, the “Services”).
1.2. References to Agate in these Terms shall include any Agate affiliates, which shall include subsidiaries, parent companies, and any other entities under common ownership. Where You receive or participate in a Service provided directly by Agate, Agate is the data controller of Your personal data.
1.3. Where You access the Services through a third-party website or platform (such as, but not limited to, Windows Store, App Store, and Google Play Store), please be aware that the privacy policies of those websites and applications will also apply to You. Payments are processed through third-party payment providers. You will also be subject to these third-party terms, and You should review them carefully.
1.4. Please note that if You follow a link to any third-party website, We do not accept any responsibility or liability for such a website or its policies, nor do We endorse such websites.
3.2. By accessing or using the Services, You are authorizing Us to collect, store and use Your Information. You can control the amount of Information You are authorizing Us to collect, store and use by altering Your privacy settings on the mobile device or platform through which You access the Services or Your user profile any third party platform. You can find out more about these settings, and how to control them, on the mobile device or platform where You access the Services from.
3.5. By accessing or using the Services via Your mobile phone or other mobile devices, You are authorizing Us to collect its identifier and IP address. We may also collect the name You have associated with Your mobile phone or other mobile devices, device type, telephone number, country, and any other information You choose to provide. We may also access Your contacts to enable You to invite friends to join You on the Services. If You request that, we do this on Your behalf.
3.6. We receive and store the information that You provide, including Your telephone number, when You sign up to have SMS notifications sent directly to Your mobile phone. These messages notify You of in-game activity within the Services and may allow You to access the Services from Your mobile device.
3.7. With Your consent, We may send push notifications to Your mobile device to provide Service updates and other relevant messages. You can manage push notifications within the settings of Your mobile device.
3.8. Should You purchase a license to use Virtual Items through a third-party platform, and that purchase is processed by a third party (e.g., Apple Inc., where You have made a purchase on an iOS device), We may receive payment information that You provide to that third-party but only in order to allow us to provide You with the license to use Virtual Items. Any purchases which You make through a third party in this manner may be subject to their policies, and it is Your sole responsibility to ensure Your compliance with those policies. We do not collect, nor do we have access to any of Your billing or credit information. That data is collected and stored by third-party payment service providers (for example, the platform through which You are accessing the Services).
3.9. We may collect this data through Our Services or third-party services connected with them (including Facebook and Google Analytics).
4.1. We use information held about You in some of the following ways:
4.2. Please remember that using the Services may reveal information relating to You that is publicly available on the platform that You are using to access the Services (for example, Your screen name, Your profile picture, and the content of Your communications to other users).
4.3. We are not responsible for the activities of other users or other third parties to whom You choose to provide Your personal information (whether via Our Services or otherwise).
4.4. If Your account is closed, we are obliged to store the Information which is saved in our database for a period of time to allow us to comply with applicable laws. Please note that it is not possible to delete Your Information prior to the expiry of applicable statutory retention periods for us to comply with our legal obligations.
4.5. We may disclose Your Information, and the contents of all Your online communications, if required to do so by law or if We believe in good faith that such action is necessary to: (i) comply with any applicable laws or regulations or any legal process served on Us, the Services or in circumstances where We are under a substantially similar legal obligation; (ii) protect and defend Our rights or property; (iii) act to protect the personal safety of users of the Services or the public; or (iv) if, in Our sole determination, You are found to have cheated or attempted to defraud Us or any other user of the Services in any way, or if We suspect You of any fraudulent activity.
4.6. We may further provide Your Information to any third parties and data processors providing services to Us, including but not limited to; payment processing, data analysis, email delivery, hosting services, customer service, and to assist Us in our marketing efforts. We take all measures to ensure that Our arrangements with third-party service providers and data processors protect the privacy of Your Information and that such third parties do not use Your Information for any other purpose than to provide services to Us.
4.8. The Services support and may encourage interaction among users. Access to Your username may allow other users to view the public information associated with Your related account and to communicate with You through the related social network communication channels.
4.9. You may be offered the option of importing Your contact list or address book contacts, either automatically or manually, into the Services to enable You to (i) locate any of Your contacts who are also users of the Services; and/or (ii) invite Your contacts to become users of the Services. Should You opt to import Your contact list or address book contacts, You are authorizing Us to store Your contact details on Our databases for these purposes unless You expressly revoke this authorization. For the avoidance of doubt, any passwords which You provide to Us to facilitate this import shall not be stored by Us.
4.10. You may contact Us at email@example.com if You:
We would like to make sure You are fully aware of all of Your data protection rights. Every user is entitled to the following:
The right to access – You have the right to request Agate for copies of your personal data. We may charge you a small fee for this service.
The right to rectification – You have the right to request that Agate correct any information you believe is inaccurate. You also have the right to request Us to complete information you believe is incomplete.
The right to erasure – You have the right to request that Agate erase Your personal data, under certain condition.
The right to restrict processing – You have the right to request that Agate restrict the processing of your personal data under certain conditions.
The right to object to processing – You have the right to object to Agate processing of your personal data under certain conditions.
The right to data portability – You have the right to request that Agate transfer the data that we have collected to another organization, or directly to you, under certain conditions.
6.1. By accessing or using the Services, You authorize Us to collect certain technical information to (i) analyse usage of the Services; (ii) provide a more personalized experience; and (iii) manage to advertise. We, and our third-party service providers, may use server log files or web log files and tracking technologies to collect and analyses certain types of technical information, including but not limited to; cookies, IP addresses, device type, device identifiers, browser types, browser language, URLs, domain names, landing pages, game state, the date and time of usage of the Service, and other similar information.
7.1. The Services provided by Agate (including the game Code Atma) may only be played by a person over the age of 13.
8.1. Further technical security measures: In order to prevent illegal manipulation by third parties and to identify and prevent any form of misuse, We record the IP addresses of all computers used to access the line-up on the Services. In addition, all Your Information are protected from unauthorized access by a firewall (a computer that is fitted with complex security technology specifically designed to shield Our network from the internet). Additionally, We use reliable internal data protection mechanisms combined with a restrictive security system. However, no website or internet transmission is completely secure, and We cannot ensure that unauthorized access, hacking, data loss, or other breaches will never occur. We thus urge You to take steps to keep Your Information safe, and to log out of Your platform account after use. If Your platform account is hacked, this may lead to unauthorized use of the Services, so be careful to keep Your account information secure.
8.2. Although We strive to protect Your Information, We cannot guarantee the security of Your Information while it is being transmitted to Us; any transmission is at Your own risk. Once We have received Your Information, We will have procedures and security features in place to try to prevent unauthorized access.
9.1. You expressly agree that the Services are provided on an “as is” basis without warranties of any kind. We are not responsible for events beyond Our direct control. Because of the complex and constantly changing nature of Our technology and business, We cannot guarantee, nor do We represent, that there will be error-free performance regarding the privacy of Your Information, and We will not be liable for any indirect, incidental, consequential or punitive damages relating to the use or release of Your Information.
10.1. Your Information collected by Us may be stored and processed in any country in which We or Our affiliates, suppliers, ESPs, or agents maintain facilities. By using the Service, You expressly consent to any transfer of Information outside of Your country. Nevertheless, We take steps to ensure that Our agents, affiliates, and suppliers comply with Our standards of privacy regardless of their location.
11.1. If We should ever file for bankruptcy, become insolvent, be acquired by a third party, merge with a third party, sell all or part of Our assets, or transfer substantially all or part of Our relevant assets to a third party, We are entitled to share Your Information You have provided through the Services to potential and subsequent business and merger partners. By agreeing to the Terms of Service, You hereby give Your consent to such transfer of this Information.
12.1. We committed to continuous growth and development in providing services with the best performance, and always striving to comply with regulations, standards, relevant requirements, and established work procedures, considering internal and external issues of the organization, and the needs and expectations of stakeholders in planning, implementing, and improving the performance of the organization’s information security management system. Ensuring the implementation of information security management in every decision-making process.
12.2. In line with this commitment, Agate continuously carries out improvements and ongoing enhancements by:
12.2.1. Implementing an information security management system based on the requirements of ISO 27001:2022;
12.2.2. Complying with legal regulations and other requirements related to the implementation of the information security management system;
12.2.3. Managing risks and opportunities to enhance the performance of the information security management system;
12.2.4. Establishing harmonious relationships with stakeholders regarding the implementation of the information security management system;
12.2.5. Maintaining and communicating this information security management system policy to all employees and external parties who need it.
This Information Security Policy is evaluated annually by our Board of Directors
If you have any questions about this Policy, the data we hold on to you, or you would like to exercise one of your data protection rights, please do not hesitate to contact us at firstname.lastname@example.org
Last Edited on June 2023