Information We Collect
When you use our games, we may collect the following types of information:
- Device information: We may collect information about the device you use to access our games, such as the device type, operating system, and device settings.
- Gameplay information: We may collect information about your gameplay, including game progress, achievements, and other game-related data.
- Personal information: We may collect personal information such as your name, email address, and payment information if you make a purchase.
- Geolocation information: We may collect information about your location to provide you with localized game content, features, or services.
How We Use Your Information
We use the information we collect to provide and improve our games and services. We may also use your information to:
- Respond to your requests and inquiries.
- Personalize your gaming experience.
- Analyze usage and performance data.
- Send you updates and promotional messages about our games and services.
- Process payments and complete transactions.
- Comply with legal requirements.
- Prevent fraud and protect the security of our games and services.
We do not sell or rent your personal information to third parties. However, we may share your information with third-party service providers who help us provide our games and services, such as analytics and advertising partners. We ensure that these providers use your information only for the intended purposes and maintain the confidentiality and security of your information.
We may also share your information when required by law or to protect our rights, such as in response to a court order or subpoena or to prevent fraud or illegal activities.
Our games may contain links to third-party websites or services. We are not responsible for the privacy practices of these third-party websites or services, and we encourage you to review their privacy policies before using them.
We take reasonable measures to protect the information we collect from loss, theft, and unauthorized access, disclosure, alteration, and destruction. We use encryption, firewalls, and other security technologies to protect your information, and we restrict access to your information to only those employees, contractors, and agents who need access to perform their job functions.
Changes to this Policy