Privacy Policy
Introduction
Effective date: March 30, 2026. This privacy policy explains our data practices for immortalromance-slot.nz. We run an independent project with no gambling services. Our four-person remote team of data hobbyists operates from the South Island. We focus on analytical work with raw spin outcomes. No visual demos or player tools. Visitors find data breakdowns here. This policy covers data from site visits. It applies to anyone accessing our pages. We keep things simple. Read on for details about collection, use and protection. Our email for questions sits at [email protected]. Our analysis of Immortal romance spins forms the core of this site.
Site traffic stays low. We track basics to improve content. No accounts mean no personal profiles. Data comes from standard web tools. New Zealand law shapes our approach under the Privacy Act 2020. We update this policy as needed. Check back for changes. Last review happened before launch.
Types of Information Collected
Server logs capture IP addresses, browser types and visit times. These help diagnose issues. No names or emails required for reading. Contact form submissions collect messages and sender emails if provided. Analytics tools note page views and referral sources. Cookies store session data. No financial info ever enters our systems. Location data pulls from IP only at country level. Device info includes screen size for layout tests. We avoid unique identifiers.
User-initiated data arrives via feedback emails. Hobbyists log spin results shared voluntarily. Public datasets feed our models. Aggregated stats appear on pages. Individual entries stay private. Collection stops at what's necessary for analysis. No health or sensitive categories.
How We Collect Information
Browsers send headers on each request. Google Analytics tracks anonymized visits with consent banners. Contact forms use server-side processing. Email links trigger standard clients. Third-party embeds for stats load with opt-in. Manual uploads from team members build datasets. Scraping skips personal sites. APIs pull public slot data where available.
Sessions expire quickly. Persistent storage limits to essentials. Users control cookie settings via browser. Our scripts respect Do Not Track signals. Collection happens passively mostly. Active inputs need form fills. Timestamps mark all entries for audits.
Purposes for Data Use
Logs aid server maintenance. Analytics spot popular sections. Feedback shapes future posts. Aggregated spins test variance models. Team shares notes internally via email. No marketing lists build. Content loads faster with cached views. Error reports fix bugs. IP blocks handle abuse. Stats validate hobby calculations.
Research drives spin outcome tables. Patterns emerge from thousands of logs. No predictions sell. Pure info sharing. Bandwidth limits prevent overload. User agents guide mobile tweaks. Referrers show traffic sources. All ties back to better data presentation. Minimal use keeps trust high.
Sharing and Disclosure
No sales of data occur. Team members access logs for work. Hosting provider sees server traffic. Analytics services process aggregates. Legal requests get narrow responses. No ad networks involved. Public posts use no personal info. Collaborators sign NDAs if needed. Email providers store messages temporarily.
Backups go to secure drives. No international shares beyond NZ hosts. Aggregates appear in articles. Raw logs stay internal. Third parties commit to our standards. Breaches trigger notifications. Transparency rules disclosures. No brokers or trackers.
Data Retention Periods
Logs delete after 90 days. Feedback emails archive for one year. Analytics data anonymizes at 14 months. Spin datasets keep indefinitely for research. Cookies clear on expiry. Contact records purge post-resolution. Audit trails last two years. Storage matches purpose needs.
Deletion runs automated. User requests speed removal. Backups follow same cycles. No indefinite holds. Volumes stay small from low traffic. Compliance checks yearly. Old hardware wipes secure. Retention balances utility and privacy.
Security Measures
HTTPS encrypts all traffic. Firewalls block suspicious IPs. Passwords hash with salts. Access logs team actions. Two-factor on accounts. Backups encrypt offsite. Software patches monthly. Vulnerability scans weekly. No public databases. Physical drives lock away.
Training covers phishing. Incident plans test quarterly. Minimal data principle applies. Audits review practices. No legacy systems run. Secure delete tools erase files. Partners vet for risks. Breaches report within 72 hours to authorities.
Your Privacy Rights
Access your data on request. Correction if inaccurate. Deletion where possible. Objection to processing. Withdrawal of consent. Portability for emails. NZ Privacy Commissioner oversees complaints. Email us at [email protected] to exercise rights. Response within 30 days.
No automated decisions affect you. Profiling skips individuals. Rights apply to identifiable info. Aggregates fall outside. Appeals process exists. Free service unless abuse. Identity verifies simply. Limits match legal bounds. Team handles manually.
