Logo
Sign In

Light Up the Reels!

Slide 1

Fast Play. Big Thrills.

Slide 1

Metawin Casino's Privacy Policy

Gathering Information

When users create an account, they give their full name, address, birthdate, and contact information as personal identifiers. To follow the law and stop illegal activities, we need to verify your identity and may ask for more documents as described in our Terms of Service. To make sure the platform is safe, activity logs, device data, and transaction history are checked on a regular basis.

Use Of Information

We need user data to keep our services running smoothly, including authentication, processing payments, communication, resolving disputes, running promotional campaigns (with explicit consent), and making sure everyone plays fair. Only authorised personnel and trusted partners who are directly involved in providing the service can access it. Third-party sharing only happens with vetted service providers or when the law requires it.

Rules For Protecting Data

Multi-factor authentication tightly controls who can see user records. All payment transactions use gateways that meet PCI DSS standards. Regular audits and penetration tests help find and fix possible security holes, which is in line with ISO/IEC 27001 best practices. Users can ask our support team to review, fix, or delete their data at any time.

Keeping And Deleting

We only keep personal records for as long as we need to in order to meet our legal, regulatory, and operational duties. After this time, data is safely deleted or made anonymous, unless it needs to be kept for legal reasons related to anti-money laundering or financial reporting.

Age Limits

Only people who are 18 years old or older can take part, and their identities will be checked. Any accounts that break the rules will be suspended, and any data that goes with them will be deleted within the law.

Get In Touch

Users can contact us through the dedicated Data Support email on our Contact page if they have questions, need to fix something, or want to have their data deleted. We respond to all requests in full compliance with international rules for handling data and deadlines set by regulators.

How Personal Information Is Gathered And Used

When a user signs up, they are asked for their full name, birth date, home address, phone number, and a valid government-issued ID. These credentials are needed to make an account, prove your age, and follow the law, which includes rules against money laundering. Technical records are made when sessions are active. This includes things like the type of device, the operating system, the browser settings, the IP address, and the times when you can access it. To find trends, improve interface design, and fix problems with how things work, tracking tools keep an eye on navigation, site usage, feature access, and transaction patterns. Along with transaction amounts, timestamps, and payment processor details, financial interactions like deposits, withdrawals, and payment preferences are also recorded. This information makes it easier to manage accounts, helps find problems, and meets legal requirements for monitoring transactions. You may be able to get communication records and metadata by talking to someone directly through support channels, email, chat, or phone. Storing these logs makes it possible to give targeted help, settle disputes, and make procedures for dealing with clients better. Browsing and activity logs may be processed to make the user experience better by personalising it. This lets you get personalised suggestions, see promotional offers that match your interests, and see content in the language and format that you like best. All of this information is only used for the reasons listed in local laws, to fulfil contracts, prevent fraud, verify users, improve services, and report to regulators. We only share information with third-party service providers when we need to for payment processing, security checks, or when the law requires it.

Data Storage: Where And How Is Your Information Kept Safe?

Your information is stored on servers that are spread out across different places with strong data protection laws. Servers are physically safe because they are watched all the time, have biometric access controls, and only authorised technical staff can get in. TLS 1.3 encryption protects all data sent between your device and the platform from being intercepted by people who shouldn't have access to it. Once received, sensitive information like payment information and authentication details are encrypted at rest using AES-256 protocols. This makes them impossible to read even if someone gets access to them without permission. Every hour, backups are made and stored in different places around the world. We choose backup locations that are very resistant to disasters, like fires, floods, and earthquakes. Each snapshot of data is encrypted on its own, and access is logged so that no one can change or tamper with it. Protected by advanced intrusion detection systems that let trained staff know about any strange behaviour. All administrative access needs to use multi-factor authentication. Accredited outside companies do regular security audits every three months to make sure that the latest standards are being followed. No personal information is ever saved on employee laptops or other portable devices, which lowers the risk at the end of the queue. We will only share your records with third parties if the law requires it, like for anti-money laundering checks or government subpoenas. We keep data retention times as short as possible, and we delete inactive accounts every so often to stay in line with international standards. If you want to look over, change, or ask for the removal of your stored data, you can ask for help from dedicated support staff. Before any changes are made, they will go through strict identity verification procedures.

User Consent And Control Over Their Own Data

The right to give clear permission for data collection, processing, and storage is at the heart of user autonomy. Users are clearly asked for their consent before any non-essential information is collected. This request includes the types of data being collected, how it will be used, and the option to opt in or out. When you sign up, in settings, and whenever updates are made to internal practices or external partners, you can see clear, detailed choices. Control comes with strong tools that you can get to from your account dashboard. Users can look over the information they sent in, change their contact information, and take back permission for certain uses of their data, like analytics or targeted promotions. Withdrawal mechanisms work right away, stopping all related processing activities right away unless legal rules say otherwise. Clear consent scopes are given for sharing information with third parties like affiliates or payment processors. If a user limits sharing, the system makes sure that no data goes to anyone other than the core service providers needed for transactions and legal compliance. Consent logs keep track of agreements, updates, and withdrawals, leaving a clear trail for audits and settling disputes. A secure portal makes it easy to request access to data. Users can download an export of their profile, transaction records, and interaction logs within the time limits set by regional laws. Users can also ask for their data to be erased or made anonymous, but there are some exceptions based on legal or contractual obligations. We respond to all requests within 48 hours and complete them by the deadlines set by law. Every time a user makes a change to their profile—adding or removing something, giving new permissions, etc.—they get an email confirming the change. This shows that each user can control their digital footprint. Before any major change, identity verification procedures are in place to stop unauthorised changes. There are guides and support staff who can help you understand each consent setting in plain language.

What Information Is Shared With Third Parties And Why?

Certain personal information may be shared with certain partners to help with required tasks, follow the law, and provide core services. The type and purpose of shared information are limited, and they always follow the rules for protecting data that are in place. Here's a full breakdown:

Data about the recipient Keeping a Shared Purpose
Processors of payments
Full name, payment information, and transaction history
Allow transactions, check sources, and stop fraud
Until the service is finished; subject to financial rules
Companies that verify identities
Personal information, official papers, and the address of your home
Follow KYC, age verification, and AML rules
Only when necessary for initial verification or legal requests
Regulatory agencies
User profile, account activity, and financial records
Meet licensing requirements and make audits easier
As required by law
Companies that offer technical support
User ID, information about the device, and logs of activity
Fixing problems and making the system run better
For now, until technical problems are fixed
Partners in marketing
Email address and data on how the site is used (with permission)
Give out promotions, get people more involved
Until consent is taken back

Data categories are never shared with people or groups that don't have permission. Collaboration agreements make sure that privacy and security rules are followed, which is checked through due diligence and regular audits. Any proposed sharing that goes beyond the scenarios listed requires clear user consent and can always be undone. Users can change their consent preferences at any time through their account settings or support channels for more control.

How Metawin Casino Keeps Your Data Safe

  1. Encryption Rules: 256-bit SSL encryption is used for all sensitive information sent between user devices and the platform. This standard makes it very hard for someone who isn't supposed to see financial transactions, registration information, or login credentials to do so.
  2. Multi-Factor Authentication: To get into personal accounts, you need more than just a password. You might need a code sent via SMS or an authentication app. This lowers the chance of unauthorised access, even if login information is stolen.
  3. Regular Security Audits: Certified third-party experts check for weaknesses and try to break into the system on a regular basis. Any weaknesses that are found are fixed right away, which lowers the risk of them being used.
  4. Access Controls: Only trained and authorised people can see user information. Strict role-based permissions make sure that workers can only see the information they need to do their jobs.
  5. Firewall and Protection Against Intrusions: Modern firewalls and intrusion detection systems keep an eye on the network and stop people from getting in without permission or acting suspiciously.
  6. Data Minimisation Practices: We only keep the information we need to run our accounts and follow the rules. We strictly follow retention periods, and we delete or anonymise data that is no longer needed.
  7. Plan for Responding to Incidents: If there is a data breach, a special team follows a set plan: they contain the breach right away, investigate it thoroughly, communicate openly with affected users, and work with regulators when necessary.
  8. Suggestions for Users: For the best security, users should make strong, unique passwords, change their credentials often, not share their login information, and turn on multi-factor authentication.

Your Rights To Access And Delete Information

You have clear rights under data protection laws about the data we collect when you use our entertainment platform. You can ask for a summary of all the information stored about your profile, such as your registration details, account activity logs, payment records, and documents you sent in to prove your identity. You can get your data back by sending a signed request through your account dashboard or by getting in touch with our support team through official channels. You will get all the information you need within the time limit set by the law, which is usually 30 days. If more proof is needed to confirm your identity, quick instructions will be given to keep your information private. You also have the right to delete data. If you ask for data to be deleted, operational systems will get rid of data that isn't needed. But anti-money laundering rules, tax laws, or protections against transaction disputes may require keeping certain information. You will get a list of things that can't be deleted, along with the exact reason for keeping them and how long they are expected to last. You can also fix old or wrong information on your profile. You can make changes directly in your private account area, or you can submit a secure ticket to ask our experts to make the changes for you. Please be aware that some features may not work properly when you use any of these rights. For example, asking for the deletion of important data could mean losing access or being unable to process pending withdrawals. We will always let you know in advance what will happen with each request. If you have any questions about how to use your data rights or need more information about regulatory retention, our dedicated team is available through a number of support options. Your account settings and help centre always show you all the information you need about procedures, documentation requirements, and how to get in touch with us.

How To Deal With Privacy Concerns And Contact Support

If you have questions or concerns about how your personal data is being handled, you can get help quickly through dedicated support channels. A special data protection team on our platform looks at all questions about user privacy and information security.

Help Directly:

You can get in touch with the data support desk by filling out the contact form on your account dashboard. Most questions get answers in less than 24 hours.

Email Communication:

If you need to send a long explanation or document, please use the compliance email address on our Contact page. For quick and accurate processing, please include your user ID and a clear description of your concern.

Raising Sensitive Issues:

If you think your rights about stored information have been broken, put "Data Rights Concern" in the subject line. This tells our data coordinator to look at your request right away. You can also ask the compliance team to call you back through your account interface to keep things honest and trustworthy. Set up a time that works for you within the given time slots, and a member of the authorised team will call you to talk about your question. Responses that have to do with technical issues, like log files or changes to permissions, are kept safe in your account through secure messaging. This keeps sensitive information from ever leaving the safe server space. You can see and download your support history from the "My Requests" section after you log in if you need a record of your conversations with the support desk or want to keep an eye on the progress of an ongoing investigation. Users in some jurisdictions have the right to take their case to the data protection supervisory authority if it has not been resolved. You can get full contact information for these independent agencies if you ask. All conversations about how your data is handled are private and can be checked by an internal audit to make sure that the company always follows the law and other rules.

Bonus

for first deposit

1000AUD + 250 FS

Switch Language

United Kingdom Australia Canada German Spanish French Dutch Italian Portuguese Polish