Logo
Sign In

Swipe Right for Fortune.

Slide 1

Game On. Stress Gone.

Slide 1

Viking Bingo Casino Privacy Policy Protects Your Data And Lets You Play Online Games Safely

We take the safety of your personal information very seriously. We use SSL encryption with a 256-bit key to protect your personal and financial information during registration, deposits, and withdrawals. Our verification procedures are based on Know Your Customer (KYC) practices and require proof of payment method, government-issued photo ID, and proof of address. According to the General Data Protection Regulation (GDPR), user data is only processed on servers located in the European Economic Area. If you want to see the information we have on you or change or delete it, you can contact us directly through our official support channels. Cookies are used to improve the experience of each session and make better use of resources. You can still change these settings in your browser, which could change how the site works and what personalised offers you see. Regulatory authorities require that transaction logs be kept safe for five years. We never give third-party advertisers or businesses that aren't connected to us any information about our users. Minors are not allowed to create or use accounts, and identity checks are done when the account is created and throughout its life. People who are 18 or older can only do business with money, as long as they follow the rules of their local government. All users are clearly told when data changes, which gives you the chance to review, accept, or contest the changes. If you have questions or formal complaints about how we use your data, please email or chat with our dedicated data handling officer on the website.

How Personal Information Is Collected And Used

When you sign up, you need to give your full name, birth date, government-issued ID, and home address. Checks are done on this data to make sure it meets age and identity requirements. This keeps people who are too young from getting in and stops fraud. We keep your contact information, like your email address and phone number, so we can send you account notifications, reset your password, and confirm your transactions. To improve the quality of responses and settle disagreements, communication history, such as live chat transcripts and support emails, is kept. To make deposits and withdrawals, payment records are processed. These include the chosen method of payment, the billing address, and transaction logs. This information is also used to keep an eye on suspicious financial activity, which is required by anti-money laundering laws. The time you logged in, the type of device you used, the browser data, and your IP address are all automatically logged. These details make the platform more secure, help with troubleshooting, and keep people from getting in without permission. We look at session data more closely to customise experiences on the platform, such as personalised bonuses and game suggestions. Data collected from surveys or promotional campaigns is used for direct marketing. People can choose how they want to receive marketing messages, and they can also turn off notifications if they don't want to receive them. We follow all regional laws, like the General Data Protection Regulation (GDPR) or the UK Gambling Commission standards, when we handle all of the information we collect. Regular audits and encryption protocols keep sensitive information safe from breaches, making sure that user data is handled correctly.

Encryption Protocols And Other Data Protection Measures To Stop Unauthorised Access:

  • TLS 1.2 or higher is used to handle all sensitive information, such as user names and passwords and payment information;
  • AES-256 standards encrypt data while it is being sent and while it is at rest, making sure that only authorised systems can read it;

Multi-factor Authentication:

In addition to the password, each account needs to go through another step to verify its identity. This could mean one-time codes sent by SMS or tokens from an authenticator app, which greatly lowers the risk that a password will be stolen.

Role-based Access Controls:

Internal systems enforce strict segmentation. Only authorized staff with designated responsibilities may retrieve protected records, and each action is logged for audit purposes.

Firewall And Intrusion Detection:

Separate firewalls keep public infrastructure and private databases apart. Real-time threat monitoring and anomaly detection algorithms send out alerts right away when they see something strange or suspicious.

Data Minimisation And Masking:

Unneeded information is deleted on a regular basis. When full data isn't needed, masking techniques hide parts of it, like credit card numbers, to limit exposure.

Physical Security:

Data centres that store customer information use multiple layers of security, such as biometric entry points, 24/7 CCTV, and guards on the premises. These buildings follow the rules set by ISO/IEC 27001.

Secure Development Practices:

Software applications are regularly checked for security holes. Source code is reviewed and penetration testing is executed quarterly by certified third-party assessors.

Incident Response Readiness:

A dedicated team is tasked with rapid containment and resolution of any suspected breach. Protocols make sure that users are quickly informed, and follow-up actions include a full analysis of the incident and upgrades to prevent it from happening again.

User Rights To Access, Change, And Delete Data

Players can directly control the information they have stored. Upon submitting a request via the customer support portal or dedicated contact form, individuals may receive a summary of their registered details, including profile attributes, transaction logs, session histories, and communication records. To fulfil such requests and keep accounts safe, it may be necessary to verify identity through secure channels. If any provided information needs updates due to errors or changes, users can initiate a rectification request. Email addresses, home addresses, and personal identifiers are some of the most common fields that can be changed. When you change sensitive information like a government-issued ID, you may need to go through extra steps to prove who you are and provide more paperwork. People who want their records erased can make a formal request for removal. Certain data segments may not be able to be completely removed for a certain amount of time due to legal obligations, like anti-money laundering (AML) or responsible gambling requirements. However, all unnecessary parts are quickly removed, and users are clearly told what happened. To be open, all parts of the request—submission, progress status, and completion—are sent through the registered contact methods. Processing times follow local laws and will not go over the legal maximums. If a request can't be met, a full explanation with the relevant legal reasons will be given. Users are encouraged to contact the data controller through the provided platform channels to start any access, correction, or erasure process. There is help available to walk you through the process and clear up any questions you may have about how to handle and store personal information.

Third-party Data Sharing: What It Is And What It Isn't

Sharing information with outside service providers is only allowed for certain business needs, like processing payments, checking ages, stopping fraud, analysing software, and providing customer support. Only trusted partners who have followed the rules for protecting data get this information. Every contract has clear rules about keeping information private and processing it. You may give these vendors clear identifiers like your username, transaction records, and limited contact information only to fulfil their contractual obligations. Sensitive information, like your full payment information or government-issued documents, is never shared unless the law requires it or you give your clear permission. Encryption protects the transmission of information, which only happens through private, verified channels. Companies that receive information must put in place their own strong protections and follow privacy laws that apply both locally and across borders. Geographic controls are in place to stop illegal international transfers and make sure that only authorised jurisdictions can share data. Unless you specifically agreed to let marketing partners reach out to you directly when you set up your account or updated your profile, they won't be able to see your data. You can take this permission back at any time by changing your notification settings in your user dashboard. If required by legally binding requests, such as court orders or specific regulatory enquiries, your data may be shared with government agencies or authorised law enforcement. In all cases, only the minimum amount of data needed is given, and users are told about it unless the law says they can't. Users who want to know more about which service providers have received their data or who want specific information about disclosures can send a formal request through the contact form in the account section.

How Long Data Is Kept And How To Close An Account

We only keep personal information and account records for as long as we need to for legal, contractual, and operational reasons. Financial rules, anti-money laundering laws, and system security protocols set specific retention periods.

Retention Timelines:

As required by governing bodies, player identification data, transaction records, and communication logs must be kept for at least five (5) years after the account becomes inactive.

Archiving Process:

After the required time has passed, all personal information is stored in secure, limited archives before being permanently deleted. This is done to make sure that ongoing investigations or regulatory audits can still find the information.

How To End Your Account:

  1. You can ask to close an account through the account settings or the support channels; Once identity is confirmed and all obligations are met, the account status changes to "Closed," and data retention rules are put in place.

Irreversible Erasure:

After the legal retention period ends, all remaining information is securely deleted from active databases and backup systems. Certified wiping methods are used to make sure that the information cannot be recovered by anyone else.

Exceptions:

Data related to unresolved disputes, ongoing legal matters, or unfinished financial transactions will be kept until those issues are completely resolved. Users must show proof of identity in order to make quick deletion requests. There are some rules that say that some removals must be kept for a certain amount of time. For more information on individual deletion timelines or specialised data handling procedures, please contact support.

Bonus

for first deposit

1000CAD + 250 FS

Switch Language

United Kingdom Australia Canada German Spanish French Dutch Italian Portuguese Polish