Privacy Guardrails
Explore Checkmate's privacy protection measures for online chess. Learn how we safeguard player data while ensuring fair play in tournaments.
Checkmate.live's approach to handling biometric data from the KYC process and managing integrity scores ensures that sensitive information is protected, while maintaining a secure and fair environment for all our users. This method is a crucial part of our commitment to upholding the highest standards of integrity and privacy on our platform.
Hashing Biometric Data for Privacy:
At Checkmate.live, when you submit your biometric data during the KYC process, we use a technique called hashing to ensure privacy. This process transforms the original biometric information into a unique string of characters.
By storing only the hashed version of the data, we ensure that the actual biometric information is not kept in its original form. This method significantly enhances the security of sensitive biometric data, protecting it even in the unlikley event of a data breach.
Handling Proof of Identity Data:
We do not store the proof of identity data provided by the KYC provider. Our system is designed to authenticate the information without retaining sensitive documents or detailed personal data. Once the verification process is complete, the actual documents or detailed data are not kept on our servers, reinforcing user privacy.
Integrity Score Management:
Integrity scores of users are managed securely and updated in real-time to reflect the latest information regarding a uplayers's conduct and adherence to fair play standards. This dynamic approach ensures that the integrity scores are always current and accurate.
We employ robust security measures to ensure that these scores are securely stored and protected, maintaining the integrity and fairness of our gaming environment.
Benefits of Our Approach:
This method offers a balance between user privacy and the need for a secure, fair, and enjoyable gaming experience.
It allows us to uphold the integrity of our platform efficiently while ensuring that sensitive information is handled with the utmost care.
Last updated