Roll Bright – Play Right!

Wins Belong to the Wise!

Great Casino Privacy Policy That Explains How To Keep Players' Personal Information And Security Safe

Set up two-factor authentication right after you sign up so that you have an extra layer of security when you log in and do transactions with your $ balance. Only authorised personnel can access your private records, and access is strictly controlled by authentication protocols and audit trails. All deposits and withdrawals in $ use 256-bit SSL encryption to keep data safe while it is being sent. Storage utilizes advanced hashing and tokenization, in full compliance with Australia regulations. Customers can request account data reports or update personal details at any time via an encrypted self-service portal. All requests are processed within statutory timeframes mandated by Australia law. We only send marketing emails and notifications with your clear permission, and every message has an option to opt out. Data retention adheres to legal requirements, with full erasure on customer request upon account closure. Have questions about information safeguards or want to manage your $ balance independently? Contact support–specialists offer guidance tailored for Australian users.

How User Data Is Collected On The Platform

  • Use unique account credentials and a secure password when registering.
  • During the sign-up process, the system requests personal identification data including ID verification documents and contact details.
  • For every transaction such as deposit to $ or withdrawal, the platform records payment method, amount, and transaction timestamp to maintain financial traceability.
  • Technical information is automatically gathered upon each login and while browsing, such as IP address, device type, operating system version, browser fingerprint, and access times. These details are essential for fraud prevention and account safety.
  • Interaction logs encompass activity history, preferences, selected games, and communication with support–helpful for account management and experience customization.
  • Authentication through two-factor systems creates a record of verification methods used.
  • Should the Australian user contact customer service, chat transcripts and emails are stored to improve support processes and resolve disputes.
  • Customers’ consent is always documented when data is collected through surveys or promotions.

Types Of Personal Details Stored And Protected

Ensure all identification data provided during registration, such as full name, date of birth, and verified contact details, is accurate; discrepancies may delay onboarding or subsequent access.

Records Of Accounts And Transactions

Keep only the most important information about your account, such as your registered email address, username, and password that has been encrypted.

Payment transaction history–such as deposit to $, withdrawal requests, and balance in $–is documented strictly to satisfy Australia regulatory requirements.

Advanced cryptographic methods protect billing addresses and authorised payment instrument identifiers, like the last four digits of your preferred card.

The Device And Usage Data

System keeps track of the type of device, the browser fingerprint, and the IP address, all of which are linked to session timestamps to prevent fraud and ensure compliance.

This technical knowledge helps protect user accounts from being accessed without permission while also following the law in each area.

Personal verification documentation–such as government-issued IDs–may be temporarily stored in encrypted environments and is deleted or anonymized following successful validation, except when retention is required by law.

Directly control the visibility of optional details in your account settings.

Limit disclosure of personal information to what is necessary for transactional and compliance needs.

Encryption And Security Mechanisms Safeguarding Player Details

  • Activate multi-factor authentication (MFA) on every user account to ensure only authorized individuals can access sensitive records. This step thwarts unauthorized logins, especially when combined with biometric or device-based verification methods.
  • All transmissions between user devices and platform servers use robust TLS 1.3 with 256-bit encryption, securing registration, logins, payments, and document uploads from interception or tampering.
  • Separate databases that only certain people can access store customer profiles and transaction histories. AES-256 encryption at rest protects each record, and keys are rotated according to compliance routines.
  • Firewall barriers and intrusion prevention tools automatically block login patterns and IP addresses that look suspicious, stopping people from trying to access your network.
  • Account credentials, like passwords, are hashed with salt and repeated (bcrypt, not plain text or insecure hashing), making them unreadable if a breach happens.
  • International cybersecurity frameworks, like ISO/IEC 27001 and PCI DSS (for payment data), guide routine vulnerability scans and annual third-party penetration tests to deal with new risks.
  • To make a withdrawal or deposit to $, you need to verify your identity and the transaction is logged so that any unusual activity can be found. Fraud monitoring lets administrators know when there is unusual financial activity so they can act quickly.
  • Only authorised staff can see client records. This is protected by strict role-based controls and real-time audit trails that keep track of every data interaction.
  • Users who want more control can turn on notifications for account activity and change their privacy settings through their dashboard. This way, they will always know about any changes right away.
  • To keep your information private, you must always be careful and use strong, unique passwords and never share your login information.

Transparency In Data Usage And Third-party Sharing

Review all linked parties involved with your user profile and transaction processing.

Before submitting identification documents or payment details, check any separate third-party processors referenced in the user agreement–especially those associated with currency operations or bonus management.

Payment gateways and other service providers that have access to financial data only get the minimum amount of information they need to make withdrawals and deposits in $.

When Data Is Shared

User details are given to trusted partners solely to fulfill legal requirements (e.g., fraud prevention, KYC/AML screening, responsible gaming obligations).

Analytics providers may receive anonymized or aggregated activity metrics, which do not reveal personal identifiers.

Marketing communication is only sent if you have actively chosen consent; advertising platforms never get direct access to contact information.

How To Control Use Of Your Details

Visit the account settings to review and manage consent for sharing data with external vendors.

Email customer support to request a list of current partners who may access your records.

Exercise the right to object or restrict transfer of details under Australia regulations at any time–processing will pause until your request is reviewed.

This approach safeguards transparency, empowering users to decide the scope and context in which their personal facts are revealed to external parties.

Player Rights: Access, Edit, And Delete Personal Information

Request immediate access to your user profile by navigating to your account dashboard.

Within this section, you can download a full copy of your stored details, covering registration data, transactional history (including amounts in $), contact details, and account preferences.

Changing Account Information

To change your email address, phone number, address, or payment method, go to your control panel and choose the right options.

Multi-factor authentication keeps all changes safe.

Because of Australia law, transaction records and identity verification logs cannot be changed.

Getting Rid Of Your Data

If you want to delete your records, you need to log into your account and fill out the official support form.

Your personally linked records will be permanently deleted within 30 days of confirming your identity, except for what is required by Australia law for legal, anti-fraud, and transactional traceability.

You can take out any money that is still in $ before your account is closed.

Contact the support team for custom inquiries or to exercise any of these rights at any time.

Steps Taken To Prevent Data Breaches And Unauthorized Access

  1. Restrict access to sensitive user records by implementing multi-factor authentication (MFA) for all administrative accounts.
  2. Enforce regular password changes and require strong, unique credentials for each login.
  3. Monitor all system activity continuously with automated intrusion detection systems.
  4. Set up real-time alerts for suspicious behavior, such as multiple failed login attempts or irregular data transfer patterns.
  5. Segment internal networks to isolate confidential details from general infrastructure.
  6. Limit staff permissions strictly according to job function, following a least-privilege principle.
  7. Audit user access and make adjustments promptly upon role changes or termination.
  8. Apply server-side firewall rules and web application firewalls (WAF) to filter malicious requests before they reach core application components.
  9. Regularly update security patches for operating systems and applications; schedule vulnerability scans and penetration tests at least quarterly.
  10. Encrypt $ transaction data in transit with TLS 1.3, and safeguard stored records using AES-256 encryption.
  11. Back up critical files to secured offsite locations and test restoration processes to ensure rapid recovery after incidents.
  12. Train all employees on data handling protocols and simulate phishing scenarios monthly.
  13. Log and review administrative actions for accountability, ensuring rapid identification and response to potential breaches.

Getting In Touch With Support About Questions And Concerns About Privacy

Use the dedicated support channels below to resolve concerns about data handling, correction requests, withdrawal of consent, disclosures, or to request a summary of processed records.

Messages regarding data issues should contain supporting details, such as your user ID and registered contact email, but never share sensitive data (like passwords) in your communication.

Method Contact Details Availability
Email [email protected] 24/7
Live Chat Accessible via site footer menu Instant (average reply within 2 minutes)
Secure Form Contact Form Replies within 24 hours

All submitted requests are handled in compliance with applicable data protection laws and specific Australia regulatory requirements.

Once the account owner has been verified, updates or responses are usually sent out within the usual time frames.

Check your inbox, even the spam folder, for messages from the support team all the time.

Bonus

for first deposit

1000AUD + 250 FS

Switch Language

United Kingdom Australia Canada German Spanish French Dutch Italian Portuguese Polish