Privacy Policy — Neves Crypto License
Home Legal & Disclosures Privacy Policy

Privacy Policy

This Privacy Policy explains, at a practical level, how information submitted through the site may be collected, used, retained, and disclosed in connection with site operations, enquiry handling, security, and administrative functions. The core principle is simple: collect what is reasonably needed, use it for the stated purpose, and do not get weird with it.

Contact-form data Operational use only Reasonable retention No unnecessary data hoarding

Quick navigation

Because even privacy pages deserve decent structure instead of turning into a long legal hallway with no doors.

Information collected

User-supplied information
Mostly the things users type into forms or otherwise knowingly provide.

The site may collect information that users voluntarily provide through contact forms, enquiry forms, or similar communication channels. This can include a user’s name, entity or company name, email address, enquiry type, subject matter details, and any message content the user chooses to submit.

Users should avoid sending sensitive, excessive, or unnecessary personal information through general site forms unless specifically requested for a legitimate operational reason. Dumping random private material into a general enquiry form is not a smart workflow.

Typical submitted fields
The normal, boring, legitimate stuff.
  • Name
  • Business or entity name
  • Email address
  • Enquiry category
  • Free-text message content
Technical or operational information
The invisible background layer sites usually need to stay functional and not get bullied by the internet.

The site may also collect limited technical or operational information relevant to security, performance, diagnostics, analytics, abuse prevention, or core site delivery. Depending on implementation, this can include log information, device or browser details, approximate usage metadata, and cookie-related data where such technologies are in use.

How information may be used

Primary use purposes
The actually defensible reasons.
  • Routing and responding to enquiries or messages
  • Administering site functions and support workflows
  • Maintaining records of communications
  • Protecting site security and preventing abuse
  • Improving site performance, navigation, or user experience
No nonsense use limitation
Meaning: do not collect a form just to invent new purposes later.

Information should be used only to the extent reasonably connected to the site’s stated functions, administrative handling, security, analytics, or legitimate operational needs. The existence of data is not a free pass to repurpose it for unrelated nonsense.

Illustrative use map
Because privacy gets a lot easier to understand when the purpose is shown cleanly.
Information type
Typical source
Typical use
Notes
Contact details
User-submitted enquiry form
Response handling, routing, recordkeeping
Should be limited to stated communication purposes
Message content
User-submitted free text
Understanding and responding to the request
Users should avoid unnecessary sensitive content
Technical data
Site usage or system logs
Security, diagnostics, analytics, performance
Depends on implementation choices
Cookie-related data
Browser/session technologies
Preferences, site function, analytics where used
Read with the Cookies Policy

Retention approach

Reasonable retention principle
Keep what is needed. Not forever. Not for vibes.

Information should be retained only for as long as reasonably necessary for the purpose for which it was collected, for related recordkeeping, for site security, for administrative follow-up, or to satisfy applicable legal, audit, or dispute-management needs where relevant.

Retention periods should be based on function, not laziness. If a piece of data no longer serves a legitimate purpose, keeping it indefinitely just because storage exists is not exactly elite privacy behavior.

Retention logic should consider
The adult factors.
  • Operational necessity
  • Communication history
  • Security review needs
  • Legal or audit obligations
  • Dispute or misuse handling

When information may be disclosed

Operational or service disclosures
The normal backend stuff, not a random data field trip.

Information may be shared with service providers, technical support providers, hosting providers, communications handlers, analytics providers, or comparable operational partners to the extent reasonably necessary to operate, secure, maintain, or improve the site and its support functions.

Legal, security, or protection disclosures
The serious-not-fun category.

Information may also be disclosed where reasonably necessary to comply with legal obligations, respond to lawful requests, protect site integrity, investigate abuse or fraud, defend rights or claims, or address security incidents affecting the site or its users.

Disclosure boundary
Just because disclosure is possible does not mean it should become a hobby.

Disclosures should remain limited to legitimate operational, legal, security, or administrative reasons. Information should not be sprayed around because a workflow is lazy, unclear, or under-designed. Privacy discipline still counts when systems are inconvenient.

Security & handling

Security principle
Protect information like it matters, because awkwardly enough, it does.

Reasonable technical and organizational measures should be used to protect information against unauthorized access, misuse, accidental loss, disclosure, or compromise, taking into account the site’s nature, function, and actual implementation environment.

Reality clause
Important because the internet remains a weird place.

No site, system, or transmission environment can be guaranteed to be perfectly secure. That is not defeatism. That is literally how technology works. Users should therefore avoid transmitting unnecessary sensitive material through general site channels.

User contact & privacy requests

Privacy-related enquiries
This is where users ask the privacy questions instead of angrily guessing the answers.

Users who have privacy-related questions, concerns, or requests regarding information submitted through the site may use the relevant contact channel provided on the Contact page. Requests should be specific enough to identify the communication, form use, or issue being raised.

Where applicable and reasonably appropriate in light of the site setup, requests may concern access, correction, deletion, or other data-handling clarifications. The exact handling of such requests should always reflect the real site implementation, recordkeeping needs, and any legal or operational obligations that apply.

Good request hygiene
Please, for the love of clarity.
  • State what form or communication is involved
  • State what action or clarification is requested
  • Use the same contact identity where possible
  • Avoid vague “delete everything” drama with no context

Implementation note

This Privacy Policy page should always be aligned to the actual forms, cookies setup, analytics tools, hosting environment, and data workflow used in production. Privacy pages should describe reality, not optimistic fan fiction about the backend.

Next: Terms of Use

The next standalone legal page should be the Terms of Use page so the footer terms link lands on a proper dedicated page instead of making users detour through the general legal stack.

Previous page Next page