Terms and
Privacy Policies Hub
Your one-stop destination for understanding your rights and obligations regarding your use of our website and services.
Explore the following sets of terms:
Website Terms of Use
Website Privacy Policy
BINGO Demo Terms of Service and Privacy Policy
This website is maintained by ParallelChain Lab.
Website Terms of Use
Welcome to ParallelChain Lab's official website (https://parallelchain-lab.io) (the "Site"). The Website Terms of Use ("Terms") on this page, together with the Website Privacy Policy, set out the terms governing the use of the Site, which includes the subdomains of the Site. By continuing to use the Site, you acknowledge you have read, understood, and agreed to be bound by these Terms. If you disagree with any part of the Terms, you must stop using the Site immediately.
1. Definitions and Interpretations
In these Terms, unless the context otherwise requires, the following expressions have the following meanings:
  • Content” means any and all text, images, audio, video, scripts, code, software, databases, and any other form of information capable of being stored on a computer that appears on, or forms part of, the Site; and
  • We/us/our” means ParallelChain Lab Private Limited, a Singapore-registered company.
  • You” or “user” refers to you, as an individual user, and/or as an authorised representative of an organisation you represent.
2. Access to the Site
Access to the Site is granted free of charge on an "as is" and "as available" basis. We reserve the right to modify, suspend, or discontinue any aspect of the Site without notice.
3. Changes to the Site
We may alter and update the Site (or any part of it) at any time to update information on our products and services.
4. Changes to These Terms of Use
4.1 We May Alter These Terms at Any Time
Your use of the Site constitutes your acceptance of these Terms. Consequently, any changes made to these Terms will apply to your use of the Site the first time you use it after the changes have been implemented. You are therefore advised to check this page regularly for any updates.
4.2 Conflict Between Versions of These Terms
Should any conflict arise between current and previous versions of these Terms, the most recent version takes precedence unless we explicitly state otherwise.
5. Intellectual Property Rights
5.1 Content Ownership
All Content included on the Site and the copyright and other intellectual property rights in that Content are owned by or licensed to us, unless specifically labelled otherwise.
5.2. Usage Permission
You may access, view, and use the Site in a web browser (including any web browsing capability built into other types of software or app) and you may download the Site (or any part of it) for caching (this usually occurs automatically).
5.3. Modification Permission
You may not modify the printed copies or downloaded extracts in any way. Images, video, audio, or any other Content downloaded from the Site must not be used separately from accompanying text.
5.4. Ownership Status
Our status as the owner and author of the Content on the Site (or that of identified licensors, as applicable) must always be acknowledged.
5.5. Commercial Usage
You may not use any Content from the Site for commercial purposes without first obtaining a written approval or official licence from us (or our licensors, as applicable). This clause is intended to prevent the unauthorised commercial exploitation of our Content. However, this does not preclude the normal access, viewing, and use of the Site for general information purposes by business users or consumers.
7. Third-Party Sites
7.1 Reliance on Information Posted
The Site may include links to third-party sites which are not under our control. We bear no responsibility for the content or accuracy of these external sites.
7.2 Links from the Website
The inclusion of a link to another website on the Site is for information purposes only and does not imply any endorsement of that website or of its owners, operators, or any other parties involved with it.
8. Disclaimers
8.1 Reliance on Information Posted
The Content on the Site is offered for general informational purposes and should not be construed as professional advice.
8.2 Content Contemporaneity
We make reasonable efforts to ensure that the Content on the Site is complete, accurate, and up to date, but we make no warranties, representations, or guarantees (express or implied) that this will always be the case.
8.3 Disclaimer of Warranties
If you are a business user, We exclude all implied representations, warranties, conditions, and other terms that may apply to the Site and Content.
9. Limitation of Liability
9.1 Unrestricted Liability
Nothing in these Terms excludes or restricts our liability for fraud or fraudulent misrepresentation, for death or personal injury resulting from negligence, or for any other forms of liability which cannot be lawfully excluded or restricted.
9.2 No Liability for Business Users
If you are a business user (i.e. you are using the Site in the course of business or for commercial purposes), to the fullest extent permissible by law, we accept no liability for any loss or damage, whether foreseeable or otherwise, in contract, tort (including negligence), for breach of statutory duty, or otherwise, arising out of or in connection with the use of (or inability to use) the Site or the use of or reliance upon any Content included on the Site.
9.3 No Liability for Business Losses
If you are a business user, we accept no liability for loss of profit, sales, business, or revenue; loss of business opportunity, goodwill, or reputation; loss of anticipated savings; business interruption; or for any indirect or consequential loss or damage.
10. Site Security and Use
10.1 Site Security and Risk of Viruses
We exercise reasonable skill and care to ensure that the Site is secure and free from viruses and malware; however, we do not guarantee that this is the case.
10.2 User Responsibility for Security
You are responsible for protecting your hardware, software, data, and other material from viruses, malware, and other internet security risks.
10.3 Prohibition of Malware Distribution
You must not deliberately introduce viruses or other malware, or any other material which is malicious or technologically harmful either to or via the Site.
10.4 Unauthorised Access Restriction
You must not attempt to gain unauthorised access to any part of the Site, the server on which the Site is stored, or any other server, computer, or database connected to the Site.
10.5 Denial of Service Attacks Prohibition
You must not attack the Site by means of a denial of service attack, a distributed denial of service attack, or by any other means.
10.6 Legal Consequences of Causing Security Breaches
By breaching the provisions of Parts 10.3 to 10.5, you may be committing a criminal offence under the relevant regulations. Any and all such breaches will be reported to the relevant law enforcement authorities and we will cooperate fully with those authorities by disclosing your identity to them. Your right to use the Site will cease immediately in the event of such a breach.
11. Acceptable Use
11.1 Lawful Use
You may only use the Site in a lawful manner:
  1. You must ensure that you comply fully with any and all local, national, or international laws and regulations that apply;
  2. You must not use the Site in any way, or for any purpose, that is unlawful or fraudulent; and;
  3. You must not use the Site to knowingly send, upload, or in any other way transmit data that contains any form of virus or other malware or any other code designed to adversely affect computer hardware, software, or data of any kind.
11.2 Breach Consequences
If you fail to comply with the provisions of this Part 11, you will be in breach of these Terms. We may take one or more of the following actions in response:
  1. Suspend or terminate your right to use the Site;
  2. Issue you with a written warning;
  3. Take legal proceedings against you for reimbursement of any and all relevant costs on an indemnity basis resulting from your breach;
  4. Take further legal action against you, as appropriate;
  5. Disclose such information to law enforcement authorities as required or as we deem reasonably necessary; and/or
  6. Any other actions which we deem reasonably appropriate (and lawful).
11.3 Liability Exclusion
We hereby exclude any and all liability arising out of any actions that we may take (including, but not limited to those set out above in Part 11.2) in response to your breach.
12. How We Use Your Personal Information
We will only use your personal information as set out in our Privacy Policy.
13. Rules of Communication and Interaction With the Site
Since the Site enables the possibility to submit requests to us, or interact with us by other means, you should comply with the following rules. Failure to comply with these rules may result in you being blacklisted by us and barred from communicating with us in the future:
  • You must not use obscene language;
  • You must not send messages that are abusive, threatening, harassing, defamatory, ageist, sexist or racist;
  • You must not send messages that are intended to promote or incite violence;
  • You must not send us 'spam';
  • You will not send messages or upload to the Site viruses, Trojan horses, worms or other computer programming routines that are intended to damage, interfere with, intercept or expropriate the Site, any system, or information;
  • You must not impersonate other people, except during participation in our product demo or testing activities where you are invited by us to try to spoof our models.
14. Law and Jurisdiction
These Terms, and the relationship between you and us (whether contractual or otherwise) shall be governed by, and construed in accordance with the laws of Singapore.
Website Privacy Policy
Welcome to ParallelChain Lab's official website (https://parallelchain-lab.io) (the "Site"). The Site has two sets of Privacy Policy. One applies to general visitors to the Site as detailed in Section 1; the other one applies to individuals interacting with ParallelChain Lab's identity verification solutions, including “Bingo by ParallelChain”, that are hosted under the Site, (the "Services") as detailed in Section 2, collectively, “Privacy Policy”.
The Privacy Policy details how we collect, use, disclose, and safeguard your information when you visit the Site, use our applications, products, or Services, or interact with us in any other manner.
1. Definitions and Interpretations
In Privacy Policy, unless the context otherwise requires, the following expressions have the following meanings:
  • We/us/our” means ParallelChain Lab Private Limited, a Singapore-registered company.
  • You” or “user” refers to you, as an individual user, and/or as an authorised representative of an organisation you represent.
  • Client(s)” refers to the legal entity to which ParallelChain Lab provides Services, “Subject(s)” refers to any entity in respect of whom the identity verification procedure (or any of its elements) is performed as part of the Services provided to a Client; collectively, “User(s)”.
  • Visitor(s)” refers to anyone who visits, views, and uses the Site.
  • Personal Data” includes any data or combination thereof provided by you or gathered through your engagement with our Services, identifying you as an individual or representing an organisation.
2. Acceptance of Privacy Policy
Please read this Privacy Policy carefully and ensure that you understand it. Your continued use of the Site and Services is deemed as acceptance of this Privacy Policy. If you disagree with any part of this Privacy Policy, please discontinue use of the Site and Services immediately.
3. Scope of Privacy Policy
This Privacy Policy applies only to your use of the Site and Services. It does not extend to any websites that are linked to or from the Site (whether we provide those links or whether they are shared by other users). We have no control over how your data is collected, stored or used by third-party websites you connect to and we advise you to check the privacy policies of any such websites before providing any data to them.
4. Changes to Privacy Policy
This Privacy Policy is constantly reviewed and amended in order to provide appropriate compliance with the relevant data protection laws. We reserve the right to make amendments to Privacy Policy at any time and for any reason. Any amendments will be effective immediately upon us posting the updated Privacy Policy on the Site. Visitors of the Site waive the right to receive specific notice about such amendments. Visitors are invited to review this Privacy Policy at any time to stay informed about updates.
5. General Visitors to the Site
This Section 1 governs Visitors’ access to and use of the Site. Section 1 should not be considered an agreement which specifies contractual obligations for the provision of Services. They also do not alter in any way any other agreement one may have with ParallelChain Lab.
We collect necessary data about Visitors via cookies. Some interactions with the Site, such as filling out forms, receiving feedback for requests, or participating in testing of our technology demo, may lead to the collection of other Personal Data.
5.1 Personal Data Processing Principles That We Adhere To:
We adhere to the principles of personal data protection as envisaged in the EU GDPR and other applicable laws. In accordance with these principles, Personal Data is
  • Processed fairly and lawfully and in a transparent manner in relation to the Subjects;
  • Processed for specified, explicit, and legitimate purposes only and not further processed in a manner that is incompatible with those purposes;
  • Adequate, relevant, and limited to what is necessary in relation to the purposes for which they are processed;
  • Kept accurate and up to date;
  • Not retained longer than necessary; and
  • Processed in a manner that ensures their appropriate security.
5.2 Purposes, Types, and Retention Period of Personal Data Processing
We only process Personal Data according to the purpose limitations below.
Contact forms purposes:
  • We collect and process Personal Data in order to provide Visitors with the information requested from us using Site forms. These Personal Data will be kept for three years to enable us to re-contact in the event of unforeseen circumstances.
Marketing purposes:
  • We email subscribers if they have previously consented to it using the relevant Site forms. We may also email or otherwise notify our existing Clients of new products and functions of our Services in terms of ‘soft opt-in’, meaning that our Clients would want to stay tuned for better offers and Service benefits. These Personal Data will be kept until unsubscribing by following the respective link in the email.
Cookie processing purposes:
  • When Visitors interact with the Site in any way, we collect and process cookie files to store Visitors’ preferences and settings, enable Visitors to sign in, personalise content and advertising, combat fraud, and analyse the incoming traffic. Cookies-related data may include IP address, equipment information, and location information, etc. Cookies data will be kept for one day to one year, depending on the data types.
Event purposes:
  • We hold various online and offline events, such as webinars, workshops, and conferences for which Visitors can sign up. In such cases, we process data to enable Visitors to register for the event, receive a reminder, and provide ancillary information. Once obtained for the event, Visitors’ data is added to and managed through the contact database. Where permitted by law, a member of our team may contact Visitors if we determine through Visitors’ submissions that they may be interested in our services and other events. These Personal Data will be kept until unsubscribing by following the respective link in the email.
Recruitment purposes:
  • Once a job application is sent to us, we process the application data to evaluate the information presented by job applicants when considering their candidacy and to contact them subsequently. These Personal Data will be kept for one year.
5.3 Your Data Rights
We respect and guarantee the following rights of each Visitor. According to privacy laws, Visitors have the right:
  • to obtain confirmation as to whether or not their Personal Data are being processed;
  • to rectify Personal Data;
  • to erase Personal Data, or “right to be forgotten”. Please note that this right is not absolute and applies only if (i) the Visitor’s Personal Data is no longer necessary in relation to the purposes for which was collected or otherwise processed, (ii) the Visitor objects to the processing, and there are no overriding legitimate grounds for us to process data; (iii) the Personal Data have been unlawfully processed;
  • to restrict Personal Data processing where (i) the accuracy of the Personal Data is contested (during the period when we are able to verify its accuracy); (ii) the processing is unlawful, and the Visitor objects to the erasure of the Personal Data and request to restrict their use instead; (iii) the Client no longer needs the Personal Data for the purposes of the processing, but they are required by the Visitor to establish, exercise or defend legal claims; (iv) the Visitor has objected to processing pending the verification whether Client’s legitimate grounds override those of the Visitor’s;
  • to be informed as to rectification or erasure of Personal Data or restriction of their processing;
  • to receive the Visitor’s Personal Data in an appropriate format to be able to provide it to another party or transfer the Visitor’s Personal Data from one controller to another;
  • to object to Personal Data processing if the processing is justified by the ‘public interest’ or ‘legitimate interest’ legal grounds;
  • to lodge a complaint with the supervisory authority.
To request that we execute the rights mentioned above, Visitors should send an email to info@parallelchain.io Information on actions taken regarding any request is provided within one month. That period may be extended by two months where necessary, considering the complexity and number of requests. Such extension will be informed within one month of receipt of the request and the reasons for the delay.
Please be aware that when Visitors ask us for the execution of the rights as stated above, we may have to take steps to verify that the Visitor is the legitimate data owner and/or authorised to make the request due to our own legal obligation.
Making a request for receiving Personal Data is free unless a reasonable cost is to be charged where requests are unfounded, excessive, or repetitive in character.
Request to delete all or any Personal Data related to the Visitor is fulfilled within one month.
5.4 Responsibilities
We are responsible for establishing policies and procedures in order to comply with the GDPR and other applicable laws and regulations. Our Data Protection Officer (DPO) can be contacted via info@parallelchain.io
5.5 Personal Data Breaches
Where a data breach occurs or is suspected, it should be reported immediately to the DPO. The report includes full and accurate details of the incident (including its reasons and magnitude) and outlines the planned measures to eliminate the breach.
5.6 Data Disclosure
We may use third parties for data processing activities, which include third-party processors as reasonably necessary for operating the Site and achieving other purposes provided in this Privacy Policy; and ParallelChain Lab group of companies for assistance in service delivery.
We require third parties to respect the security of Personal Data and treat it according to the applicable law. In addition, third parties are mostly limited to only accessing or using Personal Data to provide services to us and must provide reasonable assurances they will appropriately safeguard the data in line with this Privacy Policy. Sometimes, certain third-party sub-processors engage particular data providers who can maintain and use the data for their own legitimate purposes.
Where it is required by law, we may have to provide Personal Data to the recipients, which includes Governmental bodies and regulatory authorities, judicial bodies, investigation bodies, sworn bailiffs, and notaries based on written and concrete requests or the duties binding upon us.
5.7 International Data Transfers
All Personal data is stored on our servers located in Singapore and/or subject to any national localisation requirements in the respective countries, where such requirements exist.
Where it is necessary for the purposes of processing, achieving or ensuring convenient and reliable communication with the Visitors, we may transfer Personal Data outside of Singapore to the third parties and recipients indicated above in this Privacy Policy.
We collect data globally and store that data in Singapore. We may transfer, process, and store your information outside your country of residence where we or our service providers operate for the purpose of providing our products and services to you.
5.8 Sale of Personal Data
We do not sell Personal Data and strictly comply with applicable restrictions and prohibitions.
5.9 Policy on Children
The Site is not directed to individuals under 18. We do not knowingly collect personal information and business information from Visitors under 18. If we become aware that a Visitor under 18 has provided us with Personal Data, we will take steps to erase such Personal Data immediately. Contact us if you believe that we have mistakenly or unintentionally collected information from a Visitor under 18.
6. Users of Identity Verification Services
To provide the Services, we process personal data. This Section 2 outlines how we process, manage, and protect Personal data while providing the Services.
Clients are controllers that determine the purposes of data processing and exercise control over Subjects’ Personal Data. ParallelChain Lab, in turn, is a processor that conducts only those data processing activities that Clients request. We perform remote identity verification procedures for Clients as part of Services provision. Before passing such procedures, Subjects should be properly notified by Clients in line with their privacy policies and, depending on Clients’ legal bases for data processing, may be asked to consent to such processing.
This Privacy Policy outlines how we process Personal Data and commit to protecting your information. This Privacy Policy does not cover how our Clients may treat Subjects’ Personal Data. Clients provide this information in their privacy statements, which are not subject to our control.
6.1 Personal Data Processing Principles That We Adhere To:
We adhere to the principles of personal data protection as envisaged in the EU GDPR and other applicable laws. Under these principles, we assist Clients in ensuring that Subjects’ Personal Data is:
  • Processed fairly and lawfully and in a transparent manner in relation to the Subjects;
  • Processed for specified, explicit and legitimate purposes only and not further processed in a manner that is incompatible with those purposes;
  • Adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed;
  • Kept accurate and up to date;
  • Retained in a form permitting identification of Subjects for no longer than is necessary for the purposes for which they are processed; and
  • Processed in a manner that ensures their appropriate security.
6.2 Purposes of Personal Data Processing
We only process Personal Data according to the purpose limitations below.
Delivery of Services
  • While serving Clients, we mainly process Personal Data as a processor for Clients' benefit. we process Personal Data for the performance of agreements, including indicated Services, obligations arising from agreements, and related rights, as well as for the execution of rights and fulfilment of obligations deriving from legal acts and processing Subjects' requests. We collect and further process Subjects' data for Clients, which may include matters of compliance with applicable AML/CFT and/or other laws and regulations and/or Client's internal customer due diligence procedures. Once Personal Data is no longer necessary for the relevant purpose, acting on Client's written instructions, we erase it from our servers without leaving any backup copies.
Other Purposes
We may process Personal Data for purposes that serve our legitimate interests, which include the following purposes:
  • Where it is not prohibited by applicable laws and provided we have permission from our Clients, we may process some Personal Data, including biometrics, to develop and improve identity verification services to prevent and detect fraud and other illicit activity as part of substantial public interest via machine learning;
  • Given the nature of our Services, we are to detect and prevent criminal activity, fraud, and money laundering by checking the provided Subjects data against records of confirmed or suspected illegal activity, fraud or money laundering. If any sign of this appears, we will inform our Clients of this.
  • In connection with the purpose above, we may also conduct profiling, statistical analysis, and analytics in AML/CFT tendency, fraud detection, and prevention. Our system may aggregate Subjects’ data to generate reports and charts our Clients may use when assuming the risk likelihood associated with specific characteristics.
  • We can process Personal Data, including biometric data, to identify a User for identification purposes to process data subject access request or the Client’s request accordingly;
  • We sometimes may be obliged to process or retain all or part of Personal Data for the establishment, exercise, or defence of legal claims;
  • We process some Personal Data while adhering to the principles of Personal Data handling, namely lawfulness and accountability, by obtaining the legal basis for processing specific Personal Data concerning certain Users, as required under laws applicable to such Users.
6.3 Data Processing Activities
We carry out various types of automated processing, including, but not limited to, collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination, or otherwise making available, alignment or combination, restriction, erasure or destruction.
Biometric Processing Methods
  • We may process biometrics to verify whether provided facial images are likely to match depending on the Services chosen by a particular Client. The processing of biometrics means extracting facial features from camera-captured facial images on government-issued identity documents submitted by Subjects and comparing them. There are several reasons why Clients ask for such biometrics processing. Generally, Clients may wish to check whether an identity document genuinely belongs to a Subject by comparing a provided facial image to the facial image contained in the identity document.
  • In addition, Clients may ask us to check whether a User is alive and genuine. To do this, we use a liveness check artificial intelligence to determine if the Subject is not attempting to spoof the system using attacks such as static images and deep-fakes.
Document Check
  • For fraud detection, we subject Personal Data from camera-captured copies of documents to automated reading and verification of authenticity by conducting different checks. We also check the document's security features, including the machine-readable zone (MRZ) and other security components used for genuine data validation. Our system analyses the results of the above to make an inference regarding the document's trustworthiness.
Data Validation
  • We may process data validation checks to verify data against databases of third-party data providers and detect whether a User is involved in illicit activities, money laundering or terrorism financing. To do this, we will check the data extracted from the uploaded documents or provided by the User against a database of third-party data providers. Data Providers we may use may include ID registers, proof of address checks, other government or commercial sources and databases, PEP lists, global and country-specific sanctions lists, and adverse media sources.
  • Throughout the course of Clients' relationship with their Subjects, we may assist Clients in periodically screening Subjects' data against databases to help prevent, detect, and investigate fraud and money laundering.
Automated Decision-Making Relief and Analysis
  • We conduct identity verification analysis for Clients; however, we do not make any final decisions. Our role is to provide Clients with reports containing information about the identity verification process and results (with the reasoning behind them reflecting the level of fraud or another risk, if any). The reasons are derived from the work of our system and its algorithms based on machine learning models. The final decision on a Subject’s onboarding is made by a human on the Client’s side when the analysis result is transmitted to the particular Client. Clients consider this information while deciding to accept or decline a Subject’s application, request further checks, or continue to service that Suject following their risk assessment and investigations.
  • Certain checks may be fully automated due to simplicity on Clients’ request. When Clients use check results to make final decisions regarding Subjects verification, Clients may automate the final decision-making process. When Clients make automated decisions, including those based on our check results, they shall inform Subjects of the legal grounds and, if necessary, obtain Subjects consent. Any Subjects can appeal automated decisions by reviewing the methods provided on a Client's side.
Reusable KYC
  • In this model, our Clients may partner with each other to simplify and speed up verification for mutual Subjects that have already passed KYC via us. Clients ask us to create a data flow that exchanges previously verified KYC data between ParallelChain and other service(s). We provide such functionality only after confirmation that these Clients have all necessary legal arrangements. Before sharing the data, Subjects are asked for consent to such actions.
Service Development
  • Our Clients use our Services to perform identity verification and to prevent money laundering, terrorist financing, fraud, and other activities that are considered a matter of public interest. That is why we, as a service provider, are responsible for providing the highest quality services. For this reason, where we have the authorisation of our Clients, and it is not prohibited by applicable law, we use Personal Data to develop and improve our Services by building and enhancing algorithms, developing and testing new verification options, products and services.
  • We do this in two ways. We deploy a system recognising specific patterns in the information and making predictions about new datasets based on those patterns by training our artificial intelligence algorithms. The development of Services also includes continuous improvement and assessment. We review our Services delivery methods to ensure that we comply with Clients’ requirements and work appropriately by testing and correcting new features and functions. We implement initial and ongoing training for our analysts to perform those tasks to prevent artificial intelligence models' automatic judgement. It is also beneficial while artificial intelligence models are in the stage of development and aren't adequately suited to perform such tasks.
6.4 Data We Collect
We may collect and further process the following categories of data from Users:
6.5 Policy on Children
We only provide Services to Users above legal age where used, if an underaged User’s Personal Data is submitted, whether by accident or intention, to us, it will be deleted without undue delay.
6.6 Personal Data Retention Period
The Services’ default Personal Data retention period is four years. Please note that if you, as a Subject, would like to make a request to delete the Personal Data that you have provided for the purpose of a particular Client, please make that request directly to the Client. In general, Personal Data will be permanently destroyed based on a Client’s instructions when the Client’s initial purpose and/or retention period prescribed by applicable law expires, but no longer than for the period of contractual relationship with the Client.
Where we independently define the compatible purposes or are under a legal obligation, Personal Data, including biometric data, will be destroyed after our purposes for collecting the data have been satisfied (and one year from the date the purpose for collecting the data expires for residents of Texas) or after five years from the provision of data to our system, whichever occurs first. For the residents of Illinois, the retention period of Personal Data will be three years from the date of data provision to the our system.
6.7 Disposal and Destruction Policy
We may collect and further process the following categories of data from Users:
Any Personal Data is deleted from our systems only after (a) obtaining a User’s data deletion request in line with corresponding procedures by a Client or Subject or (b) the satisfaction of the purpose for data processing, including expiration of retention period prescribed by applicable law.
Any request to delete all or any Personal Data related to a User is fulfilled within thirty days. This period is justified by the complexity of the systems and technologies we operate to process the data.
Users’ Personal Data may be retained for up to ninety days (from a User’s request for data deletion) to comply with any applicable law, regulation, legal process, or governmental request and investigation; to assert legal rights or defend against legal claims; or to prevent, detect, or investigate illegal activity, fraud, abuse, violations of the Client’s or our terms of service, or threats to the security of the Services or the physical safety of any person. We will delete such Personal Data of the affected User when no longer legally obligated or reasonably required to retain it.
When the processing purposes differ from those specified above, we maintain the following retention period considering the amount, nature and sensitivity of the Personal Data and the purposes for which we are permitted to process it.
When we develop and improve identity verification services to prevent and detect fraud and other illicit activity, we will keep Personal Data in a pseudonymised format for the period required to calibrate and select the perfect algorithm and model for detecting fraud and other illicit activity. We may also have to store some records that have been confirmed as relating to fraudulent applications or accounts or obtaining and maintaining records to prove our compliance with legal obligations. For example, regarding consent activity log history, the retention period is defined by the criteria derived from requirements by law regarding limitation periods, other applicable regulatory requirements, contractual provisions and industry standards.
When the purpose refers to the establishment, exercise or defence of legal claims, the retention period is limited to the duration of such proceedings in a specific case or circumstance.
In any case, we do not keep your data longer than we have a lawful basis for doing so.
6.8 Your Data Rights
Upon written request from a Client, we assist the Client in exercising Subject’s rights. According to privacy laws, Subjects have the right:
  • to obtain confirmation as to whether or not their Personal Data are being processed;
  • to rectify Personal Data;
  • to erase Personal Data, or “right to be forgotten”. Please note that this right is not absolute and applies only if (i) the Personal Data is no longer necessary in relation to the purposes for which was collected or otherwise processed, (ii) Subject objects to the processing, and there are no overriding legitimate grounds for the processing of Client; (iii) the Personal Data have been unlawfully processed;
  • to restrict Personal Data processing where (i) the accuracy of the Personal Data is contested (during the period when the Client is able to verify its accuracy); (ii) the processing is unlawful, and Subject objects to the erasure of the Personal Data and request to restrict their use instead; (iii) the Client no longer needs the Personal Data for the purposes of the processing, but they are required by Subject to establish, exercise or defend legal claims; (iv) Subject has objected to processing pending the verification whether Client’s legitimate grounds override those of Subject’s;
  • to be informed as to rectification or erasure of Personal Data or restriction of their processing;
  • to receive Subject’s own Personal Data in an appropriate format to be able to provide it to another party or transfer Subject’s Personal Data from one controller to another;
  • to object to Personal Data processing if the processing is justified by the ‘public interest’ or ‘legitimate interest’ legal grounds;
  • to lodge a complaint with the supervisory authority. If Subject wants to complain about the processing activities of our Clients (the service that the Subject was verified for), please refer to the methods specified in their privacy policies.
Please be aware that when a User asks us for the execution of the rights as stated above, we may have to take steps to verify that the User is the legitimate data owner and/or authorised to make the request due to a Client's request or our own legal obligation.
Making a request for receiving Personal Data is free unless a reasonable cost is to be charged where requests are unfounded, excessive, or repetitive in character.
6.9 Responsibilities
We are responsible for establishing policies and procedures in order to comply with the GDPR and other applicable laws and regulations. Our Data Protection Officer (DPO) can be contacted via info@parallelchain.io
6.10 Personal Data Breaches
Where a data breach occurs or is suspected, it should be reported immediately to the DPO or to the respective Client and, if applicable, to the individual affected by the breach. The report includes full and accurate details of the incident (including its reasons and magnitude) and outlines the planned measures to eliminate the breach.
The report is provided directly to the concerned Client, and further breach mitigation is supported.
6.11 Data Disclosure
If Clients agree, we may use third parties for data processing activities, which include the following categories:
  • Third-party processors as reasonably necessary for the provision of Services;
  • Data providers when it is supposed to be used for the provision of Services; and
  • ParallelChain Lab group of companies for assistance in service delivery.
We require third parties to respect the security of Personal Data and treat it according to the applicable law. In addition, third parties are mostly limited to only accessing or using Personal Data to provide services to us and must provide reasonable assurances they will appropriately safeguard the data in line with this Privacy Policy. Sometimes, certain third-party sub-processors engage particular data providers who can maintain and use the data for their own legitimate purposes.
Where it is required by law, we may have to provide Personal Data to the recipients, which includes the following categories:
  • Governmental bodies and regulatory authorities, judicial bodies, investigation bodies, sworn bailiffs, and notaries based on written and concrete requests or the duties binding upon us or our Clients stipulated by the legal enactments.
  • Any other Clients provided that there is a legitimate interest or any other legal reason for doing so, obtained consent or where we have been instructed to share the information on behalf of our Clients as specified above.
6.12 International Data Transfers
All Personal data is stored on our servers located in Singapore and/or subject to any national localisation requirements in the respective countries, where such requirements exist.
Where it is necessary for Services provision or to ensure convenient and reliable communication with Subjects, we transfer Personal Data outside of a jurisdiction to the third parties and recipients indicated above in this Privacy Policy.
6.13 Sale of Personal Data
We do not sell Personal Data and strictly comply with applicable restrictions and prohibitions.
Bingo Demo Terms of Service and Privacy Policy
Welcome to Bingo Demo (the "App"), a mobile application developed and provided by ParallelChain Lab Private Limited. The App is publicly available to download for free on the Google Play Store and the Apple App Store, it serves to demonstrate our identity verification technologies, offering users a first-hand experience of our advanced solutions.
The terms “ParallelChain Lab”, “we”, “us” and “our” refer to ParallelChain Lab Private Limited and any subsidiaries. The terms “you” and “your” refer to any individuals and entities who download or use the App.
Protection of your Personal Data is of high importance to us. This Terms of Service & Privacy Policy (the "Terms") describes our practices, the information we collect, how we use that information, and with whom your information is or will be shared.
By continuing to use the App, you acknowledge you have read, understood, and agreed to be bound by these Terms. If you disagree with any part of the Terms, you must stop using and erase the App immediately.
1. The Data Controller and Its Contact Information
The data controller is ParallelChain Lab Private Limited, a Singapore-registered company.
If you want to communicate with us about personal data protection issues, please email us at info@parallelchain.io. We will address your concerns and attempt to resolve any privacy issues promptly. When writing to us, please make sure to include your User ID in the email. Providing this information is crucial as it enables us to locate your data and address your concerns. Without your User ID, we may be unable to process your request. Your User ID can be found on the menu screen of the App.
2. Personal Data Involved and Its Retention
The App requires the collection and processing of your data, both personal and general as well as sensitive and less/non-sensitive (collectively, “Personal Data”), to perform its purpose of identity verification.
Types of sensitive Personal Data could include:
  • selfie images (including biometric data);
  • images of identity documents; and
  • personal information on identity documents extracted by our Optical Character Recognition (OCR) technology: First Name, Surname, Nationality, Sex, Document Number, Date of Birth, Document Issue and Expiration Dates, Place of Birth, and ID portrait.
Types of less/non-sensitive Personal Data include:
  • device model, device-based identifier, operating system, crash logs; and
  • any other usage information.
This Personal Data is processed locally on your device and then sent to our servers. We retain this Personal Data for a standard period of two years.
3. How Your Personal Data Are Processed and Used
By using the App, you understand, agree, and allow your Personal Data to be sent to our servers.
3.1. Purposes of Personal Data Processing and Storage
We process your Personal Data based on the legal grounds and for legitimate business purposes outlined in this Terms, primarily to:
3.2. Disclosure
We will not pass on your Personal Data to third parties without first obtaining your consent. We do share your Personal Data with third parties for marketing purposes or any other purposes.
4. Policy on Children
The App is not directed to individuals under 18. We do not knowingly collect Personal Data from users under 18. If we become aware that a user under 18 has provided us with Personal Data, we will take steps to erase such Personal Data immediately. Contact us if you believe that we have mistakenly or unintentionally collected information from a user under 18.
5. Your Data Rights
Upon written request from you, we will assist you in exercising your data rights. According to privacy laws, you have the right to:
  • obtain confirmation as to whether or not your Personal Data are being processed;
  • rectify your Personal Data;
  • erase your Personal Data;
Please be aware that when you ask us for the execution of the rights stated above, we may have to take steps to verify that you are the legitimate data owner and/or authorised to make the request due to our own legal obligation.
Making a request for the execution of the rights stated above is free unless a reasonable cost is to be charged where requests are unfounded, excessive, or repetitive in character.
When making a request for the execution of the rights stated above, please include your User ID in your email. This User ID can be found on the menu screen of the App. Providing this information is crucial as it helps us to locate your data and address your concerns. Without your User ID, we may be unable to process your request.
6. Security of Your Personal Data
The security of your Personal Data is important to us. We maintain appropriate safeguards and current security standards to protect your Personal Data from unauthorised access, disclosure, or misuse.
The processing of Personal Data is done on your device, which deepens the confidentiality and security of your Personal Data. The App also applies security measures for the communication to servers.
However, no system can be completely secure, and we cannot ensure or warrant the security of any data you provide to us. While we take meaningful steps to secure your information, we do not promise, and you should not expect, that your Personal Data will always remain secure. We do not accept liability for unintentional disclosure.
If we learn of a security breach, we may attempt to notify all users by posting a notice on the App.
7. Changes in the Terms
We may change or modify the Terms at any time,
The Terms is constantly reviewed and amended in order to provide appropriate compliance with the relevant data protection laws. We reserve the right to make amendments to the Terms at any time and for any reason. Any amendments will be effective immediately upon us publishing the updated Terms on the App. You are urged to review the Terms at any time to stay informed about updates.