Please note that this privacy statement will regularly be updated to reflect any change in the way we handle your personal information or any changes in applicable laws
This Privacy Notice describes the policies and procedures of Kong-Inu, (“we,” “our,” or “us”) pertaining to the collection, use, and disclosure of your information on kong-inu.com and related mobile applications and products we offer (the “Services” or “Kong Wallet”).
Your right to privacy and the protection of your personal data is important to us. The following sections provide further details as to how we process your personal information through Kong Wallet. We don’t share your information with third parties except to deliver you our Services and products, comply with the law, make Kong Wallet better, protect our rights, or effectuate a business transfer. We’re not a huge, faceless corporation. We’re just developers trying to deliver an incredible product. If you have any questions or concerns about this policy, please reach out to us via email.
HOW DO YOU ACCEPT THIS POLICY?
WHAT PERSONAL INFORMATION DO WE COLLECT FROM OUR USERS?
We do our best to minimize the amount of Personal Information that we collect from Kong Wallet users. Your contact information, such as your phone number,, or email address (depending on how you contact us), may be collected when you communicate with us for support, or if you report a bug or other error related to Kong Wallet or when you interact with us through social media. When you use our Services, we process PUBLIC wallet addresses that you generate through Kong Wallet.
WILL WE SHARE YOUR PERSONAL DATA WITH THIRD PARTIES?
Information about our users is an important part of our business and we are not in the business of selling our users’ personal information to others. We may transfer personal data to our service providers or third parties in connection with Kong Wallet’s operation of its business, as certain features on Kong Wallet rely on various third-party products and services (collectively “Third Party Services”), . These third party services providers only have access to certain Personal Information, such as your public Wallet addresses, to perform their functions and may not use it for other purposes. Furthermore, they must process the personal information in accordance with our contractual agreements and only as permitted by applicable data protections laws. Business transfers: As we continue to develop our business, we might sell or buy other businesses or services. In such transactions, user information generally is one of the transferred business assets but remains subject to the promises made in any pre-existing Privacy notice (unless, of course, the user consents otherwise). Also, in the unlikely event that Kong Wallet or substantially all of its assets are acquired, users' information will be one of the transferred assets. We may share non-personally identifiable information publicly and with our partners- like publishers, advertisers, developers, or right holders.
HOW WE USE THE INFORMATION WE GATHER
YOUR RIGHTS WITH RESPECT TO THE PROCESSING OF PERSONAL DATA
You are entitled (under the conditions, and subject to the exceptions, set out in applicable law) to: Request Access to the personal information we process about you: You can request access to the information we have collected from you. You can do this by contacting us at via email. We will provide you with a copy of the data we process about you. To comply with your request, we may ask you to verify your identity. We will fulfill your request by sending your copy electronically. For any subsequent access request, we may charge you an administrative fee. Request a rectification of your personal data: If you believe that the information we have collected is incorrect or incomplete, you may contact us so we can update it and keep your data accurate. Object to the processing of your personal data: you may request that we no longer process your personal data. Request to erase your personal data: you may request the erasure of your personal data, including where such personal data would no longer be necessary to achieve the purposes for which it was collected. Any data that is no longer needed for purposes specified in the “How We Use the Information We Gather” section will be deleted after ninety (90) days. Wallet addresses created through the Kong Wallet application cannot be deleted from the blockchain, therefore we are unable to delete this personal information. If at any point you wish for Kong Wallet to delete information about you, you may contact us via email. Request the restriction of the processing of your personal data: you may request that Kong Wallet only processes your personal data in limited circumstances, including with your consent. Under California Consumer Protection Act (“CCPA”) you also have the right not to be discriminated against because of the exercise of your rights. Please note that we do not sell your personal data.
Please note that even If you delete your Wallet or addresses from the Kong Wallet mobile application, uninstall Kong Wallet mobile applications from your device, or request that your information be deleted, we still may retain some information that you have provided to us to maintain Kong Wallet or to comply with the laws and regulations to which Kong Wallet is subject. If you have any question or objection as to how we collect and process your personal information, please contact us via email
We are committed to making sure your information is protected in accordance with applicable laws and our data privacy policies. We have selected third-party vendors that use the Ethereum network, including Coinbase, Shapeshift, and Changelly, that help us keep your Personal Information safe. Unfortunately, we do not control these third parties and therefore cannot guarantee complete security. We work to protect the security of your personal information during transmission by using encryption protocols and software. We maintain physical, electronic and procedural safeguards in connection with the collection, storage and disclosure of your personal information and secure all connections with industry standard transport layer security. Even with all these precautions, we cannot fully guarantee against the access, disclosure, alteration, or deletion of data through events, including but not limited to hardware or software failure or unauthorized use. Any information that you provide to us is done so entirely at your own risk.
CONDITIONS OF USE, NOTICES, CHANGES AND UPDATES TO PRIVACY NOTICE
We’d be happy to answer them. Please contact us via email