Privacy Policy

Greyhunt respects your privacy. This policy outlines how we collect, use, store, and protect user data when interacting with the Greyhunt platform ("Platform"). By using the Platform, you consent to the data practices described below.

1. What We Collect

Greyhunt may collect or process the following identifiers for platform functionality:

  • Wallet Address – used for access validation, staking, gamification, and Smart Alert configurations

  • Telegram Handle – used for real-time Smart Alert delivery

  • X (formerly Twitter) Handle – used for community scoring, feature unlocks, and Yaps-linked context

  • Email Address – used for fiat subscription management, account services, and administrative notices

  • Discord ID – used for gamification programs and community-level tools

Greyhunt does not collect personally identifiable information (PII) beyond the above unless voluntarily submitted for support or access purposes.

2. Why We Collect It

Collected data is used solely to provide, personalise, and protect platform services:

  • To validate eligibility for staking, access tiers, and reward programs

  • To deliver personalised Smart Alerts and contextual Bot-Query responses

  • To manage fiat subscriptions, technical support, and system notifications

  • To enforce usage thresholds and prevent abuse (e.g., scraping or automation)

  • To enable participation in community engagement tools and missions

  • To improve product design, UX responsiveness, and system reliability

3. Cookies and Tracking

Greyhunt uses minimal, first-party cookies strictly for:

  • Maintaining login sessions

  • Storing user preferences (e.g., alert sensitivity, dark mode, UI settings)

  • Monitoring aggregate usage patterns for performance optimisation

We do not use third-party advertising or tracking cookies. Users may disable cookies via their browser, though some platform functions may be limited.

4. Data Retention

  • Non-sensitive usage logs (e.g., interaction timestamps) are stored for up to 12 months

  • Wallet and social identifiers are retained only as long as required to provide requested features

  • Email correspondence and support tickets are retained based on legal and operational necessity

5. Data Control and Deletion

Users may request to:

  • Disconnect wallets or social accounts

  • Delete linked identifiers or account-specific preferences

  • Opt out of Telegram-based Smart Alerts or email communications

  • Requests may be submitted at any time to: Greyhunt Telegram

Greyhunt processes user data under the following legal bases:

  • Contractual necessity — to deliver subscribed or requested services

  • Legitimate interest — to secure the platform, prevent abuse, and improve product quality

  • User consent — for optional features such as Smart Alerts, community missions, and integrations

Users covered under GDPR or CCPA have the right to access, correct, or delete their data in accordance with applicable regulations. Greyhunt adheres to relevant data protection frameworks where legally required.

7. Hosting and Jurisdiction

Greyhunt’s infrastructure is hosted exclusively in secure environments located within the United States. All data processing and storage operations are conducted in compliance with applicable U.S. data protection and cybersecurity standards.

Where required, Greyhunt adheres to industry practices regarding international data access, but no user data is stored or processed within the European Union.

8. Security

Greyhunt implements industry-standard security measures to protect platform integrity and user data. These include:

  • Encrypted communication over TLS/SSL for all user interactions

  • Role-based infrastructure access and internal audit controls

  • Strict rate-limiting to prevent abuse of freemium usage or automated scraping

  • Real-time monitoring for abnormal system activity and unauthorized access patterns

While no system is fully immune to attack, Greyhunt actively monitors its infrastructure and updates internal safeguards in response to emerging threats and platform usage dynamics.

Last updated