At JuneNCo, we take website security and user data protection seriously. In the online gambling world, breaches can be costly and can damage user trust; according to industry data, the average cost of a data breach is roughly $4.45 million and continues to rise. Although JuneNCo does not operate gambling services or handle user wagers, we do collect limited information (such as email addresses) for account management and communications. We recognise that even this data must be safeguarded, and we adopt security measures comparable to those used by reputable online casinos. The following section outlines our approach to protecting your information and ensuring the integrity of our platform.
Encryption & Secure Communications
- TLS/SSL Encryption: All data transmitted between your browser and our servers is protected using strong encryption protocols. We support HTTPS with advanced TLS 1.3 encryption, which scrambles information into an unreadable format so only the intended recipient can decode it. This is similar to the SSL/TLS systems used by top casinos to keep personal and payment data secure. Always look for the padlock icon in your browser’s address bar to confirm you are connected securely.
- Secure Servers: We host our website on hardened, access-controlled servers with limited privileges. These servers are monitored and updated regularly to reduce vulnerabilities, and sensitive data is stored on systems that are guarded against unauthorised access.
Infrastructure Protection
- Firewalls & Intrusion Detection Systems: Our network employs firewalls and intrusion detection tools to identify and block suspicious traffic. These tools act like locks and alarms, stopping anything that looks strange or unsafe and alerting us to potential threats. Working together, they make it harder for attackers to penetrate our systems.
- Patch Management & Updates: We regularly update our software and infrastructure to address newly discovered vulnerabilities. Our team monitors security advisories and applies patches promptly to maintain a secure environment.
- Backups & Disaster Recovery: We perform regular backups and maintain disaster recovery plans to ensure that data can be restored quickly in the event of an incident.
Access Control & Authentication
- Multi-Factor Authentication (MFA): We require multi-factor authentication for administrative accounts and provide it as an option for user accounts where applicable. MFA requires more than one piece of evidence (e.g., a password and a one‑time code) to log in, making it significantly harder for an attacker to gain access. Top gambling platforms employ similar measures to boost security.
- Least Privilege Principle: Access to systems and data is granted based on the minimum necessary privileges. Only authorised personnel with a legitimate need can view or modify sensitive information, and all access is logged and audited.
Data Protection & Regulatory Compliance
- Data Protection Laws: We comply with applicable data protection laws, including the General Data Protection Regulation (GDPR) for European users and the California Consumer Privacy Act (CCPA) for U.S. users. These laws require us to obtain consent for data collection, ensure transparent processing, allow users to access and delete their data, and implement robust security controls.
- ISO/IEC 27001 & Industry Standards: Our security framework is aligned with recognised standards such as ISO/IEC 27001. We work with reputable hosting providers and service vendors that follow strict security protocols. When engaging third‑party services (e.g., analytics or email providers), we ensure they adhere to contractual and legal requirements for data protection.
Monitoring & Incident Response
- Continuous Monitoring: We employ monitoring tools to detect unusual activity on our servers and websites. These systems use analytics and, where appropriate, AI-based detection to identify potential threats or anomalies.
- Incident Response Plan: In the unlikely event of a security incident, we have documented procedures for containment, investigation, and recovery. We will notify affected users and relevant authorities when required by law and provide guidance on protective steps they can take.
- Staff Training: Our team receives ongoing training to recognise phishing, social engineering, and other common cyber threats. Raising internal awareness helps reduce the risk of human error in security breaches.
User Responsibilities & Best Practices
Security is a shared responsibility. Users can enhance their own safety by:
- Using strong, unique passwords and a password manager.
- Enabling two-factor authentication when available.
- Verifying secure connections by checking for “https://” and a padlock before entering any personal data.
- Staying vigilant against phishing and scams, such as unsolicited emails or messages that request personal information.
- Reporting suspicious activity to our support team promptly.
Continuous Improvement & Updates
We regularly review and update our security practices to adapt to emerging threats and industry best practices. As cyber threats evolve, we may introduce new technologies, like AI-driven monitoring or blockchain-based verification, to further enhance security. Significant changes to our security program or this Security Statement will be documented here and, where appropriate, communicated to users via email or site notifications.