Introduction
Point Shift is committed to privacy by design and operational transparency. We process only information that
is necessary to provide bridge functionality, support users, secure infrastructure, and comply with legal
obligations.
Because blockchain networks are public by nature, some transaction metadata is visible on-chain
independently of this Policy and cannot be removed by Point Shift.
1. Information We Collect
We may process wallet addresses, chain and token selections, transaction hashes, route diagnostics, and
website usage metrics. If you contact support, we may process the details you provide in your request.
We do not require account creation for core bridge flows, but technical logs may include device, browser,
and request metadata needed for reliability and abuse prevention.
2. How We Use Information
Information is used to execute and monitor transfers, calculate routes, detect suspicious behavior, and
improve performance. We also use operational analytics to prioritize product quality and security updates.
Where legally required, processing is based on contract performance, legitimate interest, legal compliance,
or your explicit consent for specific communication actions.
3. Sharing and Disclosure
Point Shift does not sell personal data. Limited data may be shared with service providers that support
hosting, analytics, monitoring, incident response, and customer support workflows.
We may disclose data when required by law, court order, sanctions screening duties, or when necessary to
investigate fraud, abuse, or security incidents.
4. Cookies and Analytics
We may use cookies or similar technologies for essential site operation, security checks, and usage
analytics. You can control non-essential cookies through browser settings where available.
Disabling some cookies may reduce functionality, including route previews, interface preferences, and
diagnostics needed for transaction support.
5. Data Retention
We retain operational records only as long as needed for service integrity, security monitoring, legal
compliance, and dispute handling. Retention periods vary by data type and use case.
After retention periods expire, data is deleted, anonymized, or aggregated where feasible, except for data
that must remain accessible due to legal obligations.
6. Security Measures
Point Shift uses layered controls including access restrictions, monitoring, audit trails, and incident
response procedures. Security governance includes multi-sig controls and emergency protection mechanisms.
No system is risk-free, but we continuously improve controls through audits, testing, and post-incident
hardening.
7. International Data Transfers
Service infrastructure may operate across multiple jurisdictions. When data is transferred internationally,
we apply appropriate legal and contractual safeguards where required.
By using Point Shift, you acknowledge that processing may occur in countries with data protection standards
that differ from your home jurisdiction.
8. Your Privacy Rights
Depending on local law, you may have rights to request access, correction, deletion, restriction, or
objection to specific processing. You may also request export of data where technically feasible.
To submit a request, contact support and provide enough context to verify ownership and process the request
securely.
9. Policy Updates and Contact
We may update this Privacy Policy to reflect product changes, legal requirements, or security improvements.
The latest version and effective date are always published on this page.
For privacy questions or data requests, use the Support page and include "Privacy Request" in the message
subject for faster routing.