Privacy Policy
1. Introduction
LockedX B.V. ("we," "us," or "our") is committed to protecting your privacy. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our anti-fraud sensor technologies and related services.
Company Details:
LockedX B.V.
Address: Herengracht 280, Amsterdam, 1016BX, Netherlands
Contact: hi@lockedx.com
KvK Number: 98029967
Important Notice: Our services are currently in experimental beta stage. This means our data processing practices may evolve as we develop and improve our anti-fraud technologies.
2. Legal Basis and Regulatory Compliance
LockedX B.V. operates under strict compliance with Dutch and European Union data protection laws. Our processing activities are governed by:
Primary Legal Framework:
General Data Protection Regulation (GDPR) - EU Regulation 2016/679
Dutch Implementation Act (UAVG) - Uitvoeringswet Algemene Verordening Gegevensbescherming
ePrivacy Directive - EU Directive 2002/58/EC and Dutch Telecommunications Act
Dutch Civil Code (Burgerlijk Wetboek) - Articles on data processing and privacy
Legal Basis for Processing Under GDPR Article 6:
Legitimate Interest (Article 6(1)(f)): Fraud prevention and cybersecurity protection for our clients and their users, balanced against individual privacy rights through our privacy-by-design architecture
Consent (Article 6(1)(a)): Where explicitly provided by end users through client implementation
Contractual Necessity (Article 6(1)(b)): To fulfill our anti-fraud service obligations to client organizations
Legal Obligation (Article 6(1)(c)): Compliance with Dutch cybersecurity reporting requirements and EU fraud prevention regulations
Legitimate Interest Assessment: Under GDPR Article 6(1)(f) and Dutch UAVG implementation, we have conducted a comprehensive Legitimate Interest Assessment (LIA) demonstrating:
Compelling Legitimate Interest: Preventing financial fraud and protecting digital infrastructure
Necessity Test: Our stateless, real-time processing is the least intrusive method for effective fraud detection
Balancing Test: Privacy-by-design architecture minimizes data processing while maximizing protection
Special Categories Considerations: Our behavioral analysis does not process special categories of personal data under GDPR Article 9, as we specifically avoid biometric identification and focus solely on device and interaction patterns.
3. Information We Collect
3.1 Client-Side Sensor Data
Our behavioral anti-bot sensor collects the following data types:
Behavioral Signals:
Mouse movements, clicks, focus events, scroll patterns
Keyboard events and input patterns
Touch interactions and hover events on mobile devices
Input change counts and form interaction patterns
Device Fingerprinting (all hashed for privacy):
WebGL capabilities and renderer information
Canvas fingerprinting data
Audio context fingerprinting
Font availability and rendering characteristics
Screen geometry, color depth, and pixel ratio
Fuzzy Device DNA: 64-character fingerprint for device similarity matching
Hardware concurrency and timezone information
Technical Performance Data:
Advanced Proof-of-Work Analysis: Multi-scale timing measurements, hash rates per second, memory behavior patterns
JavaScript execution performance and timing consistency
WebRTC IP address information (processed in real-time only)
Web Worker fingerprinting capabilities
Browser performance metrics and execution patterns
Network and Security Context:
TLS fingerprints (JA3/JA4) for connection analysis
Header order patterns for client identification
Connection metadata for fraud pattern detection
Integrity Monitoring:
Anti-tampering detection flags and scores
Native modification detection
Browser development tools detection
Headless browser detection signals
3.2 Client Information
From our business clients, we collect:
Company contact information
Technical integration details
Usage analytics and performance metrics
3.3 Data We Do NOT Collect
Personal identification information (names, addresses, phone numbers)
Financial account details or payment information
Content of communications or form inputs
Passwords or authentication credentials
Raw fingerprinting data (only hashed/processed versions)
Persistent tracking across websites or sessions
Long-term behavioral profiles or user histories
4. How We Use Information
We use collected data exclusively for real-time fraud and bot detection:
Real-Time Risk Assessment: Analyze behavioral patterns to identify automated or malicious behavior
Device Similarity Matching: Use fuzzy fingerprints to detect device-based fraud patterns
Performance Analysis: Advanced proof-of-work timing analysis to distinguish human from automated behavior
Integrity Verification: Detect tampering attempts or modified browser environments
Service Optimization: Improve detection algorithms and reduce false positives
Client Reporting: Provide aggregated fraud analytics and detection insights
Security Research: Enhance our understanding of emerging bot and fraud techniques
Data Processing Principles:
All processing occurs in real-time with minimal data retention
Raw sensor data is not stored long-term
Only aggregated, anonymized insights are retained for service improvement
5. Data Sharing and Disclosure
5.1 With Clients
We share fraud risk assessments and relevant analytics with the client organizations that implement our services.
5.2 Service Providers
We may share data with trusted third-party service providers who assist with:
Edge Infrastructure: Cloudflare (operating exclusively within EU data centers with geo-fenced TLS keys)
Object Storage: EU-based R2 storage for insights logs and aggregated analytics
Performance Monitoring: EU-based infrastructure monitoring and optimization services
Security Analysis: EU-based fraud research and algorithm improvement services
Legal and compliance support within the EU
All service providers are contractually bound to process data only within EU borders and maintain GDPR compliance.
5.3 Legal Requirements
We may disclose data when required by law or to:
Respond to legal processes or government requests
Protect our rights, property, or safety
Prevent fraud or other illegal activities
5.4 Business Transfers
In case of merger, acquisition, or sale of assets, your data may be transferred as part of the transaction.
6. Data Retention
Stateless Architecture with Structured Insights: Our system processes data in real-time while maintaining detailed analytics:
Real-Time Processing:
Session Data: No persistent storage on user devices - completely stateless operation
Proof-of-Work Verification: Computed and verified in real-time, then immediately discarded
Challenge-Response: Temporary server state with 120-second automatic expiry
Tokens: 120-second lifetime, single-use, automatically purged after validation
Structured Data Retention:
Request Logs: Individual fraud assessments stored for up to 30 days in EU-based object storage
Aggregated Statistics: Rolling performance metrics retained for up to 12 months (anonymized)
Performance Analytics: PoW timing patterns and behavioral insights for algorithm improvement
Security Insights: Fraud detection effectiveness data for service optimization
Client Configuration:
API Key Metadata: Client-specific settings (difficulty levels, custom rules) retained for service duration
Client Analytics: Aggregated fraud prevention statistics provided to customers
Data Structure:
Raw sensor data is never stored - only processed insights and fraud scores
All retention follows data minimization principles with automatic expiry
Logs are organized by client and date for efficient access and deletion
Beta Considerations: During our experimental phase, we may adjust retention periods to optimize our algorithms while maintaining privacy principles.
7. Data Processing Location and Infrastructure
EU-Only Processing: All personal data is processed exclusively within European Union borders. We use geo-fencing technology with region-specific TLS keys to ensure data never leaves EU jurisdiction.
Infrastructure Partners:
Cloudflare: We utilize Cloudflare's edge infrastructure for content delivery and security, configured to operate only within EU data centers
Geographic Restrictions: Our technical architecture prevents data from being processed or stored outside the EU through automated geo-fencing controls
This approach eliminates the need for international data transfer mechanisms as no personal data crosses EU borders.
8. Data Security
We implement comprehensive technical and organizational security measures:
Architecture Security:
Geo-Fenced Processing: TLS keys and infrastructure configured to ensure EU-only data processing
Stateless Design: No persistent client-side storage eliminates data exposure risks
Real-Time Verification: Challenge-response system with automatic expiry (120 seconds)
Token Security: Single-use tokens with cryptographic verification and automatic purging
Data Protection:
Encryption of data in transit and at rest using industry-standard protocols
Advanced access controls and API key authentication systems
Edge Security: Cloudflare's security features configured for EU-only operations
Integrity Verification: Multi-layer validation of sensor data and client authenticity
Operational Security:
Comprehensive logging and monitoring with automatic anomaly detection
Background Processing: Sensitive operations isolated from response paths for performance and security
Regular security assessments and penetration testing
Staff training on data protection principles and incident response procedures
Dynamic Obfuscation: Client-side protection that evolves multiple times daily
Monitoring and Response:
Real-time fraud detection with immediate alerting capabilities
Structured insights system for security pattern analysis
Incident response procedures with defined escalation paths
Beta Security: Enhanced monitoring during experimental phase with continuous security validation
9. Your Rights Under GDPR and Dutch Law
As a data subject, you have comprehensive rights under GDPR and Dutch data protection law:
Core GDPR Rights:
Right of Access (Article 15): Request information about your personal data we process
Right to Rectification (Article 16): Correct inaccurate personal data
Right to Erasure (Article 17): Request deletion of your personal data ("right to be forgotten")
Right to Restriction (Article 18): Limit how we process your personal data
Right to Data Portability (Article 20): Receive your data in a structured, machine-readable format
Right to Object (Article 21): Object to processing based on legitimate interests
Right to Withdraw Consent (Article 7(3)): Where processing is based on consent
Additional Rights Under Dutch Law:
Right to Compensation: Under Dutch Civil Code for damages caused by unlawful data processing
Right to Lodge Complaints: With the Dutch Data Protection Authority (Autoriteit Persoonsgegevens)
Exercise of Rights: To exercise these rights, contact us at privacy@lockedx.com We will:
Respond within 30 days as required by GDPR Article 12(3)
Provide information free of charge for the first request
Verify your identity before processing requests to protect your data
Inform you of any extensions (up to 60 additional days for complex requests)
Limitations on Rights: Some rights may be limited where processing is necessary for:
Compliance with legal obligations (GDPR Article 17(3)(b))
Fraud prevention and cybersecurity (GDPR Article 21(1) legitimate interests)
Our stateless architecture may technically limit certain data portability requests as we do not maintain long-term individual profiles
10. Technical Implementation
Our privacy-first technical architecture ensures minimal data exposure:
Stateless Token System: We use completely stateless tokens that:
Contain no personally identifiable information
Are not stored on user devices (no localStorage, cookies, or persistent storage)
Are generated fresh for each fraud assessment request
Automatically expire immediately after processing (10-second lifetime)
Cannot be used to track users across sessions, pages, or websites
Real-Time Processing Architecture:
Behavioral data processed instantly without device persistence
Advanced proof-of-work analysis computed in real-time
Fuzzy device fingerprints generated on-demand for similarity matching
All processing occurs server-side within EU infrastructure
No Cross-Session Tracking: Each fraud assessment is completely independent with no tracking continuity between requests.
Dynamic Obfuscation: Our client-side sensor uses advanced polymorphic obfuscation that changes multiple times daily to prevent reverse engineering and maintain detection effectiveness.
11. Third-Party Services
Our services may integrate with third-party platforms and services. We are not responsible for the privacy practices of these third parties. We encourage you to review their privacy policies.
12. Children's Privacy
Our services are not intended for individuals under 16 years of age. We do not knowingly collect personal data from children under 16. If we become aware of such collection, we will take steps to delete the information.
13. Data Breach Response and Legal Obligations
Regulatory Compliance Framework: We maintain strict compliance with Dutch and EU breach notification requirements:
Dutch Data Protection Authority Reporting:
72-hour notification to Autoriteit Persoonsgegevens under GDPR Article 33
Breach assessment following Dutch UAVG implementation guidelines
Risk evaluation using Dutch DPA methodology for determining notification thresholds
Individual Notification Requirements: Under GDPR Article 34 and Dutch implementation:
High-risk breaches: Direct notification to affected individuals within 72 hours
Clear communication in Dutch or English as appropriate
Mitigation measures and protective steps clearly explained
Legal Documentation:
Breach register maintained per GDPR Article 33(5) and Dutch UAVG requirements
Impact assessments following Dutch DPA guidelines
Remediation tracking with timeline documentation
Incident Response Protocol:
Immediate containment (within 1 hour of detection)
Risk assessment using Dutch DPA risk matrix (within 6 hours)
Authority notification to AP if required (within 72 hours)
Individual notification if high risk confirmed (within 72 hours)
Post-incident review and Dutch UAVG compliance validation
14. Changes to This Privacy Policy
Legal Change Management: We may update this Privacy Policy periodically, especially during our beta phase as our services evolve, while maintaining compliance with:
Dutch and EU Requirements:
GDPR Article 12: Transparent information and modalities
Dutch UAVG: Implementation-specific notification requirements
ePrivacy Directive: Cookie and tracking technology disclosures
Change Process:
Advance notification: 30 days notice for material changes affecting legal basis
Client notification: Direct communication for B2B contract modifications
Website publication: Updated policy posted with version control
Version tracking: Clear "Last updated" date with change log available upon request
Legal review: Each update reviewed for Dutch and EU compliance
Material Changes Definition: Under Dutch law and GDPR, material changes include:
Modifications to legal basis for processing
Changes to data retention periods
New data sharing arrangements
Modified rights or complaint procedures
Beta Considerations: During experimental phase, we may need to adjust practices more frequently, but will:
Maintain higher notification standards during beta
Provide detailed explanations of technical changes
Ensure all changes strengthen rather than weaken privacy protections
15. Contact Information and Supervisory Authority
General Privacy Inquiries:
Email: privacy@lockedx.com
Address: LockedX B.V., Herengracht 280, Amsterdam, 1016BX, Netherlands
Dutch Registration: KvK Number: 98029967
Legal Compliance Contacts:
GDPR Compliance: gdpr@lockedx.com
Dutch UAVG Matters: uavg@lockedx.com
Data Subject Rights: data-rights@lockedx.com
Supervisory Authority - Autoriteit Persoonsgegevens (Dutch DPA): Under GDPR Article 77 and Dutch UAVG, you have the right to lodge a complaint with:
Autoriteit Persoonsgegevens:
Website: autoriteitpersoonsgegevens.nl
Phone: +31 70 888 8500
Address: Bezuidenhoutseweg 30, 2594 AV Den Haag, Netherlands
Email: info@autoriteitpersoonsgegevens.nl
European Data Protection Board: For cross-border data protection matters:
Website: edpb.europa.eu
Role: Coordination between EU data protection authorities
Legal Framework References:
GDPR: eur-lex.europa.eu/eli/reg/2016/679
Dutch UAVG: wetten.overheid.nl (Uitvoeringswet Algemene Verordening Gegevensbescherming)
ePrivacy Directive: eur-lex.europa.eu/eli/dir/2002/58
16. Legal Framework Compliance Summary
Dutch Law Compliance:
Wet bescherming persoonsgegevens (UAVG) - Full implementation of GDPR in Dutch law
Telecommunicatiewet - ePrivacy compliance for electronic communications
Burgerlijk Wetboek - Civil law protections for privacy and data subjects
Wet computercriminaliteit - Cybercrime prevention legal framework
EU Regulatory Compliance:
GDPR (EU 2016/679) - Primary data protection regulation
ePrivacy Directive (2002/58/EC) - Electronic communications privacy
NIS Directive (EU 2016/1148) - Network and information systems security
EU Cybersecurity Act (EU 2019/881) - Framework for cybersecurity certification
Industry Standards:
ISO 27001 - Information security management (implementation in progress)
NIST Cybersecurity Framework - Risk management and security controls
OWASP - Web application security best practices
Professional Obligations: As a Dutch B.V. providing cybersecurity services, we maintain:
Professional liability insurance for data protection services
Incident reporting to Dutch authorities as required
Continuous monitoring of Dutch DPA guidance and EU data protection developments
Legal counsel specializing in Dutch privacy law and EU data protection
17. Beta Service Disclaimer and Legal Considerations
Important Legal Notice: Our services are currently in experimental beta phase under Dutch and EU regulatory oversight.
Beta Legal Framework:
GDPR Article 25: Privacy-by-design implementation during development
Dutch UAVG: Beta testing with enhanced privacy protections
Innovation Sandbox: Operating under Dutch digital innovation guidelines
Beta-Specific Protections:
Enhanced consent mechanisms for experimental features
Stricter data minimization during testing phase
Accelerated deletion of test data upon beta completion
Continuous legal review of all processing activities
Regular compliance audits with Dutch DPA consultation available
Service Evolution Notice: This means our data processing practices may change as we develop our technology, but:
All changes will maintain GDPR Article 25 privacy-by-design principles
Dutch UAVG notification requirements will be strictly followed
New features will undergo Data Protection Impact Assessment (DPIA) before implementation
We may discontinue certain data processing activities with 30-day advance notice
Performance and availability are not guaranteed during experimental phase
Legal Protections During Beta:
Liability limitations under Dutch contract law for experimental services
Enhanced data subject rights during testing phase
Priority support for privacy-related inquiries
Continuous compliance monitoring with regular legal review
This privacy policy is designed to comply with Dutch and EU data protection laws including GDPR, Dutch UAVG, ePrivacy Directive, and relevant Dutch civil and commercial law. This document has been prepared with reference to guidance from the Autoriteit Persoonsgegevens and the European Data Protection Board. Please consult with legal counsel to ensure it meets your specific business requirements and circumstances.