Privacy Policy for Poki Com Games Users
Poki Com Games is built for people who want quick, enjoyable browser gaming with clear safety expectations. This Privacy Policy explains, in plain Indian English, what information we collect, how we use it, and how we keep it protected when you visit or use the services on https://pokicom.games.
Quick way to read this page: If you want a “how-to” approach, start with Section 3 (What Information We Collect), then Section 4 (Why We Collect This Data), and Section 6 (Cookies). If you are a parent or guardian, please read Section 10 (Children’s Privacy).
Article 1: Our commitment to players on https://pokicom.games
We run Poki Com Games with a simple belief: a good game session should feel safe, predictable, and respectful of your information. Our team invests time in selecting games, maintaining stable site performance, and strengthening protection against common online risks such as automated abuse, suspicious logins, and malicious traffic.
This page reflects our passion and dedication to the experience on https://pokicom.games. That dedication shows up in day-to-day actions: checking platform reliability, monitoring for misuse patterns, and improving device compatibility so the site works consistently across popular browsers and mid-range smartphones commonly used in India.
We do not sell “privacy promises.” Instead, we describe concrete practices—what data types exist, what we do with them, and what controls you have. Where we provide figures, we do so to help you understand the “shape” of the information rather than to overwhelm you.
- Clarity: we list categories of data in a structured manner.
- Safety: we focus on risk reduction, not unnecessary collection.
- Practical controls: we describe actions you can take, including deleting cookies, changing browser settings, and contacting support.
Article 2: Respect, trust, and responsible handling
Trust is not a slogan; it is earned through consistent, responsible handling. For Poki Com Games, that means collecting only what we need to operate the platform, to support account access where applicable, to improve gameplay compatibility, and to protect users from fraud, cheating, and security incidents.
When we speak about “security and risk control,” we mean practical steps such as monitoring unusual access patterns, limiting automated requests, and applying protective settings that reduce the chances of misuse. If we detect a high-risk situation (for example, repeated failed login attempts from unusual device fingerprints), we may temporarily restrict certain actions to protect you and the platform.
What we aim to prevent
- Account takeovers and unauthorised access attempts
- Automated abuse (bots scraping pages or spamming forms)
- Cheating and manipulation that affects fair play
- Suspicious traffic that harms stability for genuine players
What we aim to enable
- Reliable gameplay access and smooth loading
- Better device compatibility (browser and screen support)
- Clear options for cookies and browser controls
- Support assistance through
[email protected]
1) Scope and definitions
This Privacy Policy applies to Poki Com Games and related pages, features, and services offered through the domain pokicom.games. It covers information collected when you:
- browse game listings, guides, or informational pages;
- play games hosted or embedded through the site;
- create or use an account where such features exist;
- contact support or send feedback.
Useful definitions (plain language)
- Personal information: information that can identify you directly (example: email address), or indirectly when combined with other data.
- Device information: technical signals from your browser/device, such as operating system, browser version, and screen size.
- Cookies: small files stored by your browser that help websites remember preferences, keep sessions active, or measure performance.
Important: This policy explains the platform-level handling by Poki Com Games. Individual games may be provided by third parties and may have their own data practices. Where such third-party services are used, we explain it in Section 8.
2) What Information We Collect
We group information into four practical categories so you can understand it quickly. Some data is provided by you (like an email address), and some is automatically collected by your browser/device (like basic technical logs). If a category does not apply to your usage (for example, if you never sign in), then that category may not be collected from you.
| Category | Examples (typical) | How it is usually collected |
|---|---|---|
| Account Information | Email address, username/display name, basic profile preferences | You provide it during sign-up or profile updates |
| Login/Security Information | Sign-in timestamps, session identifiers, approximate IP-derived region, failed login counters | Automatically generated during authentication and security checks |
| Game Behaviour Data | Game start/end events, in-site clicks (navigation), performance events (load time) | Collected to improve site experience and stability; limited to what is needed |
| Technical Device Data | Browser type/version, OS, screen resolution, device class (mobile/desktop), language settings | Automatically provided by your browser/device and server logs |
2.1 Account Information
If you create or use an account, we may collect details such as an email address and a display name. We treat this data as “high sensitivity” because it can connect activity to a real person. We use it for account access, support requests, and providing consistent settings.
- Email address: used for sign-in, account recovery, and support follow-up.
- Profile preferences: such as language or display settings to improve usability.
2.2 Login and security information
Login and security information is collected to protect you and the platform. For example, we may record the time you signed in and a session token that keeps you signed in. We also store basic security events (like repeated failed logins) to detect suspicious activity.
- Session identifiers: random strings that allow the site to recognise an active session.
- Security logs: limited records that support investigation of account abuse.
2.3 Game behaviour data
Game behaviour data helps us understand how features perform at a platform level. This can include which categories are used more, whether pages load successfully, and whether errors happen for specific device types. We aim to keep this data practical and proportionate.
- Navigation events: such as which category pages are opened.
- Quality signals: such as page load time bands (for example, under 2 seconds, 2–5 seconds, above 5 seconds).
- Stability signals: such as error codes and crash reports (where available).
2.4 Technical device data
Technical device data is collected because it directly affects gameplay compatibility. For example, a game that runs smoothly on Chrome 120 may behave differently on an older browser. Knowing device class and browser version helps us identify which fixes matter most.
- Browser information: name and version, such as Chrome, Firefox, Edge, Safari.
- Device signals: screen size and whether you are on mobile or desktop.
- Language settings: helps show the right language formatting.
What we do not ask by default: We do not require you to provide sensitive personal details (such as government IDs) for basic browsing and play. If any such request appears, treat it as suspicious and contact us at [email protected].
3) Why We Collect This Data
We collect information for three core objectives: (1) to enhance the gaming experience, (2) to improve device compatibility, and (3) to strengthen security and risk control. Each objective has practical sub-reasons, explained with examples and the typical data used.
3.1 Enhance the gaming experience
A smooth experience is measurable. For instance, if a category page takes over 5 seconds to load on mid-range devices, players may abandon the session. By reviewing aggregated performance data, we can prioritise improvements that matter most.
- Used data: load time bands, error events, device class (mobile/desktop).
- Typical outcome: improved page stability and faster loading where possible.
3.2 Improve device compatibility
Indian users access games across a wide range of devices—from entry-level Android phones to high-end PCs. Compatibility work requires knowing which browsers and screen sizes are most common, and where games fail to render properly.
- Used data: browser versions, OS type, screen resolution, crash/error markers.
- Typical outcome: fewer display issues and better interaction on touch screens.
3.3 Strengthen security and risk control
Security controls depend on identifying patterns that do not match normal use. We may measure suspicious activity using practical signals such as repeated failed logins, unusually high request rates, or session anomalies. If a pattern crosses a safety threshold, the system may apply rate limits or require re-authentication.
- Used data: login attempts, session identifiers, server logs, approximate region signals.
- Typical outcome: reduced account abuse and more stable service for genuine players.
Proportionality principle: If a purpose can be achieved with lower-detail or aggregated data, we aim to use that approach. For example, we often use performance “bands” instead of storing precise millisecond-level traces tied to a specific user.
4) How We Use Information (practical examples)
This section explains “how-to” usage in a direct manner—what we do with the data, and what that means for you in a typical session. Where you see numbers, they are used to keep the explanation concrete.
4.1 Account access and recovery
- Sign-in: your email and a session token allow account access and continuity.
- Recovery: if you request a reset, we use your account identifier to help verify and complete the request.
- Support: when you email us, we may match the request to an account to assist faster.
4.2 Platform quality and reliability
We review aggregated signals to identify issues such as repeated page errors or slow loading. For example, if a specific game page shows a failure rate above 2% for a certain browser family, that indicates a compatibility issue worth investigating.
4.3 Safety monitoring and prevention
We monitor platform-level signs of abuse, including automated scraping, repeated login failures, and suspicious session behaviour. Monitoring is limited to what is needed to keep the platform stable and to protect users.
- Rate limiting: if one device sends requests at unusually high speed, access may be slowed temporarily.
- Session validation: session tokens may be invalidated if unusual patterns are detected.
4.4 Communication
If you contact us, we may store your message and our replies. This helps us resolve your case and maintain continuity if you contact us again about the same issue. We typically keep support threads for a defined retention period (see Section 7).
5) How We Protect Data
Protection is a combination of technology, process, and standards. No system can be described as “perfect,” but we apply practical safeguards that reduce risk. Below is a clear breakdown of the major controls we use and why they matter.
5.1 Encryption technology
When you access Poki Com Games in a modern browser, traffic is typically protected in transit using HTTPS. This reduces the risk of interception between your device and our servers. For sensitive operations (such as login), encryption in transit is treated as a baseline requirement.
5.2 Access control
Internal access to user-related data is restricted based on role and need. In practical terms, this means:
- support staff can access limited information required to resolve a ticket;
- technical staff can access logs required for debugging and security reviews;
- administrative access is restricted and monitored.
5.3 International standards (operational approach)
We apply widely accepted security practices used across professional platforms, including:
- Least privilege: only necessary access is granted.
- Change control: meaningful changes are reviewed before release.
- Incident response: processes exist to investigate and reduce impact.
5.4 Practical guidance for users
Your choices also matter. For stronger safety, we recommend:
- use an email account with strong password hygiene;
- avoid signing in on shared public devices;
- keep your browser updated, especially on mobile;
- if you suspect unauthorised activity, contact us immediately at
[email protected].
Expert-style note: Security professionals often emphasise “defence in depth”—multiple layers of protection rather than a single control. Our approach reflects that principle through encryption, access control, and monitoring for abnormal patterns.
6) Transparency of Cookies and Tracking Technologies
Cookies and similar browser storage technologies help websites function predictably. Some cookies are essential (for example, to keep a session active), while others may support performance analysis. This section explains what each type typically does and how you can control them.
6.1 Necessity of cookies
Necessary cookies support core functions. Without them, some pages may not load correctly, or a sign-in session may not persist. These cookies are usually short-lived and related to basic functionality.
- Session cookies: help maintain your session while you browse.
- Security cookies: help reduce misuse by validating interactions.
6.2 Performance cookies
Performance cookies help measure whether pages load quickly and whether features work reliably. In practice, performance measurement focuses on aggregated results like average load time bands. The aim is to improve stability and reduce frustration.
- What it can measure: page load bands (e.g., under 2 seconds, 2–5 seconds, above 5 seconds).
- What it avoids: storing unnecessary personal details when not needed for the measurement.
6.3 Analytics cookies (practical interpretation)
Analytics cookies and similar technologies can help us understand how the site is used at a general level—for example, which categories are popular or which pages have unexpected errors. Where possible, we prefer aggregated reporting rather than user-level profiling.
6.4 How to control cookies (step-by-step)
- In your browser settings: open Settings → Privacy → Cookies/site data and choose your preference.
- Clear existing cookies: you can clear cookies for pokicom.games specifically to reset stored preferences.
- Use private browsing: it typically reduces persistent storage across sessions.
Tip: If you block all cookies, some features may not work as expected. If you prefer strict privacy controls, try blocking non-essential cookies while keeping necessary cookies enabled.
7) Data Retention
We retain information only for as long as it is needed for the purposes described in this policy, plus any period required to meet legal, security, or operational obligations. Retention is not a single fixed number; it depends on the category of data and the reason it exists.
| Data type | Typical retention logic | Example retention window (practical) |
|---|---|---|
| Account information | Kept while the account is active and needed for access/support | Until account deletion request is processed, plus a short safety buffer |
| Login/security logs | Kept to detect patterns and investigate incidents | Often kept for a limited period (e.g., 30–180 days) depending on risk needs |
| Performance and stability events | Kept in aggregated form to track reliability and compatibility | Commonly stored in summary form for 6–24 months |
| Support messages | Kept to resolve issues and maintain continuity | Typically 12–24 months, depending on the nature of the ticket |
If you request deletion of your account-related information, we will take reasonable steps to remove or de-identify relevant data, unless retention is required for security investigations, legal compliance, or the prevention of misuse.
8) Third-Party Services and Disclosure
Poki Com Games may use third-party services to support site operation (for example, hosting, content delivery, embedded game delivery, and security protection). When third parties are involved, we aim to work with providers that apply professional safeguards and contract-based obligations.
8.1 When information may be shared
- Service providers: to run the site, deliver content, or provide security and stability support.
- Legal or safety reasons: if required by applicable law or to respond to valid legal processes.
- Protection of rights and safety: to investigate fraud, security incidents, or abuse.
8.2 What we avoid
We do not share information casually. We aim to avoid disclosure unless it is necessary to operate the service or to meet legal/safety obligations. If you see unusual requests for personal information purportedly “on behalf of Poki Com Games,” treat them as suspicious and contact [email protected].
8.3 Embedded games (important note)
Some games may be embedded or delivered by third-party game providers. Those providers may collect information based on their own policies (for example, device data needed to run a game). Where applicable, you should review any relevant notices provided at the point of use.
Practical safety check: If a game asks for permissions that feel unrelated to gameplay (for example, phone contacts), do not grant them. Browser games should generally not require such access.
9) Your Rights as a User
We respect user control and aim to provide practical ways to exercise rights. Depending on your context, you may request access, correction, or deletion of certain information. We may ask for verification to protect you from unauthorised requests.
9.1 Access and correction
- Access: you can request a summary of account-related information we hold.
- Correction: if an email or profile detail is inaccurate, you can request correction.
9.2 Deletion (where applicable)
You may request deletion of account information. If deletion is requested, we will take steps to remove or de-identify data, subject to retention needs described in Section 7.
9.3 Cookie controls
You can manage cookies using browser settings. If you want a “clean slate,” clearing site data for pokicom.games is a straightforward approach.
9.4 How to submit a request (step-by-step)
- Email
[email protected]with the subject line: “Privacy Request”. - Describe your request clearly: access, correction, or deletion.
- Provide the account email (if applicable) and any relevant details to help identify the request.
- For safety, we may ask you to confirm ownership of the email address used for the account.
10) Children’s Privacy (important for game platforms)
Protecting children online is a serious responsibility. Poki Com Games is intended for a general audience, but some users may be under 18. We encourage parents and guardians to supervise children’s online activity, especially where accounts or interactive features exist.
10.1 What we do to reduce risk
- We aim to minimise collection of personal information that is not necessary for platform operation.
- We apply security monitoring to reduce abuse, including patterns that may target younger users.
- We provide a direct support contact for concerns:
[email protected].
10.2 Guidance for parents and guardians (practical)
- Use shared family rules for screen time and online interactions.
- Review browser privacy settings on devices used by children.
- Encourage children to avoid sharing personal details in any public or semi-public space.
- If you believe a child has shared personal information on the platform, contact us and we will review reasonable steps to address it.
11) International Data Transfers
The internet is global by nature. Depending on hosting and service providers, information may be processed in locations outside your state or country. When such transfers occur, we aim to apply safeguards consistent with professional standards and contractual obligations.
In practical terms, international processing may happen when:
- content delivery networks (CDNs) route data through the nearest region to reduce loading time;
- security providers detect and block abuse across multiple regions;
- technical operations require cross-region redundancy for stability.
What remains consistent: Regardless of where processing occurs, the purpose remains the same: operate the platform, maintain security, and improve compatibility. We do not treat transfers as a reason to weaken protection.
12) Changes to this Privacy Policy
We may update this Privacy Policy when practices change, when new features are introduced, or when risk controls are improved. Updates are made to keep the policy accurate and meaningful. If the change is significant, we aim to provide a clear notice on the relevant page.
How to review updates
- Check the publication date shown at the top of this page.
- Read the section headings that match your concern (cookies, retention, rights).
- Contact support for clarification if any part is unclear.
13) Contact Us
If you have questions, requests, or concerns about privacy, account safety, or data handling, contact us using the official support email:
Email: [email protected]
How to get a faster resolution
- Use a clear subject: “Privacy Question” or “Privacy Request”.
- Include the page or game name you were using (if relevant).
- Describe the issue with basic details (date/time range and device type).
- Avoid sending passwords or one-time codes by email.
Safety note: We will never ask you to share your password by email. If anyone claiming to represent Poki Com Games asks for your password, do not respond and contact [email protected].
Brief introduction before closing
This Privacy Policy is designed to help Indian users understand how Poki Com Games handles information in a responsible, safety-first manner. For broader context about the platform, you can visit Poki Com Games.
Before you leave, here is a quick reminder: if you want to stay updated with platform changes and notices, see more about Poki Com Games and Privacy Policy and News at Privacy Policy.
Thank you for spending time with Poki Com Games. We remain committed to improving safety, device compatibility, and a reliable gaming experience—without demanding information that does not serve those goals.
-
Q: 1) Does Poki Com Games require an account to play?
A: No. Many users can browse and play without creating an account. If an account feature exists for a specific function, only the minimal account information needed for that function is requested.
-
Q: 2) What are the main types of information collected?
A: The core categories are account information (if you sign up), login/security information, game behaviour data (platform-level usage and performance), and technical device data (browser/OS/screen signals).
-
Q: 3) Why does Poki Com Games collect device and browser details?
A: Device and browser details help improve compatibility, diagnose errors, and ensure games load reliably across popular Indian device types and browsers.
-
Q: 4) How can I control cookies on Poki Com Games?
A: You can manage cookies through your browser settings. You may also clear site data for pokicom.games to reset stored preferences. Blocking all cookies may affect sign-in or page stability.
-
Q: 5) Does Poki Com Games share data with third parties?
A: Data may be shared with service providers that help operate the site (such as hosting, delivery, or security). Sharing is limited to what is necessary for operations, safety, and legal obligations.
-
Q: 6) How long is information retained?
A: Retention depends on the category. Security logs are typically kept for a limited period to detect and investigate abuse, while aggregated performance summaries may be retained longer to track stability improvements.
-
Q: 7) How do I contact Poki Com Games about a privacy concern?
A: Email [email protected] with a clear subject such as \u201CPrivacy Question\u201D or \u201CPrivacy Request\u201D, and include the details needed to identify your request. Do not send passwords or one-time codes.