Skip to content

Privacy Policy

This Privacy Policy describes how ChainSentry (“ChainSentry,” “we,” “our,” or “us”) collects, uses, stores, and protects information in connection with our products and services, including TrustEngine.

This Policy applies to information collected through our websites, services, communications, and assessments.

Information We Collect

Depending on how our services are used, we may collect:

  • Contact information (name, email address, company affiliation)

  • Entity names and identifiers submitted for assessment

  • Contextual information relevant to counterparty evaluation

  • Communications with ChainSentry

  • Technical metadata (IP address, browser type, device information) for security and analytics purposes

We do not collect personal data unrelated to the provision of our services.

How We Use Information

ChainSentry uses collected information to:

  • Perform counterparty assessments and deliver assessment outputs

  • Operate, maintain, and improve our analytical capabilities and services

  • Conduct internal analysis, aggregation, and research to enhance risk detection methodologies

  • Support customer communications and service delivery

  • Maintain security, integrity, and compliance obligations

ChainSentry does not sell personal data or use TrustEngine submissions for advertising or marketing unrelated to our services.

Confidentiality of Customer Identity

ChainSentry treats customer identity and engagement details as confidential.

We do not disclose which customers are associated with specific assessments, inquiries, or outputs, except:

  • Where required by law, regulation, or lawful process

  • Where necessary to comply with legal or regulatory obligations

Assessment Data and Outputs

Information submitted to TrustEngine, as well as assessment outputs, may be retained and used by ChainSentry to:

  • Operate and improve TrustEngine

  • Maintain analytical continuity and quality

  • Support internal research, aggregation, and risk pattern analysis

Except as expressly stated, customers are not granted ownership rights in ChainSentry’s assessments, methodologies, or analytical outputs.

Legal Basis for Processing (GDPR)

Where applicable, ChainSentry processes data on the basis of:

  • Performance of a contract or provision of requested services

  • Legitimate business interests in providing risk and compliance services

  • Compliance with legal and regulatory obligations

Data Retention

Information is retained only as long as necessary to:

  • Deliver requested services

  • Support analytical integrity and auditability

  • Comply with contractual, legal, or regulatory requirements

Retention periods may vary depending on the nature of the data and applicable obligations.

Data Security

ChainSentry employs administrative, technical, and organizational safeguards appropriate for handling sensitive compliance, enforcement-related, and investigative data.

Disclosure to Authorities

ChainSentry may disclose information where required by law or where necessary to address legal or regulatory violations, including disclosure to competent authorities.

Your Rights

Depending on jurisdiction, individuals may have rights to:

  • Access or correct personal data

  • Request deletion where legally permissible

  • Object to or restrict certain processing activities

Requests may be submitted to: privacy@chainsentry.com

International Transfers

Where data is processed across borders, ChainSentry applies safeguards consistent with applicable data protection laws.

Contact

Questions regarding this Privacy Policy may be directed to: privacy@chainsentry.com

Updates

ChainSentry may update this Privacy Policy periodically. Material changes will be reflected by an updated “Last Updated” date.

 

Always Innovating,
Always Vigilant

Gray market actors adapt rapidly, circumventing contractual and regulatory safeguards with growing sophistication. ChainSentry continually advances its capabilities to outpace these evolving threats. Our unwavering commitment to innovation ensures your organization maintains a decisive edge in protecting sensitive technologies and securing your strategic interests.

Meet the Leadership

Greg Thomas Profile Pic

POSITION

Lorem Ipsum Dolor

Greg Thomas Profile Pic

POSITION

Lorem Ipsum Dolor

Greg Thomas Profile Pic

POSITION

Lorem Ipsum Dolor