Security & Ecology Policy
GGPoker SECURITY AND ECOLOGY Policy (“SEP”)
TABLE OF CONTENTS
- ACTIONS FOR BREACHES OF SEP
- USE OF BOTS
- USE OF REAL-TIME ASSISTANCE (RTA)
- ACCOUNT SHARING
- ENHANCED ENFORCEMENT OF VIP CASH GAMES AND TOURNAMENTS
- PREDATORY BEHAVIOR
- BUM HUNTING
- MULTI ACCOUNTING
- USE OF REMOTE DESKTOP & SCREEN SHARING PROGRAMS
- USE OF VPN, PROXY, LOCATION MASKING PROGRAMS
- USE OF VIRTUAL MACHINES & EMULATORS
- THIRD-PARTY TOOLS
- USER SOLICITATION
- OFFENSIVE USER PROFILE
- DATA MINING
updated: October 29th, 2021
1.1. The Security and Ecology Policy (the ‘SEP’) as maintained and operated by the GGPoker Security Team (“The Security Team”), should be read by you, the End User, before playing on GGPoker and the GGPoker Network (“GGPN”). Your decision to play on GGPoker is confirmation of your acceptance of the terms of the SEP.
1.2. GGPoker’s ethos is that a healthy and safe User ecology is paramount to providing enjoyable poker games. To this end, we have implemented several security measures to foster and maintain a healthy ecology and ensure that GGPoker users experience a safe and secure environment. The items outlined below state what is being monitored, how it is being monitored, and any potential actions taken by GGPoker.
1.3. We reserve the right to make immaterial changes to the SEP. If we make any material changes to SEP, we will give you as much prior notice of such changes as is reasonably practicable but, in any event, you will be notified of material changes before they come into effect. Material changes will be communicated to you via email with a summary of the material changes to these Conditions. You will also receive a pop-up message when you login directing you to review the completely updated SEP. After reviewing the updated terms and conditions, you will be prompted to “Agree” to the updated SEP to continue to use our services. Your continued use of the services after being notified of the material changes, and after indicating your acceptance of the updated SEP, will be considered by us to be your acceptance of the changes. If you do not agree to the material changes, then you will not be able to continue to use the services.
2. ACTIONS FOR BREACHES OF SEP
2.1. The Security Team’s paramount objective is to provide a safe and healthy poker environment, and we will always aim to educate users at the outset. In the event of a severe breach (or repeated breaches), your account may be locked to allow for an investigation of the alleged breach. While your account is locked, access to your account, log in, gameplay, withdrawal, deposits, or inter-wallet transfers may be restricted.
2.2. Actions which can be taken against Users for confirmed breaches, based on the accumulated information available to us, are one, or a combination of the following:
- WARNING: A written notice;
- REWARD REMOVAL: Removal/reduction of your promotional rewards;
- SUSPENSION: Temporary suspension of your account;
- ACCOUNT CLOSURE: Permanent closure of your account;
- PERMANENT BAN: Permanent ban from GGPN;
- CONFISCATION: Seizure of funds to compensate victims of any prohibited/fraudulent activities (loss of funds due to use of Bots or other 3rd Party Programs, loss of funds owing to Collusion, loss of funds due to Bum Hunting). Seizure of funds may not only include funds in your poker wallet but in your main wallet as well as any pending withdrawals.
2.3. Regarding the results of any investigations, The Security Team’s decisions are final. The Security Team reserves the right to determine whether or not a breach of the SEP has occurred. By agreeing to our SEP, you hereby accept the Security Team’s said right of decision and determination.
3. USE OF BOTS
3.1. A bot plays without human intervention or reduces the requirement of a human to make decisions. A human must decide what action to take and the exact size of any bet or raise. Any tool or service which reads the current game state and gives a user aid on decisions is strictly prohibited.
3.2. GGPoker’s software package contains certain features designed to detect the use of automated programs that enable gameplay based on Artificial Intelligence.
3.3. GGPoker’s software may perform any or all of the following scans to detect the use of illicit automated programs and ensure that a “cheat-free” environment is maintained:
- Scan of all active software applications while accessing the client.
- Scan of all active processes while accessing the client.
- Scan of all activities for the potential use of artificial intelligence.
3.4. If our scans reveal a suspicious application or process, our software may scan the associated files to compile a composite mesh (a profile that characterizes the files associated with the application or process) to be matched against profiles for known illicit automated programs
3.5. Actions taken for breaches: PERMANENT BAN, CONFISCATION
4. USE OF REAL-TIME ASSISTANCE (RTA)
4.1. Every decision made at the poker table should be made unassisted.
4.2. Real-Time Assistance (RTA) is defined as any external assistance which either provides users with an unfair advantage over their opponents, or influences their decision-making in real time, or allows them to play in a manner they otherwise would not be able to replicate.
4.3. External assistance includes, but is not limited to, software, apps, websites, physical reference materials and digital reference materials. Referring to charts of any kind during play is strictly prohibited.
4.4. Actions taken for breaches: TEMPORARY SUSPENSION, PERMANENT BAN, CONFISCATION
5.1. GGPoker prohibits users from making fraudulent or unlawful use of their software.
5.2. GGPoker prohibits users from breaking into, accessing, or attempting to break into the software and/or GGPN with malicious intent.
5.3. GGPoker prohibits users from exploiting or attempting to exploit software bugs within the client for personal/mutual gain.
5.4. GGPoker has developed and employs sophisticated proprietary technology intended to seek out and identify offending users.
5.5. Actions taken for breaches: PERMANENT BAN, CONFISCATION
6. ACCOUNT SHARING
6.1. GGPN prohibits the sharing of accounts. Users may only access accounts registered by themselves.
6.2. GGPN prohibits sharing a significant volume of hands/results with anyone else to analyze or hunt other users.
6.3. GGPN prohibits sharing accounts as it affects the integrity of leaderboards and promotions.
6.4. Actions taken for breaches: REWARD REMOVAL, PERMANENT BAN, CONFISCATION
7.1 Users are strictly prohibited from playing on behalf of someone else or allowing someone else to play on their account.
7.2 The use of software to share hole card information with other individuals in real-time is strictly prohibited. Further discussed in section 15. Use of VPN, Proxy & Remote Desktop
7.3. Actions taken for breaches: PERMANENT BAN, CONFISCATION
8.1. GGPN strictly prohibits Users previously banned from any GGPN skin from returning on any GGPN skin account.
8.2. Actions taken for breaches: CONFISCATION
9. ENHANCED ENFORCEMENT OF VIP CASH GAMES AND TOURNAMENTS
9.1. Users involved in any of the following financial relationships are strictly prohibited from playing at the same VIP cash game tables as their associates: staking, swaps, profit-sharing, or any bankroll sharing agreement.
9.2. Real Name players and players that have been requested to provide personal documents for Real Name conversion are strictly prohibited from creating and/or playing on any new accounts, and creating and/or playing on any pre-existing accounts other than their Real Name accounts, on any GGPN skin.
9.3. Users are strictly prohibited from making deals, including off-client deals, at the Final Table of select tournaments, including the Super Million$ High Roller.
9.4. Actions taken for breaches: 30-DAY SUSPENSION, PERMANENT BAN, CONFISCATION
10.1. Collusion is the behavior in which two or more users establish a partnership to gain an unfair advantage over other users at the same cash game table or same tournament. The Security Team’s general rules regarding collusion are (but not limited to):
- Users’ hands must be played independently, in their own best interests.
- Users must not have a partnership to gain an advantage over other users.
- Users must refrain from “Soft-Play,” i.e., the act of intentionally playing hands in a non-aggressive manner against another user who is either a friend, backer, or another person of interest. The only exception to this Rule 3 is the “In The Money (ITM)” bubble and multi-handed situations past the money bubble in which one or more users is all-in.
- Users must not share hole-card information with another user under any circumstances.
10.2. The Security Team employs sophisticated industry-leading tools to detect suspicious actions deemed as collusion. Our tools monitor an assortment of data, such as hand history, betting patterns, and user gameplay. We also look at various other sources of information as part of our investigations.
10.3. Actions taken for minor breaches: WARNING, TEMPORARY BAN
10.4. Actions taken for repeat/major breaches: PERMANENT BAN, CONFISCATION
11. PREDATORY BEHAVIOR
11.1. Predatory Behavior is defined as user activities focused primarily on engaging in unethical advantages and tactics to exploit other users to gain unfair profit.
11.2. Predatory Behaviour includes, but is not limited to, Bum Hunting, Collusion, Use of Artificial Intelligence, Ratholing, Grimming, Hit-and-running, Buttoning, and other behaviors deemed unethical by consensus of the poker community).
11.3. GGPoker’s promise to its users is to provide a safe, fun, and enjoyable poker environment. Predatory Behavior is in direct conflict with our promise, and as such, the Security Team adopts a strict zero-tolerance policy.
11.4. Actions taken for initial breaches: WARNING, TEMPORARY BAN
11.5 Actions taken for repeat breaches: PERMANENT BAN, CONFISCATION
12. BUM HUNTING
12.1. Bum hunting is defined as the act of deliberately targeting one subset of (usually weaker) Users while avoiding giving action to another subset of (usually stronger) Users.
12.2. Bum hunting includes targeting a User by intentionally sitting out at a table or observing Cash Game tables and only participating when the preferred User joins.
12.3. Bum hunting also includes the act of purposely targeting a User by following the targeted User’s activity. For example, being on standby in the lobby until a preferred User enters a game and then following them into the game and playing only until said User leaves.
12.4. While it is acceptable to be seated and occasionally deny action in certain circumstances, giving action to certain players while denying action to other players when you are starting tables is strictly prohibited.
12.5 Queueing, the act of intentionally seeking to avoid playing against specific players in blind registration games, such as Spin & Gold, is strictly prohibited.
12.6. Actions taken for initial breaches: WARNING, SUSPENSION
12.7. Actions taken for repeat/major breaches: PERMANENT BAN, CONFISCATION
13.1. Chip-dumping is defined as the act of a user intentionally losing his/her chips to another user.
13.2 Actions taken for minor breaches: WARNING, TEMPORARY BAN
13.3. Actions taken for repeat/major breaches: PERMANENT BAN, CONFISCATION
14. MULTI ACCOUNTING
14.1. GGPN prohibits users from intentionally opening/using multiple accounts on the same GGPN skin.
14.2. GGPN prohibits users from playing from multiple accounts simultaneously. This includes, but is not limited to, playing on the same Cash Game table, Spin & Gold game, or the same player pool for any other games offered.
14.3. GGPN prohibits users from playing from multiple accounts in the same tournament.
14.4. GGPN prohibits users registering for the same tournament multiple times to take advantage of freerolls or promotions.
14.5. If a user accidentally creates a multi-account, we will close all newly created accounts and move funds to the original account.
14.6. Actions taken for breaches: ACCOUNT CLOSURE, PERMANENT BAN
15. USE OF REMOTE DESKTOP & SCREEN SHARING PROGRAMS
15.1. GGPoker strictly prohibits the use of any program that enables a user to remotely access others’ devices or others to remotely access the user’s device in conjunction with the GGPoker client.
15.2. GGPoker strictly prohibits the use of any program that enables a user to share one’s own screen with others or others to share their screen with the user in conjunction with the GGPoker client to gain an unfair advantage over their opponents.
15.3. The prohibited programs include, but are not limited to, the following:
- Microsoft Remote Desktop
15.4. GGPoker strictly prohibits the use of such programs as they may facilitate additional breaches of our Security & Ecology Policy (SEP), including ghosting, use of RTA, botting and multi accounting.
15.5. Actions taken for minor breaches: WARNING, TEMPORARY BAN
15.6. Actions taken for repeat/major breaches: PERMANENT BAN, CONFISCATION
16. USE OF VPN, PROXY, LOCATION MASKING PROGRAMS
16.1. GGPoker strictly prohibits the use of VPN, proxy or any alternative methods intended to mask one’s actual location and/or identity.
16.2. GGPoker strictly prohibits the use of VPN, proxy or any alternative methods for a user to play from a prohibited region.
16.3. GGPoker reserves the right to request and obtain a user’s Proof of Presence (PoP) at our discretion in order to verify their actual whereabouts.
16.4. Actions taken for minor breaches: WARNING, TEMPORARY BAN, VPN BLOCK
16.5. Actions taken for repeat/major breaches: PERMANENT BAN, CONFISCATION
17. USE OF VIRTUAL MACHINES & EMULATORS
17.1. GGPoker strictly prohibits the use of any virtual machines and Android emulators in conjunction with the GGPoker client.
17.2. The prohibited virtual machine programs include, but are not limited to, the following:
- Oracle VM VirtualBox
- Microsoft Hyper-V
17.3. Users must run the GGPoker client in an operating system that is native to the hardware device one is using.
17.4. Actions taken for minor breaches: WARNING, TEMPORARY BAN
17.5. Actions taken for repeat/major breaches: PERMANENT BAN, CONFISCATION
18. THIRD-PARTY TOOLS
18.1. GGPoker does not permit the use of certain third-party tools.
18.2. A third-party tool is prohibited if it
- Datamines: (i) hands or private results (observing games without playing to build up a database of hand histories for future reference) and (ii) the mass sharing of hands, personal results, or playing statistics for analysis of opponents.
- is a Heads-Up Display (HUD), i.e., a program that displays users’ past tendencies and betting patterns.
- assists in automatic seating or game-selection efficiency.
- is deemed by The Security Team to provide an unfair advantage over other users.
18.3. A third-party tool is permitted if it
- assists only in the tiling/aligning of tables.
- assists in creating macros and hotkey for gameplay efficiency that does not reduce the requirement of a user having to make a decision. The user must decide what action to take and the exact relative size of any bet or raise, with the macro or hotkey merely executing it. For example, a hotkey that bets half the pot is permitted. A hotkey that bets a randomized amount between half and three-quarters of the pot is prohibited.
- is deemed inoperable in conjunction with the client, despite exhibiting characteristics of prohibited third-party tools.
18.4. Actions taken for minor breaches: WARNING, SUSPENSION
18.5. Actions taken for major/repeat breaches: PERMANENT BAN
19.1. Ratholing includes, without limitation, incidents where a user plays short-stacked, and upon hitting a certain chip threshold, the offending user intentionally leaves the table and immediately sits with a lesser stack at a new table of the same limit.
19.2. Actions taken for breaches: WARNING, SUSPENSION
20. USER SOLICITATION
20.1. GGPoker considers any attempts to solicit personal information as a threat to our users, and strictly prohibits such behavior. Should GGPoker determine that solicitation of personal information has occurred, we reserve the right to immediately suspend the offending accounts for further investigation, permanently ban the offending accounts, and in severe cases, take legal actions against these accounts.
20.2. Actions taken for initial breach: WARNING, TEMPORARY CHAT BAN
20.3. Actions taken for repeat breaches: PERMANENT CHAT BAN, PERMANENT BAN
21. OFFENSIVE USER PROFILE
21.1. Users should not have user profiles, i.e., nicknames and avatars, that are offensive to other users. A common-sense policy should be used to determine what is deemed to be offensive. Examples are user profiles with expletives, insults, political, racial, or sexual implications, and celebrity impersonations.
21.2. GGPoker reserves the right, without prior notice, to replace any avatars it deems to be offensive.
21.3. GGPoker reserves the right, without prior notice, to reset any Nicknames it deems necessary.
21.4. Users that continuously update offensive user profiles can lose access to these functions.
21.5. Actions taken for breaches: WARNING, SUSPENSION
22. DATA MINING
22.1. GGPoker defines data mining as any act that leads to accumulating hand histories that were not played by oneself.
22.2. GGPoker strictly prohibits the use of any 3rd party tools to datamine or import hand histories from the poker table and/or PokerCraft.
22.3. GGPoker strictly prohibits Users granting direct or indirect access to PokerCraft data to another party.
22.4. GGPoker strictly prohibits sharing of one’s hand histories en masse to another party.
22.5. Actions taken for minor breaches: WARNING, REMOVAL OF ACCESS TO POKERCRAFT
22.6. Actions taken for repeat/major breaches: GAME REMOVAL, PERMANENT BAN