Skip to content


In the realm of information security, there are several goals to strive for security and safety.  The purpose of’s information security management is to keep the company’s reviews on the score and support well researched and checked.

The company shall take all reasonable means to ensure the integrity and availability of all information utilized or stored by Online Jackpot Slots is responsible for ensuring that all essential information is preserved and stored in compliance with appropriate confidentiality measures and that all information is safeguarded from unauthorized access.

Security Policy for Information

With this policy, the organization’s information assets are protected from any potential threats, whether internal or external, intentional or unintentional.

The Organization’s Policy Is to Guarantee the Following Events Occur:

  • Access to confidential information should be limited to those who have a justifiable need for access, and the principle of least privilege should be respected at all times.
  • Any changes to our systems must be done in a standardized manner across all of our sites to guarantee that our information remains stable, safe, and easily accessible.
  • The confidentiality and integrity of our client information, as well as the confidentiality and integrity of our corporate information, must always be protected.
  • To maintain our position as the industry’s leading platform and media provider, we must provide our iGaming partners and their clients with world-class security solutions.
  • We must always be in conformity with gaming legislation and other legal requirements for our multiple licences. This necessitates the incorporation of compliance into all of our systems and business operations.

Risks Involved with Information Security

Risk management at is performed through the use of an Information Risk Management Framework. This framework is intended to ensure the prompt identification and effective treatment of risks, enabling the organisation to implement a risk-based approach that is integrated into their decision-making processes.


All members of the organization’s management team are accountable for complying to the Information Security Policy. All managers are directly responsible for ensuring that Information Security requirements are met within their respective organisations. The Management Representative is directly responsible for the design, planning, implementation, and operation of’s Information Security Management System (ISMS).

The Internal Audit Committee is directly responsible for ensuring that the information security management system runs smoothly and effectively. This Information Security Policy is subject to amendment and updating whenever substantial changes occur within the organisation.