Legal Stuff

Security Practices

Contents

1. Introduction

SweepstakesPros comprehensive security measures include physical and online security techniques to monitor and block irregular activity (i.e., hackers, automated entries, viruses, etc.) from disrupting your sweepstakes, contests, and games. Our advanced security techniques help ensure that your promotion will run smoothly, uninterrupted and error free. Our protection measures include:

2. Protection for You and Your Promotions

  • Legal Support & Indemnification. We stand behind our work. Subject to your Master Services Agreement (MSA), SweepstakesPros will indemnify you for claims arising directly from the services we provide related to your promotions, including our drafting, review, and approval of promotion rules and marketing materials, and for their compliance with applicable prize promotion laws (unless, of course, you disregard our recommendations).
  • In over 30 years, we have had zero legal challenges to promotions run by SweepstakesPros.
  • We are hands-on experts at creating, running, and managing sweepstakes, contests and promotions.
  • We have run thousands of successful promotions since we were founded over 30 years ago.
  • SweepstakesPros provides access to licensed attorneys in over 100 countries to help ensure your promotions are legal in every country you run them.
  • We are promotions experts. We understand the complex state, federal and international laws that govern sweepstakes and we know what it takes to make your promotion a success.

3. Data Center Security

  • The data collected for your promotions via our Promotions Platform are stored on secure servers hosted on the Amazon AWS cloud platform, located in Virginia, USA. The AWS cloud security infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables SweepstakesPros to deploy high volume promotions quickly and securely. For more information on AWS security please visit http://aws.amazon.com/security/.
  • AWS maintains numerous third-party assessments for its infrastructure (e.g., SOC reports, ISO/IEC 27001/27017/27018, PCI DSS for applicable services). SweepstakesPros leverages these facilities and implements application-level controls appropriate to our services.
  • These data centers feature biometric access systems, data center cages, security cameras, entry/exit audit trails, and are managed 24/7/365 with onsite security staff.
  • Our Promotions Platform and websites employ layered DDoS protection.
  • System access is restricted to authorized personnel and protected by least-privilege role-based access control (RBAC), multifactor security, network segmentation, VPNs where appropriate, and firewall rules. Access is reviewed on a regular basis.

4. Data Privacy Measures

  • Data is encrypted in transit (HTTPS/TLS 1.2+; TLS 1.3 preferred) and at rest with strong industry-standard ciphers and managed keys.
  • We do not sell your data or the data you collect with our Promotions Platform.
  • All application traffic, including authentication, occurs over HTTPS (TLS). HTTPS is available and enforced on all campaigns hosted by SweepstakesPros.
  • We implement controls to support our Clients' GDPR and other privacy obligations (e.g., data minimization, access controls, audit logging, encryption, regional transfer mechanisms). Our Sub-Processors are vetted and bound by data protection terms.
  • Winner Tax Data Controls. Where Clients instruct us to collect winner tax information (e.g., SSN/ITIN/TIN or non-U.S. equivalents) for prize administration and tax reporting, access is strictly limited on a need-to-know basis, data is encrypted at rest and in transit, and files are transmitted via secure, encrypted channels. Such data is retained only for periods required by applicable tax and recordkeeping laws and then securely deleted or irreversibly anonymized (with backups purged on the next cycle).
  • You can learn more about privacy by reviewing our Privacy Policy.
  • Visit our list of Sub-Processors to learn more.

5. Data Loss and Corruption Prevention

  • To keep your data safe, each client's data is stored in separate, secure databases. Your data is never mixed with other clients' data.
  • Backups are encrypted and tested on a regular basis.
  • SweepstakesPros technology infrastructure provides enterprise scalability, maximum security, and redundancy with firewalls, load balanced servers, encrypted database servers, IDS/IPS tools, virus protection, and daily backups.
  • Our promotion systems are monitored 24 hours a day 7 days a week for suspicious activity, errors, issues, potential issues, and performance.
  • Physical access controls are in place to protect hard-copy data and computer equipment. Operational security procedures are devised to minimize the number of storage locations in which personal data is held.
  • Security policies and mechanisms include unique user accounts, disabled shared/guest accounts, RBAC and least-privilege access, strong credential standards with MFA, central logging, timely security patching, antimalware, firewalls, VPNs, and encryption of personal data during transit and at rest.
  • Unique user accounts (with strong password requirements) are assigned to each user. Access to personal data is limited only to user accounts approved to access such data.
  • A clean desk policy is always maintained by SweepstakesPros' personnel. All forms of physical personal data such as promotion entry forms, tax documents, and entry validations are not left out on desks or in open areas when not needed. All confidential materials and data are stored in secure locked areas with limited access.

6. Proper Data Destruction

  • We maintain written data retention and destruction procedures covering digital and physical records (e.g., promotion entries, winner lists, validation letters, tax records, mail, long-term storage). We minimize confidential data collection and securely destroy data when it is no longer needed or at the end of the applicable retention period.
  • All paper documents containing confidential or personal data are destroyed using cross-cut shredders.
  • When IT equipment is decommissioned, storage media is securely wiped (cryptographic erase/overwrite) or physically destroyed prior to disposal.

7. Data Breach Protocols

  • SweepstakesPros ensures the security of client data and confidential information. Our information security incident response process detects, responds to, and reports incidents quickly and effectively. Our systems help ensure that we minimize losses, address weaknesses, swiftly restore system functionality, and maintain business continuity.
  • Comprehensive chain of custody procedures are followed to protect evidence gained during any security incident.
  • Where we act as a processor, we will notify Clients without undue delay after becoming aware of a personal data breach and provide information required to support Client notifications, consistent with our DPA.

8. Employee Education & Internal Protocols

  • Employees that have access to customer data undergo criminal history background checks prior to employment.
  • All employees are required to sign non-disclosure and confidentiality agreements.
  • We provide information and training to our employees regarding privacy and security best practices.
  • Access to systems and data is promptly removed upon role change or separation and verified through termination checklists.
  • To protect our company from a variety of different losses, SweepstakesPros has established a comprehensive insurance program. Coverage includes: coverage for cyber incidents, data privacy incidents (including regulatory expenses), general error and omission liability coverage, workers compensation, and commercial general liability coverage.

9. Promotion Specific Protections

  • Independent Arbitration & Dispute Resolution. SweepstakesPros will act as the third-party independent judging organization for your promotion. We will interpret the rules and make fair and impartial decisions if issues arise, and we will manage any consumer complaints or inquiries. This helps protect you. By designating SweepstakesPros as the third-party independent judge in the Official Rules of the promotion you, and more importantly your entrants, agree that if an issue or complaint arises, SweepstakesPros will decide how best to interpret the rules and proceed. Our role is designed to provide a clear and efficient process for resolving consumer complaints and promoting fairness in your promotion and can help mitigate potential disputes.
  • Secure Data & Record Keeping. Running a promotion involves strict rules for handling data and keeping records. SweepstakesPros manages this entire process for you, securely storing all promotion data and maintaining records in full compliance with applicable laws.
  • Quality Assurance Testing.Our Quality Assurance Engineers perform rigorous testing of your promotion for functionality, browser support, stability, security and load.
  • Entry Restrictions. Consumers can be limited to entering the promotion based on any criteria such as email address, household, frequency (i.e., once per day), geography (i.e., excluding Florida), age (must be over 18), or any other criteria desired.
  • Child/Minor Participation Controls We provide configurable age-gating and (where required) parental consent workflows to help Clients address child privacy requirements (e.g., COPPA, CARU). These systems can block child registrations or require parental permission before children can participate in the promotion.
  • Data Collection and Tracking. All visitor tracking and submission data is collected centrally in a secure, redundant, encrypted database.
  • Duplicate Validation. Players can be restricted from entering a promotion multiple times based on any criteria such as name, phone number, email address, household, frequency (i.e., once per day), geography (i.e., excluding Florida), age (must be over 18) or any other criteria desired. SweepstakesPros' advanced duplication algorithms make it difficult to thwart duplication validation.
  • Entry Validation. Sweepstakes entries are validated to ensure that the information is accurate and complete and that all entrants meet the requirements of the Official Rules (e.g. entry frequency, geography, age, etc.)
  • Winner Validation. Promotion winners are validated to ensure that their information is accurate and complete and that they all meet the requirements of the Official Rules (e.g. entry frequency, geography, age, etc.)
  • Bot Protection. This feature secures your promotion entry forms with CAPTCHA challenges and other security techniques to block spammers, automated programs, and bots from interfering in promotions.
  • Audit Logs. SweepstakesPros maintains complete activity logs and audit trails of all entries, validation errors, winners, and suspicious activities.
  • IP Address Blocking. Hackers are blacklisted and blocked from disrupting promotions by their IP address.
  • High Volumes. Our load balanced cloud-based servers support extremely large volumes of traffic.
  • Fault Tolerance.Our cloud-based systems provide redundancy for hardware, software, power, and bandwidth.

SweepstakesPros takes data security and privacy very seriously. While we can't reveal everything about our security practices (as it can empower the very people we are protecting against), we hope that the information provided in this document gives you confidence in the security of our promotions and the data that you entrust to us.