
01
Apr
Is my data secure?
Yes. At Silver State Lottery, data security is a top priority. We utilize a comprehensive, enterprise-grade security framework designed to protect your personal information, financial data, and platform interactions from unauthorized access, cyber threats, and fraudulent activity.
Our systems are built to align with state, federal, and international data protection standards, including compliance with PCI-DSS (Payment Card Industry Data Security Standard), GDPR (General Data Protection Regulation, where applicable), and Nevada Revised Statutes governing digital security.
Our Security Infrastructure Includes:
1. Encrypted KYC Storage
All Know Your Customer (KYC) documentation—including ID uploads, proof of address, and personal identifiers—is stored using AES-256 bit encryption, the highest industry standard. Data is encrypted both in transit and at rest, ensuring that sensitive information is never exposed during transmission or storage.
2. Blockchain Verification for Crypto Payments
For users choosing to engage with cryptocurrency, Silver State Lottery employs blockchain-based verification protocols to authenticate crypto transactions. These protocols offer:
Tamper-proof transaction ledgers
Decentralized validation of funds
Enhanced anonymity without compromising compliance
All crypto wallets are processed through secure smart contract gateways with anti-fraud monitoring built-in.
3. Multi-Layered Server Security & Anti-Bot Firewalls
Our infrastructure is protected by a multi-tiered security architecture, including:
Intrusion detection systems (IDS) and intrusion prevention systems (IPS)
Cloud-based DDoS mitigation tools to prevent traffic flooding
Behavioral anomaly detection to flag unauthorized access attempts
WAFs (Web Application Firewalls) to block bot traffic, scraping, and API abuse
We continuously monitor and update our systems with real-time security patches and 24/7 threat detection.
4. IP Tracking and Device Fingerprinting
To prevent identity spoofing, fraudulent activity, and location-based violations, we implement:
Real-time IP address tracking for geolocation enforcement
Device fingerprinting to create a unique, encrypted profile of each user’s device configuration
Session analytics to detect unusual login patterns or unauthorized access attempts
These tools help us maintain strict one-user, one-account controls, essential for protecting prize integrity and ensuring regulatory compliance.
Data Retention & Regulatory Compliance
We retain personal data only as long as necessary to fulfill legal, regulatory, and operational obligations. All data retention and deletion policies follow best practices defined by:
Nevada’s consumer protection laws
Federal communications and financial regulations
Charitable gaming data retention statutes
Your data is never sold, rented, or shared with third parties for marketing purposes. It is only used for compliance, security, and internal operational needs.