Privacy Policy

Effective Date: June 2023

This Privacy Policy outlines the procedures and practices of VC Spectra and its affiliates regarding the collection, usage, sharing, and protection of user information obtained through the website The terms "we," "us," and "our" refer to VC Spectra and its affiliates. By using the VC Spectra website, you consent to the data practices described in this Privacy Policy.

Information Collection:

We collect certain personal information from users, either because it is required by law or for specified purposes. Any non-required information you provide is voluntary. Please note that choosing not to provide non-required information may limit your access to and utilization of our services.

Information you provide upon registration:

When creating a VC Spectra account, you are required to provide personal information such as your email address, name, and password. Additionally, you have the option to add a phone number for two-factor authentication purposes to enhance security.

Information collected during service usage:

  1. Service Usage Information:

As you use the VC Spectra platform, we collect tracking information related to usage, including access date and time, device identification, operating system, browser type, and IP address. This data helps us ensure accessibility across all platforms and aids in criminal investigations. It may be obtained directly by VC Spectra or through third-party services.

  1. Transaction Information:

For personal and enterprise user accounts, we collect transaction information, such as deposit snapshots, account balances, trade history, withdrawals, order activity, and distribution history. This data is monitored to detect suspicious trading activity, protect against fraud, and assist in legal case resolution.

Purpose of Information Collection:

We collect information for the following purposes:

  1. To provide and maintain our services:

The collected information is used to deliver our services and verify user identity. We rely on identification, contact information, and transaction-related data to fulfill our legal obligations and system requirements.

  1. To protect our users:

User information helps protect our platform, user accounts, and archives. We utilize IP addresses and cookie data to prevent automated abuse, such as spam, phishing, and Distributed Denial of Service (DDoS) attacks. Analysis of trading activity aids in early detection of suspicious behavior, reducing potential fraud and loss of funds.

  1. To comply with legal and regulatory requirements:

Respecting user privacy and data security is paramount. We adhere to regulations, governmental requests, and user-generated inquiries. Personal information will not be disclosed to third parties without the review of our legal team and/or prior consent from the user.

  1. To measure site performance:

We actively analyze data to understand how our services are used, improve platform performance, and address user experience issues. Our operations team continuously monitors system activity and user communications to identify and resolve problems promptly.

  1. To communicate with you:

We utilize personal information, such as email addresses, to interact with users directly. This includes providing customer support, informing users about logins, transactions, and security-related matters. Processing your personal information is necessary to respond to your requests, questions, and inquiries. All direct communications are kept confidential and reviewed internally for accuracy.

  1. To enforce our Terms of Use and other agreements:

We diligently review, investigate, and prevent prohibited or illegal activities that violate our Terms of Use. By actively enforcing agreements with third parties and investigating violations, we ensure the well-being of our user base. VC Spectra reserves the right to terminate services for users engaging in activities that violate our Terms of Use.

Data Security:

VC Spectra implements various security measures to protect user information from loss, abuse, or alteration. These measures include PCI Scanning, secure sockets layer encryption technology, pseudonymization, internal data access restrictions, and strict physical access controls.