Security & Ecology Policy

Security & Ecology Policy

GGPoker Network SECURITY AND ECOLOGY POLICY (“SEP”)

Current Version: 20240126

General Terms

1.1. The Security & Ecology Policy (‘SEP’), maintained and operated by GGPoker Security Team (‘Security Team’ or ‘We’), must be fully acknowledged by you, the End User (‘User’), before playing on GGPoker and the GGPoker Network (‘GGPN’)

1.2. By agreeing to or accepting GGPN’s general Terms and Conditions, the User also agrees to accept the terms of the SEP. The decision by the User to play on GGPN signifies acceptance of these terms. 

1.3. The SEP is designed to create and maintain a healthy ecology within GGPN, intended to provide a safe, fair and enjoyable playing environment for all Users, and based on the spirit of fair, safe, and lawful competition. 

1.4. As the owner of an account, the ultimate responsibility for the account’s security, its nickname and password falls on the User. If an account suffers unauthorised access using the correct email and password, we are not liable for any loss on the account, and we reserve the right to confiscate any unlawful gains made during the unauthorised access.

1.5. GGPN will not be liable for any loss the User incurs due to unauthorized use or misuse of the login details except for when We fail to exercise reasonable care. 

1.6. Given a reasonable grounds to believe that a User is involved in any form of Prohibited Activities and Behaviors or Prohibited Use of Auxiliary Tools or Services, the Security Team reserves the right to block and conduct a security check on any account at any time, even during gameplay. The security check may result in, but is not limited to, restricted access to the Users account, cashier, gameplay (both cash games and tournaments), or bonus rewards.  

1.7. We reserve the right to make changes to the SEP. We will notify the User via email and/or in-client pop-up message of any material changes. Continued use of the Services after the notification will be considered as your acceptance of the changes.

1.8. In case of any suspected criminal or fraudulent activities, we may inform relevant authorities of the Users’ identity. 

1.9. In case of any integrity violations, we may inform the Poker Integrity Council. 

1.10. In order to prevent cheating, we reserve the right to perform a scan of the User’s machine or device to monitor Prohibited Activities and Behaviors or Prohibited Uses of Auxiliary Tools or Services. If the scan reveals suspicious activity, our software may scan the associated files to compile a composite mesh to be matched against profiles for known illicit automated programs. 

1.11. In the event of a SEP breach, the Security Team reserves the right to levy one or more penalties after a thorough investigation of the case, based on accumulated information, data, and evidence. 

1.12. Any decision rendered by the Security Team is final. 

1.13. Penalties levied by the Security Team against Users may vary depending on the applicable regulations in that particular territory. 

1.14 Users holding “Verified Name accounts are strictly limited to the possession and operation of a single account across the entire GGPoker Network. Additionally, accounts in the process of conversion to “Verified Name status, or those already designated as “Verified Name accounts, are expressly prohibited from creating or utilising any other accounts, both new and pre-existing, within the GGPoker Network.

1.15. Penalties that can be taken against Users for confirmed breaches of the SEP are one or a combination of the following:

  • WARNING: A written notice
  • REWARD REMOVAL: Removal/reduction of your promotional rewards
  • SUSPENSION: Temporary suspension of your account
  • ACCOUNT CLOSURE: Permanent closure of your account
  • PERMANENT BAN: Permanent ban from the entire GGPoker Network
  • CONFISCATION OF FUNDS: Confiscation of monies won by a player by engaging in prohibited activities or behavior in order to compensate the victims of the unfair gameplay or where no specific victim can be identified, placed into the Network Ecology Improvement Fund. Confiscation may not only include the funds in one’s poker wallet but also the funds in the main wallet as well as any pending withdrawals. 
  • REMOVAL OF ACCESS TO POKERCRAFT: Restriction of access to PokerCraft
  • GAME REMOVAL: Restriction to play certain types of games

Prohibited Activities and Behaviors

Prohibited Activities and Behaviors are defined activities and behaviors that are strictly prohibited on GGPN. Engaging in or being involved in Prohibited Activities and Behaviors may result in penalties specified in each clause.

2. Use of Real-Time Assistance (RTA)

2.1. RTA is defined as any external assistance which provides users with an unfair advantage over their opponents, influences their decision making in real-time, or allows them to play in a manner they otherwise would not be able to replicate.

2.2. Every decision made at the poker table should be made free of any external assistance.

2.3. External assistance includes, but is not limited to, software, apps, websites, physical and digital reference materials. Referring to charts of any kind during play is strictly prohibited. 

2.4. Potential actions for breaches: PERMANENT BAN, CONFISCATION OF FUNDS

3. Use of Bots

3.1. Bot is defined as software, programs, websites or apps that enable playing without human intervention or reduces the requirement of a human to make decisions and/or execute actions. 

3.2. Every decision made at the poker table should be made by the person to whom the account belongs. 

3.3. Bot includes, but is not limited to, artificial intelligence, fully and partially automated bot, or any other tools that automate decisions or actions. 

3.4. Potential actions for breaches: PERMANENT BAN, CONFISCATION OF FUNDS

4. Collusion

4.1. Collusion is defined as behavior in which two or more Users conspire to gain an unfair advantage over their direct opponents in cash games, or part of or an entire field of opponents in tournaments. 

4.2. User must play one’s own hand independently and in their own interests

4.3. User must not share information about one’s own hole cards with other users whilst the same hand is still in play under any circumstances

4.4. User must refrain from ‘soft playing,’ which is defined as intentionally playing hands in a non-aggressive manner against certain opponents (e.g., friend, backer, or any other persons of interest). The only exceptions to this rule are in-the-money (ITM) bubble situations or multi-handed situations after the money bubble in which one or more Users are all-in.

4.5. Users must not conspire to cause financial harm to any User

4.6. Potential actions for breaches: WARNING, SUSPENSION, PERMANENT BAN, CONFISCATION OF FUNDS

5. Multi Accounting

5.1. Multi Accounting is defined as intentionally creating and/or using multiple accounts on the same GGPN skin 

5.2. User is strictly prohibited to participate in any game using multiple accounts simultaneously. 

5.3. User is strictly prohibited to participate in any freerolls or promotions using multiple accounts simultaneously

5.4. Users with Verified Name accounts are only allowed to maintain one account across the entire Network, without exception. It should be noted that Verified Name accounts face closer scrutiny and are held to higher standards. 

5.5. Potential actions for breaches: SUSPENSION, ACCOUNT CLOSURE, PERMANENT BAN, CONFISCATION OF FUNDS

6. Bum Hunting

6.1. Bum Hunting is defined as the intentional practice of seeking out less experienced users while deliberately avoiding engagement with more skilled users. 

6.2. User is strictly prohibited from screening for and engaging certain Users, only choosing to participate in games when these specific users are present

6.3. User is strictly prohibited from targeting specific Users, for instance, by leaving a game shortly after a certain users depart, and/or resuming the game when those particular users return. 

6.4. Potential actions for breaches: WARNING, SUSPENSION, REWARD REMOVAL, PERMANENT BAN

7. Data Mining

7.1. Data Mining is defined as any act that results in accumulation of hand histories other than one’s own hand histories.

7.2. The sole permitted use for importing hand histories is to track one’s own gameplay and results.

7.3. User is strictly prohibited from granting direct or indirect access to one’s own PokerCraft data, including one’s tournament results, or sharing one’s own hand histories to another party.

7.4. Potential actions for breaches: REMOVAL OF ACCESS TO POKERCRAFT, GAME REMOVAL, PERMANENT BAN, CONFISCATION OF FUNDS

8. Chip Dumping

8.1. Chip Dumping is defined as intentionally losing chips to another user.

8.2. When an act of Chip Dumping occurs, both the user who transferred the chips and the user who received the chips are at fault. 

8.3. Chip Dumping as a method to transfer money is strictly prohibited and could be considered money laundering. 

8.4. Potential actions for breaches: WARNING, SUSPENSION, PERMANENT BAN, CONFISCATION OF FUNDS

9. Trespassing

9.1. Trespassing is defined as returning to any of the GGPN sites after receiving a network-wide ban.

9.2. User is strictly prohibited from returning to GGPN to play on any new or pre-existing accounts, regardless of who owns the account, once a network-wide ban has been issued. 

9.3. Potential actions for breaches: PERMANENT BAN, CONFISCATION OF FUNDS

10. Account Sharing

10.1. Account Sharing is defined as sharing of an account by two or more people.

10.2. User is only allowed to possess and play on an account that is registered under one’s own credentials.

10.3. Potential actions for breaches: SUSPENSION, REWARD REMOVAL, CONFISCATION  OF FUNDS

11. Hit and Running

11.1. Hit and Running is defined as leaving a table shortly after winning a significant pot, consequently depriving opponents of a chance to recover their losses.

11.2. Factors that are considered for Hit and Running include, but are not limited to, the size of the pot, the number of hands played post-winning the pot, and the frequency of such behavior. 

11.3. Potential actions for breaches: WARNING, SUSPENSION, REWARD REMOVAL, PERMANENT BAN

12. Promotion Abusing

12.1. Promotion Abusing is defined as actively participating in any Promotion for the purposes of receiving additional bonus/promotion/leaderboard rewards than the User is entitled to..

12.2. Potential actions for breaches: REWARD REMOVAL, PERMANENT BAN, CONFISCATION OF FUNDS

13. Ghosting

13.1. Ghosting is defined as playing on behalf of someone on an account one does not own or allowing someone to play on one’s account

13.2. Potential actions for breaches: PERMANENT BAN, CONFISCATION OF FUNDS

14. Hacking

14.1. Hacking is defined as gaining unauthorized access to an account – its username and password – by compromising digital device(s) and/or network(s).

14.2. If the User is a victim of Hacking, the User should report the incident immediately to the Security Team.  

14.3. Potential actions for breaches: PERMANENT BAN, CONFISCATION OF FUNDS

15. Offensive Conduct

15.1. Offensive Conduct is defined as any act that is (but not limited to): 

  • defamatory, racist, vulgar, hateful, obscene, profane, threatening, insulting, offensive or discriminatory
  • Illegal, or associated with criminal activities 
  • Intended to impersonate another person(s) or entity
  • Intended to advertise 
  • Intended to solicit personal information
  • Intended to deceive or mislead others
  • Harmful to the computer, data, or financial security of any party
  • Considered to be ‘spamming’ other Users

15.2. Offensive Conduct includes, but is not limited to, one’s activities regarding a profile picture, chats, SnapCam, audio chat, or voice message. 

15.3. Potential actions for breaches: CHAT SUSPENSION / CHAT BAN, WARNING, SUSPENSION, PERMANENT BAN

16. Predatory Behavior

16.1. Predatory Behavior is defined as any act of exploiting unethical advantages or engaging in exploitative tactics over other users to gain undeserved benefits.

16.2. Predatory behavior includes, but is not limited to, grimming/buttoning, ratholing, and various other actions that defy the spirit of fair competition and are deemed unethical by the poker community.

16.3. Potential actions for breaches: WARNING, SUSPENSION, PERMANENT BAN

17. Circumvention

17.1. Circumvention is defined as any manipulation with malicious intent of the GGPN and its software in order to circumvent the security measures in place. 

17.2. User is strictly prohibited from exploiting or attempting to exploit software bugs within the client for financial gain. 

17.3. Potential actions for breaches: PERMANENT BAN, CONFISCATION OF FUNDS

18. Enhanced Enforcement for VIP Cash Games and Tournaments

18.1. Users involved in any of the following financial relationships are strictly prohibited from playing at the same VIP cash game tables as their associates: staking, swaps, profit-sharing, or any bankroll sharing agreement.

18.2. Users are strictly prohibited from making deals, including off-client deals, at the Final Table of select tournaments, including the GGMillion$ High Roller.

18.3. Potential actions for breaches: WARNING, SUSPENSION, PERMANENT BAN, CONFISCATION OF FUNDS

Prohibited Use of Auxiliary Tools or Services

GGPN strictly prohibits use of any auxiliary tools or services that may facilitate Prohibited Activities and Behaviors. Moreover, any tools or services that provide unfair advantage over the opponents or that result in violation of GGPoker’s Terms and Conditions, Privacy Policy, House Rules, or SEP are strictly monitored and prohibited. It must be noted that any examples of auxiliary tools or services listed here do not represent, by any means, an exhaustive list. 

  • Any tools or services that aid the execution of any poker action including, but not limited to, RTA, bots (fully or partially automated), solvers, charts, or HUDs. 
  • Any tools or services that aid the execution of any additional action while accessing the client including, but not limited to, seating scripts or automated note taking tools.
  • Remote access tools that provide access to one’s machine or device, including, but not limited to, TeamViewer, AnyDesk, ChromeRDP, RDPClip, LogMeIn, Microsoft Remote Desktop,  Splashtop, VNC Connect, RemotePC, and Zoho Assist.
  • Screen-sharing tools of any kind, including, but not limited to, OBS, Google Meet, Zoom, or Discord.
  • Virtual machines or emulators of any kind that conceal one’s own machine and device including, but not limited to Oracle VM VirtualBox, VMware, Parallels, Microsoft Hyper-V, Nox, Bluestacks, or MEnu.
  • VPNs, Proxies, or any other tools that mask one’s location.
  • Any scripts that are designed to bypass GGPoker’s intended user experience.
  • Any tools or services that are designed to extract or mine game data from the GGPN. 
  • Any tools or services that enable control access to multiple devices including, but not limited to, Mouse without Borders, ShareMouse, Synergy, and Input Director.