Structure and Principles for Data Protection on Someone’s TICKET

Someone’s TICKET respects your control over data. The system processes information only to support access, ticket issuance, transaction records, and user roles. Your data stays within your permission scope at all times. No external transfer takes place without key-level consent.

1. Data Collection Scope

The system collects only the required fields for event setup, ticket issue, transaction sync, and scan validation.

  • Full name
  • Email address
  • Phone number
  • Device fingerprint (for scan trace)
  • Payment reference (from your processor)
  • IP address and location data (for fraud trace)
  • Ticket code and scan log

Each field supports one specific function and enters the system through your interface, API, or staff input.

2. Use of Information

Your submitted data powers the platform's internal operation. Each action—creation, scan, reissue, update—relies on the related record.

  • Ticket access validation
  • Session history review
  • Refund or reissue the command.
  • Role-based visibility.
  • Export to internal records.

No data flows toward outside entities. No data enters shared stores.

3. Session and Device Records

The platform stores session data for safety, trace, and account oversight. These records support technical review or operational audits.

  • Login time
  • Device type
  • Browser agent
  • IP location.
  • Session duration
  • Activity list

Each session closes upon logout or timeout. The system never continues a stale or idle connection.

4. Webhook and Callback Traces

Webhook deliveries enter the log system for review and retry tracking. No webhook record moves outside your access.

  • Payload preview
  • Status code
  • Retry count
  • Delivery path
  • Response time

Your team holds complete control over all event delivery logs.

5. Data Security Practice

Every transaction follows a token-based system with limited scope. Each token applies to one project only. The system applies time-lock rules, IP-range filters, and call-rate boundaries.

  • SHA-256 token protocol
  • Token expiry auto-enforced
  • IP rules per user role
  • Rate threshold applied per hour
  • Encrypted key vault

System infrastructure resides on verified regional servers under UAE jurisdiction.

6. Request Access or Deletion

You may export or delete your stored data at any time. Requests pass through your admin panel with confirmation steps for security.

  • CSV or JSON export
  • Delete logs after event closure
  • Data removal from scan history
  • Ticket record purge
  • Session key wipe

Once deletion is complete, no recovery will be possible.

7. Compliance and Regulation

Someone’s TICKET meets the data protection rules set by the UAE legal bodies. Compliance reports become available upon request through your admin channel.

  • Records available for 12 months
  • Access to history is available to auditors
  • No data shared without explicit grant
  • Role visibility applied to all audit entries