Anytime anywhere, Play poker one on one

Security & Ecology Policy

ACTIONS FOR BREACHES OF SEP

Breaches are the Following

  • USE OF BOTS
  • USE OF REAL-TIME ASSISTANCE (RTA)
  • CIRCUMVENTION
  • ACCOUNT SHARING
  • GHOSTING
  • TRESPASSING
  • ENHANCED ENFORCEMENT OF VIP CASH GAMES AND TOURNAMENTS
  • COLLUSION
  • PREDATORY BEHAVIOR
  • BUM HUNTING

  • CHIP-DUMPING
  • MULTI ACCOUNTING
  • USE OF REMOTE DESKTOP & SCREEN SHARING PROGRAMS
  • USE OF VPN, PROXY, LOCATION MASKING PROGRAMS
  • USE OF VIRTUAL MACHINES & EMULATORS
  • THIRD-PARTY TOOLS
  • RATHOLING
  • USER SOLICITATION
  • OFFENSIVE USER PROFILE
  • DATA MINING