Age Verification Policy

Introduction

Welcome to Chickitik's Age Verification Policy. This document explains how we verify the age of parents and guardians before allowing the creation of a child profile.

About Chickitik:

Chickitik is a safe children's reading platform providing fairy tales, stories, and fables for children aged 0 and up. We take child protection and compliance with children's data privacy laws seriously.

Purpose of this document:

This policy describes:

• Why we verify parents' age

• What verification methods we use

• How the verification process works

• What happens to verification data

• Your rights as a parent

Legal basis:

Our age verification policy is based on:

COPPA (Children's Online Privacy Protection Act) — USA

GDPR Article 8 — European Union

Finnish Personal Data Act — Finland

These laws require us to obtain verifiable parental consent before collecting data from children under 13 (COPPA) or 16 (GDPR, with the possibility of lowering to 13 in some EU countries).

Our approach:

We use passwordless authentication via email as our primary verification method. This is a simple, secure, and effective way to confirm that you are indeed an adult with access to an email address.

Important to understand:

✓ Verification is mandatory for all parents

✓ The process is quick and simple

✓ We don't store unnecessary data

✓ You can withdraw consent at any time

Last updated:

This policy was last updated on November 1, 2025. We may periodically update this policy to comply with changes in legislation or our practices.

Why We Verify Age

Verifying the age of parents is not just a legal requirement. It is a fundamental measure to protect children in the online environment.

Legal requirements:

1. COPPA (USA):

• Requires verifiable parental consent for children under 13

• Website operators must use reasonable efforts to obtain consent from a parent, not from a child

• FTC (Federal Trade Commission) defines acceptable verification methods

2. GDPR Article 8 (EU):

• Requires parental consent for children under 16 (or under 13-15 depending on EU country)

• Data controller must make reasonable efforts to verify that consent is given or authorized by the parent

• Takes into account available technology

3. Finnish Personal Data Act:

• In Finland, the age of digital consent is set at 13 years

• Parental consent required for children under 13

Child protection:

Age verification protects children from:

Unauthorized data processing:

• Children may not understand the consequences of providing personal information

• Parents have the right to control what information is collected about their children

• Without verification, children can easily pretend to be adults

Inappropriate content:

• While all Chickitik content is designed for children, parents should control access

• Parents know best their child's readiness for different types of content

Online risks:

• Parents can make informed decisions about child's digital presence

• Control over which platforms the child interacts with

Practical reasons:

1. Responsible use:

• Parents understand responsibility for child's online actions

• Can teach children safe behavior

• Monitor time spent reading

2. Communication with parents:

• We can contact parents on important matters

• Privacy policy notifications

• Service feature information

3. Informed consent:

• Parents read and understand our privacy policy

• Make an informed decision about creating child profile

• Know their rights and how to exercise them

Ethical obligations:

Beyond laws, we believe that:

• Children deserve special protection online

• Parents have the right and duty to control children's digital life

• Transparency regarding children's data is right

• Respect for family privacy is critical

Balance of interests:

We strive to find balance between:

✓ Protecting children's privacy

✓ Convenience for parents

✓ Compliance with laws

✓ Providing valuable educational content

Who Must Verify

Age verification is mandatory for certain categories of users. Let's clarify who exactly must go through this process.

Mandatory verification for:

1. Parents and legal guardians:

• Any adult creating a profile for a child under 13

• Must confirm they are indeed a parent or legal guardian

• Must have access to a valid email address

2. Foster parents:

• Persons with legal custody rights over a child

• Must have the right to make decisions on behalf of the child

3. Official guardians:

• Persons appointed by court or custody authorities

• Having documents confirming custody rights

Who should NOT verify:

Children:

• Children should not and cannot create profiles independently

• Even teenagers 13+ cannot create a profile without parental control

• Chickitik is exclusively for use under parental supervision

Other adults:

• Grandparents, aunts, uncles (if not legal guardians)

• Teachers or caregivers

• Older siblings

• Family friends

Note: These individuals can use Chickitik with the child, but only if the profile was created by a parent or legal guardian.

Special cases:

1. Split custody:

If parents have split custody:

• Each parent can create their own account

• Both parents must verify

• Each controls child profiles in their account

2. Joint custody:

With joint custody:

• One account can be created by one parent

• Second parent can access through shared email

• Both parents are responsible

3. Institutional custody:

For children's institutions, orphanages:

• Official representative of institution verifies

• Must provide documents confirming authority

• Contact us: info@itcoti.fi for special conditions

Custody rights confirmation:

When creating a child profile, you confirm that:

✓ You are a parent or legal guardian

✓ You have the right to make decisions about child's data processing

✓ You are responsible for actions taken under this account

✓ You are not creating a profile for someone else's child without parents' permission

Age requirements:

For parents/guardians:

• Must be over 18 years old

• Must be legally competent

• Must have the right to give consent

For children:

• Profile can be created for a child from 0 to 17 years

• Child's date of birth is mandatory

• Child's name is optional (can be alias)

Multiple children:

You can create profiles for:

• Up to 5 children per parental account

• Each child must have separate profile

• Separate birth date needed for each child

What happens in case of violation:

If we discover that:

• Profile created by child pretending to be adult

• Profile created without parental permission

• Verification data is false

We have the right to:

• Immediately block account

• Delete child profile

• Request additional verification

• If necessary — contact law enforcement

Important to understand:

Verification is not just a formality. It's protecting your child and complying with law. We take this process seriously and expect the same from parents.

Verification Methods

We use several methods to verify parents' age. The main method is passwordless authentication via email. Let's look in detail at how this works.

Main method: Email verification

This is our primary age verification method. It is based on the assumption that only adults have access to a valid email address.

Why email verification:

1. Accessibility:

• Most adults have email

• No additional documents required

• Fast and convenient

2. Security:

• Confirms address ownership

• Codes valid only 24 hours

• Protection from automated bots

3. Privacy:

• No documents required

• Minimal data collection

• GDPR and COPPA compliant

4. Efficiency:

• Process takes 1-2 minutes

• No technical skills required

• Works on all devices

How email verification works:

Step 1: Enter email

• You enter your email address

• System checks format correctness

• Email must not be disposable (temporary)

Step 2: Send code

• We send a 6-digit code to your email

• Code is randomly generated

• Valid for 24 hours

• Can request new code after 60 seconds

Step 3: Confirm code

• You enter the received code

• System checks correctness

• Up to 5 input attempts

• After successful verification — access to profile creation

Technical details:

Code format:

• 6 digits (e.g.: 123456)

• Generated by cryptographically secure generator

• Unique for each request

Validity period:

• Code valid for 24 hours

• After expiration — need new code

• Used code becomes invalid

Limitations:

• Maximum 5 code input attempts

• After 5 failed attempts — need new code

• Brute force protection

Resend:

• Can request new code after 60 seconds

• Old code becomes invalid

• Limit: 3 requests per hour

Email address types:

Accepted:

✓ Regular email (Gmail, Outlook, Yahoo, etc.)

✓ Corporate email

✓ Educational email (.edu)

✓ Personal domains

Not accepted:

❌ Disposable email (tempmail, guerrillamail, etc.)

❌ Email addresses with suspicious patterns

❌ Blocked domains

Additional checks:

Besides email verification, we use:

1. Behavioral analysis:

• Analysis of interaction patterns

• Detection of suspicious activity

• Protection from automated systems

2. IP analysis:

• Check for known VPN/proxy (to prevent abuse)

• Geographic region determination

• Detection of suspicious IP addresses

3. Device fingerprinting:

• Device identification

• Detection of multiple accounts from one device

• Fraud protection

Note: These additional checks are used only for security and don't affect regular users.

Alternative verification methods:

In the future, we may add:

• Credit card verification (small payment)

• Government document verification

• Mobile phone verification

Important: These methods will be used only when email verification is insufficient or unavailable.

Legal compliance:

Our email verification method complies with:

COPPA: Considered "reasonable effort" for obtaining parental consent

GDPR Article 8: Takes into account available technology for consent verification

FTC Guidelines: Approved as acceptable method for low-risk services

Process security:

We ensure security through:

• Encryption of all data (HTTPS/TLS)

• Secure code storage (hashed)

• Logging all verification attempts

• Monitoring suspicious activity

• Automatic blocking upon abuse detection

Email Verification Process

Let's look in detail at how the email verification process works in Chickitik from start to finish.

Process overview:

The verification process consists of several stages and takes 1-2 minutes. It is designed to be as simple as possible for parents while ensuring reliable age verification.

Stage 1: Accessing the login page

What happens:

• You go to Chickitik login page

• See form for entering email

• System ready to accept your address

What we check:

• HTTPS connection established

• Page loaded without errors

• Form protected from CSRF attacks

Stage 2: Entering email address

Your actions:

• Enter your email address

• Click "Sign In" or "Send Code" button

What we check:

• Email format correct (contains @, domain)

• Email not empty

• Email not too long (max 255 characters)

• Domain not blacklisted as disposable service

Possible errors:

• "Invalid email format" — check correctness

• "This email service not supported" — use different email

Stage 3: Code generation and sending

What happens on server:

1. Code generation:

• System generates random 6-digit code

• Code hashed before saving

• Expiration time set (24 hours)

2. Database storage:

• Hashed code saved

• Linked to email address

• Creation time recorded

• Attempt counter set to 0

3. Email sending:

• Email with code formatted

• Email sent to your address

• Sending logged

What you see:

• Message "Code sent to your email"

• Field for entering code

• Timer until resend possible (60 seconds)

Stage 4: Receiving email

Email contains:

• 6-digit code (e.g.: 123456)

• Code entry instructions

• Automatic login link (optional)

• Validity period info (24 hours)

• Warning: "If you didn't request this code, ignore this email"

Delivery time:

• Usually: few seconds

• Maximum: 5 minutes

• If email not received — check spam

Stage 5: Entering confirmation code

Your actions:

• Open email

• Copy or remember code

• Enter code in form on site

• Click "Confirm" or "Continue"

What we check:

1. Code format:

• Code consists of 6 digits

• No extra characters

2. Code validity:

• Code exists in database

• Code not used before

• Code not expired (within 24 hours)

• Code matches email address

3. Attempt counter:

• Number of attempts not exceeded (max 5)

• No signs of automated brute force

Possible results:

Success:

• Code correct

• You automatically logged in

• Session created

• Redirect to main page or child profile creation

Error — invalid code:

• "Invalid code. Try again"

• Attempt counter increases

• N attempts remaining

Error — expired code:

• "Code expired. Request new code"

• "Send new code" button

Error — attempts exceeded:

• "Too many attempts"

• Code invalidated

• Need to request new code

Stage 6: Session creation

After successful verification:

1. User check or creation:

• If email exists — load profile

• If new — create new user record

2. Session creation:

• Unique session token generated

• Session linked to user

• Expiration set (e.g., 30 days)

• Device information saved

3. Cookie setup:

• Session token saved in secure cookie

• Cookie has flags: HttpOnly, Secure, SameSite

4. Logging:

• Successful login recorded

• IP address, device, time

Alternative path: Automatic login via link

If you use link from email instead of entering code:

1. Link click:

• Link contains encrypted token

• Automatic redirect to site

2. Token validation:

• Token authenticity check

• Expiration check

• Check token not used

3. Automatic login:

• Session creation

• Redirect to account

Time limits:

Code validity: 24 hours

Resend: after 60 seconds

Max resends: 3 per hour

Max input attempts: 5 per code

Session validity: 30 days (or until logout)

Security at each stage:

• All data transmitted via HTTPS

• Codes hashed before storage

• CSRF, XSS attack protection

• Rate limiting

• All actions logged

• Suspicious activity monitoring

What Happens After Verification

After successful age verification, we create a secure parent account for you and provide access to child profile management features.

Creating a Parent Account:

Immediately after email confirmation, we:

• Create your parent account

• Save verification information

• Generate a unique parent identifier

• Assign "parent" role in the system

• Establish a secure session

What You Get Access To:

After verification, you can:

Create child profiles — add up to 5 child profiles

Manage settings — control content access

View statistics — see what your children are reading

Get recommendations — curated book selections by age

Manage subscriptions — purchase and renew subscriptions

Add to favorites — save favorite stories

Your Account Security:

We protect your account through:

Passwordless authentication — login via email without passwords

Secure sessions — automatic logout after inactivity

Login notifications — receive alerts about new logins

Activity history — review all account actions

Creating a Child Profile:

After account creation, you can:

1. Enter child information:

• Child's name

• Date of birth

2. Configure content settings:

• Age restrictions

3. Set up parental controls:

• App usage time

• Available sections

• Parent notifications

Mobile Application:

After web verification:

• Log in to the Chickitik mobile app

• Use the same email for login

• All child profiles sync automatically

• Reading progress saves across devices

Verification Confirmation:

You will receive a confirmation email with:

• Date and time of verification

• Created account information

• Getting started instructions

• Links to useful resources

Re-verification:

In some cases, we may request re-verification:

• When changing email address

• Upon suspicious activity

• After extended inactivity (over 2 years)

• When changing critical security settings

Verification Failure

Sometimes the verification process may not complete successfully. Let's look at what can go wrong and how we help in such situations.

Reasons for Verification Failure:

Verification may fail for the following reasons:

Email unavailable — address doesn't exist or isn't active

Technical issues — mail delivery problems

Code expired — more than 15 minutes passed since sending

Attempt limit exceeded — too many verification requests

Suspicious activity — signs of fraud detected

Email provider block — message blocked by spam filter

What to do if email doesn't arrive:

If you haven't received the verification code email:

1. Check your "Spam" folder:

• Email may have landed in spam

• Add noreply@chickitik.com to contacts

• Mark the message as "Not spam"

2. Check email correctness:

• Make sure address is entered without typos

• Verify the mailbox is active

• Try a different email address

3. Check mailbox fullness:

• Free up space in your mailbox

• Delete old messages

4. Wait a few minutes:

• Delivery may take up to 5 minutes

• Check your internet connection

5. Request resend:

• Click "Resend code"

• Available every 60 seconds

Attempt Limit Exceeded:

If you've exceeded the verification request limit:

Temporary block — 1 hour after 5 failed attempts

What to do:

— Wait for the block to expire

— Check email address correctness

— Contact support if the problem persists

Alternative Verification Methods:

If standard email verification doesn't work:

Use a different email:

— Gmail, Outlook, Yahoo, or other popular providers

— Make sure you have access to the mailbox

Contact support:

— Email: support@chickitik.com

— Provide your email and problem description

— We'll check and help complete verification manually

Manual Verification:

In exceptional cases, we can perform manual verification:

When applicable:

— Technical issues with email provider

— Email unavailability after multiple attempts

— Special circumstances

How to request:

— Write to support@chickitik.com

— Provide your email and reason for request

— Attach error screenshots (if any)

Processing time:

— 1-2 business days

— We'll contact you for confirmation

Block for Suspicious Activity:

If the system detected suspicious activity:

Reasons for blocking:

— Multiple attempts from different IPs

— VPN/proxy usage

— Signs of automation

— System bypass attempts

How to unblock:

— Contact support

— Explain the situation

— We'll review and unblock if necessary

Important:

We strive to make the verification process as simple and reliable as possible. If you encounter problems — don't hesitate to contact support. We're always ready to help!

Verification Data Storage

After successful verification, we store the minimum necessary information about the verification process. Let's review what data we store and how we protect it.

What We Store:

After verification, our database stores:

Parent's email — used for account login

Verification status — mark of completed verification

Verification date — when verification was completed

Verification method — how verification was conducted (email)

Verification code hash — not the code itself, but its hash

Request IP address — for security and abuse prevention

What We DON'T Store:

We deliberately don't store:

Verification code itself — only hash for verification

Email content — don't save correspondence

Biometric data — don't collect or store

Document data — don't request passports or IDs

Full browser history — only necessary technical data

How We Protect Data:

Verification data security is ensured through:

1. Encryption in transit:

• SSL/TLS encryption for all requests

• HTTPS for all connections

• Secure communication channels

2. Encryption at rest:

• Hashing of passwords and codes (bcrypt)

• Encryption of sensitive data in DB

• Secure key storage

3. Access restrictions:

• Access only for authorized personnel

• Multi-level permission system

• Audit of all data access

4. Database security:

• Regular backups

• Geographically distributed storage

• SQL injection protection

• Suspicious activity monitoring

Data Retention Period:

We store verification data according to legal requirements:

Active account:

— Data stored while account is active

— Or until explicit user deletion

Deleted account:

— Main data deleted within 30 days

— Verification logs — 90 days for security

— Financial records — up to 7 years (legal requirements)

Inactive account:

— After 3 years without activity — reminder

— After 5 years without activity — data deletion

Access to Verification Data:

Your verification data is accessible to:

You:

— Through account settings

— Can view verification date and method

— Can request full data copy (GDPR)

Our security team:

— Only during incident investigations

— With full access auditing

— In accordance with internal policies

Third parties:

— Only by legal requirement (court, law enforcement)

— With prior user notification (when possible)

— With full request documentation

Database Security:

Our database is protected as follows:

PostgreSQL with security settings

Firewall — IP-based access restriction

VPN — access only through secure network

Audit — logging of all data operations

Backups — daily encrypted copies

Monitoring — 24/7 security control

Data Anonymization:

For analytics and service improvement, we use anonymized data:

Verification statistics — not linked to specific users

Error analysis — depersonalized logs

Performance metrics — aggregated data

Your Data Rights:

According to GDPR, you have the right to:

Data access — request a copy of your data

Correction — update incorrect information

Deletion — "right to be forgotten"

Portability — receive data in machine-readable format

Processing restriction — limit data usage

Objection — object to processing

To exercise these rights, write to privacy@chickitik.com

Re-verification

In certain situations, we may request re-verification of your identity to ensure security and compliance with legal requirements.

When Re-verification is Required:

We may request re-verification in the following cases:

Email address change — when changing primary email

Suspicious activity — unusual account actions

Extended inactivity — more than 2 years without use

Critical settings changes — security settings modifications

Legal requirements — changes in legislation

Adding new children — creating additional profiles after a break

Re-verification Process:

Re-verification follows a similar process to initial verification:

1. Notification:

• You receive an email explaining the reason

• Deadline for completing verification

• Link to verification form

2. Email confirmation:

• Receive code to current email

• Enter code on website

• Identity confirmation

3. Access restoration:

• Access restored after successful verification

• All data remains unchanged

• Children profiles are preserved

What Happens Before Re-verification:

While verification is pending:

Limited access — content viewing available, new creation is not

Data preservation — all profiles and settings preserved

Notifications — regular reminders about verification requirement

Waiting period — 30 days to complete re-verification

If Re-verification is Not Completed:

If verification not completed within 30 days:

Day 1-7:

— Daily email reminders

— In-app banner about verification requirement

Day 8-14:

— New content creation restricted

— Reading access preserved

Day 15-30:

— Enhanced notifications about approaching block

— Support assistance offered

After 30 days:

— Temporary account suspension

— Data preserved for 90 more days

— Recovery possible after verification

Reasons for Re-verification Request:

1. Email Change:

When changing primary email address:

• Need to confirm new address

• Receive code to new email

• Confirm ownership of both addresses

2. Suspicious Activity:

If system detected:

• Unusual login attempts

• Changes from different devices/IPs

• Bulk settings modifications

• Restriction bypass attempts

3. Extended Inactivity:

After 2+ years without login:

• To confirm account is still in use

• Update data processing consent

• Comply with current legal requirements

Re-verification Assistance:

If you have problems with re-verification:

Email unavailable:

— Contact support for email change

— Confirm identity through alternative methods

Technical issues:

— Write to support@chickitik.com

— Describe problem in detail

— Attach error screenshots

Urgent access needed:

— Specify urgency reason

— We'll try to expedite the process

Re-verification Security:

We apply the same security standards:

• Encryption of all data

• IP address and device verification

• Verification code hashing

• Attempt limit restrictions

• Action auditing

Parental Rights

After successful verification, you gain full control over your children's data and profiles. Let's review your rights in detail.

Basic Parental Rights:

After verification, you have the right to:

Data access — view all data about your children

Data editing — modify profiles and settings

Data deletion — complete removal of children profiles

Data export — obtain a copy of all data

Consent management — change privacy settings

Activity control — monitor children's actions

Right to Data Access:

You can request and receive at any time:

Children profiles:

— Name, age, date of birth

— Content settings

— Profile creation history

Activity history:

— Read stories

— Favorites

— Usage time

— Reading progress

Verification data:

— Date and method of verification

— Change history

Right to Editing:

You can modify:

Children information:

— Update name and age

— Change content settings

— Add or remove children

Parental control settings:

— App usage time

— Available content categories

— Notifications

Your account:

— Email address

— Notification settings

— Language preferences

Right to Deletion:

You can delete:

Individual child profile:

— Profile and all related data removed

— Other profiles preserved

— Process irreversible after 30 days

Entire account:

— All children profiles deleted

— All settings deleted

— Complete deletion after 30 days

Right to Data Export (Portability):

According to GDPR, you can request export of all data in machine-readable format:

Data format:

— JSON for technical data

— CSV for tabular data

— PDF for reports

What's included:

— All children profiles

— Activity history

— Settings and preferences

— Verification data

How to request:

— Through account settings

— Email to privacy@chickitik.com

— Response within 30 days

Right to Consent Management:

You control:

Data collection:

— What data we collect

— For what purposes

— How long we store

Data usage:

— Analytics

— Personalization

— Recommendations

Consent withdrawal:

— Can be withdrawn anytime

— Data deletion after withdrawal

— Minimum necessary retained for legal compliance

Right to Processing Restriction:

You can restrict data processing:

Temporary freeze:

— Data stored but not processed

— Useful for resolving disputes

Purpose limitation:

— Prohibit use for specific purposes

— For example, storage only, no analysis

Right to Object:

You can object to:

Automated processing:

— Decisions made by algorithms

— Profiling

Direct marketing:

— Promotional mailings

— Personalized offers

How to Exercise Your Rights:

1. Through personal account:

• Log into account settings

• "Privacy and Data" section

• Select desired action

2. Via email:

• Write to privacy@chickitik.com

• Provide your email and request

• Attach identity confirmation (if needed)

3. Response timeframes:

• Receipt confirmation — 48 hours

• Request fulfillment — up to 30 days

• Complex requests — up to 60 days with notification

Protecting Children's Rights:

We also protect children's rights:

Data minimization — collect only necessary

Secure storage — encryption and protection

Limited access — only authorized personnel

Regular audits — compliance verification

Appealing Decisions:

If you disagree with our decision:

Internal complaint:

— Write to complaints@chickitik.com

— Review within 14 days

Supervisory authority:

— Can contact your country's Data Protection Authority

— We'll provide all necessary information

Contacts for Rights Exercise:

Email: privacy@chickitik.com

Response: within 48 hours

Languages: Russian, English, Finnish

Security and Privacy

The security of your data and your children's data is our top priority. We use modern technologies and best practices to protect information.

Technical Security Measures:

1. Data Encryption:

In transit:

— TLS 1.3 for all connections

— HTTPS required for all requests

— Certificate pinning in mobile apps

At rest:

— AES-256 database encryption

— Password hashing via bcrypt (cost factor 12)

— Encrypted backups

2. API Protection:

Authentication:

— JWT tokens with short lifetime (15 minutes)

— Refresh tokens with secure storage

— Passwordless authentication via email

Authorization:

— Role-based access control (RBAC)

— Permission check on every request

— Data isolation between users

Attack Protection:

— Rate limiting (max 5 verification requests per hour)

— CSRF tokens for forms

— XSS protection via Content Security Policy

— SQL injection prevention via parameterized queries

3. Infrastructure Security:

Network Isolation:

— Virtual Private Network (VPN) for DB access

— Firewall with IP whitelist

— Separate networks for production and development

Monitoring:

— 24/7 security monitoring

— Automatic alerts for suspicious activity

— Logging of all data operations

Organizational Measures:

1. Data Access:

Principle of Least Privilege:

— Each employee has access only to necessary data

— Multi-factor authentication for staff

— Regular access rights audits

Staff Training:

— Regular security training

— Confidentiality policy for employees

— NDA (non-disclosure agreement) for all

2. Processes and Policies:

Incident Response Plan:

— Security incident response plan

— User notification procedure (within 72 hours)

— Incident response team

Regular Audits:

— Quarterly security audit

— Penetration testing annually

— Code review for all changes

Children's Data Privacy:

Special Protection for Children:

Data Minimization:

— Collect only name and age

— No photos of children

— No geolocation

— No children's contact information

Data Isolation:

— Children profiles linked only to parent account

— No direct access to child profile

— All actions only through parental control

No Advertising:

— No ads for children profiles

— No targeting of children

— No data sharing with advertisers

Legal Compliance:

1. COPPA (USA):

• Verifiable Parental Consent before creating child profile

• Parents' right to view and delete data

• Notice of data collection practices

2. GDPR (EU):

• Parental consent for children under 16

• Right to be forgotten

• Right to data portability

• Data Protection Officer appointed

3. Finnish Personal Data Act:

• Compliance with Finnish legislation

• Registration with Finnish Data Protection Authority

Transparency and Control:

What You Can Control:

Data Access:

— View all collected data

— Export data anytime

— History of all actions

Privacy Settings:

— Manage processing consent

— Disable analytics

— Restrict data processing

Deletion:

— Delete individual profiles

— Complete account deletion

— Automatic deletion after 30 days

Breach Notification:

In case of data breach, we commit to:

Notify Regulator:

— Within 72 hours of discovery

— Full incident report

Notify Users:

— If breach affects their data

— Description of incident and measures taken

— Protection recommendations

Third-Party Practices:

Third-Party Services:

— Use only verified providers

— DPA (Data Processing Agreement) with each

— Regular third-party audits

No Data Sharing for:

— Advertising

— Sales

— Third-party marketing

Your Security Actions:

Email Protection:

— Use strong password for email

— Enable two-factor authentication

— Don't use public email addresses

Caution:

— Don't share verification links

— Check URLs before entering data

— Report suspicious activity

Policy Changes

We are constantly improving our processes and policies to enhance security and convenience. It's important to understand how and when we make changes and how this affects you.

Right to Change Policy:

We reserve the right to change this policy at any time. This is necessary for:

Legal Compliance:

— Adaptation to new laws and regulations

— GDPR, COPPA, Finnish Personal Data Act

— Local requirements of different countries

Security Improvements:

— Implementation of new protection measures

— Response to new threats

— Raising security standards

Process Optimization:

— Simplifying verification

— Improving user experience

— Adding new features

Notification of Changes:

Material Changes:

For material changes to the policy, we will notify you:

Email Notification:

— To your registered address

— 30 days before taking effect

— With detailed description of changes

In-App Notification:

— Pop-up on next login

— Detailed description of changes

— Link to full text of new policy

On Website:

— Notice on homepage

— "What's Changed" section

— Comparison of old and new versions

What Constitutes Material Changes:

• Changes to verification methods

• Changes to the scope of data collected

• Changes to data retention periods

• Changes to parental rights

• Addition of new third parties

• Changes to data use

Minor Changes:

Minor changes take effect immediately:

Examples of Minor Changes:

— Fixing typos and grammar

— Clarifying wording without changing meaning

— Updating contact information

— Adding examples for clarity

Notification:

— Update of "Last Modified" date at the beginning of the document

— Entry in change history

Your Consent to Changes:

Accepting Changes:

After notification of material changes, you have 3 options:

1. Accept Changes:

• Continue using the service

• New policy automatically applies after 30 days

• No additional action required

2. Reject Changes:

• Delete your account before changes take effect

• All data will be deleted according to our policy

• Service will become unavailable after deletion

3. Discuss Changes:

• Contact us by email: policy@chickitik.com

• Express your concerns

• We will try to find a solution

Change History:

We maintain a complete history of all policy changes:

Current Version: 1.0

Publication Date: 2025-10-31

• First version of "Age Verification Policy"

• Includes all main sections

• Complies with GDPR, COPPA, Finnish Personal Data Act

Future Versions:

All future versions will be added here indicating:

• Version number

• Effective date

• Brief description of changes

• Link to full text of changes

Access to Previous Versions:

You can request previous versions of the policy:

Email: archive@chickitik.com

Specify: which version you want to receive (date)

Delivery: PDF file to your email within 7 days

Tracking Changes:

For easy change tracking, we provide:

1. Changelog:

• Available on policy page

• Shows all changes with dates

• Highlights material changes

2. Version Comparison:

• "Diff" tool for comparison

• Shows what was removed (in red)

• Shows what was added (in green)

3. Change RSS Feed:

• Subscribe to updates

• Automatic notifications of new versions

Legal Effect of Changes:

Taking Effect:

For New Users:

— New policy applies immediately

— From registration

For Existing Users:

— 30 days after notification (for material changes)

— Immediately (for minor changes)

Transition Period:

Within 30 days after notification of material changes:

• Old policy version applies

• You can delete your account without consequences

• You can contact us with questions

Feedback:

We value your opinion on our policies:

How to Leave Feedback:

Email: feedback@chickitik.com

Subject: "Feedback on Verification Policy"

Content:

— What you like

— What can be improved

— Your suggestions

We Consider:

• All feedback is carefully reviewed

• Constructive suggestions are considered in updates

• Most frequent questions are added to FAQ

Regular Review:

We conduct regular policy reviews:

Annual Audit:

• Checking compliance with current legislation

• Analyzing security measure effectiveness

• Assessing user satisfaction

• Implementing improvements

Unscheduled Review When:

• Legislation changes

• Security issues are discovered

• Significant service changes

• Significant feedback is received

Relationship with Other Policies:

This policy is closely related to other documents:

Privacy Policy — general data processing rules

User Agreement — service usage rules

Parental Consent Form — consent obtaining process

Cookie Policy — cookie usage

In Case of Contradictions:

• More specific documents take priority

• This policy takes priority on age verification matters

• When in doubt, contact: legal@chickitik.com

Contacts for Change-Related Questions:

General Questions: policy@chickitik.com

Legal Questions: legal@chickitik.com

Feedback: feedback@chickitik.com

Version Archive: archive@chickitik.com

Thank You for Your Trust!

We are constantly working to improve our services and value your trust. If you have questions or suggestions, please don't hesitate to contact us.

Contact Information

If you have any questions, comments or concerns about our age verification policy, we are always ready to help.

Main Contacts:

General Questions:

Email: support@chickitik.com

Response Time: within 24 hours

Languages: Russian, English, Finnish

Verification Questions:

Email: verification@chickitik.com

Response Time: within 12 hours

Help: technical support for verification process

Privacy Questions:

Email: privacy@chickitik.com

Response Time: within 48 hours

Topics: data protection, GDPR, user rights

Legal Questions:

Email: legal@chickitik.com

Response Time: within 72 hours

Topics: legal aspects, legislation compliance

Data Protection Officer:

Email: dpo@chickitik.com

Responsibility: GDPR and other data protection laws compliance

Business Hours:

Support: Monday - Friday, 9:00 - 18:00 (EET)

Emergency Cases: 24/7 via email

Mailing Address:

Chickitik Oy

Helsinki, Finland

(exact address will be provided upon company registration)

Useful Links:

• Privacy Policy

• User Agreement

• Parental Consent Form

• Cookie Policy

• FAQ

Feedback:

We value your feedback! Please write to feedback@chickitik.com

Contact Information

ITcoti Oy

Business ID: 3489603-6

Address: Neuvoksenkatu 24 A, 38700 Kankaanpää, Finland

Email: info@itcoti.fi

Phone: +358 40 258 2158