Clarification Text on the Processing of Personal Data
    bybit2024-10-04 01:32:22

    CLARIFICATION TEXT ON THE PROCESSING

    OF PERSONAL DATA

     

     

    This clarification text is drafted by Narkasa Yazılım Ticaret Anonim Şirketi (“Bybit Türkiye”) in its capacity as a data controller within the scope of Article 10 of the Personal Data Protection Law No. 6698 and the Communique on Principles and Procedures to be Followed in Fulfillment of the Obligation To Inform.

     

     

    1. Purpose

    Dear our esteemed users/potential users; personal data is defined as “any information relating to an identified or identifiable natural person” within the scope of the Personal Data Protection Law No. 6698 entered into force on 7 of April 2016 (“Law”).

    Protection of your personal data and to be informed about your personal data is your fundamental rights as per the Constitution of the Republic of Türkiye (“Constitution”). In this regard, since ensuring the safety and processing of your personal data requires great importance and diligence of Bybit Türkiye and also constitutes an obligation, your data is processed and protected by Bybit Türkiye within the scope of the Constitution.

    Data Controller is defined as, under Article 3-1 of the Law, “the natural or legal person who determines the purposes and means of processing personal data and is responsible for the establishment and management of the data filing system”, and Bybit Türkiye is a data controller in terms of data of our esteemed clients/potential clients. 

    With this Clarification Text, it is aimed to inform you by making explanations about the personal data processing activities carried out by Bybit Türkiye, which has the title of data controller within the scope of the Law.

    Article 10 of the Law imposes an obligation on the data controller to provide information regarding; 

    • the identity of the data controller and his representative, if any, to the relevant persons during the acquisition of personal data, 

    • for what purposes personal data will be processed, 

    • to whom and for what purposes the processed personal data can be transferred, 

    • the method and legal reason for collecting personal data and 

    • the rights of the relevant person listed in Article 11 of the Law 

    and with this Clarification Text, it is aimed to inform you by making explanations about the personal data processing activities carried out by Bybit Türkiye, which has the title of data controller within the scope of “the Law”.

     

    1. What are the Collecting Methods of Your Personal Data?

    Your personal data, detailed in the table below, will be collected by Bybit Türkiye through the website https://www.bybit-tr.com/tr-TUR , mobile or digital applications, customer conversations via phone/mobile/internet, written and digital applications made to our Company, itt is obtained and processed through electronic, verbal or physical means, in a limited and measured manner, and in accordance with the principles of the Law, by fully/partially automatic means, in connection with the following purposes.

     

    1. What are your Personal Data Processed?

     

    • Identity Data: Name-surname, date of birth, place of birth, mother's name-father's name, identity number(s), identity serial number, other identity information

    • Communication Data: Mobile phone number, e-mail address, address

    • Location  Data: Location information

    • Legal Transaction Data: Information in correspondence with judicial authorities, information in the case file.

    • Customer Transaction Data: Transaction date, transaction type, transaction amount, place of transaction, method of transaction, transaction type, contact records with customer service

    • Transaction Security Data: Device type and ID, usage tracking information, IP address and information from WLAN (Wireless Local Area Network), transaction history, access date and time, browser type and version 

    • Finance Data: Bank account information, income status, account movements, assets information, balance information, crypto asset account information, crypto asset address, deposited amount, crypto asset wallet number, crypto asset balance

    • Professional Information Data: Job title, income information and company information

    • Marketing Data: cookie records, marketing information

    • Visual Data: Photograph, identity card, identity card, driver's license, passport, residence permit



    1. What are the Purposes and Legal Reasons for Processing Personal Data?

    The purposes and legal reasons for the processing of your personal data processed by Bybit Türkiye are given in the table below.

    1. Purpose

    Dear our esteemed users/potential users; personal data is defined as “any information relating to an identified or identifiable natural person” within the scope of the Personal Data Protection Law No. 6698 entered into force on 7 of April 2016 (“Law”).

    Protection of your personal data and to be informed about your personal data is your fundamental rights as per the Constitution of the Republic of Türkiye (“Constitution”). In this regard, since ensuring the safety and processing of your personal data requires great importance and diligence of Bybit Türkiye and also constitutes an obligation, your data is processed and protected by Bybit Türkiye within the scope of the Constitution.

    Data Controller is defined as, under Article 3-1 of the Law, “the natural or legal person who determines the purposes and means of processing personal data and is responsible for the establishment and management of the data filing system”, and Bybit Türkiye is a data controller in terms of data of our esteemed clients/potential clients. 

    With this Clarification Text, it is aimed to inform you by making explanations about the personal data processing activities carried out by Bybit Türkiye, which has the title of data controller within the scope of the Law.

    Article 10 of the Law imposes an obligation on the data controller to provide information regarding; 

    • the identity of the data controller and his representative, if any, to the relevant persons during the acquisition of personal data, 

    • for what purposes personal data will be processed, 

    • to whom and for what purposes the processed personal data can be transferred, 

    • the method and legal reason for collecting personal data and 

    • the rights of the relevant person listed in Article 11 of the Law 

    and with this Clarification Text, it is aimed to inform you by making explanations about the personal data processing activities carried out by Bybit Türkiye, which has the title of data controller within the scope of “the Law”.

     

    1. What are the Collecting Methods of Your Personal Data?

    Your personal data, detailed in the table below, will be collected by Bybit Türkiye through the website https://www.bybit-tr.com/tr-TUR , mobile or digital applications, customer conversations via phone/mobile/internet, written and digital applications made to our Company, itt is obtained and processed through electronic, verbal or physical means, in a limited and measured manner, and in accordance with the principles of the Law, by fully/partially automatic means, in connection with the following purposes.

     

    1. What are your Personal Data Processed?

     

    • Identity Data: Name-surname, date of birth, place of birth, mother's name-father's name, identity number(s), identity serial number, other identity information

    • Communication Data: Mobile phone number, e-mail address, address

    • Location  Data: Location information

    • Legal Transaction Data: Information in correspondence with judicial authorities, information in the case file.

    • Customer Transaction Data: Transaction date, transaction type, transaction amount, place of transaction, method of transaction, transaction type, contact records with customer service

    • Transaction Security Data: Device type and ID, usage tracking information, IP address and information from WLAN (Wireless Local Area Network), transaction history, access date and time, browser type and version 

    • Finance Data: Bank account information, income status, account movements, assets information, balance information, crypto asset account information, crypto asset address, deposited amount, crypto asset wallet number, crypto asset balance

    • Professional Information Data: Job title, income information and company information

    • Marketing Data: cookie records, marketing information

    • Visual Data: Photograph, identity card, identity card, driver's license, passport, residence permit



    1. What are the Purposes and Legal Reasons for Processing Personal Data?

    The purposes and legal reasons for the processing of your personal data processed by Bybit Türkiye are given in the table below.

    Legal Reason

    Personal Data Category

    The Purpose of Processing

    Being expressly stipulated in the law (KVKK art. 5/2-a)

    Identity Data

    • In order to comply with legal and administrative measures.

    • Reporting suspicious transactions to MASAK.

    • Detection of suspicious transaction and fraud prevention, tracking fraud processes, identifying customers and detecting suspicious transactions, identifying customers who perform suspicious transactions.

    • Arranging the information and documents that will be the basis for the work and transactions to be carried out.

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    • Notifying these authorities for the purpose of investigating, detecting and preventing violations of the contract and the law.

    • Verification of customer identity.

    • Performing account opening procedures

    • Execution of activities in accordance with the legislation.

    Communication Data

    • In order to comply with legal and administrative measures.

    • Reporting suspicious transactions to MASAK.

    • Detection of suspicious transactions and fraud prevention, tracking fraud processes, identifying customers and detecting suspicious transactions, identifying customers who have made suspicious transactions.

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    • Notifying these authorities for the purpose of investigating, detecting and preventing violations of the contract and the law.

    • Verification of your customer identity.

    • Evaluation of account opening requests.

    • Execution of activities in accordance with the legislation

    Legal Transaction Data

    • In order to comply with legal and administrative measures.

    • Reporting suspicious transactions to MASAK.

    • Detection of suspicious transactions and fraud prevention, tracking fraud processes, identifying customers and detecting suspicious transactions, identifying customers who have made suspicious transactions.

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    Customer Transaction Data

    • In order to comply with legal and administrative measures.

    • Reporting suspicious transactions to MASAK.

    • Detection of suspicious transactions and fraud prevention, tracking fraud processes, identifying customers and detecting suspicious transactions, identifying customers who have made suspicious transactions.

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    Transaction Security Data

    • In order to comply with legal and administrative measures.

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    Finance Data

    • In order to comply with legal and administrative measures.

    • Reporting suspicious transactions to MASAK.

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    Professional Information Data

    • In order to comply with legal and administrative measures.

    • Reporting suspicious transactions to MASAK.

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    Visual Data

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    • In order to comply with legal and administrative measures.

    • Reporting suspicious transactions to MASAK.

    Provided that it is directly related to the establishment or performance of a contract, it is necessary to process the personal data of the parties to the contract (KVKK art. 5/2-c)

    Identity Data

    • Providing our services and verifying the identity of the customer in this context.

    • Performing account opening procedures

    • Confirming the identity of the customer performing the transaction, making changes to the customer account information, raising the customer account level.

    • Making money inflows to customer accounts, making money outflows from customer accounts.

    • Protection of customer accounts and archives, prevention of unauthorized access to customer accounts.

    • Tracking of assets in customers' crypto asset wallet addresses.

    • Execution of contract processes.

    • Execution of finance and accounting works.

    • Execution of communication activities.

    • Execution of customer support services processes.

    • Execution of storage and archiving activities.

    • Arranging the information and documents that will be the basis for the work and transactions to be carried out.

    • Execution of operational processes.

    Communication Data

    • Providing our services and verifying the identity of the customer in this context.

    • Performing account opening procedures

    • Confirming the identity of the customer performing the transaction, making changes to the customer account information, raising the customer account level.

    • Making money inflows to customer accounts, making money outflows from customer accounts.

    • Protection of customer accounts and archives, prevention of unauthorized access to customer accounts.

    • Tracking of assets in customers' crypto asset wallet addresses.

    • Execution of contract processes.

    • Execution of finance and accounting works.

    • Execution of communication activities.

    • Execution of customer support services processes.

    • Execution of storage and archiving activities.

    • Arranging the information and documents that will be the basis for the work and transactions to be carried out.

    • Execution of operational processes. 

    Customer Transaction Data

    • Providing our services and verifying the identity of the customer in this context.

    • Confirming the identity of the customer performing the transaction, making changes to the customer account information, raising the customer account level.

    • Making money inflows to customer accounts, making money outflows from customer accounts.

    • Protection of customer accounts and archives, prevention of unauthorized access to customer accounts. 

    • Tracking of assets in customers' crypto asset wallet addresses.

    • Execution of finance and accounting works.

    • Execution of communication activities.

    • Execution of customer support services processes.

    • Execution of storage and archiving activities.

    • Arranging the information and documents that will be the basis for the work and transactions to be carried out.

    Transaction Security Data

    • Protection of customer accounts and archives, prevention of unauthorized access to customer accounts.

    • Execution of customer support services processes.

    • Execution of storage and archiving activities.

    • Arranging the information and documents that will be the basis for the work and transactions to be carried out.

    •  Execution of operational processes.

    Finance Data

    • Making money inflows to customer accounts, making money outflows from customer accounts.

    • Tracking of assets in customers' crypto asset wallet addresses.

    • In order to comply with legal and administrative measures.

    • Arranging the information and documents that will be the basis for the work and transactions to be carried out.

    • Execution of contract processes.

    • Provision of services

    • Changing customer account information, raising customer account level.

    Professional Information Data

    • Changing customer account information, raising customer account level.

    Visual Data

    • Providing our services and verifying the identity of the customer in this context.

    • Performing account opening procedures

    • Confirming the identity of the customer performing the transaction, making changes to the customer account information, raising the customer account level.

    • Protection of customer accounts and archives.

    • Arranging the information and documents that will be the basis for the work and transactions to be carried out.

    • Execution of contract processes.

    • Resolving existing and future legal disputes.

    • Providing system security with customer account security; fulfilling our legitimate interests, such as meeting our obligations under money laundering legislation and preventing fraud and crime.

    • Execution of activities in accordance with the legislation.

    It is mandatory for the data controller to fulfill its legal obligations (KVKK art. 5/2-ç)

    Identity Data

    • Providing our services and verifying the identity of the customer in this context.

    • Performing account opening procedures

    • Confirming the identity of the customer performing the transaction, making changes to the customer account information, raising the customer account level.

    • Arranging the information and documents that will be the basis for the work and transactions to be carried out.

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    • Notifying these authorities for the purpose of investigating, detecting and preventing violations of the contract and the law.

    • Resolving existing and future legal disputes,

    • Providing system security with customer account security; Fulfilling our legitimate interests, such as meeting our obligations under money laundering legislation and preventing fraud and crime.

    • Law, follow-up and execution of litigation works, follow-up and execution of mediation works, follow-up and execution of enforcement works.

    • Execution of finance and accounting works.

    • Execution of communication activities.

    • Execution of customer support services processes.

    • Execution of storage and archiving activities.

    • Follow-up of requests/complaints.

    • Execution of operational processes.

    • Reporting suspicious transactions to MASAK, detecting suspicious transactions and preventing fraud, monitoring fraud processes, identifying customers and detecting suspicious transactions, identifying customers with suspicious transactions.

    • Execution of activities in accordance with the legislation.

    • Making money inflows to customer accounts, making money outflows from customer accounts.

    Communication Data

    • Providing our services and verifying the identity of the customer in this context.

    • Performing account opening procedures

    • Confirming the identity of the customer performing the transaction, making changes to the customer account information, raising the customer account level.

    • Arranging the information and documents that will be the basis for the work and transactions to be carried out.

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    • Notifying these authorities for the purpose of investigating, detecting and preventing violations of the contract and the law.

    • Resolving existing and future legal disputes,

    • Providing system security with customer account security; Fulfilling our legitimate interests, such as meeting our obligations under money laundering legislation and preventing fraud and crime.

    • Law, follow-up and execution of litigation works, follow-up and execution of mediation works, follow-up and execution of enforcement works.

    • Execution of finance and accounting works.

    • Execution of communication activities.

    • Execution of customer support services processes.

    • Execution of storage and archiving activities.

    • Follow-up of requests/complaints.

    • Execution of operational processes.

    • Reporting suspicious transactions to MASAK, detecting suspicious transactions and preventing fraud, monitoring fraud processes, identifying customers and detecting suspicious transactions, identifying customers with suspicious transactions.

    • Execution of activities in accordance with the legislation.

    • Making money inflows to customer accounts, making money outflows from customer accounts.

    Location Data

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    Legal Transaction Data

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled,

    • Notifying these authorities for the purpose of investigating, detecting and preventing violations of the contract and the law.

    • Law, follow-up and execution of litigation works, follow-up and execution of mediation works, follow-up and execution of enforcement works.

    • Execution of storage and archiving activities.

    Customer Transaction Data

    • Arranging the information and documents that will be the basis for the work and transactions to be carried out.

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    • Notifying these authorities for the purpose of investigating, detecting and preventing violations of the contract and the law.

    • Resolving existing and future legal disputes.

    • Providing system security with customer account security; Fulfilling our legitimate interests, such as meeting our obligations under money laundering legislation and preventing fraud and crime.

    • Law, follow-up and execution of litigation works, follow-up and execution of mediation works, follow-up and execution of enforcement works.

    • Execution of finance and accounting works.

    • Execution of communication activities.

    • Execution of customer support services processes.

    • Execution of storage and archiving activities.

    • Execution of contract processes.

    • Follow-up of requests/complaints.

    • Execution of operational processes.

    • Managing customer relations processes.

    • Reporting suspicious transactions to MASAK, detecting suspicious transactions and preventing fraud, monitoring fraud processes, identifying customers and detecting suspicious transactions, identifying customers with suspicious transactions.

    • Making money inflows to customer accounts, making money outflows from customer accounts.

    Transaction Security Data

    • Execution of storage and archiving activities.

    • Reporting suspicious transactions to MASAK, detecting suspicious transactions and preventing fraud, monitoring fraud processes, identifying customers and detecting suspicious transactions, identifying customers with suspicious transactions.

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    • Law, follow-up and execution of litigation works, follow-up and execution of mediation works, follow-up and execution of enforcement works.

    Finance Data

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    • Execution of finance and accounting works.

    • Execution of customer support services processes.

    • Execution of storage and archiving activities.

    • Execution of contract processes.

    • Follow-up of requests/complaints.

    • Execution of operational processes.

    • Execution of activities in accordance with the legislation.

    • Reporting suspicious transactions to MASAK, detecting suspicious transactions and preventing fraud, monitoring fraud processes, identifying customers and detecting suspicious transactions, identifying customers with suspicious transactions.

    • Making money inflows to customer accounts, making money outflows from customer accounts.

    Professional Information Data

    • In order to comply with legal and administrative measures.

    • Reporting suspicious transactions to MASAK, detecting suspicious transactions and preventing fraud, monitoring fraud processes, identifying customers and detecting suspicious transactions, identifying customers with suspicious transactions.

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    Visual Data

    • Complying with the information storage, reporting and informing obligations stipulated by all judicial and administrative authorities in accordance with the relevant legislation, ensuring that requests or decisions from these authorities are fulfilled.

    • In order to comply with legal and administrative measures.

    • Reporting suspicious transactions to MASAK.

    • Providing our services and verifying your customer identity in this context.

    • Performing account opening procedures.

    • Confirming the identity of the customer performing the transaction, making changes to the customer account information, raising the customer account level.

    • Notifying these authorities for the purpose of investigating, detecting and preventing violations of the contract and the law.

    • Resolving existing and future legal disputes. 

    Data processing is mandatory for the legitimate interests of the data controller (KVKK art. 5/2-f)

    Identity Data

    • Keeping customer satisfaction at the highest level by measuring the performance of our systems.

    • Planning of commercial/business strategies.

    • Ensuring the security of our website, mobile applications, other online applications and products.

    • Modelling, reporting, scoring, risk monitoring, intelligence, existing or new product studies and potential customer identification.

    • Follow-up of requests/complaints.

    Communication Data

    • Keeping customer satisfaction at the highest level by measuring the performance of our systems.

    • Planning of commercial/business strategies.

    • Ensuring the security of our website, mobile applications, other online applications and products.

    • Modelling, reporting, scoring, risk monitoring, intelligence, existing or new product studies and potential customer identification.

    Location Data

    • Ensuring that our systems, services and interface are accessible to users using all platforms (IOS, Android).

    Customer Transaction Data

    • Keeping customer satisfaction at the highest level by measuring the performance of our systems.

    • Planning of commercial/business strategies.

    • Ensuring the security of our website, mobile applications, other online applications and products.

    • Modelling, reporting, scoring, risk monitoring, intelligence, existing or new product studies and potential customer identification.

    Transaction Security Data

    • Ensuring the security of our website, mobile applications, other online applications and products.

    • Providing system security with customer account security.

    • Ensuring that our systems, services and interface are accessible to users using all platforms (IOS, Android),

    Finance Data

    • Modelling, reporting, scoring, risk monitoring, intelligence, existing or new product studies and potential customer identification.

    Professional Information Data

    • Modelling, reporting, scoring, risk monitoring, intelligence, existing or new product studies and potential customer identification.

    Explicit consent (KVKK art. 5/1)

    Marketing Data

    • Modelling, reporting, scoring, risk monitoring, intelligence, existing or new product studies and potential customer identification.

    • Execution of marketing analysis studies and advertising / campaign / promotion processes.

    • Carrying out activities for customer satisfaction,

    • Analysis of target or advertising cookie usage.

    Explicit consent (KVKK art. 5/1)

    Identity Data

    • Sending informing/ marketing messages via SMS.

    • Sending informing/ marketing messages via e-mail.

    Explicit consent (KVKK art. 5/1)

    Communication Data

    • Sending informing/ marketing messages via SMS.

    • Sending informing/ marketing messages via e-mail.

     

    Bybit Türkiye uses cookies and similar tools to improve user experience, provide our services, improve our marketing efforts and understand how our customers use our services and make improvements accordingly. The cookie banner in your browser will indicate how to accept or reject cookies or manage your preferences. You can access Bybit Türkiye Clarification Text  on Cookies through https://www.bybit-tr.com/tr-TUR 

     

    5. To whom and for what purpose do we transfer your personal data?

    In accordance with Articles 8 and 9 of the Law; we may transfer your personal data held by Bybit Türkiye to third parties.

    • Your Identity, Communication, Finance, Transaction Security, Customer Transaction, Professional Experience, Legal Transaction, Visual Data; based on being expressly stipulated in the law (KVKK art. 5/2-a) and that it is mandatory for the data controller to fulfill its legal obligation (KVKK art. 5/2-ç).In order to provide information to authorized persons, institutions and organizations, to carry out risk management processes, to follow up and carry out legal affairs, to fulfill our legal obligations; we may transfer personal data to persons, institutions and/or organizations that are required/permitted by the law and other legislative provisions, and to all kinds of public institutions and organizations and private institutions and organizations that are legally authorized to receive personal data, to authorities, auditors, supervisory and regulatory bodies.

    • Your Identity, Communication, Finance, Transaction Security, Customer Transaction, Legal Transaction, Visual, Marketing Data; ıt is necessary to process personal data of the parties to the contract, provided that it is directly related to the establishment or performance of a contract (KVKK art. 5/2-c), it is mandatory for the data controller to fulfill its legal obligation (KVKK art. 5/2-ç), and Based on the legal reasons that data processing is mandatory for the legitimate interests of the data controller (KVKK art. 5/2-f). For the purposes of follow-up and execution of legal affairs, legal evaluation of customers' demands and complaints, follow-up of requests/complaints, execution of information security processes, execution of communication activities, execution of contract processes, execution of finance and accounting affairs, execution of customer relations management processes, execution of business continuity activities, carrying out after-sales support services, legally evaluating customers' demands and complaints, carrying out service and operation processes, carrying out audit activities, carrying out risk management processes, carrying out internal audit activities, and carrying out marketing analysis studies; we may transfer it to third parties from whom services, support and consultancy are received in law, tax and similar fields to carry out company activities, and to third parties who provide support in sales, marketing, targeting activities and other fields; the program partner institutions, organizations, banks, representatives, funds with which we cooperate, to cooperating organizations, to organizations/individuals from which service/support/consultancy is received, and to organizations/individuals from which independent audit and support services are received.

    • Your Identity (name, surname) and Communication (phone number, e-mail address) Data; may be transferred to İleti Yönetim Sistemi Anonim Şirketi (İYS- https://iys.org.tr/) for the purpose of carrying out advertising/campaign/promotion processes based on your explicit consent (KVKK art. 5/1). 

    • Your Identity, Communication, Customer Identification, Finance, Customer Transaction, Legal Transaction, Visual Data; may be transferred to our business partners and representatives for the purpose of carrying out marketing activities, modeling, reporting, existing or new product studies and potential customer identification, and advertising/campaign/promotion processes based on your explicit consent (KVKK art. 5/1). 

    • Your Identity, Communication, Location, Legal Transaction, Customer Transaction, Transaction Security, Finance, Professional Experience, Marketing, Visual Data; may be transferred to the companies and company groups residing abroad of Bybit Türkiye, based on your explicit consent  (KVKK art. 5/1), for the purposes of executing operational processes and ensuring business continuity.

    • Your Identity, Communication, Location, Legal Transaction, Customer Transaction, Transaction Security, Finance, Professional Experience, Marketing, Visual Data; will be transferred to group companies, our affiliates, and external service providers providing infrastructure and information system services, to our shareholders, based abroad, in accordance with the operation of Bybit Türkiye's activities and the functioning of its infrastructure and information systems based on your explicit consent  (KVKK art. 5/1).

    Bybit Türkiye, takes all necessary technical and administrative measures in case your personal data is transferred at home or abroad.

    Bybit Türkiye will use reasonable efforts to ensure that such third parties take the necessary technical and administrative measures to protect the personal data transferred.

     

    6. Protection, Storage and Destruction of Your Personal Data by Bybit Türkiye

    Bybit Türkiye will not process personal data contrary to the purposes for which they were collected within the framework of this clarification text and the Law, and will delete, destroy or anonymize, if requested by the relevant person or ex officio or upon the disappearance of the data processing purpose. 

    Bybit Türkiye takes all necessary technical and administrative measures to prevent your personal data from being accessed by unauthorized persons, incorrect processing, disclosure, modification/deletion for unlawful reasons, and to ensure its protection and security. 

    In case your personal data is damaged and/or seized/disclosed by third parties as a result of attacks on the archive and/or servers and/or other systems containing your personal data processed by Bybit Türkiye, Bybit Türkiye shall notify the relevant persons and the Personal Data Protection Board after being informed of the violation in question. will then inform you within 72 hours. 

    Your personal data will be stored for 10 years from the expiry of the contract you have concluded. In cases where you do not have a contractual relationship with Bybit Türkiye, your personal data will be stored for a reasonable period of time required for the purpose of processing. If there are storage periods stipulated by legal regulations regarding the storage of your personal data within the scope of the relevant processing process, your data will not be deleted during the said periods.

    In the event that the above-mentioned periods expire, the period stipulated in the relevant legal regulation or required for the purpose for which it was processed expires, or in the event that the deletion request of the person concerned is positive, your personal data will be deleted, destroyed or anonymized in accordance with the protection of data legislation in accordance with Bybit Türkiye Personal Data Protection and Confidentiality Procedure and Personal Data Storage and Destruction Procedures.

     

    7. Your Rights Regarding Your Personal Data

    By applying to Bybit Türkiye, you have the right to:

     

    1. learn whether personal data is processed;

    2. request information if personal data has been processed,

    3. learn the purpose of processing personal data and whether they have been used in accordance with the purpose;

    4. be informed of the third parties from which personal data is transferred domestically or abroad;

    5. request personal data to be corrected if it is incompletely or improperly processed;

    6. request the deletion or destruction of personal data within the framework of the conditions stipulated in the Article 7 of the Law; 

    7. requesting the transactions made in accordance with paragraphs (iv) and (v)  to be notified to third parties to whom personal data has been transferred;

    8. object to the appearance of a result against you by analyzing the processed data exclusively through automated systems;

    9. claim to recover damages in case of damage caused by illegal processing of personal data.

     

    Your requests within the scope of your stated rights; You can send it to the Bybit Türkiye address below, with information proving your identity, in person or via secure electronic signature, mobile signature or your current e-mail address notified to Bybit Türkiye and registered in the Bybit Türkiye system, to Bybit Türkiye's kvkk@bybit-tr.com 

    In your applications made according to the abovementioned procedure: 

    • your name, surname, date and signature if the application is written;

    • 11-digit TR ID number if you're a Turkish citizen;

    • your residence permit and ID number, if you are not a Turkish citizen;

    • your residence or work place address subject to the notification;

    • your electronic mail address subject to the notification and telephone number, if any;

    • request subject

     

    shall be definitely included, and all information and documents relating to your request should be legibly added to your application. 

    Your application will be accepted following ID authentication to be made by Bybit Türkiye and will be answered in writing or in electronic form within 30 days at the latest. We would very much like to point out that for written applications the date when the documents are delivered to Bybit Türkiye and for applications made with other methods the date when the application is delivered to Bybit Türkiye will be considered as the application date. The response to your applications is essentially a free of charge process and if the response process requires a cost, the fee will be reflected to you within the scope of the legislation or in the tariff determined/to be determined administratively.

     

    Version Date: 03.07.2024

     

    Trade Registry Number: 184965-5

    Mersis No: 0629-1082-1210-0001

    Trade Title: NARKASA YAZILIM TİCARET ANONİM ŞİRKETİ

    Address: Huzur Mahallesi Maslak Ayazağa Cad. No:4 H/201 Sarıyer İstanbul 

    Website: https://www.bybit-tr.com/tr-TUR 

    KEP address: narkasa@hs01.kep.tr

    Was it helpful?
    yesYesyesNo