Privacy Policy
Crypto Ledger Security — data collection, cookies, and your rights.
Crypto Ledger Security Privacy Policy describes how personal data is collected, processed, stored, and protected when users interact with Crypto Ledger security services, hardware wallets, companion applications, and related documentation resources. This policy applies comprehensively to all platforms where security functionality operates, including hardware wallet devices, desktop applications for Windows, macOS, and Linux, mobile applications for iOS and Android, and web properties providing security-related resources and support.
This Privacy Policy was last updated in January 2026. Periodic review is recommended as updates may occur reflecting changes in data handling practices, regulatory requirements, or service capabilities across jurisdictions where users access services. Continued use of Crypto Ledger services after policy updates constitutes acceptance of revised terms governing ongoing data processing.
Data Collection
Crypto Ledger Security services collect limited categories of personal data necessary for providing security functionality while maintaining the protection and privacy expectations of cryptocurrency users who specifically choose hardware wallet security for their assets.
Security verification data includes hardware wallet genuine check results, secure element attestation records, and firmware integrity verification outcomes. This data enables device authenticity confirmation and counterfeit detection without transmitting private keys or recovery phrases.
Application security data includes anonymized information about security feature usage, firmware update adoption rates, and security warning interactions when users opt into analytics. This data supports security improvement without identifying individual users or their specific holdings.
Threat reporting data includes information provided when users report suspicious communications, fake applications, or phishing attempts. This data enables investigation and takedown of fraudulent resources threatening the user community.
Support interaction data includes information users provide when submitting security-related inquiries through official channels. This data is necessary for providing accurate guidance and resolving reported issues.
Website visitor data comprises standard server logs including IP addresses, browser types, pages visited, and timestamps. This data supports security monitoring, abuse prevention, and content improvement analysis.
Cookies and Tracking Technologies
Crypto Ledger websites use cookies and similar technologies for functionality and analysis purposes with user control over non-essential categories.
Essential cookies enable core website functions including navigation, session management, download initiation, and security features. These cookies are strictly necessary for proper website operation and cannot be disabled without affecting functionality. Essential cookies do not track users across websites or collect information for advertising purposes.
Security cookies support fraud detection, suspicious activity monitoring, and protection against automated attacks. These cookies help protect both the platform and users from malicious activity.
Analytics cookies collect anonymized website usage data including security documentation page visits, feature interest patterns, and navigation sequences. These cookies support content improvement and user experience optimization. Analytics cookies can be disabled through the consent interface presented on first visit without affecting security functionality.
Preference cookies remember user selections including display preferences, language settings, and interface configurations. These cookies improve user experience by reducing repetitive selections and can be managed through browser settings or the consent interface.
Cookie consent preferences persist for 13 months before requiring renewal, in compliance with applicable regulations. Users can modify preferences at any time through settings links available in website footers.
Analytics and Performance Monitoring
Crypto Ledger Security uses analytics to understand security feature effectiveness while maintaining user privacy through aggregation and anonymization practices.
Security analytics track anonymous patterns of firmware update adoption, genuine check completion rates, and security warning engagement. This data helps prioritize security development and identify adoption barriers for protective features without identifying individual users.
Threat analytics aggregate attack pattern information from user reports, blocked phishing attempts, and detected fake applications. This information improves security response and helps protect the broader user community.
Application analytics operate through opt-in telemetry that users enable or disable during initial setup. Enabled telemetry collects anonymized events while users declining analytics transmit no telemetry data whatsoever, with no functional penalties or feature restrictions.
Analytics data retention follows a 26-month rolling period aligning with typical security analysis cycles. After this period, aggregated trend data archives for historical comparison while raw event data undergoes permanent deletion from all systems.
Third-Party Tools and Services
Crypto Ledger Security integrates with third-party services for specific functions with data sharing governed by respective service privacy policies and data processing agreements.
Genuine check services verify hardware wallet authenticity through secure attestation protocols. This verification communicates with Ledger security infrastructure to confirm device integrity without transmitting private keys, recovery phrases, or balance information.
Security research partners may receive anonymized threat intelligence for coordinated defense against attacks affecting multiple cryptocurrency platforms. No personally identifying information is shared in these collaborations.
Certification bodies receive device samples and documentation for security evaluation during certification processes. No user data is involved in certification activities.
Cloud infrastructure providers host backend services under data processing agreements requiring compliance with applicable data protection regulations including GDPR requirements.
Data Security
Crypto Ledger Security implements comprehensive technical and organizational security measures protecting user data throughout collection, processing, and storage operations.
Security measures include TLS 1.3 encryption for all data transmission protecting against interception, hardware secure element protection preventing private key extraction, genuine check verification detecting counterfeit devices, firmware signature validation blocking unauthorized code, access controls restricting employee data access to authorized personnel, regular security audits conducted by independent third-party firms, bug bounty programs incentivizing responsible vulnerability disclosure, and incident response procedures for identifying and addressing potential breaches.
We never ask for your recovery phrase or private keys. The Crypto Ledger architecture ensures recovery phrases and private keys exist exclusively inside hardware wallet secure elements, isolated from all connected systems including companion software, computers, and mobile devices. These cryptographic secrets are never transmitted to Ledger servers, companion applications, or third parties during any operation. Any request for recovery phrases or private keys through any channel should be immediately recognized as a phishing attempt and reported to official support.
Data Retention
Crypto Ledger Security retains personal data only for durations necessary to fulfill stated purposes, applying appropriate deletion schedules to different data categories.
Website server logs are retained for 90 days supporting security monitoring and abuse investigation, then permanently deleted from all systems. Analytics data follows 26-month rolling retention for security analysis, with subsequent archival of aggregated trends and deletion of raw event data. Genuine check records are retained for 18 months supporting security verification and counterfeit tracking.
Threat reports are retained for 5 years supporting ongoing investigation and pattern analysis. Support tickets are retained for 3 years following last interaction, enabling follow-up assistance and pattern identification. Cookie consent records follow 13-month retention per regulatory guidelines.
Users can request data deletion subject to legal retention requirements through the support portal. Deletion requests require identity verification before processing to prevent unauthorized access to deletion capabilities.
User Rights
Depending on jurisdiction, users may exercise rights regarding personal data including access to personal data held about them, correction of inaccurate or incomplete data, deletion of personal data subject to legal retention requirements, restriction of data processing, data portability in structured machine-readable formats, objection to processing based on legitimate interests, and withdrawal of consent for consent-based processing without affecting prior processing legality.
Rights requests can be submitted through the support portal at support.ledger.com. Identity verification may be required before processing to prevent unauthorized access to personal data or exercise of deletion rights. Responses are provided within 30 days or within shorter timeframes required by applicable law in specific jurisdictions.
International Transfers
Data may be transferred internationally for processing by service providers and infrastructure partners located outside the user's jurisdiction to enable global service delivery. Such transfers are protected by appropriate safeguards including Standard Contractual Clauses approved by relevant regulatory authorities, adequacy decisions recognizing equivalent data protection standards in destination countries, and binding corporate rules where applicable.
Children Privacy
Crypto Ledger services are not directed at individuals under 18 years of age. Personal data from minors is not knowingly collected during security feature usage or related activities. If such collection is discovered through user report or internal processes, the data will be deleted promptly upon notification without requiring additional verification.
Policy Changes
This policy may be updated to reflect changes in data handling practices, regulatory requirements, or service capabilities affecting data processing activities. Material changes will be communicated through application interfaces during updates, website notices prominently displayed on affected pages, or direct communication where appropriate contact information exists.
Privacy Inquiries
Privacy questions can be directed to the support portal at support.ledger.com using the privacy category for appropriate routing. Privacy-related inquiries receive priority handling within applicable regulatory timeframes. For general security support unrelated to privacy rights, visit our Contact page.