PRIVACY & DATA USAGE
We keep our data requirements lean, focusing only on what is necessary to facilitate a high-quality sporting environment:
Personal Identity (First Name): We use this to personalize your experience, manage check-ins at the court, and help players and coaches get to know one another by name.
Communication Channels (Email or Messaging Contact): This is our direct line to you.
Whether it's a venue change, a weather cancellation, or a notification about an upcoming league, this ensures you're never left out of the loop.
Participation History: By keeping track of how often you play, we can better understand the demand for certain time slots,
help balance team skill levels, and recognize our most dedicated community members.
Booking & Transaction Details: This allows us to verify your spot in a session, manage waitlists fairly, and resolve any
scheduling conflicts before you even arrive at the gym.
How This Data Powers the Game
Data processing isn't just a backend task; it's the engine that keeps our sessions running smoothly.
Your information undergoes processing for the following core purposes:
Precision Logistics: We use your booking data to organize rosters, ensuring that sessions aren't over-crowded and that every player gets maximum court time.
Real-Time Coordination: Basketball is dynamic, and sometimes schedules change.
We process your contact details to provide "fast-break" updates regarding schedule shifts, gym availability,
or upcoming special events.
Attendance & Accountability: Managing a community requires knowing who is on the court.
Tracking attendance helps us maintain a reliable environment where everyone who signs up shows up,
ensuring the game stays 5-on-5.
legal basis
The legal basis for processing your personal data is:
- Consent
- Contractual obligations
Data Retention
When participation tracking no longer requires retention, information gets removed. Necessary duration governs storage, nothing beyond that point remains.
Your Rights
Under GDPR you may have rights regarding your personal data, including:
- Request correction
- Request deletion
- Restrict processing
Requests: support@lockedinlx.com
Security
Information kept on file is secured through practical methods. Protection relies upon established procedures. Safeguards follow recognized patterns. Systems apply consistent controls. Security reflects standard practices. Measures meet expected levels. Tools function within known limits.