Tether Wallet
Privacy Statement
Last updated March 31, 2026
Thank you for using Tether Wallet, a self-custodial wallet application (the "Application"). The Application was developed by Tether Data, S.A. de C.V. ("Tether Data", "we", "our", or "us").
This privacy statement ("Privacy Statement") sets out the basis on which any Personal Information we collect from you ("you", "your", or "customer") or that you provide to us, will be processed by us. By "Personal Information", we mean any information which, either alone or in combination with other data, enables you to be directly or indirectly identified, for example your name, email address, username, contact details or any unique identifier such as an IP address, device ID or other online identifier.
Capitalized terms that are not defined in this Privacy Statement shall have the meaning ascribed in our Tether Wallet Terms of Use (the "Terms").
Please read the following carefully to understand what Personal Information we collect, how that Personal Information is used and the ways it can be shared by us.
The data controller of your Personal Information is Tether Data, S.A. de C.V., an El Salvador Sociedad Anónima de Capital Variable with an office at Colonia Escalón, 87 Avenida Norte, Calle el Mirador, Edificio Torre Futura, Oficina 06, Nivel 11, San Salvador, El Salvador. Its EU representative is: Rickert Rechtsanwaltsgesellschaft mbH, whose registered office is Colmantstraße 15, 53115, Bonn, Germany. Its UK representative is: Rickert Services Ltd UK whose registered office is PO Box 1487 Peterborough PE1 9XX United Kingdom.
1. Our Processing of Your Personal Information
| Purpose | Personal Information | Legal Basis | |
|---|---|---|---|
| From You | From Others and Your Devices | ||
| Enable access to the Application and related services (registration). | Email address, Tether.me username | IP address, Device model, Operating system and version, Application version, Authentication logs (including timestamps and verification attempts). | You are using us (Performance of a contract) |
| Provide wallet functionality, including generation, storage and management of cryptographic keys; enabling lookup of wallet addresses via Tether.me username pseudonyms; broadcasting blockchain transactions; retrieving and indexing publicly available blockchain data associated with wallet addresses; and presenting transaction history within the Application. | Email address, Tether.me username, Wallet public addresses, Encrypted or unencrypted cryptographic seed material | Tether.me username lookup logs (including timestamps and IP address), Cached recipient wallet address associations, Blockchain transaction data, Transaction hashes, Token transfer data, Gas fee metadata, Consolidated transaction metadata, IP address, Push notification token | |
| Enable backup and recovery of encrypted cryptographic seed material, including email-based verification mechanisms for recovery requests. | Encrypted cryptographic seed material, Email address, Tether.me username | Backup status metadata, Cloud provider interaction metadata (if applicable), Device model / OS (if relevant to backup compatibility), Recovery request logs (including IP address and timestamps), Authentication logs related to PIN verification, Website interaction logs. | |
| Send service-related communications, including follow-up emails for incomplete sign-in attempts, reminders to complete account access or verification steps, and product updates regarding new features, enhancements, or changes to the Application. | Email address | IP address, Device model, Operating system version, Application version, session identifiers, Access timestamps, Application event data. | |
| Operate, maintain and improve the functionality, usability and reliability of the Application, including providing service-related communications and technical updates necessary for the provision of the wallet service. | Email address (for service communications) | IP address, Device model, Operating system version, Application version, session identifiers, Access timestamps, Crash reports, Error logs, Performance logs, Application event data. | We think we can (Legitimate interest) |
| Enhance functionality and user experience by monitoring performance and analyzing aggregated usage data. | N/A | IP address, Device model, Operating system version, Application version, session identifiers, Access timestamps, Crash reports, Error logs, Performance logs, Application event data. | |
| Detection for troubleshooting and improve the functionality, usability and reliability of the Application. | Email address, Tether.me username, Wallet public addresses, Information voluntarily provided in support requests | IP address, blockchain addresses (for abuse prevention and filtering purposes), Authentication logs, Security logs, Access logs, Relevant blockchain transaction metadata, device metadata, crash logs, error logs, Application logs. | |
| Comply with industry self-regulatory and other requirements, as well as applicable legal obligations arising under the laws of relevant jurisdictions. | Email address, Tether.me username | IP address, Access logs, relevant transaction metadata, blockchain addresses. | |
| Protect the rights, property and safety of the Company, its users and others. | Email address, Tether.me username, wallet public addresses (where relevant), security logs, and relevant transaction metadata strictly necessary for investigating misuse or violations | IP address, Security logs, Relevant transaction metadata (if necessary for investigation) | |
| Conduct surveys and collect user feedback to improve the Application and user experience. | Email address, Survey responses and other personal data you decide to disclose in your communication with us. | N/A | |
| Receive and understand the feedback you provide. | Any personal data you decide to disclose in your communication with us. | If you decide to provide Carrier information: name of your carrier (if over a mobile network) or Internet Service Provider (if over WiFi/internet); device information (phone or computer model and operating system); and/or the version number of the Application you are using. | You agreed to it (consent) |
| Comply with applicable legal obligations and respond to lawful requests from competent authorities. | Email address, Tether.me username, Wallet public addresses. | IP address, Access logs, relevant transaction metadata, blockchain addresses. | Compliance with a legal requirement |
When we say that we think we can process your Personal Information, it is because we considered we have a legitimate interest (for ourselves or of a third party) to do so; it is in the interest of our organization to conduct and manage our business; this includes conducting analytics to improve and optimize the Application and the services, protecting our interests and enforcing agreements with others, as well as complying with industry self-regulatory requirements. We might have legitimate interest in processing Personal Information in other contexts. We ensure that we balance any potential impact on you and your rights before we process your Personal Information on that basis. You can obtain further information about how we assess our legitimate interests against any potential impact on you in respect of specific activities by contacting us. Please also consult the section "Your rights" below.
It is important that the Personal Information we collect from you is accurate and current. Please keep us informed if your Personal Information changes during your relationship with us. We will endeavor to effect those changes within a reasonable timeframe.
If you do not wish for your Personal Information to be used in the ways described within this Privacy Statement then you should not use the Application.
We do not rely on consent as a legal basis for processing your Personal Information, except when we receive your feedback.
Aggregated Data. We may also aggregate personal and other data captured by us so that the data is no longer capable of identifying an individual. Aggregated data may cover patterns of usage or information and data that you provide to us, and we reserve the right to use this aggregated information for the purposes of improving and enhancing the Application, generating insights, for use in marketing to other users and current and potential partners and otherwise for the purposes of our business. Provided that such aggregated data does not directly or indirectly identify you as an individual, this data is not considered to be Personal Information and is not covered by this Privacy Statement.
2. Security and Confidentiality
We are committed to protecting your privacy. Internally, only people with a business need to know Personal Information, or whose duties reasonably require access to it, are granted access to customers' Personal Information. Such individuals will only process your Personal Information on our instructions and are subject to a duty of confidentiality. We audit our personal compliance regularly.
We have put in place procedures to deal with any actual or suspected data breach and will notify you and any applicable regulator of a breach where we are legally required to do so.
We take all reasonable endeavors to protect and safeguard Personal Information. Unfortunately, the transmission of information via the Internet is not completely secure. While we do our utmost to protect your Personal Information, we cannot guarantee the security of your data transmitted to us over email or through the Application; any transmission is at your own risk. Once we have received your Personal Information, we will use strict procedures and security features to try to prevent unauthorized access, but there are protective measures you should take, as well. Do not share your Personal Information with others unless you clearly understand the purpose of their request for it and you know with whom you are dealing. Do not keep sensitive Personal Information in your e-mail inbox or on Webmail. If you are asked to assign passwords to connect you to your Personal Information, you should use a secure password and always use two-factor authentication (2FA), where available. You should change your password regularly.
3. What and with whom we share your Personal Information
As necessary, we will share your Personal Information with:
3.1. With any member of our group, which means our direct or indirect subsidiaries, our ultimate holding company and any other subsidiary of that holding company, including their respective shareholders, directors, officers, affiliates, employees, contractors, agents, partners, insurers and attorneys or representatives.
3.2. With our service providers, to the extent necessary to supply the Application to you.
3.3. With selected third parties, including analytics and search engine providers that assist us in the improvement and optimization of the Application.
3.4. With authorities and law enforcement agencies worldwide either when ordered to do so or on a voluntary basis if this appears reasonable and necessary to us.
We may also disclose your Personal Information to third parties:
3.1. If Tether Data or substantially all of its assets are acquired by a third party, in which case Personal Information held by it about its customers will be one of the transferred assets.
3.2. If we are under a duty to disclose or share your Personal Information in order to comply with any legal obligation, or in order to enforce or apply our Terms and other agreements; or to protect the rights, property, or safety of us, our clients, or others, including to defend ourselves from legal claims.
You can find more information on the actual parties we are sharing your data with at the end of this policy. The list is updated regularly.
4. Transfers
Your Personal Information will be stored in the European Economic Area ("EEA") and may be transferred worldwide.
Personal Information and other data may therefore be exported outside of the jurisdiction in which you reside. Your Personal Information may be processed and stored in a foreign country or countries. Under those circumstances, the governments, courts, law enforcement, or regulatory agencies of that country or those countries may be able to obtain access to your Personal Information through foreign laws. You need to be aware that the privacy standards of those countries may be lower than those of the jurisdiction in which you reside.
EEA customers. We will take all steps reasonably necessary to ensure that your Personal Information is treated securely and in accordance with this Privacy Statement. All data you provide to us is stored on our secure servers. Where we transfer our data outside of the EEA, we ensure that adequate safeguards are in place. That includes, where necessary, taking steps to evaluate the risks raised by the transfers in countries that do not offer an adequate level of protection. Please contact us if you want further information on the specific mechanism used by us when transferring your Personal Information out of the EEA.
5. Data Retention
We have data retention and deletion policies designed to retain Personal Information for no longer than necessary for the purposes set out herein or as otherwise required to meet legal or business needs. Because of those retention requirements, we might not be able to honor erasure requests.
6. Your rights
All customers. You may access, verify, request the deletion of your Personal Information held by Tether Data and, where consent is the legal basis for processing of your Personal Information and subject to any legal or contractual restrictions, withdraw your consent, in each case, by a written request to Tether Data at privacy@tether.to. Our electronic marketing communications also contain opt-out mechanism and options to update your contact information or change your preferences at any time. We will do our best to honor your request promptly.
EEA customers. You have a number of rights in relation to how we process your Personal Information. You may exercise these rights by contacting us (see details below). These include the right to:
- access the Personal Information that we may hold about you;
- rectify any inaccurate Personal Information that we may hold about you;
- have your Personal Information erased in certain circumstances, for example, where it is no longer necessary for us to process your Personal Information to fulfill our processing purposes; or where you have exercised your right to object to the processing;
- restrict the processing of your Personal Information where, for example, the information is inaccurate or it is no longer necessary for us to process such information or where you have exercised your right to object to our processing;
- object to the processing of your Personal Information which may be exercised in certain circumstances, for example, where your own legitimate interests outweigh ours;
- have your Personal Information ported to a new service provider if you no longer wish to use the Application;
- when we rely on your consent to process Personal Information (e-mail communications), withdraw your consent at any time.
No fee usually required. You will not have to pay a fee to access your Personal Information or to exercise any of your other rights. We may charge a reasonable fee if your request is clearly unfounded, repetitive or excessive. Alternatively, we may refuse to comply with your request in these circumstances.
What we may need from you. We may need to request specific information from you to help us confirm your identity and ensure your right to access your Personal Information (or to exercise any of your other rights). This is a security measure to ensure that Personal Information is not disclosed to any person who has no right to receive it. We may also contact you to ask you for further information in relation to your request to speed up our response.
Time limit to respond. We try to respond to all legitimate requests within one month. Occasionally it may take us longer than a month if your request is particularly complex or you have made a number of requests. In this case, we will notify you and keep you updated.
7. Changes to this Privacy Statement
Any changes we make to our Privacy Statement in the future will be posted on this page. Please check back frequently to see any updates or changes to our Privacy Statement.
8. Contact & Complaints
Tether Data's Data Protection Officer ("DPO") is responsible for overseeing our privacy practices. If you have any questions or concerns about this Privacy Policy or our privacy practices, or wish to exercise your rights, please contact our DPO at privacy@tether.to.
EEA customers only. Should you have any concerns about how we handle your Personal Information, please contact us in the first instance by email at privacy@tether.to. You can also contact our EU/UK representative at art-27-rep-tetherdatasa@rickert.law or art-27-rep-tetherdatasa@rickert-services.uk. We will do our best to resolve your concern. You can also submit a complaint to the national supervisory authority within your jurisdiction, details of which can be found online.
Appendix — List of Third-Party Service Providers with whom Personal Information may be shared
| Party Name and Jurisdiction | Purpose | Data Disclosed |
|---|---|---|
| Cloud providers | For storage purposes. | Email address, blockchain address, encrypted backup metadata, application logs, device information, transactional activity and analysis |
| Cloudflare, Inc. (US). Cloudflare’s privacy policy is available at cloudflare.com/privacypolicy | To provide DNS management, security, and content delivery network (CDN) services, enhancing website performance and accessibility. We also utilize its geolocation identification services to manage access to certain parts of our platforms. | IP addresses, traffic routing data, system configuration information, and other information about traffic to and from our websites, devices, applications, and/or networks |
| Legal Counsel | As part of attorney-client relationships, legal counselling and litigations | Any relevant account information, as the case may be. |
| Chainalysis, Inc. (US). Chainalysis privacy policy is accessible at https://www.chainalysis.com/privacy-policy/ | Chainalysis uses public blockchain addresses to conduct investigations, compliance, and risk management checks. | Public blockchain addresses. |