Security Policy

Your trust is our priority. Learn how we protect you.

1. Data Protection

We utilize industry-standard encryption (AES-256) and TLS protocols to ensure your personal and financial data is secure during transmission and storage.

2. Access Control

Strict access controls are in place. Only authorized personnel have access to sensitive information, and we employ multi-factor authentication for all internal systems.

3. Fraud Monitoring

Our sophisticated AI-driven systems monitor accounts 24/7 for suspicious activity. We take immediate action to freeze accounts and notify you if any anomalies are detected.

4. Secure Transactions

All online transactions are verified with dynamic OTPs (One-Time Passwords) and, where applicable, biometric authentication to prevent unauthorized transfers.

5. Incident Response

We maintain a dedicated security operations center (SOC) ready to respond to any security incidents promptly, minimizing impact and ensuring transparency.