Information Security Policy

1. Introduction is committed to protecting the security and confidentiality of our customers’ personal and financial information. This policy outlines the measures we have put in place to ensure the security of our digital banking platform and the information it contains.

2. Scope

This policy applies to all employees, contractors, and vendors of, as well as any third-party service providers who have access to our digital banking platform or customer information.

3. Information Security Management System (ISMS) has implemented an ISMS to ensure the confidentiality, integrity, and availability of customer information. The ISMS includes regular risk assessments, security controls, and incident response procedures.

4. Access Control

Access to the digital banking platform is restricted to authorized personnel only. All employees, contractors, and vendors must use unique login credentials and are subject to periodic password changes. Access rights are reviewed and revoked as necessary.

5. Data Encryption

All customer information transmitted and stored on the digital banking platform is encrypted using industry-standard encryption algorithms.

6. Incident Response has an incident response plan in place to quickly and effectively respond to any security breaches or other incidents that may occur. All employees, contractors, and vendors are trained on the incident response plan and are required to report any security incidents to the appropriate personnel immediately.

7. Third-Party Service Providers conducts thorough due diligence on all third-party service providers to ensure they meet our information security standards. We also require all third-party service providers to sign a confidentiality agreement and comply with our information security policies and procedures.

8. Compliance is committed to complying with all relevant laws and regulations regarding information security. We regularly review and update our policies and procedures to ensure ongoing compliance.

9. Employee Education and Training

All employees, contractors, and vendors of are required to complete regular information security training. Additionally, all new employees receive information security training as part of their onboarding process.

10. Policy Review and Update

This policy and procedure will be reviewed and updated as necessary to ensure it remains effective in protecting the security and confidentiality of customer information.

Join the waitlist

Get notified when your account is ready.