Security & Compliance
11.1 Data Protection & Privacy
How Your Data is Protected:
Encryption: All data encrypted in transit (TLS 1.3) and at rest (AES-256)
Access Controls: Role-based access control (RBAC) limits data access
Audit Logging: All data access is logged and monitored
Regular Backups: Daily encrypted backups with disaster recovery plan
GDPR Compliance: Right to access, rectify, and delete personal data
Personal Information Collected:
Identity information (name, date of birth)
Contact information (email, phone)
Financial information (income, assets, net worth)
Investment history and preferences
Government ID documents (for KYC)
Wallet addresses
How Your Information is Used:
Verify your identity (KYC/AML)
Assess investment suitability
Process transactions
Send project updates and notifications
Comply with regulatory requirements
Improve platform services
Your Privacy Rights:
Access your personal data
Correct inaccurate data
Request data deletion (subject to legal retention)
Export your data
Opt-out of marketing communications
11.2 Access Controls & Permissions
User Authentication:
Password requirements: 12+ characters, uppercase, lowercase, number, special character
Multi-factor authentication (MFA) available
Session timeout after 30 minutes of inactivity
Failed login attempt lockout after 5 attempts
Role-Based Access Control:
All organizations
Full access
Own org only
No access
All projects
Full access
Own org only
Approved only
User PII
Full access
No access
Own only
Financial transactions
Full access
Own org only
Own only
Audit logs
Full access
No access
No access
KYC documents
Full access
No access
Own only
11.3 Audit Trails & Logging
All actions are logged, including:
User authentication (login, logout, failed attempts)
Role assignments and changes
Project creation, submission, approval/rejection
Organization changes and change requests
Document uploads and downloads
Investment transactions
Data exports
Admin actions
Log Retention:
Security logs: 7 years
Transaction logs: 10 years (regulatory requirement)
Access logs: 3 years
Session logs: 1 year
Audit Log Access:
Platform admins: Full access to all logs
Issuer admins: Access to own organization's logs
Investors: Access to own activity logs
Available via Settings → Security → Activity Log
11.4 Regulatory Compliance
Securities Regulations:
Reg D (506b, 506c): Private placement exemptions
Reg A+: Mini-IPO for up to $75M
Reg CF: Crowdfunding exemption up to $5M
All offerings comply with applicable securities laws
KYC/AML Compliance:
Know Your Customer (KYC) verification required for all investors
Anti-Money Laundering (AML) screening
Politically Exposed Persons (PEP) checks
Sanctions list screening (OFAC, EU, UN)
Ongoing transaction monitoring
Accredited Investor Verification:
Income verification ($200K+ individual, $300K+ joint)
Net worth verification ($1M+ excluding primary residence)
Professional certification (Series 7, 65, 82)
Third-party verification services integrated
Data Privacy Regulations:
GDPR (EU General Data Protection Regulation)
CCPA (California Consumer Privacy Act)
PIPEDA (Canadian privacy law)
Data protection officer appointed
Privacy by design principles
Investor Suitability:
Risk tolerance assessment required
Investment profile matching
Suitability warnings for high-risk investments
Accreditation requirements enforced
11.5 Smart Contract Security
Blockchain & Smart Contracts:
Smart contracts audited by third-party security firms
Multi-signature wallets for issuer funds
Time-locked token transfers
Emergency pause functionality
Transparent on-chain transactions
Supported Blockchains:
Ethereum (ERC-20, ERC-1400 security tokens)
Polygon (lower gas fees)
Other EVM-compatible chains
Token Standards:
ERC-1400: Security token standard with compliance features
Transfer restrictions based on investor accreditation
Automated compliance checks
Dividend distribution automation
11.6 Incident Response
Security Incident Response Plan:
Detection: Automated monitoring alerts on suspicious activity
Assessment: Security team evaluates severity and scope
Containment: Immediate action to prevent further damage
Eradication: Remove threat and vulnerabilities
Recovery: Restore normal operations
Notification: Inform affected users within 72 hours (if required)
Post-Incident Review: Document lessons learned and improve processes
How to Report Security Issues:
Email: [email protected]
In-app: Settings → Security → Report Issue
Bug bounty program for responsible disclosure
11.7 Best Practices for Users
For All Users:
✅ Use strong, unique passwords
✅ Enable multi-factor authentication (MFA)
✅ Never share your login credentials
✅ Log out when using shared computers
✅ Keep your email account secure
✅ Beware of phishing emails
✅ Verify URLs before entering credentials
✅ Review your activity log regularly
For Issuer Admins:
✅ Limit team member access to necessary functions only
✅ Review and approve all project submissions carefully
✅ Keep organization information up to date
✅ Secure all uploaded documents
✅ Monitor investor activity for anomalies
For Investors:
✅ Use hardware wallets for large holdings
✅ Keep wallet recovery phrases offline and secure
✅ Verify token contract addresses before transactions
✅ Be cautious of too-good-to-be-true returns
✅ Review all legal documents before investing
✅ Never send funds to unverified addresses
Last updated
Was this helpful?