To ensure a high level of information security, we have implemented the following solutions:



  • data of the Bit Trade service are stored applying reliable encryption algorithms in the servers located in certified European and Asian data centers (not lower than TIER 3) and providing a high level of security;
  • regular data backup;
  • all confidential information, including documents uploaded by Users, is located in separate storage systems isolated from external access in an encrypted form;
  • use of IPS and NGFW systems;
  • two-factor authentication (2FA) to log in to the Bit Trade account;
  • anti-fraud system to identify suspicious activity of Users;
  • verification of details of recipients and senders of fiat funds to ensure the security of transfers.


  • Bit Trade Customers are verified in accordance with the requirements of the fifth EU Anti-Money Laundering Directive (5AMLD);
  • Bit Trade employees are well-qualified to fulfill their duties and are tested beforehand as well as required to sign all necessary legal agreements, including the Non-Disclosure Agreement (NDA);
  • limited number of employees has access to confidential data of the Bit Trade service and has received the necessary accreditation to work with such data;
  • regular audits and security testing ensure additional safety of the Bit Trade service. Analyzing the received results, we take measures to increase the level of information security;
  • updating the Bit Trade service and adding new functions after they are tested by the Quality Control Department along with information security specialists;
  • the Quick Response and Management Service identifies and prevents information security threats;
  • operating round-the-clock, the Bit Trade Customer Support is able to provide services 24/7 based on the data of monitoring systems.

For security reasons, our Company does not provide the full list of methods that ensure efficient and seamless operation of the Bit Trade service.

Bit Trade’s security system uses techniques for preserving information privacy, integrity and availability in accordance with the ISO/IEC (27002:2013/Cor.2:2015) standard that contains the following sections:

  • security policy;
  • organization of information security;
  • ensuring the physical integrity and security of equipment;
  • access management;
  • management of the continuous operation of the organization;
  • compliance with regulatory requirements.

Legal Information

Bitbon Protocol is the final document of creating the “Bitbon Protocol” information resource derivative of the nonmonetary asset “Infrastructure Asset of the Bitbon System — Simcord” kept on the balance sheet of SIMCORD LLC, EDRPOU 37657823. The Bitbon Protocol establishes the following: scope of Bitbon System Participants’ rights of access to the “Bitbon Protocol” information resource; number of Bitbon access token accounting units; attributes and properties of the Bitbon digital asset; terms and conditions of transferring the Bitbon digital asset; the Bitbon Protocol execution procedure.

You can learn more about the Bitbon Protocol by following the link.