To ensure the high level of information security, the following solutions are provided:

Technical

Technical

  • Data of the Bit Trade service are stored applying reliable encryption algorithms on servers located in certified European and Asian data centers (not lower than TIER 3) and providing a high level of security.
  • Regular data backup.
  • All confidential information, including documents uploaded by Users, is located in separate storage systems isolated from external access in an encrypted form.
  • Use of IPS and NGFW systems.
  • Two-factor authentication (2FA) to log in to the Bit Trade account.
  • Anti-fraud system to identify suspicious activity of Users.
  • Verification of details of recipients and senders of fiat funds to ensure the security of transfers.

Administrative

  • Bit Trade Customers are verified in accordance with the requirements of the fifth EU Anti-Money Laundering Directive (5AMLD).
  • Bit Trade Employees are well-qualified to fulfill their duties and are tested beforehand, as well as required to sign all necessary legal agreements, including the Non-Disclosure Agreement (NDA).
  • Limited number of employees has access to confidential data of the Bit Trade service and has received the necessary accreditation to work with such data.
  • Regular audits and security testing ensure the additional safety of Bit Trade. Based on the analysis of the results, we take measures to increase the security level.
  • The Bit Trade service is updated, and new functions are added after the Quality Control Department along with information security specialists completes the testing.
  • The Quick Response and Management Service identifies and prevents information security threats.
  • The Bit Trade Technical Support Service is available round-the-clock and able to provide 24/7 services based on the data of monitoring systems.

For security reasons, our Company does not provide the full list of methods that ensure efficient and seamless operation of the Bit Trade service.

Bit Trade's security system uses methods for preservation of information privacy, integrity and availability in accordance with the ISO/IEC (27002:2013/Cor.2:2015) standard that contains the following sections:

  • security policy;
  • organization of information security;
  • ensuring the physical integrity and security of equipment;
  • access management;
  • management of the continuous operation of the organization;
  • compliance with regulatory requirements.

Legal Information

Bitbon Protocol is the final document of creating the “Bitbon Protocol” information resource derivative of the nonmonetary asset “Infrastructure Asset of the Bitbon System — Simcord” kept on the balance sheet of SIMCORD LLC, EDRPOU 37657823. The Bitbon Protocol establishes the following: scope of Bitbon System Participants’ rights of access to the “Bitbon Protocol” information resource; number of Bitbon access token accounting units; attributes and properties of the Bitbon digital asset; terms and conditions of transferring the Bitbon digital asset; the Bitbon Protocol execution procedure.

You can learn more about the Bitbon Protocol by following the link.