Security and Compliance

At CustomersChain, we are committed to upholding the highest standards of security and regulatory compliance to protect our users, maintain trust, and foster responsible participation in the digital asset ecosystem.

1. Information Security Practices

1.1 Data Encryption

All sensitive user data—including personal information, KYC documents,

and transaction data—is encrypted both in transit and at rest using AES-256 and TLS 1.2+ protocols.

1.2 Access Controls

Access to user data is restricted based on role-specific permissions.

All access is logged, and activity is regularly audited.

1.3 Multi-Factor Authentication (MFA)

MFA is mandatory for all administrative users and strongly encouraged for all clients to reduce the risk of unauthorized account access.

1.4 Infrastructure Security

Our systems are hosted in secure, SOC 2-certified data centers with DDoS protection, firewall monitoring, and intrusion detection systems (IDS).

2. KYC/AML Compliance

2.1 Know Your Customer (KYC)

We partner with regulated identity verification providers to validate all users prior to enabling OTC trading services.

Required documentation includes:

  • Government-issued photo ID
  • Proof of address
  • (For businesses) Incorporation documents, UBO declarations

2.2 Anti-Money Laundering (AML)

We screen all users and transactions against global sanctions, PEP (Politically Exposed Persons), and watch lists.

Suspicious activity is flagged, investigated, and reported to relevant authorities where required.

2.3 Ongoing Due Diligence

KYC information is periodically updated, and enhanced due diligence (EDD) is conducted for high-risk users or unusual activity.

3. Regulatory Alignment

3.1 Licensing

CustomersChain operates under applicable regulatory frameworks and is actively pursuing or maintaining licensing in relevant jurisdictions.

3.2 Jurisdictional Restrictions

Access to our services is restricted in regions subject to international sanctions or where local laws prohibit cryptocurrency trading.

3.3 Record Keeping

All transaction and user verification records are securely stored for at least five (5) years or as required by law.

4. Incident Response

4.1 Breach Notification

In the event of a data breach affecting user data, we will notify impacted parties and regulators within the legally required timeframes.

4.2 Security Audits

We undergo periodic third-party security audits and penetration tests.

Results are used to enhance system defenses and operational procedures.

4.3 User Reporting

Users are encouraged to report suspicious activity or potential security incidents to our dedicated compliance team at [Insert Contact Email].

5. User Responsibilities

5.1 Secure Credentials

Users are responsible for safeguarding their account credentials.

CustomersChain is not liable for loss due to compromised passwords unless caused by platform negligence.

5.2 Compliance Cooperation

Users must comply with all KYC/AML requests and cooperate during investigations or account reviews.

5.3 Prohibited Use

Users may not use our services to engage in illegal activity, including but not limited to fraud, sanctions evasion, or terrorist financing.

6. Updates to This Policy

This policy may be updated to reflect changes in legal requirements, industry standards, or internal procedures.

All updates will be communicated to users in a timely manner.