Security Policy
12 Mar 2021
Data protection
Leading technologies including encryption software are used to protect data and adhering to strict security standards are maintained to prevent unauthorized access.

Storage security
All electronic storage and transmission of personal data are secured and stored with appropriate security technologies.

Access and system design
Our system is designed and developed with the first and ultimate intent to always protect the safety and integrity of all information and transactions.

We also adopt a variety of monitoring and review measures upon the security and integrity of our system, which include but are not limited to:
  • Enhanced data-encryption methods.
  • Anti-virus detection, prevention, and protection procedures.
  • Firewall barriers.
  • 24/7 surveillance and detection.