Data Security and Privacy
Last updated
Last updated
Verify by Tiller prioritises data security through multiple layers of protection. All data, both at rest and in transit, is encrypted using advanced encryption standards, including AES 256 for data at rest and TLS v1.2 or greater for data in transit.
Our infrastructure is hosted in secure data centers with strict access controls. Regular security testing, including penetration testing, is conducted to ensure ongoing resilience against threats. Please see more information in the section within service information.
Verify by Tiller collects data necessary to perform KYC, AML, and CDD checks. This includes personal identification information (PII) such as full name, date of birth, residential address, email address, ID document images, biometric data (for liveness and face match checks), and geolocation data.
This data is used solely for the purpose of verifying the identity of individuals and assessing related risks as part of the compliance process. Data usage is in strict adherence to our and applicable laws.
Verify by Tiller stores customer data for a period necessary to fulfill the KYC checks, after which the data is securely deleted. Typically, customer data is automatically deleted from our systems 8 weeks after the completion of the verification process, ensuring that sensitive information is not retained longer than necessary. This retention policy is designed to balance regulatory requirements with privacy considerations.
Verify by Tiller shares data with third-party services only to the extent necessary to perform the required verification checks. All third-party service providers are rigorously vetted and bound by strict data processing agreements that ensure compliance with data protection laws and the security of the data being processed. Our commitment to user privacy prohibits the sale of data to third parties for marketing or any non-essential purposes.
Verify by Tiller employs a comprehensive set of privacy measures, including data minimisation and strict access controls. We adhere to the principles of GDPR and other data protection regulations, ensuring that users have control over their personal information. Users can request access to, correction of, or deletion of their personal data as per applicable laws.
Users are encouraged to review Verify by Tiller's for detailed information. Additionally, users should secure their accounts using strong, unique passwords and remain vigilant against phishing and other types of online fraud. For any concerns or questions about data security and privacy, our support team is available to assist.
In the event of a data breach, Verify by Tiller has established incident response procedures to quickly address and mitigate any potential impact. Affected users will be notified without undue delay, along with relevant authorities as required by law, providing details of the breach and the measures taken to address it. Continuous monitoring and improvement of our security practices ensure the highest level of data protection.
For more information on this process, please see the reporting section of the service information.