Security
Security & Compliance: Our Commitment to Trust
At PIXL, security and regulatory compliance are foundational pillars of our platform. We implement industry-leading security measures and maintain strict compliance with global financial regulations to protect our users and their investments.
Platform Security Architecture
- Multi-Layer Security: Defence-in-depth approach with multiple security layers protecting user data and assets.
- Encryption Standards: Military-grade encryption for data at rest and in transit using AES-256 and TLS 1.3 protocols.
- Infrastructure Security: Secure cloud infrastructure with regular penetration testing and security audits.
Asset Protection
- Cold Storage: Majority of digital assets stored in secure offline wallets with multi-signature protection.
- Smart Contract Security: Regular audits by leading blockchain security firms and formal verification of smart contracts.
- Insurance Coverage: Comprehensive insurance policy covering digital assets and traditional property investments.
User Account Security
- Multi-Factor Authentication: Mandatory 2FA for all accounts with support for hardware security keys and biometric authentication.
- Advanced Access Controls: Role-based access control with detailed audit logs and suspicious activity monitoring.
- Session Management: Secure session handling with automatic timeouts and device verification.
Regulatory Compliance
- Global Compliance Framework: Adherence to international financial regulations including GDPR, MiFID II, and relevant SEC guidelines.
- KYC/AML Procedures: Robust identity verification and anti-money laundering protocols following global standards.
- Regulatory Reporting: Automated compliance reporting and transaction monitoring systems.
Data Protection
- Privacy by Design: Built-in privacy controls and data minimization principles throughout the platform.
- Data Governance: Comprehensive data management policies with regular audits and access controls.
- Backup Systems: Regular encrypted backups with geographic redundancy and disaster recovery protocols.
Incident Response
- 24/7 Security Monitoring: Round-the-clock security operations centre with automated threat detection and response.
- Incident Management: Comprehensive incident response plan with regular drills and updates.
- Communication Protocol: Clear procedures for security incident notification and stakeholder communication.
Ongoing Security Commitment
Our security and compliance measures are continuously evolving to address new threats and regulatory requirements. We maintain partnerships with leading security firms and regularly update our systems to ensure the highest levels of protection for our users and their investments.