Security & Compliance

Your security is our top priority. We employ multiple layers of protection to safeguard your financial data and transactions.

PCI DSS Level 1

ISO 27001

SOC 2 Type II

GDPR Compliant

Security Features

Multi-layered security architecture protecting your data

End-to-End Encryption

All transactions and sensitive data are encrypted using industry-standard AES-256 encryption, ensuring your information remains secure during transmission and storage.

Two-Factor Authentication

Enhance account security with multiple 2FA options including Google Authenticator, email verification, and backup codes to prevent unauthorized access.

Secure API Access

API requests are authenticated using Basic Auth with public and secret keys, ensuring only authorized applications can access your account data.

Cloud Infrastructure

Our platform runs on enterprise-grade cloud infrastructure with 99.9% uptime SLA, automated backups, and disaster recovery procedures.

KYC Verification

Comprehensive Know Your Customer (KYC) verification process helps prevent fraud and ensures compliance with international financial regulations.

PCI DSS Compliance

Our payment processing infrastructure is PCI DSS Level 1 compliant, meeting the highest standards for handling credit card information securely.

Our Security Practices

Comprehensive measures to ensure platform integrity

Regular Security Audits

We conduct quarterly security audits and penetration testing by independent third-party security firms to identify and address vulnerabilities.

Data Privacy Protection

Your personal and financial data is protected under strict privacy policies compliant with GDPR, CCPA, and other international data protection regulations.

Real-Time Monitoring

24/7 automated monitoring systems detect and respond to suspicious activities, unauthorized access attempts, and potential security threats immediately.

Secure Development

Our development team follows secure coding practices, conducts code reviews, and uses automated security testing tools to prevent vulnerabilities.

Employee Training

All team members undergo regular security awareness training and background checks to maintain the highest security standards.

Incident Response

We maintain a comprehensive incident response plan with defined procedures for handling security events and communicating with affected users.

Responsible Disclosure Program

We welcome security researchers to report vulnerabilities responsibly. If you discover a security issue, please contact our security team immediately. We commit to:

  • Respond to reports within 24 hours
  • Provide regular updates on remediation progress
  • Recognize researchers (with permission) in our Hall of Fame
  • Not pursue legal action against good-faith reports

Protect Your Account

Best practices to keep your account secure

Enable Notifications

Turn on transaction notifications to receive instant alerts for any account activity. This helps you detect unauthorized access immediately.

Use Strong Passwords

Create unique passwords with at least 12 characters, mixing uppercase, lowercase, numbers, and symbols. Never reuse passwords across platforms.

Verify Recipients

Always double-check recipient details before sending payments or transfers. Once completed, transactions cannot be reversed.

Avoid Phishing

We'll never ask for your password via email or phone. Always verify the URL (tchotchom.com) before entering your credentials.

Have Security Questions?

Our dedicated security team is available 24/7 to address your concerns and assist with security-related inquiries.