Security

SECURITY001 - Security overview
Security overview   Security is paramount when dealing with financial transactions and payments. For over 10 years, XTRM has developed and deployed the f...
Wed, 17 May, 2023 at 11:13 AM
SECURITY002 - Companies - Information Security Policy
Companies - XTRM Inc. Information Security Policy  I. POLICY A.  It is the policy of XTRM Inc. that information, as defined hereinafter, in all its for...
Wed, 27 Sep, 2023 at 9:50 AM
SECURITY003 - XTRM Inc. Information security reporting policy
XTRM Inc. Information security reporting policy 2020 I. POLICY A. It is the policy of XTRM Inc. that information, as defined hereinafter, in all ...
Wed, 17 May, 2023 at 11:13 AM
SECURITY004 - XTRM Sub-processors
To support XTRM in delivering its services, XTRM may engage third-party service providers to assist XTRM with its data processing activities. When we work w...
Wed, 1 May, 2024 at 10:35 AM
SECURITY005 - IP and device access security
The device list in your XTRM account tracks all the computers and mobile devices currently logged into your account. If you notice a device you don't re...
Thu, 4 Jul, 2024 at 2:34 PM
SECURITY006 - One Time Passwords (MFA) overview
XTRM uses one-time passcodes (OTP), also known as Multi-Factor Authentication (MFA), during login and certain transactions, such as bank transfers, for addi...
Thu, 4 Jul, 2024 at 2:39 PM
SECURITY007 - Card Security Code Overview (CSC/CVV Code)
The CSC is in addition to the bank card number which is embossed or printed on the card. The CSC is used as a security feature, in situations where a per...
Wed, 17 May, 2023 at 11:16 AM
SECURITY008 - Organization entities, user roles, and access levels
XTRM is a global multi-tenant payment system. This means we have one organization account (Prime Entity) for a company worldwide with separate entities for ...
Thu, 4 Jul, 2024 at 2:39 PM
SECURITY009 - Data retention and destruction
1.0 Overview and Purpose The purpose of this policy is to ensure that necessary records and documents of XTRM, Inc are adequately protected and maintain...
Wed, 17 May, 2023 at 11:18 AM
SECURITY010 - Approval Policies
Approval Policies Approval policies can be used if your internal security and compliance policies require you to have one or if you require your Users t...
Fri, 5 Jul, 2024 at 9:43 AM