Security
Security overview Security is paramount when dealing with financial transactions and payments. For over 10 years, XTRM has developed and deployed the f...
Thu, 7 Oct, 2021 at 1:03 PM
Companies - Information Security Policy Companies - XTRM Inc. Information Security Policy I. POLICY A. It is the policy of XTRM Inc. that informa...
Tue, 15 Jun, 2021 at 9:36 AM
XTRM Inc. Information security reporting policy 2020 I. POLICY A. It is the policy of XTRM Inc. that information, as defined hereinafter, in all ...
Thu, 19 Jan, 2023 at 9:40 AM
XTRM Sub-processors. To support XTRM in delivering its Services, XTRM may engage third party service providers to assist XTRM with its data processing a...
Tue, 12 Jul, 2022 at 3:58 AM
The device list in your account tracks all the computers or mobile devices logged into your account. If you see a device, you don't recognize it. You c...
Thu, 7 Oct, 2021 at 1:09 PM
XTRM uses one-time passcodes (OTP), sometimes known as Multi-Factor Authentication (MFA), during login and certain transactions such as bank transfers for a...
Fri, 21 Oct, 2022 at 7:37 AM
The CSC is in addition to the bank card number which is embossed or printed on the card. The CSC is used as a security feature, in situations where a per...
Fri, 20 Jan, 2023 at 2:46 PM
XTRM is a global multi-tenant payment system. This means we have one organization account (Prime Entity) for a company worldwide with separate entities for ...
Thu, 19 Jan, 2023 at 9:43 AM
1.0 Overview and Purpose The purpose of this policy is to ensure that necessary records and documents of XTRM, Inc are adequately protected and maintain...
Thu, 31 Mar, 2022 at 6:27 AM
If there is a requirement to have a secondary person approve a transfer from a specific wallet, this can be turned on when creating or editing a wallet. ...
Thu, 19 Jan, 2023 at 9:50 AM