Security
Security overview Security is paramount when dealing with financial transactions and payments. For over 10 years, XTRM has developed and deployed the f...
Thu, 7 Oct, 2021 at 1:03 PM
Companies - Information Security Policy Companies - XTRM Inc. Information Security Policy I. POLICY A. It is the policy of XTRM Inc. that informa...
Tue, 15 Jun, 2021 at 9:36 AM
XTRM Inc. Information security reporting policy 2020 I. POLICY A. It is the policy of XTRM Inc. that information, as defined hereinafter, in all ...
Thu, 7 Oct, 2021 at 1:07 PM
XTRM Sub-processors. To support XTRM in delivering its Services, XTRM may engage third party service providers to assist XTRM with its data processing a...
Wed, 4 May, 2022 at 9:27 AM
The device list in your account tracks all the computers or mobile devices logged into your account. If you see a device, you don't recognize it. You c...
Thu, 7 Oct, 2021 at 1:09 PM
XTRM uses one-time passcodes (OTP), sometimes known as Multi-Factor Authentication (MFA), during login and certain transactions such as bank transfers for a...
Thu, 7 Oct, 2021 at 1:20 PM
The CSC is in addition to the bank card number which is embossed or printed on the card. The CSC is used as a security feature, in situations where a per...
Wed, 11 Nov, 2020 at 9:59 AM
XTRM is a global multi-tenant payment system. This means we have one organization account (Org Acct.) for a company worldwide with separate sub-accounts ...
Wed, 12 Jan, 2022 at 11:20 AM
1.0 Overview and Purpose The purpose of this policy is to ensure that necessary records and documents of XTRM, Inc are adequately protected and maintain...
Thu, 31 Mar, 2022 at 6:27 AM
If there is a requirement to have a secondary person approve a transfer from a specific wallet, this can be turned on when creating or editing a wallet. ...
Tue, 31 Aug, 2021 at 1:23 PM