Security
Security overview Security is paramount when dealing with financial transactions and payments. For over 10 years, XTRM has developed and deployed the f...
Wed, 17 May, 2023 at 11:13 AM
Companies - XTRM Inc. Information Security Policy I. POLICY A. It is the policy of XTRM Inc. that information, as defined hereinafter, in all its for...
Wed, 27 Sep, 2023 at 9:50 AM
XTRM Inc. Information security reporting policy 2020 I. POLICY A. It is the policy of XTRM Inc. that information, as defined hereinafter, in all ...
Wed, 17 May, 2023 at 11:13 AM
To support XTRM in delivering its services, XTRM may engage third-party service providers to assist XTRM with its data processing activities. When we work w...
Thu, 5 Sep, 2024 at 11:29 AM
The device list in your XTRM account tracks all the computers and mobile devices currently logged into your account. If you notice a device you don't re...
Thu, 4 Jul, 2024 at 2:34 PM
XTRM uses one-time passcodes (OTP), also known as Multi-Factor Authentication (MFA), during login and certain transactions, such as bank transfers, for addi...
Thu, 4 Jul, 2024 at 2:39 PM
The CSC is in addition to the bank card number which is embossed or printed on the card. The CSC is used as a security feature, in situations where a per...
Wed, 17 May, 2023 at 11:16 AM
XTRM is a global multi-tenant payment system. This means we have one organization account (Prime Entity) for a company worldwide with separate entities for ...
Thu, 4 Jul, 2024 at 2:39 PM
1.0 Overview and Purpose The purpose of this policy is to ensure that necessary records and documents of XTRM, Inc are adequately protected and maintain...
Wed, 17 May, 2023 at 11:18 AM
Approval Policies Approval policies can be used if your internal security and compliance policies require you to have one or if you require your Users t...
Fri, 5 Jul, 2024 at 9:43 AM