Data Protection and Communication Security
Privacy and Data
Compliance with applicable data protection regulations; clear disclosure of data collection scope, purposes, sharing parties, and cross-border transfers; provision of rights to access, correct, and delete data.
Social Media
The official channels will never request ID documents, passwords, private keys, or sensitive financial information via social media; beware of impersonation and phishing links.
Information Security
End-to-end encryption, role-based access control, audit logging, and regular penetration testing.
Last updated