Data Protection and Communication Security

Privacy and Data

Compliance with applicable data protection regulations; clear disclosure of data collection scope, purposes, sharing parties, and cross-border transfers; provision of rights to access, correct, and delete data.

Social Media

The official channels will never request ID documents, passwords, private keys, or sensitive financial information via social media; beware of impersonation and phishing links.

Information Security

End-to-end encryption, role-based access control, audit logging, and regular penetration testing.

Last updated