Initial Verification
When setting up your global account:
Basic Information: Must match that on your ID
Government-issued ID: Passport, National ID, or Driver's License
Photo Verification: A live selfie that matches your ID
Processing Time: Typically completed within minutes to hours
Enhanced Verification
For higher limits and business accounts:
Additional Documents: Proof of Income, Employment Verification
Source of Funds: Documents that show how you earn money
Business Registration: For business accounts (if applicable)
Bank Statements: Recent statements from existing accounts
Bridge Banking Partner Verification
Additional verification through our banking partner:
Regulatory Compliance: Required by banking regulations
Enhanced Security: An additional layer of protection against fraud
Instant Decision: Typically instant approval or flagging for review
Document Quality: High-resolution, clear photos are required
Two-Factor Authentication (2FA)
Setting Up 2FA
Protect your account with two-factor authentication:
SMS Verification: Text messages to your verified phone
Authentication Apps: Google Authenticator, Authy, or similar apps
Email Backup: Secondary email verification
Recovery Codes: Save backup codes for account recovery
When 2FA is Required
Enhanced security for sensitive transactions:
Large Withdrawals: Transactions above certain limits
Account Settings Changes: Updates to your email, phone, or address
New Device Login: First login from unknown devices
Security Settings Changes: Edit your 2FA or password settings
Manage 2FA Settings
Multiple Methods: Set up SMS and app-based authentication
Backup Options: Always maintain a secondary verification method
Regular Updates: Keep your backup phone numbers and email addresses up to date.
Recovery Planning: Store your recovery codes in a safe place.
Account Security Features
Advanced Security Monitoring
Real-Time Protection Systems:
Device Identification: Alerts for access from new devices.
Location Monitoring: Alerts for logins from unusual locations.
Behavioral Analysis: Detects unusual transaction patterns.
IP Address Tracking: Monitors suspicious access attempts.
Transaction Security
Protecting Your Financial Activity:
Transaction Limits: Daily and monthly security limits.
Approval Requirements: Large transactions require additional confirmation.
Cooling Periods: Delays for suspicious activity.
Fraud Detection: AI-powered fraud prevention systems.
Data Protection
How We Protect Your Information:
Encryption: All data is encrypted at rest and in transit.
Secure Storage: Financial data is stored in secure, compliant systems.
Controls Access: Strict internal access policies
Regular Reviews: Security reviews and compliance checks
Compliance and Regulatory Standards
Banking Regulations
We comply with multiple jurisdictions:
US Banking Laws: Through our Bridge Banking Partner
European Regulations: For Euro Account Compliance
Egyptian Regulations: For local operations and users
International Standards: Anti-Money Laundering, KYC, and Counter-Terrorist Financing
Data Privacy Compliance
Protecting your privacy rights:
GDPR Compliance: European data protection standards
Data Minimization: Collecting only necessary information
Right of Access: You can request all your data
Right of Deletion: Account closure, including data deletion options
Financial Crime Prevention
Strong systems to prevent illegal activities:
Anti-Money Laundering: Monitoring suspicious patterns
Transaction Screening: Automatic and manual reviews
Sanctions Screening: Compliance with international sanctions lists
Activity Reporting Suspect: Legal reporting when needed
Document Security and Management
Document Upload Security
Secure handling of your sensitive documents:
Encrypted Transmission: Secure upload process
Secure Storage: Documents are stored in encrypted systems
Access Log: Track who accesses your documents and when
Automatic Deletion: Old documents are removed according to retention policies
Acceptable Document Types
Valid Documents for Verification:
Primary Identity: Passport (preferred), National ID, Driver's License
Proof of Address: Utility bills, bank statements, lease agreements
Proof of Income: Pay stubs, tax returns, bank statements
Business Documents: Registration certificates, tax IDs
Document Quality Requirements
To ensure successful verification:
High Resolution: Clear, legible text and images
Good Lighting: Avoid shadows, glare, or poor lighting
Complete Document: The four corners Visible
No Obstructions: Remove covers, cases, or hands from the image.
Privacy Protection Measures
Information Sharing Policies
How We Handle Your Data:
Sharing with Third Parties: Only with banking partners and regulatory bodies
Marketing Communications: Opt-out is available for all marketing
Sale of Data: We never sell your personal information
Consent Management: You control how your data is used
Account Privacy Settings
Control Your Privacy:
Profile Visibility: Control visible information
Communication Preferences: Choose how we communicate with you
Data Processing: Manage consent for different uses
Communications with Third Parties: Control which services can access your account
Fraud Prevention and Combating
Common Fraud Scenarios
What We Protect You From:
Account Takeover: Unauthorized access to your account
Identity Theft: Someone using your documents or information
Payment Fraud: Unauthorized transactions or transfers
Phishing Attempts: Fake communications requesting your information
How to Protect Yourself
Best Practices to Stay Safe:
Strong Passwords: Use unique and complex passwords
Secure Networks: Don't log into your account on public WiFi
Check Connections: We will never ask for passwords via email or phone
Regular Monitoring: Regularly check your account for unauthorized activity
Report Suspicious Activity
If You Notice Something Wrong:
Immediate Action: Contact Support immediately
Document Everything: Take screenshots of suspicious communications
Don't Share Information: Never provide passwords or 2FA codes
Account Monitoring: Check all your financial accounts for activity Unauthorized
Account Recovery Procedures
Recover Lost Access
If you can't access your account:
Password Reset: Use an automated password reset system
2FA Recovery: Use backup codes or a secondary authentication method
Support Help: Contact support with identity verification
Account Verification: May require re-verification for security
Compromised Account Recovery
If your account has been compromised:
Immediate Freeze: Account activity is suspended for protection
Investigation Process: The security team is reviewing the situation
Re-Verification: Additional identity confirmation is required
Account Recovery: Secure recovery after investigation
Regulatory Reporting and Transparency
Transaction Reporting
Legal Compliance Requirements:
Large Transaction Reports: Automatically filed with regulators
Suspicious Activity Reports: Filed when patterns indicate potential crimes
Cross-Border Reporting: Report international transfers as required
Reporting Tax: Compliance with tax authorities' requirements
User Rights and Transparency
What you are entitled to know:
Data Access Rights: Request all the data we hold about you
Processing Transparency: Understand how we process your information
Complaints Procedure: How to file complaints about our services
Regulatory Contact: Information about our regulatory oversight
Security Concerns or Verification Questions?
Our Compliance team is available to help you understand our security procedures and assist with any verification requirements.