Skip to main content

Security, Verification, and Compliance

KYC Requirements

Updated today

Initial Verification

When setting up your global account:

  • Basic Information: Must match that on your ID

  • Government-issued ID: Passport, National ID, or Driver's License

  • Photo Verification: A live selfie that matches your ID

  • Processing Time: Typically completed within minutes to hours

Enhanced Verification

For higher limits and business accounts:

  • Additional Documents: Proof of Income, Employment Verification

  • Source of Funds: Documents that show how you earn money

  • Business Registration: For business accounts (if applicable)

  • Bank Statements: Recent statements from existing accounts

Bridge Banking Partner Verification

Additional verification through our banking partner:

  • Regulatory Compliance: Required by banking regulations

  • Enhanced Security: An additional layer of protection against fraud

  • Instant Decision: Typically instant approval or flagging for review

  • Document Quality: High-resolution, clear photos are required

Two-Factor Authentication (2FA)

Setting Up 2FA

Protect your account with two-factor authentication:

  • SMS Verification: Text messages to your verified phone

  • Authentication Apps: Google Authenticator, Authy, or similar apps

  • Email Backup: Secondary email verification

  • Recovery Codes: Save backup codes for account recovery

When 2FA is Required

Enhanced security for sensitive transactions:

  • Large Withdrawals: Transactions above certain limits

  • Account Settings Changes: Updates to your email, phone, or address

  • New Device Login: First login from unknown devices

  • Security Settings Changes: Edit your 2FA or password settings

Manage 2FA Settings

  • Multiple Methods: Set up SMS and app-based authentication

  • Backup Options: Always maintain a secondary verification method

  • Regular Updates: Keep your backup phone numbers and email addresses up to date.

  • Recovery Planning: Store your recovery codes in a safe place.

Account Security Features

Advanced Security Monitoring

Real-Time Protection Systems:

  • Device Identification: Alerts for access from new devices.

  • Location Monitoring: Alerts for logins from unusual locations.

  • Behavioral Analysis: Detects unusual transaction patterns.

  • IP Address Tracking: Monitors suspicious access attempts.

Transaction Security

Protecting Your Financial Activity:

  • Transaction Limits: Daily and monthly security limits.

  • Approval Requirements: Large transactions require additional confirmation.

  • Cooling Periods: Delays for suspicious activity.

  • Fraud Detection: AI-powered fraud prevention systems.

Data Protection

How We Protect Your Information:

  • Encryption: All data is encrypted at rest and in transit.

  • Secure Storage: Financial data is stored in secure, compliant systems.

  • Controls Access: Strict internal access policies

  • Regular Reviews: Security reviews and compliance checks

Compliance and Regulatory Standards

Banking Regulations

We comply with multiple jurisdictions:

  • US Banking Laws: Through our Bridge Banking Partner

  • European Regulations: For Euro Account Compliance

  • Egyptian Regulations: For local operations and users

  • International Standards: Anti-Money Laundering, KYC, and Counter-Terrorist Financing

Data Privacy Compliance

Protecting your privacy rights:

  • GDPR Compliance: European data protection standards

  • Data Minimization: Collecting only necessary information

  • Right of Access: You can request all your data

  • Right of Deletion: Account closure, including data deletion options

Financial Crime Prevention

Strong systems to prevent illegal activities:

  • Anti-Money Laundering: Monitoring suspicious patterns

  • Transaction Screening: Automatic and manual reviews

  • Sanctions Screening: Compliance with international sanctions lists

  • Activity Reporting Suspect: Legal reporting when needed

Document Security and Management

Document Upload Security

Secure handling of your sensitive documents:

  • Encrypted Transmission: Secure upload process

  • Secure Storage: Documents are stored in encrypted systems

  • Access Log: Track who accesses your documents and when

  • Automatic Deletion: Old documents are removed according to retention policies

Acceptable Document Types

Valid Documents for Verification:

  • Primary Identity: Passport (preferred), National ID, Driver's License

  • Proof of Address: Utility bills, bank statements, lease agreements

  • Proof of Income: Pay stubs, tax returns, bank statements

  • Business Documents: Registration certificates, tax IDs

Document Quality Requirements

To ensure successful verification:

  • High Resolution: Clear, legible text and images

  • Good Lighting: Avoid shadows, glare, or poor lighting

  • Complete Document: The four corners Visible

  • No Obstructions: Remove covers, cases, or hands from the image.

Privacy Protection Measures

Information Sharing Policies

How We Handle Your Data:

  • Sharing with Third Parties: Only with banking partners and regulatory bodies

  • Marketing Communications: Opt-out is available for all marketing

  • Sale of Data: We never sell your personal information

  • Consent Management: You control how your data is used

Account Privacy Settings

Control Your Privacy:

  • Profile Visibility: Control visible information

  • Communication Preferences: Choose how we communicate with you

  • Data Processing: Manage consent for different uses

  • Communications with Third Parties: Control which services can access your account

Fraud Prevention and Combating

Common Fraud Scenarios

What We Protect You From:

  • Account Takeover: Unauthorized access to your account

  • Identity Theft: Someone using your documents or information

  • Payment Fraud: Unauthorized transactions or transfers

  • Phishing Attempts: Fake communications requesting your information

How ​​to Protect Yourself

Best Practices to Stay Safe:

  • Strong Passwords: Use unique and complex passwords

  • Secure Networks: Don't log into your account on public WiFi

  • Check Connections: We will never ask for passwords via email or phone

  • Regular Monitoring: Regularly check your account for unauthorized activity

Report Suspicious Activity

If You Notice Something Wrong:

  • Immediate Action: Contact Support immediately

  • Document Everything: Take screenshots of suspicious communications

  • Don't Share Information: Never provide passwords or 2FA codes

  • Account Monitoring: Check all your financial accounts for activity Unauthorized

Account Recovery Procedures

Recover Lost Access

If you can't access your account:

  • Password Reset: Use an automated password reset system

  • 2FA Recovery: Use backup codes or a secondary authentication method

  • Support Help: Contact support with identity verification

  • Account Verification: May require re-verification for security

Compromised Account Recovery

If your account has been compromised:

  • Immediate Freeze: Account activity is suspended for protection

  • Investigation Process: The security team is reviewing the situation

  • Re-Verification: Additional identity confirmation is required

  • Account Recovery: Secure recovery after investigation

Regulatory Reporting and Transparency

Transaction Reporting

Legal Compliance Requirements:

  • Large Transaction Reports: Automatically filed with regulators

  • Suspicious Activity Reports: Filed when patterns indicate potential crimes

  • Cross-Border Reporting: Report international transfers as required

  • Reporting Tax: Compliance with tax authorities' requirements

User Rights and Transparency

What you are entitled to know:

  • Data Access Rights: Request all the data we hold about you

  • Processing Transparency: Understand how we process your information

  • Complaints Procedure: How to file complaints about our services

  • Regulatory Contact: Information about our regulatory oversight


Security Concerns or Verification Questions?
Our Compliance team is available to help you understand our security procedures and assist with any verification requirements.

Did this answer your question?