At VeriLink, safeguarding your data is our highest priority. We combine industry-leading security practices with compliance frameworks to ensure your identity information remains private, protected, and under your control.
Encryption & Data Protection
In transit: All data is encrypted using TLS 1.3 with forward secrecy.
At rest: Personal and biometric data is encrypted with AES-256-GCM.
On device: Facial templates (PVTF files) are stored locally in the app's secure storage. Temporary liveness frames are discarded immediately after use.
Identity & Access Controls
Zero Trust approach: All access to systems requires strong multi-factor authentication.
Role-based access control (RBAC): Staff can only access the minimum data required for their role.
Audit logging: All access to sensitive data is logged and monitored.
Features
β Encryption & Data Protection
In transit: All data is encrypted using TLS 1.3 with forward secrecy.
At rest: Personal and biometric data is encrypted with AES-256-GCM.
On device: Facial templates (PVTF files) are stored locally in the appβs secure storage. Temporary liveness frames are discarded immediately after use.
β Identity & Access Controls
Zero Trust approach: All access to systems requires strong multi-factor authentication.
Role-based access control (RBAC): Staff can only access the minimum data required for their role.
Audit logging: All access to sensitive data is logged and monitored.
β Biometric Data Protection
Face templates are never shared or sold.
Biometric data is only transmitted with the userβs explicit consent to the specified relying party.
Users can delete their Personal Verification Token File (PVTF) at any time, directly within the app.
β Compliance & Standards
Built with compliance in mind:
GDPR & POPIA β Data minimization and user rights respected.
KYC/AML Ready β Meets requirements for regulated identity verification.
ISO 27001/SOC 2 principles guide our security controls.
β Infrastructure & Monitoring
Hosted on secure, tier-1 cloud providers with global redundancy.
Continuous security patching and vulnerability scanning.
Regular penetration testing by independent security professionals.
β Your Control
You decide when and with whom to share your identity information.
You may withdraw consent, delete your data, or request a full export at any time.
Questions?
We're happy to answer any security or compliance questions.
Contact Us
We'd love to hear from you. Please fill out the form below and our team will get back to you shortly.