
Currency Exchange International
- Websitehttps://ceifx.com
- Trust Centerhttps://trust.cxifx.com
- Compliance
- CCPA
Please visit our Privacy Policy to learn how we comply with GLBA, CPRA, and other state regulations.
- GDPR
To read about how we comply with GDPR, please visit our Privacy Policy page.
1 more topic
- Product Security
- Audit Logs
We maintain extensive transaction audit logs to provide insight when you need it.
- IP-Based Access Control
Access can be limited to allowlisted IPs, further restricting access to your sensitive data.
4 more topics
- Data Security
- Data Encrypted At-Rest
We use field-level encryption to keep production and backup data safe while at rest.
- Data Encrypted In-Transit
We use modern, non-deprecated cryptographic algorithms to secure data in motion.
- Privacy
- Privacy Policy
We take privacy seriously. View our privacy policy to understand our processes and your rights.
- Data Retention Policy
Data is retained for the minimum time required by regulatory and contractual requirements.
1 more topic
- Incident Management & Response
- Incident Response Plan (IRP)
We maintain a thorough incident response plan with playbooks for various scenarios. These are developed in-house by our Information Security Team in conjuction with world-class third-party response teams.
- Availability & Reliability
- Data Redundancy
To ensure your information can always be recovered, we store redundant copies of data. Retention of backups follows the same policy as production data.
- Denial of Service (DoS) Protection
We've implemented premiere DoS measures so that you stay connected, even during an attack.
1 more topic
- Organizational Security
- Confidentiality Agreements
Every employee, contracted employee, third party, and client must sign a confidentiality agreement before access to any system is granted.
- Employee Background Checks
All employees undergo thorough background checks before being onboarded.
6 more topics
- Business Continuity
- Business Continuity Plan
Our organization follows a meticulous business continuity plan that is reviewed and tested annually.
- Disaster Recovery Plan
Our disaster recovery plan is developed to ensure quick and effective recovery in the face of natual and man-made attacks. The DR plan is tested annually.
1 more topic
- Threat Management
- Penetration Testing
A third-party penetration testing firm annually performs pen tests of our networks, web apps, and API.
- Vulnerability Scanning
We regularly scan for and patch vulnerabilities to limit our risk of attack vectors.
- Subprocessors
Sign up to view Currency Exchange International's Subprocessors
Sign up to see the rest of Currency Exchange International's posture and unlock unlimited access.
Unlimited access to the directory allows you to review and compare thousands of security postures sourced from around the web.