LogoLogo
idax.exchangeSUPPORTМонгол хэл
  • 💎INTRODUCTION
    • About Us
      • 📞Contact us
      • Financial statements
  • 💻PRODUCT
    • Spot Trading
      • ❓How to Do the Spot Trading?
    • ETF Trading
    • Futures Trading
      • ❓How to Use Futures Trading?
      • Funding rate
      • Mark price
      • Index price
      • Take Profit, Stop Loss TP/SL
      • Take Profit Stop Loss Order
    • Fees
  • 🧑‍🏫HELP CENTER
    • To start
      • ❓How to register on idax?
      • ❓How to find my referral code in idax?
      • ❓How to LogIn idax account?
      • ❓How to trade on idax
      • ❓How can I check my balance in idax Wallets?
    • Personal Account Verification (KYC)
      • ❓Can I Trade Without KYC?
      • ❓How long does it take for my KYC verification to be approved?
      • ❓Is it possible to complete KYC Tier 2 without a passport?
      • ❓Why do my documents get rejected for KYC?
    • Deposit
      • ❓How to deposit in idax?
      • ❓What is a transaction ID (TXID)
    • Withdraw
      • ❓How to add a recipient’s address?
      • ❓How to withdraw assets from idax?
      • ❓What is a transaction ID (TXID)
      • ❓How to find my transaction ID (TXID)
      • ❓How do I check the withdrawal transaction status on the blockchain?
      • ❓What can I do when I withdraw to a wrong address?
      • ❓What can I do when withdrawal is suspended?
    • Security verification 2FA
      • ❓How to change your e-mail?
      • ❓How to change my mobile number?
      • ❓Why can't I verify my phone number?
      • ❓How to enable Google Authentication (2FA) on idax?
      • ❓How to solve a 2FA code error?
      • ❓How to find my user ID on idax?
  • ✒️Terms
    • PEER-TO-PEER (P2P)
    • ✅Terms and Conditions
    • 🔒Privacy Policy
    • 💡Information security management system policy
    • 📄Token information
Powered by GitBook
On this page

Was this helpful?

  1. Terms

Information security management system policy

INFORMATION SECURITY MANAGEMENT SYSTEM POLICY

The information security policy of idax LLC is aimed at minimizing the damage to the organization by ensuring the complete and accessible confidentiality of the company's information and assets, and reducing the risks arising from it.

The company shall adhere to the following policy in ensuring information security. It includes:

● Unhindered delivery of necessary information to authorized employee and the public in accordance with business requirements;

● Ensuring the confidentiality of information of the organization and users and third parties;

● Meet the requirements of legal and regulatory authorities;

● Conduct information security training for employees and regularly provide relevant information;

● Ensuring continuity of operations and timely implementation of response measures in the event of information security breaches;

● Preventing attacks by implementing appropriate controls and restrictions on access rights,

● Ensuring normal and reliable continuous operation of the idax system;

● Ensuring data security of users of the idax system;

Documents such as relevant policies, regulations and manuals of the information security management system shall be stored in hard and soft form in the organization's internal systems in a manner accessible to authorized persons.

PreviousPrivacy PolicyNextToken information

Last updated 1 year ago

Was this helpful?

✒️
💡