Cryptrac LogoCryptrac
  • Blog
  • Documentation
  • Pricing
  • FAQ
  • About
  • Contact
Sign InSign Up
  • Blog
  • Documentation
  • Pricing
  • FAQ
  • About
  • Contact
Cryptrac LogoCryptrac

The simplest way to accept cryptocurrency payments. Non-custodial, secure, and designed for modern businesses.

© Copyright 2025 Cryptrac. All Rights Reserved.

Company
  • About
  • Blog
  • Become A Sales Rep
  • Security
Product
  • Documentation
  • Pricing
Help
  • Contact
  • FAQ
Legal
  • Terms of Service
  • Privacy Policy
  • Cookie Policy
Follow Us
  • Twitter/X
  • Instagram
  • Overview
  • Platform Architecture
  • Data Protection
  • Transaction Security
  • Authentication
  • Infrastructure
  • Compliance
  • Incident Response
  • Your Responsibilities
  • Report Issues

Compliance and Security Standards

ISO 27001, NIST framework, GDPR, and CCPA compliance

Cryptrac maintains compliance with leading industry security standards and data protection regulations.

Security Standards

ISO 27001 Compliance

Our Information Security Management System (ISMS) follows ISO 27001 standards:

  • Risk assessment and management
  • Security policy documentation
  • Access control procedures
  • Incident management processes
  • Regular internal audits

NIST Framework Alignment

We align with the NIST Cybersecurity Framework:

  • Identify: Asset and risk management
  • Protect: Security controls and training
  • Detect: Continuous monitoring
  • Respond: Incident response procedures
  • Recover: Business continuity planning

SOC 2 Type II

  • Trust Services Criteria compliance
  • Annual third-party audits
  • Security, availability, and confidentiality controls
  • Processing integrity measures

Data Protection Regulations

GDPR Compliance

For our European customers, we ensure:

  • Lawful Processing: Clear legal basis for data processing
  • Consent Management: Explicit consent mechanisms
  • Data Subject Rights: Support for all GDPR rights
  • Data Protection Officer: Designated DPO available
  • Privacy by Design: Built-in privacy protections

CCPA Compliance

For California residents:

  • Disclosure Requirements: Transparent data practices
  • Consumer Rights: Access, deletion, and opt-out rights
  • Do Not Sell: No sale of personal information
  • Non-Discrimination: Equal service regardless of privacy choices

Financial Regulations

AML/KYC Compliance

While we are non-custodial, we maintain:

  • Know Your Customer (KYC) procedures
  • Anti-Money Laundering (AML) monitoring
  • Transaction monitoring for suspicious activity
  • Regulatory reporting capabilities

Regional Compliance

  • Compliance with local cryptocurrency regulations
  • Adherence to payment processing requirements
  • Regular regulatory compliance reviews
  • Proactive regulatory engagement

Third-Party Security

Vendor Security Assessments

  • Comprehensive vendor security reviews
  • Regular vendor audits
  • Contractual security requirements
  • Data processing agreements

Security Certifications

  • Regular third-party security assessments
  • Penetration testing by external firms
  • Independent security audits
  • Bug bounty program

Continuous Compliance

Compliance Monitoring

  • Automated compliance checking
  • Regular policy reviews and updates
  • Compliance training for all staff
  • Documentation and evidence collection

Audit Support

  • Annual compliance audits
  • Third-party audit cooperation
  • Comprehensive audit trails
  • Regulatory reporting support
  1. Security Standards
    1. ISO 27001 Compliance
    2. NIST Framework Alignment
    3. SOC 2 Type II
    4. Data Protection Regulations
    5. Financial Regulations
    6. Third-Party Security
    7. Continuous Compliance