Cryptrac LogoCryptrac
  • Blog
  • Documentation
  • Pricing
  • FAQ
  • About
  • Contact
Sign InSign Up
  • Blog
  • Documentation
  • Pricing
  • FAQ
  • About
  • Contact
Cryptrac LogoCryptrac

The simplest way to accept cryptocurrency payments. Non-custodial, secure, and designed for modern businesses.

© Copyright 2025 Cryptrac. All Rights Reserved.

Company
  • About
  • Blog
  • Become A Sales Rep
  • Security
Product
  • Documentation
  • Pricing
Help
  • Contact
  • FAQ
Legal
  • Terms of Service
  • Privacy Policy
  • Cookie Policy
Follow Us
  • Twitter/X
  • Instagram
  • Overview
  • Platform Architecture
  • Data Protection
  • Transaction Security
  • Authentication
  • Infrastructure
  • Compliance
  • Incident Response
  • Your Responsibilities
  • Report Issues

Data Protection and Privacy

AES-256 encryption, role-based access control, and privacy-first approach

We take data protection seriously and implement comprehensive measures to ensure your information remains private and secure.

Encryption Standards

Data at Rest

  • AES-256 Encryption: Military-grade encryption for stored data
  • Database Encryption: Full database encryption enabled
  • Encrypted Backups: All backups encrypted and securely stored
  • Key Management: Secure key rotation and management practices

Data in Transit

  • TLS 1.3 for all network communications
  • End-to-end encryption for sensitive data
  • Secure API communications
  • Encrypted payment link generation

Access Control

Role-Based Access Control (RBAC)

  • Granular permission management
  • Principle of least privilege
  • Separation of duties
  • Regular access reviews and audits

Authentication Mechanisms

  • Multi-factor authentication (MFA) support
  • Strong password requirements
  • Session management and timeout policies
  • Account lockout protection

Data Minimization

We follow data minimization principles:

  • Collect only necessary information
  • Limited data retention periods
  • Secure data disposal procedures
  • No unnecessary data storage

Privacy Practices

GDPR Compliance

  • Right to access personal data
  • Right to data portability
  • Right to erasure (right to be forgotten)
  • Data processing transparency

CCPA Compliance

  • Consumer rights protection
  • Opt-out mechanisms
  • Data disclosure practices
  • Non-discrimination policies

Data Segregation

  • Logical separation of customer data
  • Isolated database instances
  • Secure multi-tenancy architecture
  • No cross-customer data access
  1. Encryption Standards
    1. Data at Rest
    2. Data in Transit
    3. Access Control
    4. Data Minimization
    5. Privacy Practices
    6. Data Segregation