Security

At VeriLink, safeguarding your data is our highest priority. We combine industry-leading security practices with compliance frameworks to ensure your identity information remains private, protected, and under your control.

Encryption & Data Protection

  • In transit: All data is encrypted using TLS 1.3 with forward secrecy.
  • At rest: Personal and biometric data is encrypted with AES-256-GCM.
  • On device: Facial templates (PVTF files) are stored locally in the app's secure storage. Temporary liveness frames are discarded immediately after use.
About Verilink
About Verilink

Identity & Access Controls

  • Zero Trust approach: All access to systems requires strong multi-factor authentication.
  • Role-based access control (RBAC): Staff can only access the minimum data required for their role.
  • Audit logging: All access to sensitive data is logged and monitored.

Features

βœ… Encryption & Data Protection

  • In transit: All data is encrypted using TLS 1.3 with forward secrecy.
  • At rest: Personal and biometric data is encrypted with AES-256-GCM.
  • On device: Facial templates (PVTF files) are stored locally in the app’s secure storage. Temporary liveness frames are discarded immediately after use.

βœ… Identity & Access Controls

  • Zero Trust approach: All access to systems requires strong multi-factor authentication.
  • Role-based access control (RBAC): Staff can only access the minimum data required for their role.
  • Audit logging: All access to sensitive data is logged and monitored.

βœ… Biometric Data Protection

  • Face templates are never shared or sold.
  • Biometric data is only transmitted with the user’s explicit consent to the specified relying party.
  • Users can delete their Personal Verification Token File (PVTF) at any time, directly within the app.

βœ… Compliance & Standards

Built with compliance in mind:

  • GDPR & POPIA – Data minimization and user rights respected.
  • KYC/AML Ready – Meets requirements for regulated identity verification.
  • ISO 27001/SOC 2 principles guide our security controls.

βœ… Infrastructure & Monitoring

  • Hosted on secure, tier-1 cloud providers with global redundancy.
  • Continuous security patching and vulnerability scanning.
  • Regular penetration testing by independent security professionals.

βœ… Your Control

  • You decide when and with whom to share your identity information.
  • You may withdraw consent, delete your data, or request a full export at any time.

Questions?

We're happy to answer any security or compliance questions.

Contact Us

We'd love to hear from you. Please fill out the form below and our team will get back to you shortly.

refresh
Powered by SkyL4rk
view order