Skip to main content

Compliance

Building in crypto doesn't mean building outside the law. Encrypto operates within regulatory frameworks while maintaining the technical advantages of on-chain infrastructure.

KYC / AML​

Identity Verification​

Every Encrypto user completes KYC (Know Your Customer) before accessing financial products:

StepWhat HappensProvider
Document uploadGovernment-issued ID (passport, driver's license)Identity verification partner
Liveness checkBiometric face match against document photoIdentity verification partner
Sanctions screeningCross-reference against OFAC, UN, EU sanctions listsCompliance infrastructure
PEP screeningPolitically Exposed Persons checkCompliance infrastructure
Ongoing monitoringContinuous re-screening against updated listsAutomated

Transaction Monitoring​

All transactions are monitored for suspicious activity:

  • Pattern detection β€” Unusual transaction volumes, frequencies, or destinations
  • Chain analysis β€” On-chain transaction tracing for flagged addresses
  • Threshold reporting β€” Automated reporting for transactions above regulatory thresholds
  • Risk scoring β€” Every transaction is assigned a risk score based on multiple signals

Regulatory Framework​

United States​

  • Money transmission: Partner-based licensing model. Encrypto operates through licensed partners for fiat on/off ramps and card issuance.
  • Card issuance: Visa debit cards issued through a licensed card issuer and program manager.
  • Securities: Points and rewards are utility-based. No investment contract, no securities classification.

Latin America​

  • Market-specific compliance: Each LATAM market has distinct regulatory requirements. Encrypto works with local partners who hold appropriate licenses.
  • Currency controls: Compliant with local currency regulations. USDC holdings are treated as digital assets, not foreign currency deposits.
  • Data residency: User data stored in compliance with local data protection laws (LGPD in Brazil, Ley de ProtecciΓ³n de Datos in Argentina, etc.)

Data Protection​

What We Store​

Data TypeStorageEncryptionAccess
PII (name, DOB, address)Isolated databaseAES-256 at restRestricted to compliance team
KYC documentsEncrypted object storageAES-256 at rest + in transitCompliance only, time-limited
Transaction historyApplication databaseAES-256 at restUser + authorized systems
Wallet addressesApplication databaseNot PIIPublic by nature
Session dataEphemeral storeEncryptedExpires automatically

What We Don't Store​

  • Private keys or key shards (managed by Privy)
  • Plaintext passwords (social login only)
  • Card numbers (managed by card issuer)
  • Biometric data (processed by identity partner, not retained)

Data Principles​

  1. Minimal collection. We only collect data required for compliance and product functionality.
  2. Purpose limitation. Data is used only for its stated purpose.
  3. Encryption everywhere. AES-256 at rest, TLS 1.3 in transit. No exceptions.
  4. Access controls. Role-based access. PII access is logged and audited.
  5. Right to deletion. Users can request data deletion, subject to regulatory retention requirements.

Third-Party Security​

Every vendor and partner integration is evaluated for:

  • SOC 2 Type II compliance (or equivalent)
  • Data processing agreements
  • Encryption standards
  • Incident notification procedures
  • Regular security assessments

Critical infrastructure partners (Privy, card issuer, banking partner) undergo enhanced due diligence and continuous monitoring.