Security

How we protect your data and maintain platform security

Last updated: August 18, 2025

Our Commitment to Security

At Diem Link, security is fundamental to everything we do. We understand that you trust us with your sensitive business data, and we take that responsibility seriously. Our security program is designed to protect your information through multiple layers of defense.

Data Protection

Encryption

  • Data in Transit: All data transmitted between your browser and our servers is protected using 256-bit SSL/TLS encryption
  • Data at Rest: All stored data is encrypted using AES-256 encryption standards
  • Database Encryption: Customer data is encrypted at the database level with industry-standard algorithms
  • Backup Encryption: All backups are encrypted and stored securely

Access Controls

  • Multi-factor authentication (MFA) for all administrative access
  • Role-based access controls with principle of least privilege
  • Regular access reviews and deprovisioning procedures
  • Secure authentication protocols for user accounts

Infrastructure Security

Cloud Infrastructure

Our infrastructure is built on enterprise-grade cloud platforms with:

  • SOC 2 Type II certified data centers
  • 24/7 physical security and monitoring
  • Redundant systems and automatic failover capabilities
  • Network firewalls and intrusion detection systems
  • DDoS protection and traffic filtering

Application Security

  • Regular security audits and penetration testing
  • Automated vulnerability scanning
  • Secure code review processes
  • Input validation and sanitization
  • Protection against common web vulnerabilities (OWASP Top 10)

Monitoring and Incident Response

Security Monitoring

  • 24/7 security monitoring and alerting
  • Real-time threat detection and analysis
  • Comprehensive audit logging
  • Anomaly detection for suspicious activities
  • Regular security metrics review and reporting

Incident Response

  • Formal incident response plan and procedures
  • Dedicated security team for rapid response
  • Immediate containment and investigation protocols
  • Customer notification procedures for security incidents
  • Post-incident analysis and improvement processes

Compliance and Certifications

We maintain compliance with industry standards and regulations:

  • SOC 2 Type II: Annual audits of our security controls and procedures
  • GDPR Compliance: Full compliance with European data protection regulations
  • CCPA Compliance: California Consumer Privacy Act compliance
  • ISO 27001: Information security management system standards
  • PCI DSS: Payment card industry data security standards (when applicable)

Data Backup and Recovery

  • Automated Backups: Daily automated backups of all customer data
  • Geographic Distribution: Backups stored in multiple geographic locations
  • Point-in-Time Recovery: Ability to restore data to specific points in time
  • Backup Testing: Regular testing of backup and restore procedures
  • Disaster Recovery: Comprehensive disaster recovery plan with defined RTOs and RPOs

Employee Security

  • Background Checks: Comprehensive background checks for all employees
  • Security Training: Regular security awareness training and education
  • Confidentiality Agreements: All employees sign strict confidentiality agreements
  • Access Reviews: Quarterly reviews of employee access permissions
  • Secure Development: Security-focused development practices and training

Your Security Responsibilities

While we provide robust security measures, security is a shared responsibility. You can help protect your data by:

  • Using strong, unique passwords for your account
  • Enabling two-factor authentication when available
  • Keeping your account information up to date
  • Reporting any suspicious activity immediately
  • Regularly reviewing your account access and permissions
  • Following security best practices in your organization

Security Incident Reporting

If you discover a security vulnerability or suspect a security incident, please contact us immediately:

  • Security Email: security@diemlink.com
  • Response Time: We respond to security reports within 24 hours
  • Responsible Disclosure: We support responsible disclosure of security vulnerabilities

Continuous Improvement

Security is an ongoing process. We continuously evaluate and improve our security measures through:

  • Regular security assessments and audits
  • Staying current with emerging threats and vulnerabilities
  • Implementing new security technologies and practices
  • Participating in security communities and threat intelligence sharing
  • Regular updates to our security policies and procedures

Security Contact Information

For security-related questions or to report security issues:

Diem Corporation Inc.

8 The Green, Ste A

Dover, DE 19901

Security Email: security@diemlink.com

General Support: support@diemlink.com

Website: www.diemlink.com