LogoLogo
  • Introduction
    • General Context
    • Thesis
  • Glossary
  • Participants
    • Originators
      • How we managed to reduce costs and increase efficiency
    • Investors
      • Enhanced debt financing products
    • Borrowers
  • Platform Mechanics
    • AmFi Pools
      • Characteristics of a tokenized asset
      • Example of an operation
    • ABRL: Our stablecoin
    • Junior & Senior Tranches
      • Example of how tranches work
    • Custodial Wallets
    • Legal Setup
  • Roadmap
  • Investing through AmFi
    • Registration process
    • Transfer of funds to the platform
    • Investing in a Pool
  • How to launch a pool
    • Originator Journey
    • AmFi Factory
    • Pool launch!
  • FAQ
  • Compliance
    • Obsession for security
    • The AmFi platform
    • Regulators
    • AmFi policies and manuals
    • Best practices adopted by AmFi
  • Other references
    • Terms and Conditions
      • 1. Introduction
      • 2. Updates to the terms
      • 3. The services
      • 4. Use of our services
      • 5. Intellectual property
      • 6. Limitation of liability
      • 7. Bad behavior
      • 8. Governing law and legal disputes
      • 9. Our commitments to you
      • 10. Miscellaneous
      • 11. Contact us
    • AmFi Privacy Policy
      • 1. Definitions
      • 2. What Personal Data we collect and process
      • 3. Why we collect and process personal data
      • 4. Cookies and other tracking technologies
      • 5. Who else has access to the personal data and why
      • 6. What are your rights with respect to the personal data
      • 7. How we store and protect your personal data
      • 8. When we delete your personal data
      • 9. International transfer of personal data
      • 10. Do you need to provide your consent for AmFi to use your personal data as per this policy?
      • 11. Security measures
      • 12. Websites of third parties
      • 13. Children’s and teenagers’ data
      • 14. How to make a complaint
      • 15. Changes to this privacy policy
Powered by GitBook
On this page
  1. Compliance

Obsession for security

AmFi is a pioneer in the Brazilian capital market and has developed a platform that brings together service providers and global investors, providing an infrastructure for blockchain-based financial products, including anticipation of receivables and structured operations.

Our goal is to bring innovation to the financial market while applying the highest standards of security and efficiency to protect the company and its users from violations of laws and regulations, as well as issues related to ethics, image, and sensitive information.

AmFi recognizes that security, governance and compliance are critical to ensuring that the platform and its operations comply with applicable laws, regulations and internal policies. Therefore, fostering an ethical and transparent culture is a sine qua non for the company's success. This includes encouraging employees, customers and partners to report issues or concerns and to support the market as a whole in its development.

State-of-the-art security

  • The AmFi Platform was developed entirely by AmFi partners and staff and includes a complete and proprietary software system, system integrations, and business rules designed specifically for AmFi's core operations. One of the main tasks of the development team was to automate most of the processes and make them as little dependent on human intervention as possible to minimize the risk of manual errors or incorrect use of the Platform.

  • The system's back-office interface has permission control so that each internal AmFi user ("AmFi Operator") has access only to the actions required for their function, with access control, activity log, and audit of actions performed, including information edited, modified, replicated, and/or canceled.

  • No Employee, Partner or Related Party has full access to keys, passwords and/or access passwords used by the AmFi Platform systems to communicate with the blockchain. These keys are used exclusively by the system to perform automated functions.

  • All of these keys are protected by multiple layers of encryption. Each is encrypted with passwords from three different sources and then split into parts that are stored in topologically isolated infrastructures with disk encryption.

  • Communication between the different parts of the system is ensured through the simultaneous use of cryptography and several sophisticated and highly secure software development techniques, including: Handshake between internal services and third-party services, RSA key pairs, and communication via SSL, in addition to firewalls and isolation of subnets to prevent any outside access.

  • All logins and User information, including AmFi's internal Users, are stored in an audit log.

  • All executed writing operations are stored in an audit log with information on which User executed them.

PreviousComplianceNextThe AmFi platform

Last updated 1 year ago