<aside> 💡 Terms of Use:
Bitscard - Terms of Use
Effective Date: 8/17/2023
1. Acceptance of Terms
By accessing and using the services provided by Bitscard ("the Company"), you agree to be bound by these Terms of Use. If you do not agree with these terms, please do not use our services.
2. Services
Bitscard offers financial technology services and solutions, including [Brief Description of Services]. The services are provided according to the terms and conditions outlined herein.
3. User Registration and Accounts
4. User Conduct
5. Privacy Policy
Your use of our services is also governed by our Privacy Policy, which outlines how we collect, use, and protect your personal information.
6. Intellectual Property
All content, trademarks, and intellectual property on our website and services are owned by Bitscard. You may not reproduce, modify, distribute, or use our content without written permission.
7. Limitation of Liability
Bitscard shall not be liable for any direct, indirect, incidental, consequential, or special damages arising from the use or inability to use our services.
8. Indemnification
You agree to indemnify and hold Bitscard and its affiliates harmless from any claims, losses, liabilities, and expenses resulting from your use of our services or violation of these terms.
9. Modifications
Bitscard reserves the right to modify, update, or terminate these Terms of Use and services at any time without prior notice. Your continued use constitutes acceptance of any changes.
10. Governing Law and Jurisdiction
These Terms of Use are governed by the laws of Nigeria. Any disputes arising from these terms will be subject to the jurisdiction of the Nigerian courts.
</aside>
Bitscard - Anti-Money Laundering (AML) Policy
Effective Date: 8/17/2023
1. Introduction
Bitscard ("the Company") is committed to preventing money laundering, terrorist financing, and other illicit activities. This Anti-Money Laundering (AML) Policy outlines our efforts to comply with the relevant laws and regulations in Nigeria.
2. AML Responsibilities
- Designated Officer: The Company designates an AML Compliance Officer responsible for overseeing AML compliance.
- Training: Regular AML training is provided to employees to enhance their understanding of AML regulations.
3. Customer Due Diligence (CDD)
- Identity Verification: We conduct thorough identity verification of customers during onboarding.
- Risk Assessment: We assess the risk associated with each customer and transaction based on factors such as source of funds, business nature, and geographical risk.
4. Suspicious Activity Reporting (SAR)
- Reporting Obligation: The Company has an obligation to report any suspicious activities to the appropriate authorities.
- Process: A clear process is established for identifying, documenting, and reporting suspicious transactions.
5. Record Keeping
- Transaction Records: We maintain comprehensive records of customer transactions, identities, and due diligence.
- Retention Period: Records are retained for the period prescribed by Nigerian regulations.
6. Politically Exposed Persons (PEPs)
- Enhanced Due Diligence: We apply enhanced due diligence measures for customers classified as PEPs.
7. Sanctions Screening
- Screening Process: We conduct sanctions screening to ensure that transactions and customers are not associated with sanctioned individuals or entities.
8. Internal Controls
- AML Compliance: We regularly review and update our AML policies and procedures to ensure compliance with Nigerian regulations.
- Reporting: Compliance efforts are reported to the board of directors and senior management.
9. Employee Training
- Training Programs: Employees receive ongoing training to enhance their understanding of AML regulations and their role in compliance.
10. Independent Audits
- Independent Review: Periodic independent audits are conducted to assess the effectiveness of our AML program.
11. Reporting and Cooperation
- Regulatory Reporting: The Company cooperates fully with regulatory agencies and law enforcement authorities.
- Suspicious Activity Reporting: We report suspicious activities as required by law.
12. Governing Law
This AML Policy is governed by the laws of Nigeria.
Bitscard - Information Security Management System (ISMS) Policy Statement
Effective Date: 8/17/2023
1. Introduction
Bitscard ("the Company") is dedicated to maintaining the highest standards of information security to protect our clients' sensitive data, our business operations, and the integrity of our services. This Information Security Management System (ISMS) Policy outlines our commitment to ensuring the confidentiality, integrity, and availability of information assets.
2. Scope
This policy applies to all aspects of the Company's information assets, including but not limited to client data, employee data, intellectual property, financial information, and proprietary technology.
3. Policy Objectives
Our ISMS Policy is designed to achieve the following objectives:
- Ensure the confidentiality, integrity, and availability of information assets.
- Protect against unauthorized access, disclosure, alteration, and destruction of data.
- Comply with relevant Nigerian laws, regulations, and industry standards related to information security.
- Establish a culture of information security awareness and responsibility among employees and stakeholders.
4. Information Security Responsibilities
- Management Commitment: The Company's management is committed to providing the necessary resources and support for information security initiatives.
- Employee Responsibility: Every employee has a role to play in ensuring information security and must adhere to established security policies and procedures.
5. Risk Management
- Risk Assessment: We conduct regular risk assessments to identify vulnerabilities and threats to our information assets.
- Risk Mitigation: Appropriate safeguards and controls are implemented to mitigate identified risks.
6. Information Security Controls
- Access Control: Access to information assets is controlled based on the principle of least privilege.
- Encryption: Sensitive data is encrypted during transmission and storage.
- Incident Response: A clear incident response plan is in place to handle security breaches effectively.
- Data Protection: Client and employee data is handled in compliance with applicable data protection laws.
7. Training and Awareness
... and feel free to link to other more detailed documents