Security Protocols
We employ a multi-layered approach to physical and digital security.
Physical Security
- Perimeter: Anti-ram bollards, blast-resistant glass, and 24/7 CCTV surveillance.
- Access Control: Mantrap vestibules, metal detectors, and biometric scanners (iris + fingerprint).
- Guards: Armed security personnel on-site 24/7/365.
- Vault: UL Class 3 modular vault with time-lock mechanisms.
Procedural Security
- Dual Control: Two authorized personnel required for vault opening.
- Anonymity: Client identity is known only to senior management. No data shared.
- Audit Trails: Every access event is logged and time-stamped.
Privacy & Confidentiality
We operate with absolute discretion. Client identities and access schedules are confidential and stored securely with strict access controls. We never sell data or share with third parties except where required by law.
- Data Minimization: We collect only essential data for service delivery.
- Encryption: All communications and sessions use modern TLS with Perfect Forward Secrecy.
- Confidential Handling: Information is accessible only to designated senior staff.
Compliance & AML Notice
We follow strict Know Your Customer (KYC) and Anti‑Money Laundering (AML) protocols to prevent abuse of our services. This includes identity verification, source‑of‑funds checks, and continuous monitoring for suspicious activity.
- KYC: Government‑issued ID and verification are required for account activation.
- AML: Transactions are monitored under applicable regulations. We report when legally mandated.
- Sanctions Screening: Clients are screened against international sanctions lists.
Discreet Storage Statement
Our facility location and access procedures are intentionally discreet. Signage is minimal, and all client visits are scheduled privately to ensure anonymity and safety.