ANSWER :
There are no fictitious orders in InFace Invest Group, and therefore behind each IFIG account of InFace Invest Group there are real people, so it is necessary for users to verify their identity by verifying their IFIG account. InFace Invest Group operates strictly according to the rules of the AML procedure and it is necessary for each user to confirm and prove their identity so that the company has proof to whom it pays money when the user's account starts earning and when the user starts withdrawing money from the system.
In order to fulfill the obligation to verify their IFIG account, users send a photo of themselves with their personal document via the "My Account - KYC" page.
In order to fulfill the obligation to verify their IFIG account, users through the "My Account" page send a photo of themselves with their identification document.
The personal document with which users can verify their IFIG account are:
- Valid ID card
- Valid passport
- Valid driver's license
How is user data protection done?
Data protection is done by uploading to the server, the data is first encrypted by the AES method in combination with RSA-4096, which is adopted by all US government agencies such as the NSA, CIA, and then pseudonymized.
After the user identification is checked, that data is deleted from the vault and every trace of that upload and data as well, because that data has fulfilled its purpose, that is. identification of the person just as GDPR, US Policy, ZZLP, etc. order.
The only image that stands out and is not deleted during the verification is the image of you where you keep the document and which serves as proof that we are not engaged in money laundering, which is known in the world as AML verification. Of course, if you decide to deactivate your account a picture of you holding an identity document is also deleted from the system.
With this encrypt, pseudonym method as well as deleting data that are no longer needed and that have fulfilled their purpose, we also meet GDPR regulations as well as others such as the US Privacy Model, Serbian ZZLP, etc.
As for the staff who check the same documents, they are on a special LAN connection and do not have any port open for communication except with each other through a server that is protected by the latest generation of firewalls (hardware cisco), they can not download or do anything with that documents. Upon entering the workplace, Support Team workers put their phones away before entering the room and go through a scanner that detects any electrical devices or metals and non-metals, also the office is under full video surveillance, and cameras are places above each workplace.