Reasonable Security Practices for Protection of Personal Information

  1. We have used the term “personal information” to describe information that can be associated with a specific person and can be used to identify that person. Personal information does not include any information that has been anonymized and cannot be used to identify a specific user.
  2. We store and process your personal information in our possession or control on our computers where our facilities are located. We protect your information using physical, technical, and administrative security measures to reduce the risks of loss, misuse, unauthorized access, disclosure and alteration. Some of the safeguards we use are firewalls and data encryption, physical access controls to our data centers, and information access authorization controls. We have fully ensured that the reasonable security practices adapted by Fold are fully in compliant with the applicable laws and at par with the industry standards.