Our Framework for Protecting Your Sensitive Information
Last Updated: 1/1/2026
This Security & Data Handling overview describes the administrative, technical, and physical safeguards Veridica Global maintains to protect information submitted through our authentication services. This document is provided for transparency and does not create contractual obligations beyond those expressly stated in applicable service agreements or policies.
1. Security Framework and Principles
Veridica Global applies a risk-based security framework designed to protect sensitive information throughout the document authentication lifecycle. Our controls are informed by widely recognized information security principles, including least privilege, defense-in-depth, and data minimization.
All client-submitted information is handled as confidential and restricted to authorized use consistent with the purpose for which it was provided.
2. Data Encryption
Encryption in Transit
Data transmitted between user devices and Veridica Global systems is encrypted using Transport Layer Security (TLS) version 1.2 or higher.
Encryption at Rest
Digital copies of documents and associated sensitive data stored within Veridica Global systems are encrypted at rest using AES-256 encryption or equivalent cryptographic standards.
3. Access Controls and Monitoring
Role-Based Access
Access to client data is limited to authorized personnel whose job responsibilities require such access.
Authentication Controls
Multi-factor authentication (MFA) is required for internal access to systems containing sensitive client data.
Logging and Monitoring
System access and data interactions are logged for security monitoring, operational integrity, and incident investigation purposes, subject to applicable retention policies.
4. Physical Document Handling
When physical documents are submitted, they are processed within controlled facilities with restricted access. Documents are stored securely when not actively in use and handled in accordance with internal chain-of-custody procedures.
Shipments are conducted using reputable courier services. While reasonable precautions are taken, Veridica Global does not guarantee against delays, loss, or damage attributable to third-party carriers.
5. Infrastructure and Third-Party Management
Hosting Environment
Veridica Global utilizes established cloud infrastructure providers that maintain independent security compliance programs, such as SOC 2 and ISO 27001.
Payment Processing
Payment card transactions are processed through a third-party payment processor that maintains PCI DSS compliance. Veridica Global does not store full payment card numbers on its systems.
Third-Party Service Providers
Third-party vendors with potential access to client data are subject to due diligence and contractual safeguards appropriate to the nature of the services provided.
6. Data Retention and Disposal
Client data is retained only for periods necessary to fulfill service, legal, regulatory, or operational requirements. Upon expiration of the applicable retention period, digital data is securely deleted or rendered inaccessible in accordance with internal data disposal procedures.
Additional details are available in the Veridica Global Document Retention Policy.
7. No Absolute Security Guarantee
While Veridica Global implements commercially reasonable safeguards designed to protect information, no system can be guaranteed to be completely secure. Users acknowledge that the transmission and storage of data carries inherent risk.
8. Policy Updates
This document may be updated periodically to reflect changes in operational practices, technology, or legal requirements. Updates will be posted to this page with a revised effective date.