Effective Date: 18 september 2023
Issued by: Neobank Capital
Approved by: Chief Information Security Officer (CISO) & Data Protection Officer (DPO)
1. Purpose
This Data Protection and Encryption Policy establishes the security standards and technical controls used by Neobank Capital to protect all personal, financial, and confidential information handled across our platforms, infrastructure, and partner networks.
The goal is to ensure that data is collected, stored, transmitted, and processed securely, in accordance with:
- GDPR Articles 5, 25, 32, and 34
- UK GDPR and the Data Protection Act 2018
- ISO/IEC 27001 & 27018 (Cloud Security & Privacy)
- NIST SP 800-53 and 800-171
- Relevant U.S. and international data protection laws
2. Scope
This policy applies to:
- All Neobank Capital systems, cloud environments, databases, and applications.
- All employees, contractors, vendors, and partners with access to company data.
- All categories of data processed by the company, including:
- Customer personal data
- Financial transaction records
- Authentication credentials
- API keys, cryptographic material, and internal business information
3. Policy Objectives
Neobank Capital commits to the following data protection principles:
- Confidentiality – Information is accessible only to authorized persons.
- Integrity – Information is accurate, complete, and protected from unauthorized modification.
- Availability – Information and systems are available when needed.
- Accountability – All data handling actions are logged, traceable, and auditable.
- Privacy by Design – Every new system or process integrates security and data minimization principles from inception.
4. Data Classification
Neobank Capital classifies all information into four sensitivity levels to determine the required protection measures:
Classification | Description | Examples |
Public | Information approved for public release. | Marketing materials, website content |
Internal | Limited to internal business use. | Internal memos, process docs |
Confidential | Restricted data that could impact business or clients if disclosed. | Customer records, contracts |
Highly Confidential | Critical or regulated data requiring the highest protection. | Financial data, private keys, PII, authentication tokens |
5. Encryption Standards
All personal, financial, and confidential data must be encrypted in transit and at rest using industry-approved algorithms and key management practices.
5.1 Encryption In Transit
- Protocol: TLS 1.3 (minimum) with strong cipher suites.
- Email: Encrypted via TLS/SSL or end-to-end (PGP/S/MIME) for sensitive correspondence.
- API Communications: All REST or GraphQL APIs must use HTTPS only; unencrypted endpoints are strictly prohibited.
- VPN / Remote Access: Secure via AES-256 or equivalent encryption; MFA is mandatory.
5.2 Encryption At Rest
- Databases: AES-256 or stronger full-disk encryption.
- Cloud Storage: Encrypted at the storage layer using provider-native encryption (AWS KMS, Azure Key Vault, GCP KMS).
- Backups: All backups are encrypted prior to transfer or storage; stored in geo-redundant secure regions.
- Mobile Devices: Company-issued devices must use full-disk encryption and remote wipe capability.
5.3 Key Management
- All cryptographic keys must be managed using Hardware Security Modules (HSMs) or cloud-native key management systems.
- Keys are rotated periodically and immediately revoked if compromised.
- Private keys are never stored in plaintext or shared over unencrypted channels.
- Access to cryptographic material is limited to authorized security personnel under strict access control policies.
6. Data Protection Controls
6.1 Access Control
- Multi-Factor Authentication (MFA) is mandatory for all systems handling confidential data.
- Role-Based Access Control (RBAC) is enforced; least privilege principle applies.
- Access logs are monitored and retained for a minimum of 12 months.
6.2 Data Minimization
- Only the minimum personal data necessary for operational purposes is collected.
- Sensitive identifiers (e.g., SSN, passport number) are masked or hashed where possible.
- Temporary or test data sets must be pseudonymized or anonymized.
6.3 Data Retention
- Data is retained only for as long as necessary to fulfill contractual, operational, or legal obligations.
- Once no longer required, data is securely deleted using NIST SP 800-88 compliant methods.
6.4 Logging and Monitoring
- Security logs are centralized, time-synchronized, and monitored 24/7.
- Automated alerts trigger when suspicious access, data exfiltration, or failed login patterns are detected.
6.5 Vendor & Third-Party Data Protection
- All third-party service providers must comply with Neobank Capital’s Data Protection Addendum (DPA).
- Vendors must demonstrate encryption compliance equivalent to this policy before data exchange begins.
- Periodic security assessments and audits are mandatory for high-risk vendors.
7. Special Protections for Decentralized Systems
As Neobank Capital operates decentralized financial technology, specific controls apply:
- Private Keys & Wallet Data: Encrypted using HSM-backed key vaults with quorum-based access policies.
- Blockchain Nodes: Operate within secure cloud environments with network isolation and strict identity validation.
- Transaction Metadata: Pseudonymized before storage in analytics or monitoring systems.
- Smart Contracts: Audited for data exposure and vulnerabilities prior to deployment.
8. Incident Management
In the event of a suspected or confirmed data breach:
- The incident must be reported immediately to the Information Security Team and DPO.
- The Incident Response Plan is activated within one hour of detection.
- For GDPR-covered data, the DPO ensures regulatory notification within 72 hours if required.
- All incidents are logged, investigated, and corrective measures are documented.
9. Employee Responsibilities
- Employees must safeguard all devices and accounts with strong, unique passwords and MFA.
- No personal or confidential data may be stored on unapproved devices or media.
- Data sharing must occur only through secure company channels (encrypted email, secure portal, etc.).
- Security awareness and data protection training are required annually.
10. Compliance and Auditing
- Regular penetration tests and vulnerability assessments are performed at least twice per year.
- Internal audits verify compliance with GDPR, PCI DSS, and this policy.
- The CISO and DPO jointly review encryption controls annually.
- Non-compliance may result in disciplinary action or contract termination.
11. Review and Maintenance
This policy is reviewed annually or whenever significant regulatory, operational, or technological changes occur.
All updates must be approved by the Chief Information Security Officer (CISO) and Data Protection Officer (DPO).
12. Contact Information
Data Protection Officer (DPO)
📧 privacy@neobank.capital
📍 Neobank Capital – Global Privacy Office
2355 116 74, Stockholm, Sweden