Qutoken Security Policy

This document is effective as of 24 December 2025 and may be updated from time to time. The current version is published on this website.

  1. General Provisions

This Security Policy (hereinafter referred to as the “Policy”) sets out the general principles and approaches applied to ensure information and technical security of the Qutoken technological platform, including the official website and related services (hereinafter referred to as the “Platform”).

This Policy is of a general nature and is intended to inform users about the measures taken by Qutoken to protect information, data, and the Platform’s infrastructure. This Policy does not disclose or describe specific technical solutions, configurations, or vulnerabilities used as part of the security framework.

Use of the Platform is carried out in accordance with the applicable laws of the relevant user’s jurisdiction. In the event of any discrepancies between the provisions of this Policy and mandatory requirements of applicable law, such mandatory requirements shall prevail.

  1. Security Principles

In ensuring the security of the Platform, Qutoken adheres to the following core principles:

  • ensuring the confidentiality, integrity, and availability of information;
  • applying reasonable and proportionate security measures, taking into account the nature of the Platform and the technologies used;
  • minimizing access to data and systems based on the principle of necessity;
  • regular review and updating of implemented security measures;
  • responding to security incidents within reasonable timeframes.
  1. Measures for the Protection of Information and Data

As part of ensuring the security of the Platform, Qutoken implements technical and organizational measures aimed, inter alia, at:

  • protecting information from unauthorized access, loss, alteration, or disclosure;
  • controlling access to systems and data;
  • protecting network and server infrastructure;
  • monitoring the operation of the Platform and detecting anomalous activity;
  • performing data backup and recovery within the scope provided for by internal procedures.

Specific methods and means of protection are determined by Qutoken’s internal policies and procedures and are not subject to disclosure.

  1. Personal Data Security

The processing and protection of users’ personal data are carried out in accordance with the Qutoken Privacy Policy and applicable legal requirements.

Measures for the protection of personal data form part of the Platform’s overall security framework and are implemented taking into account the nature of the processed data and the risks associated with such processing.

  1. User Responsibilities

The user is responsible for complying with security measures on their side, including:

  • maintaining the confidentiality of account credentials and access tools;
  • using strong passwords and other authentication mechanisms;
  • taking reasonable measures to protect devices and software used to access the Platform;
  • promptly notifying Qutoken of any suspected unauthorized access or security incidents.
  1. Limitation of Liability

Despite the security measures implemented, Qutoken cannot guarantee absolute protection of the Platform against all possible threats, attacks, or failures.

Qutoken shall not be liable for losses or damages arising from security breaches caused by circumstances beyond Qutoken’s reasonable control, including actions of third parties, malicious software, or failures of user networks or equipment.

  1. Jurisdictional Considerations

Information security requirements may vary depending on the user’s jurisdiction. Where applicable law provides for additional or specific security requirements, such requirements shall apply with priority.

Additional security conditions and measures may be established in separate documents or jurisdictional addenda.

  1. Amendments to the Security Policy

Qutoken reserves the right to amend or supplement this Security Policy at any time. The current version of the Policy is published on the Platform and enters into force upon its publication, unless otherwise expressly stated.

  1. Contact Information

For matters related to the security of the Platform, the user may contact Qutoken using the contact details provided on the Platform or in the relevant section of the official Qutoken website.