Identity verification and content moderation
Privacy & security
Home / Identity verification and content moderation / Identity verification and content moderation privacy and security
Privacy & security
Data protection is the process of safeguarding sensitive information from loss, corruption, or damage. It involves security processes and strategies to protect information about individuals, such as their names, dates of birth, email addresses, and photographs.Â
Privacy and data protection are hugely important in the age assurance, identity verification and content moderation solutions that Verifymy offers. Data protection laws aim to balance the rights of individuals to privacy with the legitimate interests of organisations to process personal data.
Privacy by design
Our safeguarding solutions have been built within the principles of privacy-by-design. This is a concept that involves incorporating privacy and data protection into the design of products, services, and business processes from the very beginning. Privacy-by-design is a fundamental principle of the General Data Protection Regulation (GDPR).
Please view our Privacy Policy for more details.
GDPR
Data minimisation
User data
Identity verification privacy information
ID scan + face match
The user is asked to scan their face, which is then submitted securely using 256-bit encryption to the Verifymy server.Â
During the face scan, liveness is confirmed to protect against the use of 2D images, masks or bots.
The user is then asked to scan their ID document using the camera on their device. The document is then submitted securely using 256-bit encryption to the Verifymy server. Information is then extracted from the ID document to calculate whether the customer meets the service’s minimum age requirements.
The face scan confirms that the user is the owner and in possession of the ID document they are using to verify.
Data security
All data submitted through Verifymy’s safety tech solutions is encrypted using high-end cryptography. The data is encrypted at rest and in transit using a combination of 256-bit encryption and hashing algorithms.