Protecting your accounts is crucial to us. Volity protects your money and personal information with comprehensive security procedures.
Separating client funds from our company's
Our money management is regulated by strict client money and client assets rules. Thus, we separate client cash and assets from ours. We cannot utilise your deposit for business purposes. In case we go bankrupt, your funds and assets are entirely protected.
Title transfers, where professional clients have signed a legal instrument directing how their funds and assets are held, are exempt from this fund segregation policy.
Volity deposits—what happens to your money?
Money you deposit with us is put into trustee-supervised bank accounts. The money remain yours and are not incorporated into ours. This arrangement prevents Volity and its creditors from claiming ownership, charge, set-off, or retention by clearly identifying client money.
We have many bank accounts with reputable companies. By policy, we cannot aggregate client funds in one place. Instead, we must divide them among many banks. We check and reconcile customer balances regularly and inspect our financial institutions. We swiftly transfer monies to client accounts when needed.
Two-Factor Authentication (2FA) and Encryption
Volity safeguards your account with two-factor authentication (2FA) and encryption.
Advanced Password Protection
Instead of storing passwords in plain text, we safeguard your accounts and passwords with salted-secure hash algorithms.
Remember that you can spend the money you deposit however you like. If you decide not to trade, you can withdraw it using the same manner as deposit.
Protecting Against Cyber Attacks
In order to protect against cyber attack threats, we employ a combination of load balancers, firewalls, and VPNs to monitor and filter incoming and outgoing network traffic.
Secure Data Transmission
Constant monitoring is performed on our infrastructure, and data transmission occurs exclusively via encrypted transport layer security (TLS).
Email and Cyber Threat Prevention
A DMARC policy is implemented to assess the credibility of all email communications. Furthermore, an HTTP Strict-Transport-Security response system is enabled to identify potential cyber threats.
You can read more about our security here.
We wish you successful trading with Volity !