Join Our Telegram Community.

Join Now



Security, terms and conditions




GENERAL PROVISIONS

This Security Statement applies to all Users participating in any Transaction or otherwise accessing the Platform in any capacity, other than Administrating Agents who have signed a separate written agreement with TronstakersDAO that expressly supersedes this Security Statement. This Security Statement, together with the General Terms, relevant Supplements, and the relevant Order Form (if the User is a Subscriber), are the “Agreement”.

INFORMATION SECURITY

  1. SECURITY
    TronstakersDAO security groups and partners have implemented and will maintain appropriate technical, physical and organizational measures in compliance with applicable law intended to protect User Data against accidental, unauthorized or unlawful access, disclosure, alteration, loss, or destruction.
  2. PAYMENT CARDS
    TronstakersDAO does not collect or process payment card information for payment, Administrating Agents will never ask for your credit or debit card information.
  3. INFORMATION SECURITY POLICIES
    TronstakersDAO security groups follow a written information security policy for each of the Services designed to comply with applicable law.
  4. ORGANIZATION OF INFORMATION SECURITY
    1. Security Ownership: TronstakersDAO have appointed and maintain more senior officials responsible for coordinating and monitoring the security rules and procedures.
    2. Risk Management Program: TronstakersDAO perform a risk assessment (1) annually, (2) in conjunction with significant changes to the Services, and (3) before offering new Services or processing new kinds of data.
    3. Retention: TronstakersDAO security group retains its security-related policies, procedures, and related reviews and assessments documents pursuant to its record retention schedule, subject to applicable record retention laws.
  5. ASSET MANAGEMENT
    1. Asset Inventory: TronstakersDAO maintain an inventory of all media on which User Data is stored. Access to the inventories of such media is restricted to TronstakersDAO personnel authorized in writing to have such access.
    2. Asset Handling: TronstakersDAO classifies User Data in accordance with Tron (TRX) current policies and procedures and applies appropriate controls to protect it. TronstakersDAO impose restrictions on printing User Data and have procedures for disposing of printed materials that contain User Data. We avoid storing User Data on portable devices unless it is necessary. When necessary, we authorize such storage and instruct personnel on proper security measures prior to storing User Data on portable devices.
  6. HUMAN RESOURCES SECURITY, SECURITY TRAINING
    TronstakersDAO security groups take reasonable steps designed to ensure the compliance of its personnel with security procedures relevant to the Services, including by informing its personnel about relevant security procedures. TronstakersDAO also inform its personnel of possible consequences of breaching the security rules and procedures. TronstakersDAO security groups do not use User Data to train its personnel.
  7. PHYSICAL SECURITY, RESILIENCY, AND DATA HANDLING
    1. Physical Access to Facilities: TronstakersDAO security groups (and its third-party service providers) limit access to facilities where information systems that process User Data are located to authorized individuals.
    2. Physical Access to Components: TronstakersDAO or its vendors maintain records of the incoming and outgoing media containing User Data, including the kind of media, the authorized sender/recipients, date and time, the number of media and the types of User Data they contain.
    3. Resiliency: TronstakersDAO uses third-party service providers that offer protections intended to prevent or limit service interruptions.
    4. Data Deletion: We uses reasonable processes to delete User Data when it is no longer needed pursuant to the terms of the Agreement.
    5. Protection from Disruptions: TronstakersDAO or its vendors use a variety of systems designed to protect against loss of data due to power supply failure or line interference.
    6. Component Disposal: TronstakersDAO or its vendors use processes to delete User Data when it is no longer needed pursuant to the terms of the Agreement.
  8. COMMUNICATIONS AND OPERATIONS MANAGEMENT
    1. Malicious Software:TronstakersDAO security groups uses anti-malware controls to avoid malicious software gaining unauthorized access to User Data, including malicious software originating from public networks.
    2. Event Logging: TronstakersDAO logs access and use of information systems containing User Data, registering the access ID, time, authorization granted or denied, and relevant activity.
  9. ACCESS CONTROL
    1. Operational Policy:TronstakersDAO security groups maintains security documents describing its security measures and the relevant procedures and responsibilities of its personnel who have access to User Data.
    2. Access Policy: TronstakersDAO group maintains a policy and supporting procedures that identify, by roles, those having access to User Data.
    3. Access Authorization: We also maintains and updates records of roles authorized to access TronstakersDAO systems that contain User Data, including roles that may grant, alter or cancel authorized access to data and resources.
    4. Least Privilege: We restricts access to User Data to only those individuals who require such access to perform their role. TronstakersDAO security groups only permits technical support personnel to have access to User Data if necessary.
    5. Integrity and Confidentiality: We instructs TronstakersDAO personnel to disable administrative sessions when they leave their workstations. We also stores passwords using cryptographic techniques designed to protect them from disclosure.
    6. Authentication: TronstakersDAO uses processes to identify and authenticate users who attempt to access information systems. Where authentication mechanisms are based on passwords, TronstakersDAO requires that the passwords are composed and maintained based on current best practices. TronstakersDAO does not reactivate deactivated or expired credentials without proper authorization. We monitors and locks accounts (where appropriate) that have repeated failed attempts to gain access to the information system. We also maintains procedures to deactivate passwords that have been corrupted or inadvertently disclosed.
  10. NETWORK DESIGN
    We implements and maintains controls designed to avoid individuals assuming access rights they have not been assigned to gain access to User Data they are not authorized to access.
  11. DATA BACKUP PLAN
    The Services are designed for high availability and to be resilient in the event of failure. On an ongoing basis, but in no case less frequently than once a week (unless no User Data has been updated during that period), TronstakersDAO maintains multiple copies of User Data from which User Data can be recovered. TronstakersDAO has specific procedures in place governing access to backups of User Data. Tron sales leads logs data restoration efforts, including the person responsible, the description of the restored User Data and where applicable, the person responsible and which User Data (if any) had to be input manually in the data recovery process. TronstakersDAO redundant storage and its procedures for recovering data are designed to reconstruct User Data in its original or last-replicated state from before the time it was lost or destroyed.
  12. SECURITY INCIDENTS
    1. Incident Response Plan: TronstakersDAO maintains a cyber-incident breach response plan in accordance with TronstakersDAO information security policy (“Incident Response Plan”) and implements the procedures required under such plan on the occurrence of a Security Incident.
    2. Security Incident Notification: If TronstakersDAO becomes aware of any unauthorized third party access to or processing of any User Data, which affects the confidentiality, integrity, or availability of User Data (a “Security Incident”), Tron sales leads, after initial investigation, without unreasonable delay: (1) notifies Subscriber of the Security Incident; (2) investigates the Security Incident and, after completing its investigation, provide Subscriber with information about the Security Incident; (3) uses reasonable efforts to mitigate the effects and to minimize any damage resulting from the Security Incident and, after doing so, informs Subscriber of the steps taken; and (4) once determined, informs Subscriber of any modifications Tron sales leads makes to its security procedures that are intended to prevent similar security incidents occurring in the future.
    3. Information Security Incident Management: (i) Incident Response Process. TronstakersDAO maintains a record of Security Incidents with a description of the Security Incident, the time period, the consequences of the incident, the name of the reporting person, to whom the Security Incident was reported, and the procedure for recovering any affected data. TronstakersDAO shall track, Security Incidents, including what data has been disclosed and to whom, or what data has been lost, damaged, destroyed or altered (as the case may be), and at what time; (ii) Service Monitoring. Following a Security Incident, Tron sales leads security personnel review relevant service-related logs to propose remediation efforts, if necessary.

SECURITY PARTNERSHIP



Stay in touch

Announcements can be found in our blog. Press contact:
support@tronstakersdao.site

Subscribe to our
newsletter

New coins supported, blog updates and exclusive offers directly in your inbox