The security of people's finance

investment securities

1. Safety monitoring system

Renzhong Finance has rich experience in the financial industry. Based on the whole process and multi-faceted risk management and control, it provides customers with safe, efficient and fast investment and financing service products, achieving a win-win situation for enterprise growth and wealth appreciation.

2. Multiple protective nets to prevent transaction risks.

The investment services released by Renzhong Finance will be subject to strict internal audit by Renzhong Financial Services Co., Ltd. and professional institutions, and at the same time seek the third-party guarantee company or core enterprises above AA level to provide guarantees. For some slightly risky transactions, Renren Finance will also set higher auditing standards for investors and financiers to ensure that only qualified investors can participate.

(2) Asset safety

1. Entrust a third party to manage the funds in the user account.

2. Funds can only be transferred to the certified and bound bank account, and users can query the details of the fund account in real time.

3. The website adopts the internationally advanced system encryption protection technology and is monitored 24 hours a day.

4. Strict internal fund management process and perfect guarantee system.

(3) Data and information security

1. supports secure socket layer protocol and 128-bit encryption technology.

This encryption technology is an industry standard to protect data security on the Internet. It allows customers to automatically encrypt information when conducting operations involving sensitive information such as membership management, personal account management and recharge, and then send it safely through the Internet.

2. Commitment to data security

Take various appropriate physical, electronic and management measures to protect data, so as to realize the promise of data security.

3. Digital signature technology

Digital signature technology is used to ensure the non-repudiation of information and sources in web page jumping and data transmission between websites.

4. Effectively avoid being tampered with and deleted.

Centralized image storage service is adopted to ensure the storage of contract and other file information, effectively prevent tampering and deletion, and realize permanent preservation.

(4) Privacy and confidentiality

1. The scope of information collected is limited to the relevant materials that our company considers necessary to understand your financial needs and conduct business.

2. Keep the information provided by customers strictly confidential, and will not disclose it to any external organization except for one of the following circumstances.

A) Disclosure with the prior consent of the customer; B) Disclosure required by laws and regulations; C) Disclosure at the request of government departments or other institutions; D) Disclosure shall be made at the request of the superior regulatory agency.

3. Make every effort to ensure that the recorded customer information is accurate and timely.

We have established a strict security system to prevent any unauthorized person, including our employees, from obtaining customer information.

5. With the permission of our company, the third party entrusted for service needs must strictly abide by the confidentiality responsibility when obtaining the personal information of customers.