Over 100 000+ users have placed trust in us. Maintaining that trust and improving the security both in the app and behind the app is a continual focus area for Change. We have dedicated teams at Change to ensure the end to end security of your account and assets.
Change card product is following Payment Card Industry Data Security Standard and compliance to it has been audited by independent auditors; in addition, Change’s information security management is following the ISO27001 security framework.
Security of your Change account
There are three main components that have direct impact on the security of your account:
The way we verify our customers
All our customers need to verify their identity during onboarding. We’ve partnered with Veriff and Onfido to ensure our customers are who they claim to be. We make efforts to know our clients and have clear procedures in place to confirm their identity also throughout our business relationship with them.
The way you log into
the app
Setting up password and a passcode (or using biometrics) is mandatory in Change app. We recommend you to set up a long and unique password for your account and enable the second factor authentication (2FA) - a feature we’ve built for you in Change app so that you could protect your account.
The way we monitor our systems
We monitor the transactions and evaluate their risk on the go to avoid servicing fraudulent activities. We monitor how our product is being used to identify potential suspicious behaviours as early as possible. All Change card users must bind their device and the usage of a new device initiates a device verification flow.
Security of your assets with change
Customer assets are kept separately from Change’s own assets. Change is using third party service platforms to support liquidity management procedures. All service providers undergo periodic due diligence.
We have partnered with industry leaders across the board, enabling us to offer our clients a comprehensive and seamless user experience without compromising on security. Read more about this from our Report on Transparency which you can find in our blog.
Let's talk security