DESCRIPTION OF THE SECURITY SYSTEMS USED BY COINMOTION
General
The Company protects the Customer's Account by, for instance, requiring the Customer to confirm with a Verification Code sent via email if the Customer logs into the Service from an IP address that has not been previously used in the Service, or if the Customer uses the Mobile App on a Mobile Device that has not been used with the Mobile App before. In accordance with the applicable Terms of Service, the Customer is responsible for ensuring that only they can access the Verification Codes delivered via email or other technical means.
Additionally, the Company offers the Customer the option and recommends using a separate Authenticator application, with which the Customer can confirm their login using generated and constantly changing verification codes. A Customer using the Authenticator application can, if desired, disable the confirmation of a new IP address.
Custody Service
The Company strives to keep at least 95–98% of all Crypto-Assets stored in the Custody Service in cold wallets (offline) at all times, retaining only the amount necessary for executing transfers and trades in hot wallets (online). The Company secures the Crypto-Assets held in both cold and hot wallets through continuous monitoring, various security measures, and internal processes, such as access restrictions and the so-called four-eyes principle.
Transfer Service
The Company secures the Crypto-Assets stored in the Customer's Custody Service by restricting the Transfer Service in various ways. For instance, the Company requires the Customer to provide separate Verification for each Order using a Verification Code delivered via email, SMS, or generated by a dedicated Authenticator app. From the Account Settings, the Customer can choose the method for receiving the Verification Code: Email, SMS, the Authenticator app, or the Authenticator app combined with Email or SMS. In accordance with the Terms of Service, the Customer is responsible for ensuring that only they can access the Verification Codes delivered via email or other technical means.
The Company may also impose time-based restrictions on the execution of Transfer Orders if the Customer has recently logged in from a new IP address or Mobile Device (see the "General" section above). Additionally, the Company conducts both automated and manual Reviews of Transfer Orders before executing them to ensure their legality (see Terms of Service, specifically section 4.3 of the B terms) and to prevent cybercrime (such as scams) to the best of its ability.