IFTA

Security & Data Protection

This Security & Data Protection Policy explains the measures and principles applied by IFTA (International Financial Transactions Authority) (“IFTA”, “we”, “us”, or “our”) to safeguard information submitted through our website, systems, and digital services.


1. Security Governance and Oversight

IFTA maintains internal security governance practices designed to protect the confidentiality, integrity, and availability of information. Security responsibilities are assigned to authorized personnel and reviewed periodically to ensure alignment with operational, legal, and regulatory requirements.

2. Technical and Organizational Safeguards

We implement a combination of technical, administrative, and organizational controls, which may include:

  • Role-based access controls limiting data access to authorized individuals only.
  • Secure hosting infrastructure and controlled system environments.
  • Encryption and secure communication protocols where appropriate.
  • System monitoring, logging, and auditing to identify suspicious or unauthorized activity.

3. Protection of Case and Personal Data

Information submitted when opening or managing a case—including personal details, documentation, and communications—is handled with strict confidentiality and processed solely for legitimate operational, compliance, and legal purposes.

Data is not accessed, reviewed, or disclosed except where necessary to provide Services, comply with applicable laws, or protect the integrity of IFTA’s operations.

4. Access Management

Access to sensitive information is granted strictly on a need-to-know basis and limited to authorized personnel. Authentication mechanisms and internal controls are used to reduce the risk of unauthorized access.

5. Data Transmission and Storage Risks

While IFTA applies reasonable security measures to protect information transmitted or stored electronically, no method of transmission over the internet or electronic storage system can be guaranteed to be fully secure.

Users acknowledge and accept these inherent risks when submitting information online.

6. Incident Detection and Response

IFTA maintains procedures intended to identify, assess, and respond to suspected security incidents. Where required by law, IFTA will take appropriate steps to mitigate risks and comply with applicable notification obligations.

7. User Responsibilities

Users are responsible for maintaining the confidentiality of case numbers, reference details, and communications issued by IFTA. Users should ensure that their own devices and networks are protected against unauthorized access.

8. Continuous Improvement

Security practices and controls may be reviewed and enhanced from time to time to address evolving risks, technological changes, and regulatory developments.

9. Policy Updates

This Security & Data Protection Policy may be updated periodically. Any changes will be posted on this page with a revised “Last updated” date.

10. Contact Us

If you have questions regarding security or data protection, please contact us at:
Email: info@ifta-clearance.com
Website: ifta-clearance.com