Security Policy


At Panaroma Finance (hereinafter referred to as “Panaroma Finance Limited”) as defined below, we prioritize the security and protection of our users’ information and assets. We have implemented robust security measures to safeguard against unauthorized access, data breaches, and other potential threats. This Security Policy outlines our commitment to maintaining a secure environment for our users and the steps we take to ensure their protection. 

Data Protection: 

  1. We employ industry-standard encryption protocols to secure user data transmission and storage.
  2. User data is stored on secure servers with restricted access and strong authentication mechanisms.
  3. We regularly backup user data to prevent loss or corruption and ensure business continuity.

Account Security: 

  1. We encourage users to enable two-factor authentication (2FA) for an additional layer of security on the platform.
  2. We continuously monitor user accounts for suspicious activities or unauthorized access attempts.
  3. In the event of a suspected security breach, we promptly notify affected users and respond appropriately to mitigate risks.

System Security: 

  1. Our systems undergo regular security assessments and vulnerability testing to identify and address any potential weaknesses.
  2. We maintain up-to-date security patches and software updates to protect against known vulnerabilities.
  3. Our infrastructure is designed with redundancy and failover mechanisms to ensure system availability and resilience.

Employee Training: 

  1. We conduct regular security awareness training for our employees to promote a culture of security and vigilance.
  2. Our employees are trained to follow strict security protocols and maintain the confidentiality of user data.

Third-Party Integration: 

  1. When integrating with third-party services or platforms, we carefully evaluate their security practices and ensure they meet our stringent security standards.
  2. We establish contractual agreements with third-party providers to protect user data and ensure compliance with applicable privacy and security regulations.

Incident Response: 

  1. We maintain an incident response plan to address security incidents promptly and effectively.
  2. In the event of a security breach, we follow established procedures to investigate, contain, and mitigate the impact of the incident.

Compliance and Auditing: 

  1. We adhere to applicable data protection laws and regulations, including the handling of personal information.
  2. Regular internal and external audits are conducted to assess our security practices and ensure compliance with industry standards.


We are committed to continuously improving our security measures and staying abreast of emerging threats and technologies. By implementing these security practices, we strive to provide a safe and trustworthy environment for our users to engage with our services. 

For any security concerns or questions, please contact our dedicated security team at [email protected] 

Note: This Security Policy is subject to updates and revisions as needed to align with evolving security practices and regulatory requirements. 

Note: This Risk Warning Policy is subject to updates and revisions as needed to align with regulatory requirements and reflect the evolving nature of the DeFi ecosystem.