Transaction Security, Risk Management and Cybersecurity Policy

Last updated: January 2026

Table of Contents

ARTICLE 1 - OBJECT, SCOPE AND STRATEGIC CHALLENGES

1.1 General context

In the context of its digital financial services activities, Rollo Technologies LLC ('Rollo') places the security of transactions, risk management, and cybersecurity at the heart of its strategic priorities.

This Transaction Security, Risk Management, and Cybersecurity Policy (hereinafter the 'Policy') defines the principles, organizational framework, and operational measures implemented by Rollo to protect the interests of its Users, partners, and stakeholders.

1.2 Scope

This Policy applies to:

  • all financial transactions processed by Rollo;
  • all technical infrastructures and information systems;
  • all Users, employees, and partners of Rollo;
  • all services offered, including international payments and Mobile Money transfers.

ARTICLE 2 - DEFINITIONS

Transaction security
all measures ensuring the integrity, confidentiality, and availability of financial transactions.
Cybersecurity
protection of computer systems, networks, and data against digital attacks.
Risk management
systematic process of identifying, assessing, and mitigating operational and financial risks.
Authentication
process of verifying the identity of a User before granting access to Services.
Encryption
transformation of data into a coded form to prevent unauthorized access.

ARTICLE 3 - SECURITY GOVERNANCE

Rollo has established a security governance framework integrated into its overall organizational structure.

Security responsibilities are assigned at the highest level of management, with dedicated teams for implementation and monitoring of security measures.

ARTICLE 4 - RISK-BASED APPROACH

Rollo applies a risk-based approach to security, continuously assessing threats and vulnerabilities to allocate resources effectively.

Risk assessments are conducted regularly and after any significant changes to systems or services.

ARTICLE 5 - SECURITY STANDARDS AND FRAMEWORKS

Rollo aligns its security practices with internationally recognized standards, including:

  • ISO 27001 Information Security Management;
  • PCI DSS for payment card data security;
  • NIST Cybersecurity Framework;
  • industry best practices for fintech security.

ARTICLE 6 - TRANSACTION LIFECYCLE SECURITY

Rollo implements security measures throughout the transaction lifecycle:

  • secure initiation and authentication;
  • encrypted data transmission;
  • real-time fraud detection;
  • secure processing and settlement;
  • comprehensive audit trails.

ARTICLE 7 - USER AUTHENTICATION

7.1 Authentication Methods

Rollo implements multi-factor authentication (MFA) to verify User identity, combining:

  • something you know (password, PIN);
  • something you have (mobile device, token);
  • something you are (biometric verification).

7.2 Session Management

User sessions are managed securely with automatic timeouts, session invalidation on logout, and protection against session hijacking.

ARTICLE 8 - ACCOUNT SECURITY

Rollo implements comprehensive account security measures including:

  • strong password requirements;
  • account lockout after failed attempts;
  • suspicious activity alerts;
  • secure account recovery procedures.

ARTICLE 9 - FRAUD DETECTION AND PREVENTION

Rollo deploys advanced fraud detection systems that analyze transactions in real-time to identify suspicious patterns.

Detection mechanisms include machine learning algorithms, behavioral analysis, and rule-based monitoring.

Suspicious transactions may be delayed, blocked, or flagged for manual review.

ARTICLE 10 - TRANSACTION MONITORING

All transactions are subject to continuous monitoring to detect anomalies, unusual patterns, or potential security threats.

Monitoring systems operate 24/7 with automated alerts for immediate response to security events.

ARTICLE 11 - DATA ENCRYPTION

11.1 Encryption in Transit

All data transmitted between Users and Rollo systems is encrypted using TLS 1.3 or higher protocols.

11.2 Encryption at Rest

Sensitive data stored in Rollo systems is encrypted using industry-standard encryption algorithms (AES-256).

ARTICLE 12 - INFRASTRUCTURE SECURITY

Rollo's technical infrastructure is protected by multiple layers of security including:

  • firewalls and intrusion detection systems;
  • network segmentation;
  • DDoS protection;
  • secure cloud infrastructure;
  • regular vulnerability assessments.

ARTICLE 13 - APPLICATION SECURITY

Rollo follows secure development practices including:

  • secure coding standards;
  • regular code reviews;
  • automated security testing;
  • penetration testing;
  • secure deployment procedures.

ARTICLE 14 - ACCESS MANAGEMENT

Access to systems and data is strictly controlled based on the principle of least privilege.

Access rights are reviewed regularly and revoked promptly when no longer needed.

All access activities are logged for audit purposes.

ARTICLE 15 - LOGGING AND MONITORING

Comprehensive logging is implemented across all systems to enable security monitoring, incident investigation, and compliance auditing.

Logs are retained securely for the duration required by applicable regulations.

ARTICLE 16 - INCIDENT MANAGEMENT

16.1 Incident Detection

Rollo maintains capabilities for rapid detection of security incidents through automated monitoring, threat intelligence, and User reports.

16.2 Incident Response

A documented incident response plan ensures prompt and effective response to security incidents, including containment, investigation, and recovery procedures.

ARTICLE 17 - DATA BREACH MANAGEMENT

In the event of a data breach, Rollo follows established procedures to:

  • contain and limit the breach;
  • assess the scope and impact;
  • notify affected parties and authorities as required;
  • implement remediation measures;
  • conduct post-incident review.

ARTICLE 18 - BUSINESS CONTINUITY

Rollo maintains business continuity plans to ensure service availability in the event of disruptions.

Plans include regular backups, redundant systems, and disaster recovery procedures.

Business continuity plans are tested and updated regularly.

ARTICLE 19 - VENDOR AND THIRD-PARTY SECURITY

Third-party vendors and partners are subject to security assessments before engagement and ongoing monitoring.

Contractual agreements include security requirements and data protection obligations.

ARTICLE 20 - SECURITY AUDITS

Rollo conducts regular security audits, including:

  • internal security assessments;
  • external penetration testing;
  • compliance audits;
  • vulnerability scans.

Audit findings are addressed through prioritized remediation plans.

ARTICLE 21 - USER RESPONSIBILITIES

Users play a critical role in security and are expected to:

  • use strong, unique passwords;
  • enable multi-factor authentication;
  • keep devices and software updated;
  • avoid sharing account credentials;
  • report suspicious activities promptly.

ARTICLE 22 - EMPLOYEE SECURITY

All Rollo employees receive security awareness training and are subject to:

  • background checks;
  • confidentiality agreements;
  • regular security training;
  • clear security policies and procedures.

ARTICLE 23 - PHYSICAL SECURITY

Physical access to Rollo facilities and data centers is controlled through security measures including access controls, surveillance, and visitor management.

ARTICLE 24 - LIMITATION OF LIABILITY

While Rollo implements comprehensive security measures, no system can guarantee absolute security. Rollo's liability for security incidents is subject to the limitations set forth in the Terms of Use.

ARTICLE 25 - POLICY UPDATES

This Policy may be updated periodically to reflect changes in security practices, technologies, and regulatory requirements.

The current version is always available on www.rollo.money.

ARTICLE 26 - CONTACT

For security-related questions or to report security concerns, please contact us at contact@rollo.money.

ARTICLE 27 - EFFECTIVE DATE

This Transaction Security, Risk Management, and Cybersecurity Policy is effective from its publication date and remains applicable as long as Rollo services are offered.

Rollo Technologies LLC. All rights reserved.