PRIVATE.

TRANSPARENT.

SECURE.

PRIVATE.

TRANSPARENT.

SECURE.

PRIVATE TRANSPARENT SECURE.

PRIVATE.

TRANSPARENT.

SECURE.

Customers worldwide trust us to look after millions of sensitive documents.

Customers worldwide trust us to look after millions of sensitive documents.

Customers worldwide trust us to look after millions of sensitive documents.

Customers worldwide trust us to look after millions of sensitive documents.

Documents we collect

Payment

information

Photos


Bank

statements

Past visas


Passport


Payment

information

Photos


Bank

statements

Past visas


Passport


Payment

information

Photos


Bank

statements

Past visas


Passport


Payment

information

Photos


Bank

statements

Past visas


Passport


Key Features

Data Minimization and Anonymization

Collect only the necessary data required for providing services and anonymize data wherever possible.

Reduces the risk of data breaches by minimizing the amount of sensitive data stored.

Data Minimization and Anonymization

Collect only the necessary data required for providing services and anonymize data wherever possible.

Reduces the risk of data breaches by minimizing the amount of sensitive data stored.

Secure Payments

Implement industry-leading security measures for all payment transactions, including multi-factor authentication and fraud detection systems.

Ensures that financial transactions are safe from fraud and unauthorized access.

Secure Payments

Implement industry-leading security measures for all payment transactions, including multi-factor authentication and fraud detection systems.

Ensures that financial transactions are safe from fraud and unauthorized access.

Encryption at Rest

Encrypt all user data stored on Atlys servers, ensuring it cannot be accessed or deciphered by unauthorized individuals.

Provides an additional layer of security by protecting data even if physical storage devices are compromised.

Encryption at Rest

Encrypt all user data stored on Atlys servers, ensuring it cannot be accessed or deciphered by unauthorized individuals.

Provides an additional layer of security by protecting data even if physical storage devices are compromised.

End-to-End Encryption

Ensure that all data transmitted between users and Atlys servers is encrypted, making it unreadable to unauthorized parties.

Protects data during transmission, ensuring privacy and security.

End-to-End Encryption

Ensure that all data transmitted between users and Atlys servers is encrypted, making it unreadable to unauthorized parties.

Protects data during transmission, ensuring privacy and security.

End-to-End Encryption

Ensure that all data transmitted between users and Atlys servers is encrypted, making it unreadable to unauthorized parties.

Protects data during transmission, ensuring privacy and security.

End-to-End Encryption

Ensure that all data transmitted between users and Atlys servers is encrypted, making it unreadable to unauthorized parties.

Protects data during transmission, ensuring privacy and security.

Key Features

Key Features

Key Features

Data Minimization and Anonymization

Collect only the necessary data required for providing services and anonymize data wherever possible.

Reduces the risk of data breaches by minimizing the amount of sensitive data stored.

Data Minimization and Anonymization

Collect only the necessary data required for providing services and anonymize data wherever possible.

Reduces the risk of data breaches by minimizing the amount of sensitive data stored.

Data Minimization and Anonymization

Collect only the necessary data required for providing services and anonymize data wherever possible.

Reduces the risk of data breaches by minimizing the amount of sensitive data stored.

Secure Payments

Implement industry-leading security measures for all payment transactions, including multi-factor authentication and fraud detection systems.

Ensures that financial transactions are safe from fraud and unauthorized access.

Secure Payments

Implement industry-leading security measures for all payment transactions, including multi-factor authentication and fraud detection systems.

Ensures that financial transactions are safe from fraud and unauthorized access.

Secure Payments

Implement industry-leading security measures for all payment transactions, including multi-factor authentication and fraud detection systems.

Ensures that financial transactions are safe from fraud and unauthorized access.

Encryption at Rest

Encrypt all user data stored on Atlys servers, ensuring it cannot be accessed or deciphered by unauthorized individuals.

Provides an additional layer of security by protecting data even if physical storage devices are compromised.

Encryption at Rest

Encrypt all user data stored on Atlys servers, ensuring it cannot be accessed or deciphered by unauthorized individuals.

Provides an additional layer of security by protecting data even if physical storage devices are compromised.

Encryption at Rest

Encrypt all user data stored on Atlys servers, ensuring it cannot be accessed or deciphered by unauthorized individuals.

Provides an additional layer of security by protecting data even if physical storage devices are compromised.

End-to-End Encryption

Ensure that all data transmitted between users and Atlys servers is encrypted, making it unreadable to unauthorized parties.

Protects data during transmission, ensuring privacy and security.

End-to-End Encryption

Ensure that all data transmitted between users and Atlys servers is encrypted, making it unreadable to unauthorized parties.

Protects data during transmission, ensuring privacy and security.

End-to-End Encryption

Ensure that all data transmitted between users and Atlys servers is encrypted, making it unreadable to unauthorized parties.

Protects data during transmission, ensuring privacy and security.

End-to-End Encryption

Ensure that all data transmitted between users and Atlys servers is encrypted, making it unreadable to unauthorized parties.

Protects data during transmission, ensuring privacy and security.

End-to-End Encryption

Ensure that all data transmitted between users and Atlys servers is encrypted, making it unreadable to unauthorized parties.

Protects data during transmission, ensuring privacy and security.

Compliance with

Industry Standards

Compliance with Industry Standards

Compliance with Industry Standards

Compliance with Industry Standards

Adhere to industry standards and regulations such as GDPR, CCPA, and PCI DSS to ensure

data protection and privacy. We've the following certification with us:

Adhere to industry standards and regulations such as GDPR, CCPA, and PCI DSS to ensure data protection and privacy. We've the following certification with us:

Adhere to industry standards and regulations such as GDPR, CCPA, and PCI DSS to ensure data protection and privacy. We've the following certification with us:

Adhere to industry standards and regulations such as GDPR, CCPA, and PCI DSS to ensure data protection and privacy. We've the following certification with us:

Provides users with confidence that Atlys meets stringent security and privacy requirements.

Provides users with confidence that Atlys meets stringent security and privacy requirements.

Regular Security Audits

Conduct regular security audits and vulnerability assessments to identify and fix potential security issues.

Ensures that security measures are up-to-date and effective against emerging threats.

Regular Security Audits

Conduct regular security audits and vulnerability assessments to identify and fix potential security issues.

Ensures that security measures are up-to-date and effective against emerging threats.

Regular Security Audits

Conduct regular security audits and vulnerability assessments to identify and fix potential security issues.

Ensures that security measures are up-to-date and effective against emerging threats.

Regular Security Audits

Conduct regular security audits and vulnerability assessments to identify and fix potential security issues.

Ensures that security measures are up-to-date and effective against emerging threats.

Secure Access Controls

Implement robust access controls to ensure that only authorized personnel can access sensitive data.

Prevents unauthorized access to user data within the organization.

Secure Access Controls

Implement robust access controls to ensure that only authorized personnel can access sensitive data.

Prevents unauthorized access to user data within the organization.

Secure Access Controls

Implement robust access controls to ensure that only authorized personnel can access sensitive data.

Prevents unauthorized access to user data within the organization.

Secure Access Controls

Implement robust access controls to ensure that only authorized personnel can access sensitive data.

Prevents unauthorized access to user data within the organization.

User Education and Awareness

Provide users with information and resources on how to protect their data and recognize potential security threats.

Empowers users to take an active role in protecting their personal information.

User Education and Awareness

Provide users with information and resources on how to protect their data and recognize potential security threats.

Empowers users to take an active role in protecting their personal information.

User Education and Awareness

Provide users with information and resources on how to protect their data and recognize potential security threats.

Empowers users to take an active role in protecting their personal information.

User Education and Awareness

Provide users with information and resources on how to protect their data and recognize potential security threats.

Empowers users to take an active role in protecting their personal information.

Responsible Vulnerability Disclosure Program (VDP)

Responsible Vulnerability Disclosure Program (VDP)

Responsible Vulnerability Disclosure Program (VDP)

At Atlys, the security of our users and partners is important to us.
We welcome reports of genuine security issues and appreciate the efforts of the security research community in helping us maintain a safe platform.

If you believe you have identified a potential security vulnerability affecting Atlys services, we encourage you to report it responsibly following the guidelines below.

How to Report a Security Issue

Please email your findings to: security@atlys.com

Include the following details in your report:

Type of issue (e.g., authentication issue, access control, injection, etc.)

Affected URL, feature, or service

Clear steps to reproduce the issue

Potential security impact

Any proof-of-concept (screenshots or videos preferred)

Please do not send:

Passwords or authentication tokens

Raw malware data or stealer logs

Large automated scan reports

Customer personal data or documents

Scope

This program covers security vulnerabilities in:

  • Atlys web applications and APIs

  • Atlys-owned infrastructure and services


This program does not cover:

  • Issues resulting from compromised user devices or credentials

  • Social engineering or phishing attacks

  • Third-party services or integrations not operated by Atlys

  • Automated scanner findings without demonstrated impact

  • Missing security headers or best-practice recommendations without exploitability

Responsible Disclosure Guidelines

By submitting a report, you agree to:

  • Act in good faith and avoid privacy violations or service disruption

  • Not exploit the issue beyond what is necessary for validation

  • Keep all vulnerability details confidential until we resolve the issue

  • Not publicly disclose or publish findings without prior written consent from Atlys


We commit to:

  • Reviewing all valid reports

  • Communicating respectfully with reporters

  • Taking appropriate remediation actions where required

Legal Safe Harbor

If you follow this policy in good faith, Atlys will not initiate legal action against you for accidental or unintentional violations related to your security research.

You are expected to comply with all applicable laws and regulations.

Rewards and Bug Bounty

Atlys does not currently operate a public bug bounty program.

In some cases, we may offer a token of appreciation at our discretion for valid and responsibly reported issues.
Such tokens are not guaranteed and are evaluated based on impact and relevance.

Program Updates

Atlys reserves the right to modify or terminate this program at any time without prior notice.

If you are unsure whether your research aligns with this policy, please contact us at security@atlys.com before proceeding.