{"id":25842,"date":"2025-08-05T15:52:37","date_gmt":"2025-08-05T12:52:37","guid":{"rendered":"https:\/\/forklog.com\/en\/emcds-approach-to-safeguarding-assets-and-user-data\/"},"modified":"2025-08-05T15:52:37","modified_gmt":"2025-08-05T12:52:37","slug":"emcds-approach-to-safeguarding-assets-and-user-data","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/emcds-approach-to-safeguarding-assets-and-user-data\/","title":{"rendered":"EMCD&#8217;s Approach to Safeguarding Assets and User Data"},"content":{"rendered":"<p>In the first half of 2025, the crypto industry <a href=\"https:\/\/forklog.com\/en\/news\/a-grim-half-year-scams-and-hacks-cost-the-industry-3-1-billion\">suffered<\/a> losses of $3.1 billion due to scams and hackers. This figure surpasses the total for the entire year of 2024, which stood at $2.85 billion.<\/p>\n<p>We discussed user data security and protection with representatives from <a class=\"tracking_link\" href=\"https:\/\/emcd.io\/\" target=\"_blank\" rel=\"noopener\">EMCD<\/a>, one of the world&#8217;s top 10 Bitcoin mining pools. The project team is also developing a financial product ecosystem, including the Coinhold Earn service with up to 14% annual returns and a P2P platform.<\/p>\n<h2 class=\"wp-block-heading\">Core Principles<\/h2>\n<p>EMCD bases its security on threat prevention and responsibility distribution principles. Specialists analyze threats, create a risk map (identifying potential vulnerabilities), and proactively reinforce these areas. All system elements are protected according to international <a class=\"tracking_link\" href=\"https:\/\/ru.wikipedia.org\/wiki\/ISO\/IEC_27001\" target=\"_blank\" rel=\"noopener\">ISO 27001<\/a> standards.<\/p>\n<p>The monitoring system tracks deviations from normal operations, detects suspicious activity, and automatically responds to incidents following pre-developed protocols. Recovery mechanisms are in place to swiftly restore services to operational status.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWe believe security encompasses not only technical solutions but also organizational processes and internal culture. The entire team, not just a single information security specialist, bears responsibility,\u201d comment representatives from <a class=\"tracking_link\" href=\"https:\/\/emcd.io\/\" target=\"_blank\" rel=\"noopener\">EMCD<\/a>.<\/p>\n<\/blockquote>\n<p>All sensitive information is encrypted during transmission and storage. EMCD employs cryptographic algorithms and the <a class=\"tracking_link\" href=\"https:\/\/ru.wikipedia.org\/wiki\/TLS\" target=\"_blank\" rel=\"noopener\">TLS<\/a> protocol.<\/p>\n<h2 class=\"wp-block-heading\">Role-Based Access and Permissions<\/h2>\n<p>EMCD utilizes a segmented infrastructure, where each component has its own access level. Employees are granted rights only to the systems relevant to their position.<\/p>\n<p>Encryption keys are issued only to authorized personnel. System access is granted through verified logins and <a class=\"tracking_link\" href=\"https:\/\/ru.wikipedia.org\/wiki\/SSH\" target=\"_blank\" rel=\"noopener\">SSH<\/a> keys\u2014universal accounts are not used. Access to databases and internal applications is possible only after multi-factor authentication.<\/p>\n<p>EMCD&#8217;s infrastructure is modular. Even if an intruder gains access to one component, they cannot proceed further. The intrusion detection system (IDS) and protection against <span data-descr=\"distributed denial of service\" class=\"old_tooltip\">DDoS<\/span> attacks enable prompt responses to abnormal activity.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cEMCD trains all employees in security protocols. They know how to handle corporate devices, manage passwords, and control access. System rights are granted strictly by role and only after managerial approval. All corporate devices are connected to a mobile device management (MDM) system, which monitors activity and blocks access if necessary,\u201d note EMCD representatives.<\/em><\/p>\n<\/blockquote>\n<p>Any system changes undergo internal audits and independent external tests to identify vulnerabilities.<\/p>\n<h2 class=\"wp-block-heading\">Personal Data Processing<\/h2>\n<p>EMCD collects only the personal data necessary for service provision, legal compliance, and user security.<\/p>\n<p>The company gathers only essential information and does not share data with third parties without legal grounds. Data storage complies with UAE regulatory requirements.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cWe store user information on secure servers in accordance with retention periods: most data is deleted with the account, some after 5-8 years as per UAE laws,\u201d comment EMCD representatives.<\/em><\/p>\n<\/blockquote>\n<p>Details on personal data processing conditions can be found in the privacy policy on the <a class=\"tracking_link\" href=\"https:\/\/emcd.io\/\" target=\"_blank\" rel=\"noopener\">EMCD website<\/a>. The company announces all changes to the privacy policy and new feature launches in advance via the website and personal account.<\/p>\n<p>Users can request information on stored data, demand corrections or deletions, restrict or stop processing, and withdraw consent. To do so, they should contact EMCD support.<\/p>\n<p>Earlier, ForkLog<a href=\"https:\/\/forklog.com\/en\/news\/where-to-keep-usdt-ahead-of-a-bear-market-a-comparison-of-platforms-offering-up-to-14\"> analyzed<\/a> the profitability of Earn products from crypto exchanges and other crypto services, including Coinhold.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the first half of 2025, the crypto industry suffered losses of $3.1 billion due to scams and hackers. This figure surpasses the total for the entire year of 2024, which stood at $2.85 billion. We discussed user data security and protection with representatives from EMCD, one of the world&#8217;s top 10 Bitcoin mining pools. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":25841,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1137],"class_list":["post-25842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cryptocurrency-mining"],"aioseo_notices":[],"amp_enabled":true,"views":"31","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/25842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=25842"}],"version-history":[{"count":0,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/25842\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/25841"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=25842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=25842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=25842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}