Security & Privacy
Security and privacy are foundational to how we design, build, and deliver our products. Identity verification involves the most sensitive personal data — we built our entire architecture around the principle that this data should never leave your control.
01
On-Premise by Design
Unlike cloud-based verification services, Assurique products run entirely on your infrastructure. This is not an optional deployment mode — it is the only way our software operates.
02
Data Sovereignty & Regulatory Compliance
With Assurique, data sovereignty is guaranteed by architecture, not by policy:
No cloud dependency
The software requires no internet connection after deployment.
No data processor relationship
Because we never touch your data, no DPAs or cross-border transfer mechanisms are needed.
Full regulatory control
You implement data protection policies according to your local regulations and sector requirements.
Audit-ready
All verification data, audit logs, and decision trails are stored in your database under your control.
Algerian Regulatory Alignment
| Regulation | Requirement | How Assurique Complies |
|---|---|---|
| Law 18-07 | Personal data protection, consent, DPO obligations | All data stays on customer infrastructure; customer is sole data controller |
| Regulation 24-64 | Digital banking platforms must be hosted domestically | Fully on-premise — no external hosting of any kind |
| Instruction 06-2025 | Payment service providers require domestic hosting | No cloud dependency — runs 100% offline after deployment |
| Law 05-01 | KYC/AML identity verification obligations | Provides the full verification pipeline to meet KYC obligations |
03
Software Security
Secure Delivery
Application Security
Code Protection
Infrastructure Security
04
Identity Verification Security
Assurique Document Reader
Assurique Chip Reader
Assurique liveness check
05
Android SDK Security
Our Android SDK includes built-in security checks before processing sensitive data:
06
Responsible AI
Our ML models are designed for accuracy and fairness:
Representative training
Models are trained and validated on representative datasets to ensure consistent performance.
Explainable decisions
Verification decisions include confidence scores and component-level detail for each check performed.
Human review workflows
Manual review workflows are available for borderline cases, ensuring humans remain in the loop.
Override capability
All automated decisions can be overridden by authorized operators through the management dashboard.
07
Vulnerability Management
08
Certifications
Actively pursuing certifications
We are actively pursuing relevant security and compliance certifications. Contact us for the latest information on our certification status and roadmap.
09
Contact
For security or privacy inquiries:
| Purpose | Contact |
|---|---|
| Security reports & technical issues | support@assurique.com |
| Privacy & data protection | privacy@assurique.com |
| General inquiries | contact@assurique.com |
