Skip to Content
Security & Privacy

Data Privacy & Security

UNIKRON is committed to protecting your data and ensuring secure, transparent operations. This page outlines our security measures, privacy practices, and compliance framework.

Service Architecture

Asset Custody Model

  • User funds remain in self-custody at all times
  • Non-custodial architecture ensures asset segregation
  • No commingling of client assets with operational funds
  • Users retain full control of private keys

Execution Policy

  • Best execution standard: Routes orders to achieve optimal pricing
  • Transparent fee structure disclosed in all API responses
  • No proprietary trading or market making activities
  • Independent execution without payment for order flow
  • Third-party DEX routing ensures unbiased execution

Data Collection & Processing

We collect and process the following data to provide our services:

Data TypePurposeProcessing BasisRetention Period
Wallet addressesTransaction executionLegitimate business interest7 years
API keysAuthenticationService deliveryUntil revoked
Transaction dataService provisionService delivery7 years
Usage logsSecurity & operationsLegal obligations7 years
IP addressesFraud preventionLegitimate business interest90 days

Your Privacy Rights

Your Data Rights

You have the following rights regarding your personal data:

  • Right to access your data
  • Right to rectification and deletion
  • Right to data portability
  • Right to object to certain processing activities
  • Right to lodge complaints with relevant supervisory authorities

Contact: For data privacy inquiries, contact help@unikron.ch

Security Measures

Technical Safeguards

  • End-to-end encryption for all API communications (TLS 1.3)
  • Encrypted data storage at rest (AES-256)
  • Multi-factor authentication for account access
  • Regular third-party security audits
  • ISO 27001 certified infrastructure
  • Incident response procedures with timely breach notification

Data Sovereignty:

  • Primary data processing in Vercel, California, Secondary Processing in Switzerland and EU regions
  • Appropriate safeguards for cross-border data transfers
  • Compliance with applicable data protection frameworks

Transaction Monitoring

Security Screening:

  • Transactions screened against international sanctions lists
  • Automated monitoring for suspicious activity patterns
  • Enhanced due diligence for high-volume accounts
  • Source of funds verification when required

Institutional Requirements:

  • Know Your Customer (KYC) procedures for institutional accounts
  • Periodic account reviews for ongoing relationships
  • Transaction documentation available upon request
  • Mandatory reporting of qualifying transactions

Audit & Transparency

Independent Audits:

  • Annual smart contract security audits
  • Quarterly financial audits
  • Continuous security monitoring
  • Public attestation reports available upon request

Audit Trail:

  • All API requests logged with unique identifiers
  • Transaction history retained for 7 years
  • Immutable blockchain records for all executed swaps
  • Export functionality for audit and reporting purposes

Last updated on