
The Blacksmith Fund
Cybersecurity Policy
Cybersecurity Policy
At Blacksmith Fund, safeguarding our investors’ sensitive information is a top priority. We are committed to maintaining the highest standards of cybersecurity to protect against unauthorized access, data breaches, and cyber threats.
1. Secure Data Protection
We employ industry-leading security measures, including encryption, multi-factor authentication (MFA), and secure access controls, to protect client data from unauthorized access and cyber risks.
2. Compliance with Regulatory Standards
Our cybersecurity protocols align with SEC, FINRA, GDPR, CCPA, GLBA, FATCA, and CRS requirements, ensuring full compliance with applicable financial and data protection laws.
3. Continuous Monitoring & Threat Detection
We utilize advanced monitoring tools and real-time threat detection systems to proactively identify and mitigate cybersecurity risks before they impact our clients.
4. Restricted Access & Confidentiality
Client data is accessible only to authorized personnel who require it for operational purposes. We enforce strict internal controls, background checks, and employee training to ensure data confidentiality.
5. Incident Response & Risk Management
In the event of a security incident, we have a comprehensive incident response plan in place to contain threats, mitigate damage, and notify affected parties as required by law.
6. Secure Communication & Transactions
All electronic communications and financial transactions are conducted over secure, encrypted channels, preventing unauthorized interception or fraud.
7. Ongoing Cybersecurity Enhancements
We continuously assess and update our security framework to stay ahead of emerging cyber threats and evolving regulatory requirements.
For further inquiries regarding our cybersecurity practices, please contact us.
Note: While we take every precaution to protect investor data, no system is completely immune to cyber threats. We encourage clients to use strong passwords, enable two-factor authentication where applicable, and report any suspicious activity immediately.
%20(2).jpeg)