>Security at Bias
A secure foundation
As a payments fintech company serving developers, we understand that your trust depends on our ability to protect sensitive financial data and maintain the highest security standards. We’ve architected our platform with security-first principles, implementing multiple layers of protection to keep your financial data safe.
Encryption & data protection
Every piece of data that flows through Bias is encrypted:
- E2E Encryption: TLS 1.3 for all API communications with certificate pinning and HSTS headers
- Data at Rest: AES-256 encryption with regularly rotated keys and transparent database encryption
- Field-Level Encryption: Additional protection for the most sensitive payment information
- Secure Data Handling: Follows all best practices for data minimization, anonymization where possible, and cryptographic erasure for secure deletion
PCI DSS complianet service provider
Bias maintains a PCI DSS Service Provider certification. We follow all payment card industry security standards:
- Annual self-assessment questionnaires (SAQ) and network security scans
- Compliance across all six PCI DSS requirement categories
- Regular vulnerability assessments and security reviews
- Quarterly network security scans by approved scanning vendors (ASV)
Developer security tools
Purpose-built security features for developers:
- API Key Management: Environment-specific keys with easy rotation
- Built-in Protection: Rate limiting, security headers, and comprehensive security documentation
- Integration Support: Best practices guides and security-focused developer resources
Security disclosure program
We work with the security community through responsible disclosure to keep our platform secure.
Reporting security issues
Email: info@biaspay.com
Please include:
- Detailed vulnerability description and potential impact
- Step-by-step reproduction instructions
- Proof-of-concept code or screenshots (if applicable)
- Your contact information
Response commitment
- 24-hour acknowledgment of all reports
- Transparent communication throughout investigation
- Public recognition (with your permission)
- No legal action against researchers following responsible disclosure
Resolution timeline
- Critical Issues: 72 hours
- High Severity: 7 days
- Medium/Low Severity: 30 days
Program scope
In Scope: Bias web applications, APIs, developer dashboard, mobile applications, and Bias-owned domains
Out of Scope: Third-party integrations, social engineering, physical attacks, and external applications
Continuous security investment
We maintain our security leadership through ongoing investment in team training, emerging technologies, industry participation, and community collaboration.
Last updated: June 2025