Security is a fundamental part of our business. Below, we explain how we protect personal data and secure our systems.
A functioning Passiv account relies on enabling Passiv to interact with your investment account. This allows Passiv to display your investment accounts, account holdings, and transaction history.
To link your investment account, Passiv sends you over to your brokerage’s website, where you enter your login credentials. At no point does Passiv see or store your brokerage account credentials.
When you link your investment account, you choose whether to grant Passiv read-only or trade-enabled access. Trade-enabled access allows you to execute One-Click Trades through Passiv.
This access is granted through a secure OAuth flow. The process works as follows:
Passiv periodically accesses information from your investment account in order to:
When you access your Passiv account, we make live requests for information from your investment account to give you real-time information about your account and calculated trades.
Passiv stores limited personal data from your investment account. We store only information that is required to provide our service.
The basic account information is a list of your investment accounts and identifiers associated with them. We need to store this information so that we can associate your set portfolio targets with their associated investment accounts.
Besides basic account information, Passiv also stores:
Your investment account information is not shared with any other party, except when included with communications such as emails or other messaging. Application usage data may be shared with third-party services such as Google Analytics. Please note that the sharing of application usage data does not include your private financial data.
Passiv runs its software on servers in a major datacentre. Our servers are hosted in Canada and fall under the jurisdiction of the Canadian legal system. We limit server access to only key employees who need access to production resources. The server is frequently screened for vulnerabilities and patched where appropriate. Standard security practices such as a firewall and SSH keys are used to limit access and reduce attack surface. All networked services running on the server are locally bound and password protected where possible. Database backups are made frequently and strongly encrypted before uploading to a secure remote location. All data is encrypted at rest and in transit using SSL.
Passiv employs a number of third party services to help us run our business. Only relevant data is shared as needed with subprocessors, and is anonymized where possible.
Data subprocessors include:
Any user can request the permanent deletion of all their personal data at any time. Simply contact us using our feedback form and the email address associated with your Passiv account, requesting the closure of your account or the deletion of your personal data. Your request will be processed within five business days and you will receive a confirmation email once complete.