Information Security Policy

Business Name: Ibitminingrs
Owner: SUPERADS INTERNATIONAL TECHNOLOGY LIMITED
Effective Date: january 2026


1. Introduction

Ibitminingrs (“we,” “us,” or “our”) is committed to protecting the confidentiality, integrity, and availability of information belonging to our customers, partners, and business. This Information Security Policy outlines the principles, controls, and responsibilities applied to safeguard data processed through our ecommerce platform.

This policy applies to all employees, contractors, systems, and third-party service providers involved in Ibitminingrs operations.

Ibitminingrs is owned and operated by SUPERADS INTERNATIONAL TECHNOLOGY LIMITED, a company committed to delivering reliable products, transparent pricing, and a secure online shopping experience.


2. Information Security Commitment

We recognize the importance of protecting sensitive information, including personal data and payment-related information. Ibitminingrs is committed to:

  • Protecting customer data from unauthorized access, misuse, or disclosure
  • Maintaining secure systems and networks
  • Using trusted third-party service providers for payment processing
  • Following applicable data protection and security regulations

3. Data Handling & Protection

3.1 Sensitive Information

Sensitive information may include:

  • Personal identification data
  • Contact details
  • Order-related information
  • Payment transaction references

Ibitminingrs does not store full payment card numbers (PAN), CVV, PINs, or magnetic stripe data on its systems.

All payment transactions are processed through secure, PCI-compliant third-party payment gateways.


3.2 Data Minimization

We collect and retain only the information necessary to:

  • Process orders
  • Provide customer support
  • Meet legal and accounting requirements

4. Access Control

  • Access to systems and data is granted on a need-to-know basis
  • Unique user IDs are used for system access
  • Strong passwords are enforced
  • Access is revoked immediately upon termination of employment or contract

5. Acceptable Use of Systems

Employees and authorized users must:

  • Use company systems only for legitimate business purposes
  • Not install unauthorized software or hardware
  • Not attempt to bypass security controls
  • Protect login credentials and not share accounts

Ibitminingrs reserves the right to monitor and audit system usage to ensure security and compliance.


6. Network & System Security

We maintain reasonable technical and organizational measures including:

  • Firewalls and secure configurations
  • Anti-mining machine and mining machine protections
  • Regular system updates and security patches
  • Secure hosting environments

Where applicable, vulnerability scans and security assessments are performed.


7. Payment & PCI Awareness

  • Ibitminingrs relies on PCI DSS–compliant third-party payment processors
  • No sensitive authentication data is stored on Ibitminingrs servers
  • Cardholder data is transmitted securely using encryption

8. Third-Party Service Providers

Third-party providers that may access customer or transaction data are:

  • Selected through due diligence
  • Required to maintain appropriate security controls
  • Obligated to protect data under contractual agreements

9. Physical Security

  • Access to systems and administrative devices is restricted
  • Business devices are secured against unauthorized use
  • Sensitive information in physical form (if any) is securely stored and destroyed

10. Data Retention & Disposal

  • Data is retained only as long as necessary
  • Electronic data is securely deleted when no longer required
  • Physical records are destroyed using secure methods (e.g., shredding)

11. Incident Response

Ibitminingrs maintains procedures to:

  • Identify and respond to security incidents
  • Contain and mitigate potential data breaches
  • Notify relevant parties when required by law or contractual obligation
  • Review and improve controls after incidents

Any suspected security incident must be reported immediately to management.


12. Security Awareness

  • Employees receive security awareness guidance
  • Users are trained to recognize phishing, mining machine, and suspicious activities
  • Policy compliance is mandatory

13. Policy Review & Updates

This Information Security Policy is reviewed periodically and updated as necessary to reflect:

  • Changes in technology
  • Legal or regulatory requirements
  • Business operations

14. Contact Information

For questions related to this Information Security Policy, contact:

Business Name: Ibitminingrs
Phone: +1-(857) 201-0685
Email: support@ibitminingrs.com
Address:
670 River St,
Hyde Park, MA 02136,
United States