How we handle
your data
Your trust is our top priority. We are committed to developing solutions that are reliable and secure, allowing you to confidently entrust your anti-money laundering compliance to us.
.png?width=243&height=450&name=grib%20illustration%20(1).png)
Our clients conduct over +15.000 monthly KYC checks with Creditro
ISAE 3000-statement
Each year, we have an ISAE 3000 statement prepared, which verifies that we handle personal data in complete compliance with GDPR.
The statement is prepared by an independent third party and confirms that Visma Creditro complies with the requirements of the General Data Protection Regulation, relevant EU regulations, national legislation, and the content of our data processing agreement.

Compliance Board
Our compliance board ensures that our platform and services comply with the requirements of the anti-money laundering law. The team of experts is dedicated to combating money laundering.

Marie Søgaard
Compliance Officer
Selected Car Leasing

Frans Skovholm
Partner/Lawyer
Dahl Advokater

Sune Gabelgård
Fraud Manager
EPI Company
Authorized Credit Reporting Agency
Visma Creditro is officially approved as a credit reporting agency by the Danish Data Protection Agency. This ensures that our services adhere to the highest standards of data protection and transparency.

Find out more about
how we manage security
-
Product Access
A select subset of our employees have access to our products and customer data through controlled interfaces.
The purpose of granting access to a subgroup of employees is to provide efficient customer support, troubleshoot potential issues, detect and respond to security incidents, and implement data security measures.
Access to customer data is enabled through "just in time" access requests. All such requests are logged. Employees are granted access based on their roles, and reviews of high-risk privilege grants are initiated daily. Employee roles and access privileges are reviewed and revised at least once a year.
-
Background Check
At Creditro, we believe in the importance of conducting thorough background checks as an essential part of our hiring process. This ensures that only the most reliable and qualified professionals join our team.
Our background checks are carried out in full compliance with applicable laws and regulations.
We also take great pride in maintaining a high level of ethics and integrity in our company culture. All of our employees are committed to adhering to our company's guidelines, which include strict requirements for confidentiality and protection of confidential information. This ensures that our clients can have complete trust in us and our ability to handle their financial matters in a professional and reliable manner.
-
Physical and environmental security
We host our product infrastructure with multi-tenant, outsourced infrastructure suppliers.
The physical and environmental security protocols are reviewed for SOC 2 Type II and ISO 27001 compliance, among other certifications.
-
Authentification
Visma Creditro enforces a uniform password policy for our client products.Clients who interact with our products through the user interface, must authenticate, before access is granted to non-public client data.
-
Autorisation
Kundedata lagres i lagersystemer med flere lejere, som kun er tilgængelige for kunder via applikationsbrugergrænseflader og applikationsprogrammeringsgrænseflader.
Kunder får ikke direkte adgang til den underliggende applikationsinfrastruktur. Autorisationsmodellen i hvert af vores produkter er designet til at sikre, at kun de korrekt tildelte personer kan få adgang til relevante funktioner, visninger og tilpasningsmuligheder.
Autorisation til datasæt udføres ved at validere brugerens tilladelser mod de attributter, der er knyttet til hvert datasæt.
-
API-access (Application Programming Interface)
Public product-API’s can be accessed by an API-key or through Oauth-authorisation. -
Prevention of unauthorised product access
Creditro enforces industry standard access control and detection functions for the internal networks that support our products. -
Access control
Network access control mechanisms have been designed to prevent network traffic using unauthorised protocols to reach the product infrastructure.
The implemented technical features are separated from the infrastructure suppliers and includes Virtual Private Cloud (VPC) implementations, security group settings and traditional firewall rules.
-
Registration and breach prevention
We utilise a Web Application Firewall-solution (WAF) to protect hosted client-websites and other online applications.
WAF is designed to identify and prevent attacks against publicly accessible network services.
-
Static code analysis
Security reviews of code stored in our source code vaults, is being done with appropriate intervals and checks for best coding practice and identifiable software errors. -
Transmission control
In transit
Creditro enables HTTPS-encryption (also known as SSL or TLS) on all login sites and makes it freely available on all customer websites hosted on our Creditro products. Our HTTPS-implementation uses standard industry algorithms and certificates.
At rest
Creditro stores user passwords according to policies following standard industry security protocols. Creditro has implemented technologies to ensure that stored data is encrypted at rest.
-
Access control
Registration
Visma Creditro has designed its infrastructure to log extensive information about the system behaviour, incoming traffic, system authorisation, and other application requests.
Internal systems collect log data and warn relevant employees of malicious, irregular, or unintended activities. Our personnel, including security-, maintenance-, and support personnel, are vigilant and trained to handle events.
Response and tracking
Visma Creditro maintains a log of known security events, including descriptions, dates, and timestamps of relevant activities and the disposition of the events.
Security, maintenance, and support personnel will investigate suspected and confirmed security events and identify and document appropriate countermeasures.
Creditro will take appropriate actions for all available events to minimise damage to clients and products or unauthorised data publication. Notifications to clients will follow the terms agreed in our contracts.
-
Availability control
Infrastructure availability
Infrastructure suppliers make a commercially fair effort to secure a minimum of 99,95 % uptime. The suppliers maintain a minimum of N+1 redundancy for power and network.
Fault tolerance
Backup- and replication strategies are designed to secure redundancy and failover protection during a critical system operation. Client data are backed up to multiple data storage facilities and are replicated across several availability points.
Online replicas and backups
Production databases are designed to replicate data between no less than a primary and secondary database wherever possible. All databases are backed up and maintained using industry-standard methods or better.
Our products are designed to secure redundancy and problem-free failovers. The servers supporting our products have also been designed to prevent single points of failure. This design helps our services by maintaining and updating the product applications and backend while limiting possible downtime.
Let's simplify your
compliance work
Compliance can be cumbersome, but it's essential. We assist you in completing the task in a straightforward and efficient manner, giving you time for other valuable tasks.
