Question 3
What access controls are in place to limit access to production assets and sensitive data?
RBAC, least-privilege access, segmented environments/accounts, access logging, and periodic access reviews.
Lucky9 technology is primarily deployed on local premises or limited-scope cloud accounts. We maintain documented policies and procedures to identify, mitigate, and monitor information security risk.
We reserve the right to modify these policies and controls for any product extended to external consumers.
Question 3
RBAC, least-privilege access, segmented environments/accounts, access logging, and periodic access reviews.
Question 4
Current deployments are internal/private and this flow is not publicly exposed. If extended to external consumers, MFA is required before Plaid Link is surfaced.
Question 5
Yes. MFA is enforced on critical systems.
Question 6
Yes. Data in transit is protected with TLS 1.2+.
Question 7
Yes. Plaid-received consumer data is encrypted at rest.
Question 8
Yes. Vulnerability scanning, patch management, and remediation tracking are part of the program.
Question 9
Yes. Policy link and downloadable copy are provided. Live link: /privacy-policy
Question 10
Yes. Consent is required before collection and processing.
Question 11
Yes. A defined deletion/retention policy is enforced and periodically reviewed for compliance.