Kryptos Logo
Products
Portfolio Tracker
Live view across every chain
Crypto Tax Software
35+ countries supported
DeFi Tracker
Every position, every protocol
NFT Tracker
Floor price, P&L, collections
Resources
5,000+ Integrations
Exchanges, wallets, chains, DeFi
Tax Guides
US, UK, EU, AU & 30+ more
Plans & Pricing
Free trial, no credit card
Get started free
Your entire crypto life in one app.
40,000+ users across 35+ countries trust Kryptos.
Download onApp Store Get it onGoogle Play
Create free account
Products
Enterprise Treasury Live
Map on-chain to chart of accounts
SAFT Tracker
Vesting, unlocks, cap table
DeFi Positions
Real-time exposure & rewards
Crypto Invoicing
Send, receive, full audit trail
Who it's for
Funds & Hedge Funds
Audit-ready, GAAP & IFRS
Accountants & CPAs
White-label client reports
Exchanges & Custodians
Embed tax & portfolio tools
Book a Demo
See it running with your data
Enterprise-grade
Trusted by 100+ institutions.
Binance, Phemex, Bitstamp run their finance ops on Kryptos.
SOC 2 SOC 1 Type I certified
Talk to sales
Start building
Kryptos Connect Beta
One API for all of crypto finance
API Reference
Full endpoints & schemas
Quickstart
Your first call in 5 minutes
SDKs & Libraries
TypeScript, Python, Go
OAuth & API keys
Secure authentication
Tools & support
Developer Dashboard
Keys, logs, usage analytics
Status Page
Real-time uptime & incidents
Changelog
API updates & releases
GitHub
Open source & examples
Community
Discord & Stack Overflow
Code preview
One call. Clean data.
// Connect any account
const data = await kryptos.connect({
  exchanges: ["binance"],
  wallets: ["0x8a...3b"]
});
Talk to our team
Learn
Blog
Trends, guides, announcements
Tax Guides
35+ countries covered
Case Studies
Binance, ChainComply, YieldNest
FAQs & Help Center
Setup, billing, integrations
Featured
Preparing for 2026: Key crypto trends.
CARF, DAC8, 1099-DA. What changes for every crypto business next year.
Read article
Why Kryptos
The infrastructure story
Careers Hiring
Join the team building the layer
Partners & Investors
Binance Labs, Gate.io, YZiLabs
Contact
Sales, support, press
Sign in Get started
โœ•

Take the first step today: pick your option

๐Ÿ‘ค

For Individuals

๐Ÿข

For Businesses

โ˜ฐ
Individuals
Portfolio Tracker Crypto Tax DeFi Tracker NFT Tracker
Businesses
Enterprise Book Demo
Build
API SDKs Docs
Resources
Blog Guides FAQs
Company
Why Kryptos Careers
Sign in
Limited Time Offer: FLAT 25% Discount on all plans at Kryptos
(Valid till 15th April, 2025).
Copy code TARIFF25
Get started now
arrow
Kryptos logo
Individuals
dropdown arrow
PRODUCTS
Portfolio Tracker
Live view across every chain
Crypto Tax Software
35+ Countries Supported
DeFi Tracker
Every Position, Every Protocol
NFT Tracker
Floor price, P&L, Collections
RESOURCES
5000+ Integrations
Exchanges, Wallets, Chains, DeFi
Tax Guides
US, UK, EU, AU &ย 30+ More
Plans &ย Pricing
Free Trial, No Credit Card Required
GET STARTED FOR FREE
Your entire crypto life in one app.
40,000+ users across 35+ countries trust Kryptos.
Get it on Play Store
Download on App Store
Get Started for Free
arrowarrow
Businesses
dropdown arrow
PRODUCTS
Enterprise Treasury
Map on-chain to chart of accounts
SAFT Tracker
Vesting, unlocks, cap table
DeFi Positions
Real-time exposure & rewards
Crypto Invoicing
Send, receive, full audit trail
WHO ITS FOR
Funds & Hedge Funds
Audit-ready, GAAP & IFRS
โ€
Accountants & CPAs
White-label client reports
Exchanges & Custodians
Embed tax & portfolio tools
Book a Demo
See it running with your data
ENTERPRISE GRADE
Trusted by 100+ institutions.
Binance, Phemex, Bitstamp run their finance ops on Kryptos.
AICPA SOC certification seal for Service Organizations with the URL aicpa.org/soc4so.AICPA SOC 2 badge with website aicpa.org/soc4so and text SOC for Service Organizations.
Talk to Sales
arrowarrow
Build
dropdown arrow
START BUILDING
Kryptos Connect Beta
One API for all of crypto finance
API Reference
Full endpoints & schemas
Quickstart
Your first call in 5 minutes
SDKs & Libraries
TypeScript, Python, Go
OAuth & API keys
Secure authentication
TOOLS & SUPPORT
Developer Dashboard
Keys, logs, usage analytics
Status Page
Real-time uptime & incidents
Changelog
API updates & releases
GitHub
Open source & examples
Community
Discord & Telegram
CODE PREVIEW
One call. Clean data.
// Connect any account
const data = await kryptos.connect({
  exchanges: ["binance"],
  wallets: ["0x8a...3b"]
});
Talk to Sales
arrowarrow
Resources
dropdown arrow
LEARN
Blog
Trends, guides, announcements
Tax Guides
35+ countries covered
Case Studies
Binance, ChainComply, YieldNest
FAQs & Help Center
Setup, billing, integrations
FEATURED
Portfolio Analytics for Crypto Traders | Kryptos Guide
Discover how portfolio analytics, P&L insights, and tax reporting tools like Kryptos improve decisions.
View Blog
arrowarrow
Company
dropdown arrow
Why Kryptos
The infrastructure story
Careers
Join the team building the layer
Partners & Investors
Binance Labs, Gate.io, YZiLabs
Contact
Sales, support, press
Use cases
dropdown arrow
Use cases
Innovative tools for crypto tax reporting, financial analytics, and portfolio management.
Personal Finance
Business Finance
Market Analysis
Portfolio & Wealth Management
Tax & Accounting Software
dropdown arrow
English
Deutsch
French
Spanish
Get Started for Free
arrowarrow
cross to close popup
Take the first step today: pick your option
For Individuals
For Accountants
For Businesses

Data Processing Agreement

Last Updated: Monday, May 11, 2026

This Data Processing Agreement ("DPA") forms part of the Terms of Use (or other similarly titled written or electronic agreement addressing the same subject matter) ("Agreement") between Customer (as defined in the Agreement) and "Kryptoskatt AB" under which the Processor provides the Controller with the software and services (the "Services"). The Controller and the Processor are individually referred to as a "Party" and collectively as the "Parties".

The Parties seek to implement this DPA to comply with the requirements of EU GDPR (defined hereunder) in relation to Processor's processing of Personal Data (as defined under the EU GDPR) as part of its obligations under the Agreement.

This DPA shall apply to Processor's processing of Personal Data, provided by the Controller as part of Processor's obligations under the Agreement.

Except as modified below, the terms of the Agreement shall remain in full force and effect.

1. Definitions

Terms not otherwise defined herein shall have the meaning given to them in the EU GDPR or the Agreement. The following terms shall have the corresponding meanings assigned to them below:

  1. "Data Transfer" means a transfer of the Personal Data from the Controller to the Processor, or between two establishments of the Processor, or with a Sub-processor by the Processor.
  2. "EU GDPR" means the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC (General Data Protection Regulation).
  3. "Standard Contractual Clauses" means the contractual clauses attached hereto as Schedule 1 pursuant to the European Commission's Implementing Decision (EU) 2021/914 of 4 June 2021 on Standard Contractual Clauses for the transfer of Personal Data to processors established in third countries which do not ensure an adequate level of data protection.
  4. "Controller" means the natural or legal person, public authority, agency, or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the controller or the specific criteria for its nomination may be provided for by Union or Member State law.
  5. "Processor" means a natural or legal person, public authority, agency, or other body which processes personal data on behalf of the controller.
  6. "Sub-processor" means a processor/sub-contractor appointed by the Processor for the provision of all or parts of the Services and Processes the Personal Data as provided by the Controller.

2. Purpose of this Agreement

This DPA sets out various obligations of the Processor in relation to the Processing of Personal Data and shall be limited to the Processor's obligations under the Agreement. If there is a conflict between the provisions of the Agreement and this DPA, the provisions of this DPA shall prevail.

3. Categories of Personal Data and Data Subjects

The Controller authorizes permission to the Processor to process the Personal Data to the extent of which is determined and regulated by the Controller. The current nature of the Personal Data is specified in Annex I to Schedule 1 to this DPA.

4. Purpose of Processing

The objective of Processing of Personal Data by the Processor shall be limited to the Processor's provision of the Services to the Controller and/or its Client, pursuant to the Agreement.

5. Duration of Processing

The Processor will Process Personal Data for the duration of the Agreement, unless otherwise agreed upon in writing by the Controller.

6. Data Controller's Obligations

  1. The Data Controller shall warrant that it has all necessary rights to provide the Personal Data to the Data Processor for the Processing to be performed in relation to the agreed services. To the extent required by Data Privacy Laws, Data Controller is responsible for ensuring that it provides such Personal Data to Data Processor based on an appropriate legal basis allowing lawful processing activities, including any necessary Data Subject consents to this Processing are obtained, and for ensuring that a record of such consents is maintained. Should such consent be revoked by the Data Subject, the Data Controller is responsible for communicating the fact of such revocation to the Data Processor.
  2. The Data Controller shall provide all natural persons from whom it collects Personal Data with the relevant privacy notice.
  3. The Data Controller shall request the Data Processor to purge Personal Data when required by the Data Controller or any Data Subject whom it collects Personal Data unless the Data Processor is otherwise required to retain the Personal Data by applicable law.
  4. The Data Controller shall immediately advise the Data Processor in writing if it receives or learns of any:
    โ€ข Complaint or allegation indicating a violation of Data Privacy Laws regarding Personal Data;
    โ€ข Request from one or more individuals seeking to access, correct, or delete Personal Data;
    โ€ข Inquiry or complaint from one or more individuals relating to the collection, processing, use, or transfer of Personal Data;
    โ€ข Any regulatory request, search warrant, or other legal, regulatory, administrative, or governmental process seeking Personal Data.

7. Data Processor's Obligations

  1. The Processor will follow written and documented instructions received, including email, from the Controller, its affiliate, agents, or personnel, with respect to the Processing of Personal Data (each, an "Instruction").
  2. The Processing described in the Agreement and the relating documentation shall be considered as Instruction from the Controller.
  3. At the Data Controller's request, the Data Processor will provide reasonable assistance to the Data Controller in responding to/complying with requests/directions by Data Subject in exercising their rights or of the applicable regulatory authorities regarding Data Processor's Processing of Personal Data.
  4. In relation to the Personal Data, Data Processor shall obtain consent (where necessary) and/or provide notice to the Data Subject in accordance with Data Protection Laws to enable shared Personal Data to be provided to, and used by, the other Party as contemplated by this Agreement.
  5. Where shared Personal Data is transferred outside the Data Processor's territorial boundaries, the transferor shall ensure that the recipient of such data is under contractual obligations to protect such Personal Data to the same or higher standards as those imposed under this Addendum and the Data Protection Laws.
  6. The processor shall inform the controller if, in its opinion, a processing instruction infringes applicable legislation or regulation.
  7. As a Data Processor, taking into account the nature of the processing and the information available to the Data Processor, the Data Processor shall assist the data controller in conducting any necessary Data Protection Impact Assessments (DPIAs), as required under GDPR.

8. Data Secrecy

  1. To Process the Personal Data, the Processor will use personnel who are:
    โ€ข Informed of the confidential nature of the Personal Data; and
    โ€ข Perform the Services in accordance with the Agreement.
  2. The Processor will regularly train individuals having access to Personal Data in data security and data privacy in accordance with accepted industry practice and shall ensure that all the Personal Data is kept strictly confidential.
  3. The Processor will maintain appropriate technical and organizational measures for protection of the security, confidentiality, and integrity of the Personal Data as per the specifications as per the standards mutually agreed in writing by the Parties.

9. Audit Rights

  1. Upon Controller's reasonable request, the Processor will make available to the Controller, information as is reasonably necessary to demonstrate Processor's compliance with its obligations under the EU GDPR or other applicable laws in respect of its Processing of the Personal Data.
  2. When the Controller wishes to conduct the audit (by itself or through a representative) at Processor's site, it shall provide at least fifteen (15) days' prior written notice to the Processor; the Processor will provide reasonable cooperation and assistance in relation to audits, including inspections, conducted by the Controller or its representative.
  3. The Controller shall bear the expense of such an audit.

10. Mechanism of Data Transfers

Any Data Transfer for the purpose of Processing by the Processor in a country outside the European Economic Area (the "EEA") shall only take place in compliance as detailed in Schedule 1 to the DPA. Where such model clauses have not been executed at the same time as this DPA, the Processor shall not unduly withhold the execution of such template model clauses, where the transfer of Personal Data outside of the EEA is required for the performance of the Agreement.

11. Sub-processors

  1. The Controller acknowledges and agrees that the Processor may engage a third-party Sub-processor(s) in connection with the performance of the Services, provided such Sub-processor(s) take technical and organizational measures to ensure confidentiality of Personal Data shared with them; The current Sub-processors engaged by the Processors and approved by the Controller are listed in Annex III of Schedule 1 hereto. The processor shall notify the controller at least thirty (30) calendar days in advance of any intended changes or additions to its Sub-processors listed in Annex III by emailing notice of the intended change to Customer. In accordance with Article 28(4) of the GDPR, the Processor shall remain liable to Controller for any failure on behalf of a Sub-processor to fulfil its data protection obligations under the DPA in connection with the performance of the Services.
  2. If the Controller has a concern that the Sub-processor(s) Processing of Personal Data is reasonably likely to cause the Controller to breach its data protection obligations under the GDPR, the Controller may object to Processor's use of such Sub-processor and the Processor and Controller shall confer in good faith to address such concern.

12. Personal Data Breach Notification

  1. The Processor shall maintain defined procedures in case of a Personal Data Breach (as defined under the GDPR) and shall without undue delay notify Controller if it becomes aware of any Personal Data Breach unless such Data Breach is unlikely to result in a risk to the rights and freedoms of natural persons.
  2. The Processor shall provide the Controller with all reasonable assistance to comply with the notification of Personal Data Breach to Supervisory Authority and/or the Data Subject, to identify the cause of such Data Breach and take such commercially reasonable steps as reasonably required to mitigate and remedy such Data Breach.
  3. No Acknowledgement of Fault by Processor. Processor's notification of or response to a Personal Data Breach under this DPA will not be construed as an acknowledgement by Processor of any fault or liability with respect to the data incident.

13. Return and Deletion of Personal Data

  1. The Processor shall at least thirty (30) days from the end of the Agreement or cessation of the Processor's Services under the Agreement, whichever occurs earlier, shall return to the Controller all the Personal Data, or if the Controller so instructs, the Processor shall have the Personal Data deleted. The Processor shall return such Personal Data in a commonly used format or in the current format in which it was stored at discretion of the Controller, soon as reasonably practicable following receipt of Controller's notification.
  2. In any case, the Processor shall delete Personal Data including all the copies of it as soon as reasonably practicable following the end of the Agreement.

14. Technical and Organizational Measures

Having regard to the state of technological development and the cost of implementing any measures, the Processor will take appropriate technical and organizational measures against the unauthorized or unlawful processing of Personal Data and against the accidental loss or destruction of, or damage to, Personal Data to ensure a level of security appropriate to: (a) the harm that might result from unauthorized or unlawful processing or accidental loss, destruction or damage; and (b) the nature of the data to be protected [including the measures stated in Annex II of Schedule 1]

SCHEDULE 1

ANNEX I

A. LIST OF PARTIES

Data exporter(s):

  • Name: Customer (As set forth in the relevant Order Form).
  • Address: As set forth in the relevant Order Form.
  • Contact person's name, position, and contact details: As set forth in the relevant Order Form.
  • Activities relevant to the data transferred under these Clauses: Recipient of the Services provided by Kryptoskatt AB in accordance with the Agreement.
  • Signature and date: Signature and date are set out in the Agreement.
  • Role (Controller/Processor): Controller

Data importer(s):

  • Name: Kryptoskatt AB
  • Address: A2-1101, Frida Hjertbergs Gata 12, Gรถteborg, Sweden 41281
  • Contact person's name, position, and contact details: Sukesh Kumar Tedla, CEO, sukeshtedla@kryptos.io; Akash Srivastava, CTO, akash.srivastava@kryptos.io; DPO: dpo@kryptos.io
  • Activities relevant to the data transferred under these Clauses: Provision of the Services to the Customer in accordance with the Agreement.
  • Signature and date: Signature and date are set out in the Agreement.
  • Role (Controller/Processor): Processor

B. DESCRIPTION OF TRANSFER

Categories of data subjects whose personal data is transferred

  • End users/customers of the application (individual users who sign up or interact with the service).

Categories of personal data transferred

  • Email address, Name (optional, provided by user), Person/User ID (optional, provided by user).

Sensitive data transferred (if applicable) and applied restrictions or safeguards that fully take into consideration the nature of the data and the risks involved, such as for instance strict purpose limitation, access restrictions (including access only for staff having followed specialized training), keeping a record of access to the data, restrictions for onward transfers or additional security measures.

  • No sensitive or special category data (as defined under GDPR, e.g., health, biometric, religious, or political data) is intentionally collected.

The frequency of the transfer (e.g., whether the data is transferred on a one-off or continuous basis).

  • Continuous basis

Nature of the processing

  • SaaS platform and API service for crypto financial data processing, tax compliance, and portfolio management.

Purpose(s) of the data transfer and further processing

  • The purpose of the transfer is to facilitate the performance of the Services more fully described in the Agreement and accompanying order forms. Data is processed to provide user authentication, account management, service delivery, and compliance with applicable data protection laws.

The period for which the personal data will be retained, or, if that is not possible, the criteria used to determine that period

  • Point-in-time recovery (PITR): 7 days. Scheduled backups: Daily backups retained for 15 days. Data deletion: Upon user request or account deletion, subject to backup retention cycle and legal retention obligations.

For transfers to (sub-) processors, also specify subject matter, nature, and duration of the processing

  • The subject matter, nature, and duration of the Processing are more fully described in the Agreement, Addendum, and accompanying order forms. Sub-processors including Google Cloud, Sendgrid, and Mixpanel process data as per their respective data processing agreements.

C. COMPETENT SUPERVISORY AUTHORITY

Data exporter is established in an EEA country. The competent supervisory authority is as determined by application of Clause 13 of the EU SCCs.

ANNEX II

TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA

Description of the technical and organisational security measures implemented by Kryptoskatt AB as the data processor/data importer to ensure an appropriate level of security, taking into account the nature, scope, context, and purpose of the processing, and the risks for the rights and freedoms of natural persons.

Security Management System

Organization. Kryptoskatt AB designates qualified security personnel whose responsibilities include development, implementation, and ongoing maintenance of the Information Security Program.

Policies. Management reviews and supports all security related policies to ensure the security, availability, integrity and confidentiality of Customer Personal Data. These policies are updated at least once annually.

Assessments. Kryptoskatt AB engages a reputable independent third-party to perform risk assessments of all systems containing Customer Personal Data at least once annually.

Risk Treatment. Kryptoskatt AB maintains a formal and effective risk treatment program that includes penetration testing (conducted monthly), vulnerability management (weekly scans), and patch management to identify and protect against potential threats to the security, integrity or confidentiality of Customer Personal Data.

Vendor Management. Kryptoskatt AB maintains an effective vendor management program with all sub-processors subject to written data processing agreements.

Incident Management. Kryptoskatt AB reviews security incidents regularly, including effective determination of root cause and corrective action. Incident response time expectation: less than 5 minutes.

Standards. Kryptoskatt AB operates an information security management system in compliance with SOC 2 Type II certification. ISO/IEC 27001:2022 certification is currently in process.

Personnel Security

Kryptoskatt AB personnel are required to conduct themselves in a manner consistent with the company's guidelines regarding confidentiality, business ethics, appropriate usage, and professional standards. Kryptoskatt AB conducts reasonably appropriate background checks on any employees who will have access to client data under this Agreement, including in relation to employment history and criminal records, to the extent legally permissible and in accordance with applicable local labor law, customary practice and statutory regulations.

Personnel are required to execute a confidentiality agreement in writing at the time of hire and to protect Customer Personal Data at all times. Personnel must acknowledge receipt of, and compliance with, Kryptoskatt AB's confidentiality, privacy and security policies. Personnel are provided with privacy and security training on how to implement and comply with the Information Security Program. Personnel handling Customer Personal Data are required to complete additional requirements appropriate to their role (e.g., certifications). Kryptoskatt AB's personnel will not process Customer Personal Data without authorization.

Access Controls

Access Management. Kryptoskatt AB maintains a formal access management process for the request, review, approval and provisioning of all personnel with access to Customer Personal Data to limit access to Customer Personal Data and systems storing, accessing or transmitting Customer Personal Data to properly authorized persons having a need for such access. Access reviews are conducted periodically to ensure that only those personnel with access to Customer Personal Data still require it.

Infrastructure Security Personnel. Kryptoskatt AB has, and maintains, a security policy for its personnel, and requires security training as part of the training package for its personnel. Kryptoskatt AB's infrastructure security personnel are responsible for the ongoing monitoring of Kryptoskatt AB's security infrastructure, the review of the Services, and for responding to security incidents.

Access Control and Privilege Management. Kryptoskatt AB's and Customer's administrators and end users must authenticate themselves via OAuth (Google OAuth for SSO) or via email and password authentication in order to use the Services. Multi-factor authentication (MFA) is available for users.

Internal Data Access Processes and Policies. Kryptoskatt AB's internal data access processes and policies are designed to protect against unauthorized access, use, disclosure, alteration or destruction of Customer Personal Data. Kryptoskatt AB designs its systems to only allow authorized persons to access data they are authorized to access based on principles of "least privileged" and "need to know", and to prevent others who should not have access from obtaining access. Kryptoskatt AB requires the use of unique user IDs, strong passwords, and carefully monitored access lists to minimize the potential for unauthorized account use. The granting or modification of access rights is based on: the authorized personnel's job responsibilities; job duty requirements necessary to perform authorized tasks; a need to know basis; and must be in accordance with Kryptoskatt AB's internal data access policies and training. Approvals are managed by workflow tools that maintain audit records of all changes. Access to systems is logged to create an audit trail for accountability.

Data Center and Network Security

Data Centers.

  • Infrastructure. Kryptoskatt AB uses Google Cloud as its primary data center platform.
  • Regions. Primary data storage: europe-west3 (Paris). Secondary/related region: eu-central1 (Frankfurt).
  • Resiliency. Multi Availability Zones are enabled on GCP and Kryptoskatt AB conducts Backup Restoration Testing on a regular basis to ensure resiliency.
  • Server Operating Systems. Kryptoskatt AB's servers are customized for the application environment and the servers have been hardened for the security of the Services. Kryptoskatt AB employs a code review process to increase the security of the code used to provide the Services and enhance the security products in production environments.
  • Disaster Recovery. Kryptoskatt AB replicates data over multiple systems and availability zones to help protect against accidental destruction or loss. Kryptoskatt AB has designed and regularly plans and tests its disaster recovery programs. Recovery Time Objective (RTO): less than 15 minutes. Recovery Point Objective (RPO): 1 to 5 minutes.
  • Security Logs. Kryptoskatt AB's systems have centralized logging enabled to support security audits, and monitor and detect actual and attempted attacks on, or intrusions into, Kryptoskatt AB's systems.
  • Vulnerability Management. Kryptoskatt AB performs regular vulnerability scans (weekly) on all infrastructure components of its production and development environment. Vulnerabilities are remediated on a risk basis, with Critical, High and Medium security patches for all components installed as soon as commercially possible.

Networks and Transmission.

  • Data Transmission. All transmissions in the production environment are transmitted via Internet standard protocols with TLS 1.3 encryption enforced.
  • External Attack Surface. GCP firewall rules and security policies are in place for the production environment.
  • Encryption in Transit. HTTPS/TLS 1.3 is enforced for all data in transit.
  • Encryption at Rest. Customer Personal Data is encrypted at rest using AES-256 encryption in Galois/Counter Mode (GCM). Encryption key management is handled via Google Cloud's Key Management Service (KMS). Keys are rotated periodically and access is restricted via IAM policies. No direct access to raw encryption keys is provided to application developers. Secure key exchange utilizes ECDHE_ECDSA for forward secrecy.
  • Incident Response. Kryptoskatt AB maintains incident management policies and procedures, including detailed security incident escalation procedures. Kryptoskatt AB monitors a variety of communication channels for security incidents, and Kryptoskatt AB's security personnel will react promptly to suspected or known incidents, mitigate harmful effects of such security incidents, and document such security incidents and their outcomes. Expected incident response time: less than 5 minutes.
  • Data Storage, Isolation, Authentication, and Destruction. Kryptoskatt AB stores data in Google Cloud's multi-region environment. Data, the Services database and file system architecture are replicated between multiple availability zones on GCP. Kryptoskatt AB logically isolates the data of different customers. A central authentication system is used across all Services to increase uniform security of data. Kryptoskatt AB ensures secure disposal of Client Data through the use of a series of data destruction processes. Backups are automated daily with 15-day retention, and point-in-time recovery is available for 7 days.

ANNEX III

LIST OF SUB-PROCESSORS

The controller has authorized the use of the following sub-processors:

Name of Sub-Processor Description of Processing Location of Processor
Google Cloud Platform (GCP) Hosting the Production Environment, Data Storage, Compute Resources, Key Management Service (KMS) EU data centers (Paris, Frankfurt)
SendGrid Email Service Provider for transactional and notification emails Europe
Mixpanel Analytics and event tracking for service improvement Europe
โœจ

Generate your Crypto Tax
Report in Minutes

5000+ Integrations
Portfolio Tracking
Lightning fast reports
Try Now for Free

Sign up to our newsletter

Stay up to date with the latest offers, news, announcements, and articles.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Products
TransactionsNFTDeFiPricing
Explore
IndividualsEnterpriseAccountantsDevelopers
Use cases
Personal FinanceBusiness FinanceMarket AnalysisPortfolio & Wealth ManagementTax & Accounting SoftwareTokenomics
Individuals
Portfolio TrackerIntegrationsCrypto Tax SoftwareCrypto Tax Reports
Resources
BlogTax GuidesEnterprise ResourcesFAQs
Countries
USA ๐Ÿ‡บ๐Ÿ‡ธUK ๐Ÿ‡ฌ๐Ÿ‡งFrance ๐Ÿ‡ซ๐Ÿ‡ท Germany ๐Ÿ‡ฉ๐Ÿ‡ชAustralia ๐Ÿ‡ฆ๐Ÿ‡บPartner with usOur InvestorsContact Us
About
Why KryptosCareersPartner with usOur InvestorsContact Us
Legal
DisclaimerPrivacy PolicyTerms of ServicesRefund PolicyCookie Consent
Support
FAQsContact Us
Developers
Quickstart
Kryptos logo
sourceforge user reviewsSOC 1 TYPE 1SOC2 TYPE 1SOC2 TYPE 1
English
dropdown arrow
Tax Guides
๐Ÿ‡บ๐Ÿ‡ธ USA Crypto Tax Guide๐Ÿ‡ฌ๐Ÿ‡ง UK Crypto Tax Guide ๐Ÿ‡ฆ๐Ÿ‡บ Australia Crypto Tax Guide๐Ÿ‡ฉ๐Ÿ‡ช German Crypto Tax Guide๐Ÿ‡ณ๐Ÿ‡ด Norway Crypto Tax Guide๐Ÿ‡ซ๐Ÿ‡ท France Crypto Tax Guide๐Ÿ‡ต๐Ÿ‡ฑ Poland Crypto Tax Guide๐Ÿ‡ฉ๐Ÿ‡ฐ Denmark Crypto Tax Guide๐Ÿ‡ธ๐Ÿ‡ช Sweden Crypto Tax Guide๐Ÿ‡จ๐Ÿ‡ฆ Canada Crypto Tax Guide๐Ÿ‡ซ๐Ÿ‡ฎ Finland Crypto Tax Guide๐Ÿ‡ณ๐Ÿ‡ฑ Netherland Crypto Tax Guide๐Ÿ‡ฏ๐Ÿ‡ต Japan Crypto Tax GuideFAQs
ยฉ 2026 Kryptos | ย All rights reserved