Home Managed Account
Open An Account Blog FAQ Contact Us

Privacy Policy

ICM Option are committed to the security of the information which you submit to the company. ICM Option may acquire this information during the course of providing its services. It is the Company’s policy not to disclose customer’s information to non-affiliated third parties, except with the consent of the customer or when required by law. The Company is providing this Privacy Policy to help you understand how we protect the privacy of your financial and other non-public personal information.

We restrict access of non-public personal information about our customers to those employees who need to know such information in order to provide service to your account. We maintain physical, electronic and procedural safeguards, which comply with all applicable laws, in order to safeguard your non-public personal information.

We shall not sell or rent your personal information to third parties for any purposes, without your explicit consent, and we shall only use your information as described in our Privacy Policy. Any change in Client’s identifying details must be notified to the Company immediately.

As a precondition for performing Transactions at the Site, Client may be asked to provide certain identifying documents and any other documents required by the Company. If such documents are not provided, the Company can, on its sole discretion, freeze the Client’s Account for any period of time as well as permanently close the Account. Without prejudice to the above, the Company may, at its sole discretion, refuse to open an Account for any person or entity and for any reason, or no reason.

The Company will take measures to implement advanced data protection procedures and to update them from time to time for purpose of safeguarding the Client’s private information and Accounts.

Any use of the Site with the Client’s username and password is the Client’s sole responsibility. The Company shall not be held responsible for any such use, including for validation that the Client is actually operating in his/her Account. ICM Option views its customers’ information security as being of the utmost importance, and therefore invests considerable resources for protecting customers’ information securely.

Ensuring authorized access only, ICM Option uses two layers of top class firewall protection: one at the server level and one at the application level.

For user authentication and data transfer, ICM Option uses an advanced SSL by Verisign.
The application servers (the servers that handle our clients’ online activity) are separated from the transaction information, this is stored on a different data server. For data recovery, integrity and replication, ICM Option uses two different server farms, physically located apart from each other. Data must be synchronized in both locations, and thus cannot be tampered with. All of the information on the servers is encrypted.

Data exchange

The common method for securing the exchange of data is to encrypt it. Encryption means that the data transferred over the communication line is encoded in a special way at the sending end, and decoded using the same algorithm in reverse at the receiving end. The data that goes through the communication channel is meaningless to an eavesdropper, even if he does succeed in intercepting the data. Unless the eavesdropper can decode the data, he cannot read it. The encryption strength is dependent upon the length of the encryption key. The key that is used to encrypt/decrypt the data is a very long number. The longer the number, the harder it is, exponentially, to decode the data. Lengths of keys vary between 32, 64, 128, 256 bit and so on. The minimum length for good security is 64-bit. The problem with selecting a very long key is the computing power that is required to encode/decode the message. So selecting a very long key can mean slow processing time. Privacy and data integrity have their own software protocols but are generally handled in the same way as described above.

Personal Information

You will access the system by entering a username and password. This data is personal and must not be divulged to others. While logging into the system using your personal identifying details, it is recommended that no unauthorized persons are in your vicinity who can view this information. Your personal password must never be divulged to others, not even to service personnel. If anyone requests your password, do not disclose it and immediately notify customer service.