Skip to main content
Trust & security

Compliance is not a checkbox. It is the schema.

Relyon was designed for regulators before they asked. Multi-tenant isolation, audit-grade traceability, and regulator alignment are not features bolted on — they are how the platform is built.

Architecture

Tenant isolation, by design.

Every row in the database carries country and organisation. Every query is scoped. Every privileged read is logged.

Multi-country tenancy

country_id and organization_id on every row. Row-level security enforced in the database, not assumed in application code.

4-tier RBAC

Global, country, location, self. Per-country sub-roles. A country lead never sees another country's data — by construction.

Column-level encryption

Sensitive KYC fields are encrypted at the column with pgcrypto. Decryption requires explicit, audited access.

Append-only audit

Every state change, every payment, every privileged read is captured in an immutable audit trail. Forensics is not a project — it is a query.

TLS 1.3 everywhere

All traffic — public and internal — encrypted with TLS 1.3. Strict transport security. Modern cipher suites only.

Idempotent money paths

Every payment, refund, and settlement carries an idempotency key. Retries are safe. Double-charges are mathematically prevented.

Regulatory alignment

Built for the markets we serve.

Ghana from day one — and engineered for the data-protection regimes of every market on our roadmap.

Ghana

  • Bank of Ghana — payments and settlement
  • National Insurance Commission — TPA operations
  • Ghana Data Protection Act, 2012

Nigeria

  • Central Bank of Nigeria — payments alignment
  • NAICOM — insurance administration
  • Nigeria Data Protection Act (NDPA)

Côte d'Ivoire

  • BCEAO — UEMOA payments framework
  • Loi 2013-450 — data protection
  • WAEMU regional coordination

Kenya

  • Central Bank of Kenya — payments framework
  • Insurance Regulatory Authority
  • Kenya Data Protection Act, 2019
Operational guarantees

Verifiable. Reproducible. Auditable.

  • 30-day digital warranty

    Every repair carries a digital warranty entry. Lookup by IMEI, serial, or job ID — at any hub, any time.

  • Parts provenance

    From supplier purchase order to job consumption — every part is traceable. Counterfeit parts cannot enter the system unnoticed.

  • Multi-channel collection

    MTN MoMo, Vodafone Cash, AirtelTigo Money, card, and bank transfer — all reconciled through an idempotent ledger.

  • Tenant-aware exports

    Reports respect role and scope. A country lead exports country data. A cost-centre owner exports their cost centre. Nothing more.

  • Encrypted backups

    Encrypted, versioned, geographically distributed backups. Tested restores on a defined cadence.

  • Incident response

    A defined runbook for security events, with severity classification, communication templates, and post-mortem requirements.

Need a deeper review?

If you are a partner, regulator, or enterprise security lead — talk to us. We will share our security and compliance documentation.