TrueLayer's security policy was designed to ensure that we never store any personally identifiable data.
There is no way for TrueLayer to identify an individual in their database. Your connected account will only be identifiable by TrueLayer by an access token that looks something like this:
eyJhbGciOiJSUzI1NiIsImtpZCI6IjE0NTk4OUIwNTdDOUMzMzg0MDc4MDBBOEJB
NkNCOUZFQjMzRTk1MTAiLCJ0eXAiOiJKV1QiLCJ4NXQiOiJGRm1Kc0ZmSnd6aEFl
QUNvdW15NV9yTS1sUkEifQ.eyJuYmYiOjE1NjIwNTg5NTAsImV4cCI6MTU2MjA2M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.nN24zPKL07KeIX69MwQ91jkQ
A5kG-9AjVGthQLZMNLHTTsYk5mXtaiWSCg5er3wbneUKYodffKju4fSZoB6gWUXo
FomvQrUmJdxOnaHpedQZaDTdkSIA1re3-0Vi9Bf5zVCY1OswBpf-4lN1PGSCXc64
lvqJIImESSWQucgvx2rsXdJb6Yc1B224MOx2XDKss5AYIhhqms9K6h1t3BQd0EqR
1hbrdo47bNrL8k6eA6g4wFZ1_ZJzVIllw8Um3SeEEVmIyioDUE_A9rjtMGvGNT05
n7BpHZNWoNnA_SzPvFP4n168SPKvoULinzjJMK51kfXulPFi-zf4k6MjJ80Grg
TrueLayer has designed it this way to ensure that no one can access your data without first exchanging a "key" to decrypt the access token for your details and gain access to the account.
The same logic is used when the account is deleted. A "key" needs to be provided by the application or service that the account is linked to remove the details.
More
Have a look at our security page for information on how we store and hold access tokens.
Comments
0 comments
Please sign in to leave a comment.