+353 857317051

Usage Policy

Proper use guidelines for Electropal hardware key storage devices, compliance requirements, and user responsibilities.

Last updated: September 12, 2024

1. Purpose and Limitations

Electropal hardware devices are designed exclusively for offline private key storage and management. Our products comply with all specified requirements and provide secure custody solutions for cryptocurrency and NFT private keys.

Key Storage Functionality Only

Our hardware wallets are engineered specifically for private key custody and do not provide any of the following services:

  • Cryptocurrency buying, selling, or exchange services
  • Trading platform integration or functionality
  • Market analysis or investment advice
  • Automated trading or portfolio management
  • Cryptocurrency conversion or swap services
  • Direct connection to trading exchanges
  • Price tracking or market data services
  • Investment recommendations or financial advice

This focused approach ensures minimal attack surface and maintains compliance with regulatory requirements while providing robust offline key storage capabilities.

2. Security Architecture and Implementation

Our devices implement comprehensive security measures designed to enhance the protection of private keys through offline storage solutions.

Isolated Secure Element Technology

Each Electropal device features an isolated secure-element chip that operates independently from internet connectivity:

  • No Permanent Internet Connection: The secure element never maintains persistent internet connectivity, ensuring private keys remain offline
  • Hardware-Level Isolation: Private keys are generated and stored within the secure element, isolated from the main processor
  • Tamper-Resistant Design: Physical security measures designed to detect and respond to tampering attempts
  • Certified Security Standards: Secure elements meet Common Criteria EAL6+ certification standards
  • Air-Gap Architecture: Critical operations occur without network connectivity to minimize remote attack vectors
  • Secure Boot Process: Verified boot sequence ensures firmware integrity and authenticity
  • Hardware Random Number Generation: True random number generation for cryptographic key creation

Multi-Layer Authentication System

Our devices implement multiple authentication layers to enhance access security:

  • PIN Protection: User-defined PIN code required for device access and transaction authorization
  • Optional Passphrase: Additional passphrase layer for enhanced security (25th word)
  • Seed Phrase Backup: BIP39-compliant mnemonic seed phrase for key recovery and backup
  • Biometric Authentication: Fingerprint recognition on supported models for convenient access
  • Time-Based Lockouts: Progressive delays after incorrect PIN attempts
  • Factory Reset Protection: Secure wipe functionality to protect against unauthorized access

Open Source Firmware and Auditing

Transparency and verifiability are core principles of our security approach:

  • Open Source Code: Firmware source code is publicly available for independent review and verification
  • Independent Security Audits: Regular third-party security assessments by recognized cybersecurity firms
  • Community Verification: Global cryptographic community can review and validate security implementations
  • Reproducible Builds: Firmware builds can be independently reproduced and verified
  • Vulnerability Disclosure Program: Responsible disclosure process for security researchers
  • Regular Security Updates: Timely firmware updates to address identified vulnerabilities
  • Cryptographic Standards: Implementation of industry-standard cryptographic algorithms and protocols

3. Legal Requirements and Compliance

Electropal devices comply with applicable regulations while maintaining focus on key storage functionality.

Device Regulatory Compliance

Our hardware devices meet the following regulatory standards:

  • CE Marking Compliance: Certified for European consumer electronics standards
  • Irish Manufacturing Standards: Compliant with Irish electronic device manufacturing regulations
  • EMC Compliance: Electromagnetic compatibility testing and certification
  • Safety Standards: IEC 62368-1 safety standards for electronic equipment
  • Environmental Compliance: RoHS and WEEE directive compliance for environmental protection
  • Quality Management: ISO 9001 quality management system implementation

KYC/AML Exemption for Hardware Devices

Important clarification regarding regulatory requirements:

  • Device Exemption: The hardware device itself is not subject to Know Your Customer (KYC) or Anti-Money Laundering (AML) requirements
  • Manufacturing Compliance: We comply with device manufacturing and safety regulations
  • No Financial Services: As we do not provide financial or trading services, financial services regulations do not apply to the device
  • User Responsibility: Users remain responsible for compliance with their local cryptocurrency regulations

User Legal Responsibilities

Users must ensure compliance with applicable laws in their jurisdiction:

  • Local Cryptocurrency Laws: Compliance with local regulations regarding cryptocurrency ownership and use
  • Import/Export Regulations: Adherence to customs and import regulations for electronic devices
  • Tax Obligations: Proper reporting of cryptocurrency holdings and transactions as required by local tax authorities
  • Sanctions Compliance: Ensuring use does not violate international sanctions or embargoes
  • Licensing Requirements: Obtaining any required licenses for cryptocurrency activities in their jurisdiction
  • Record Keeping: Maintaining appropriate records for tax and regulatory compliance
  • Professional Advice: Seeking legal and tax advice regarding cryptocurrency regulations in their jurisdiction

4. Risk Disclosure and Liability Limitations

Users must understand the inherent risks associated with cryptocurrency key storage and our liability limitations.

Seed Phrase Security and Recovery

Critical information regarding seed phrase management:

  • Permanent Loss Risk: Loss of the seed phrase results in permanent and irreversible loss of all stored cryptocurrency assets
  • No Recovery Capability: Electropal cannot restore, recover, or regenerate lost private keys or seed phrases
  • User Responsibility: Users are solely responsible for secure backup and storage of their seed phrases
  • Multiple Backup Copies: We recommend creating multiple secure backup copies stored in different locations
  • Physical Security: Seed phrases should be stored securely offline, protected from theft, fire, and water damage
  • No Digital Storage: Seed phrases should never be stored digitally or transmitted electronically
  • Verification Testing: Users should verify their backup by testing recovery before storing significant amounts

Market Value and Investment Risks

Important disclaimers regarding cryptocurrency investments:

  • No Market Value Responsibility: Electropal is not responsible for cryptocurrency market value fluctuations or investment losses
  • Volatility Risk: Cryptocurrency values can fluctuate significantly and may result in substantial losses
  • No Investment Advice: Our products and services do not constitute investment advice or recommendations
  • User Investment Decisions: All investment decisions are made solely by the user at their own risk
  • No Performance Guarantees: We make no guarantees regarding investment performance or returns
  • Regulatory Changes: Cryptocurrency regulations may change and affect the value or legality of holdings

Technical Limitations and Risks

Understanding the technical limitations of hardware key storage:

  • Hardware Failure Risk: Electronic devices may fail due to manufacturing defects, wear, or damage
  • Firmware Vulnerabilities: Despite security measures, firmware may contain undiscovered vulnerabilities
  • User Error Risk: Incorrect usage, configuration, or key management may result in asset loss
  • Network Compatibility: Device compatibility with specific cryptocurrency networks may change over time
  • Technology Evolution: Cryptographic standards and security requirements may evolve, potentially affecting device security
  • Physical Damage: Physical damage to the device may result in inability to access stored keys

5. Setup and Support Guidelines

Proper device setup and ongoing support procedures to ensure secure operation.

Device Authentication and Setup

Essential steps for secure device initialization:

  • Authenticity Verification: Verify device authenticity using provided security seals and verification procedures
  • Firmware Verification: Confirm firmware authenticity and integrity before first use
  • Secure Environment: Perform initial setup in a secure, private environment free from surveillance
  • Offline Key Generation: Ensure private keys are generated offline without internet connectivity
  • Seed Phrase Recording: Carefully record and verify the generated seed phrase using provided materials
  • PIN Configuration: Set a strong, unique PIN that is not easily guessable
  • Recovery Testing: Test device recovery using the seed phrase before storing significant amounts
  • Secure Storage: Store the device and backup materials in secure, separate locations

Firmware Updates and Maintenance

Maintaining device security through proper updates and maintenance:

  • Regular Updates: Install firmware updates promptly to address security vulnerabilities
  • Update Verification: Verify firmware update authenticity before installation
  • Backup Before Updates: Ensure seed phrase backup is secure before performing updates
  • Update Notifications: Subscribe to security notifications for important updates
  • Version Tracking: Keep records of firmware versions and update history
  • Rollback Procedures: Understand rollback procedures in case of update issues

Network Compatibility and Support

Understanding supported networks and compatibility:

  • Supported Networks: Verify cryptocurrency network compatibility before use
  • Network Updates: Stay informed about changes to supported cryptocurrency networks
  • Derivation Paths: Understand proper derivation paths for different cryptocurrency types
  • Address Formats: Verify correct address formats for each supported network
  • Transaction Verification: Always verify transaction details on the device screen
  • Network Fees: Understand network transaction fees are separate from device functionality

Support Channels and Resources

Available support resources for device users:

  • Technical Documentation: Comprehensive user manuals and technical guides
  • Phone Support: Direct phone support for technical issues and questions
  • Email Support: Email support for non-urgent inquiries and documentation
  • Security Advisories: Regular security updates and vulnerability notifications
  • Community Resources: Access to user community and knowledge base
  • Warranty Support: Hardware warranty coverage and replacement procedures
  • Training Materials: Educational resources for secure cryptocurrency storage practices

6. Advertising and Marketing Compliance

Our marketing and advertising practices comply with platform requirements and regulatory standards.

Google Ads Compliance

Our advertising strictly adheres to Google Ads requirements for cryptocurrency-related products:

  • Key Storage Focus: All advertising promotes only key storage functionality and hardware features
  • No Trading Services: Advertisements explicitly exclude any mention of trading, buying, selling, or exchange services
  • Legal Limitations Disclosure: All ads clearly disclose legal limitations and user responsibilities
  • Compliance Statements: Advertisements include appropriate compliance and regulatory statements
  • Risk Disclosures: Marketing materials include appropriate risk warnings and disclaimers
  • Factual Claims: All advertising claims are factual, verifiable, and supported by evidence
  • No Investment Advice: Marketing materials explicitly disclaim investment advice or recommendations

Marketing Content Standards

Our marketing content maintains high standards of accuracy and compliance:

  • Accurate Representations: All product descriptions accurately represent device capabilities and limitations
  • Clear Disclaimers: Prominent disclaimers regarding risks, limitations, and user responsibilities
  • No Misleading Claims: Marketing avoids misleading or exaggerated security claims
  • Educational Focus: Content emphasizes education about secure key storage practices
  • Regulatory Compliance: All marketing materials comply with applicable advertising regulations
  • Professional Standards: Marketing maintains professional standards appropriate for security products

Contact Information

For questions about this Usage Policy or our products, please contact us:

Email: info@electropal.ie

Phone: +353 857317051

Address: 27 Castlewood Avenue, Rathmines, Dublin 6, D06 E7T3, Ireland

Support Hours: Monday-Friday, 9:00 AM - 5:00 PM GMT