Compliance is not a checkbox. It is the schema.
Relyon was designed for regulators before they asked. Multi-tenant isolation, audit-grade traceability, and regulator alignment are not features bolted on — they are how the platform is built.
Tenant isolation, by design.
Every row in the database carries country and organisation. Every query is scoped. Every privileged read is logged.
Multi-country tenancy
country_id and organization_id on every row. Row-level security enforced in the database, not assumed in application code.
4-tier RBAC
Global, country, location, self. Per-country sub-roles. A country lead never sees another country's data — by construction.
Column-level encryption
Sensitive KYC fields are encrypted at the column with pgcrypto. Decryption requires explicit, audited access.
Append-only audit
Every state change, every payment, every privileged read is captured in an immutable audit trail. Forensics is not a project — it is a query.
TLS 1.3 everywhere
All traffic — public and internal — encrypted with TLS 1.3. Strict transport security. Modern cipher suites only.
Idempotent money paths
Every payment, refund, and settlement carries an idempotency key. Retries are safe. Double-charges are mathematically prevented.
Built for the markets we serve.
Ghana from day one — and engineered for the data-protection regimes of every market on our roadmap.
Ghana
- Bank of Ghana — payments and settlement
- National Insurance Commission — TPA operations
- Ghana Data Protection Act, 2012
Nigeria
- Central Bank of Nigeria — payments alignment
- NAICOM — insurance administration
- Nigeria Data Protection Act (NDPA)
Côte d'Ivoire
- BCEAO — UEMOA payments framework
- Loi 2013-450 — data protection
- WAEMU regional coordination
Kenya
- Central Bank of Kenya — payments framework
- Insurance Regulatory Authority
- Kenya Data Protection Act, 2019
Verifiable. Reproducible. Auditable.
30-day digital warranty
Every repair carries a digital warranty entry. Lookup by IMEI, serial, or job ID — at any hub, any time.
Parts provenance
From supplier purchase order to job consumption — every part is traceable. Counterfeit parts cannot enter the system unnoticed.
Multi-channel collection
MTN MoMo, Vodafone Cash, AirtelTigo Money, card, and bank transfer — all reconciled through an idempotent ledger.
Tenant-aware exports
Reports respect role and scope. A country lead exports country data. A cost-centre owner exports their cost centre. Nothing more.
Encrypted backups
Encrypted, versioned, geographically distributed backups. Tested restores on a defined cadence.
Incident response
A defined runbook for security events, with severity classification, communication templates, and post-mortem requirements.
Need a deeper review?
If you are a partner, regulator, or enterprise security lead — talk to us. We will share our security and compliance documentation.