Skip to main content
This guide explains the information ChainPatrol needs during onboarding and how to keep your organization’s data up to date for effective threat protection.

Overview

ChainPatrol protects your organization by monitoring for threats impersonating your brands, assets, and employees. To do this effectively, we need accurate and comprehensive information about:

Assets

All digital properties you own or manage

Brand Identity

Logos, trademarks, and brand terms

Legal Authorization

Documents that allow us to take action on your behalf
Keeping this information current ensures we can quickly identify and respond to threats while avoiding false positives.

What Information We Collect

Assets

We need to know about all digital properties associated with your organization:
  • Websites and web applications
  • Subdomains and development environments
  • Landing pages and marketing sites
  • Documentation and support portals
Important: When something is added to your organization, we automatically allowlist it so it doesn’t get accidentally blocked or taken down by our systems.

Brand Images and Visual Identity

We collect visual assets to help identify brand impersonation attempts:
  • Primary logo (all formats)
  • Secondary logo variations
  • Wordmarks and text-only versions
  • Monochrome versions
  • Icon-only versions
  • Primary color palette
  • Secondary colors
  • Hex codes and RGB values
  • Color usage guidelines
  • Icons and symbols
  • Patterns and textures
  • Typography and fonts
  • Other brand elements

Brand Terms and Trademarks

We monitor for unauthorized use of your:

Registered Trademarks

All marks registered with trademark offices

Product Names

Official names of your products and services

Taglines & Slogans

Marketing phrases associated with your brand

Common Misspellings

Variations that scammers might use
Before we can perform takedowns on your behalf, we need:
1

Power of Attorney (POA)

Authorizes ChainPatrol to perform takedowns in a narrow, specific capacity
2

Letter of Authorization (LOA)

Required specifically for Twitter/X takedowns
3

Supporting Documentation

Trademark certificates and business registration documents
These documents are required before we can enable takedown services for your organization.

Managing Your Organization’s Assets

Organization Assets Settings Page

You can add, remove, or modify assets directly from your organization’s settings:
1

Navigate to Settings

Go to Settings > Organization Assets
2

Add Assets

Click Add Asset to include new properties
3

Remove Assets

Select assets and click Remove to delete outdated entries
4

Search and Filter

Use the search and filter tools to find specific assets
5

Organize

Group assets to help organize by priority or type

API Management

For organizations with many assets or frequent updates, you can manage assets programmatically using our API:

API Documentation

Complete endpoint documentation

Generate API Keys

Create keys in Settings > API Keys

Batch Operations

Add or remove multiple assets in a single request
See our API Integration Guide for detailed instructions on programmatic asset management.

The Onboarding Process

Customer Information Sheet (CIS)

During onboarding, you’ll receive a Customer Information Sheet to fill out. This comprehensive form captures all the information listed above.
Best Practice: Don’t fill out the CIS alone. Share it with teams across your organization.

Teams to Involve

  • Brand campaigns and initiatives
  • Social media accounts
  • Creative assets and materials
  • Marketing domains and landing pages
  • Infrastructure domains
  • GitHub repositories
  • Developer tools and APIs
  • Staging and testing environments
  • Product names and features
  • Beta programs
  • Feature launches
  • Product documentation
  • Discord servers
  • Telegram groups
  • Community forums
  • Ambassador programs
Sometimes teams “squat” domains or social media handles for future use that leadership may not know about. A comprehensive internal review prevents these assets from being misidentified as threats.

Ongoing Allowlist Updates

We don’t just collect information once. ChainPatrol conducts frequent allowlist gathering throughout the year to:

Capture Growth

New assets as your organization grows

Remove Deprecated

Outdated or retired properties

Update Materials

Brand materials after refreshes

Add Team Members

New employees and team members
You’ll be notified when it’s time for an allowlist review, typically quarterly or after major organizational changes.

Document Security and Privacy

Your legal documents and sensitive information are handled with strict security measures:

Private Cloud Storage

All documents stored in encrypted, access-controlled cloud storage

Limited Access

Only authorized takedown staff and support can retrieve documents

Audit Trails

All document access is logged and monitored

Compliance

Following industry-standard security practices

Frequently Asked Questions

You should remove their email address and any personal accounts from your organization’s asset list. This can be done through the Settings page or API.
We recommend integrating asset management with your employee offboarding process.
Contact us immediately when planning a rebrand. We’ll work with you to:
  1. Add new brand assets to your allowlist
  2. Update visual identity materials
  3. Keep old brand assets protected during the transition period
  4. Eventually remove outdated assets after the transition is complete
Rebrand transitions typically require 30-90 days where both old and new assets are protected.
For acquisitions you make:
  • Add the acquired brand as a sub-brand in your organization
  • Include all their assets in your allowlist
  • Keep existing POA/LOA documents for the acquired entity
For being acquired:
  • Work with your new parent company to transfer ChainPatrol services
  • Legal documents may need to be updated to reflect the new ownership structure
  • Contact support@chainpatrol.io to coordinate the transition
If an asset you own is compromised (hacked, stolen credentials, etc.):
1

Immediately Notify ChainPatrol

Email support@chainpatrol.io or use your dedicated Slack channel
2

Remove from Allowlist

Remove the compromised asset so we can take action against it
3

Report the Compromise

Report through our platform so we can track and monitor the threat
4

Re-add After Recovery

Re-add the asset once you’ve regained control and secured it
We can respond quickly to compromised assets once notified, often taking them down within hours.
Yes! Organizations can have multiple brands, each with their own:
  • Asset lists
  • Brand identity materials
  • Protected terms
This is common for holding companies, investment firms, or organizations with multiple product lines.
We recommend reviewing your assets:
  • Quarterly: Regular check-ins to catch gradual changes
  • After launches: New products, campaigns, or initiatives
  • After reorganizations: Mergers, acquisitions, or restructuring
  • When prompted: We’ll notify you when it’s time for a scheduled review
When in doubt, include it. It’s better to have too many assets in your allowlist than to miss something.
Our team can help you refine your list during onboarding and ongoing reviews.

Ready to Get Started?

Schedule an onboarding call to begin protecting your organization