Customer Security

How do we keep our customers’ data secure?

  • Integrity of Data. Substantial measures are in place to deter unauthorized access to information and
    prevent malicious intent to access, modify or alter data.
  • Data Privacy. We are committed in ensuring the privacy of our valued clients. Should we ask you to provide certain information from our website or application, you can be assured that it will only be used in accordance with this policy. The information that we gather will be used for us to better understand your needs and help continuously improve or products and services.
  • User Authentication. Authentication controls are implemented ensuring that only authorized and registered users can access the system. Access of users to various modules and information are defined, thus limiting their access to approved security levels only. Passwords are required to follow specific complexity requirements.
  • Data Encryption. User passwords and other sensitive information are encrypted.
  • Time Stamping.To avoid tampering and backdating, all generated and processed documents are time stamped.
  • Intrusion and Detection. Firewall and antivirus protection systems are in place to ensure immediate detection and prevention of suspicious activities and potentially destructive information on the system. Alerts and monitoring tools are in place. Our servers and workstations are installed with anti-virus software and latest definitions are applied automatically. Data logs are regularly reviewed to ensure that the system is not compromised in any way.
  • Network and Access Controls. Strong security measures are in place to avoid unauthorized access to our technology infrastructure in order to prevent theft of critical information, deny services and compromise the confidentiality of data.
  • ncident Management. All incidents are properly investigated. It is our objective to track, manage and resolve all incidents and determine the root cause to avoid recurrence.
  • Integrity of Data. Substantial measures are in place to deter unauthorized access to information and
    prevent malicious intent to access, modify or alter data.
  • Data Privacy. We are committed in ensuring the privacy of our valued clients. Should we ask you to provide certain information from our website or application, you can be assured that it will only be used in accordance with this policy. The information that we gather will be used for us to better understand your needs and help continuously improve or products and services.
  • User Authentication. Authentication controls are implemented ensuring that only authorized and registered users can access the system. Access of users to various modules and information are defined, thus limiting their access to approved security levels only. Passwords are required to follow specific complexity requirements.
  • Data Encryption. User passwords and other sensitive information are encrypted.
  • Time Stamping.To avoid tampering and backdating, all generated and processed documents are time stamped.
  • Intrusion and Detection. Firewall and antivirus protection systems are in place to ensure immediate detection and prevention of suspicious activities and potentially destructive information on the system. Alerts and monitoring tools are in place. Our servers and workstations are installed with anti-virus software and latest definitions are applied automatically. Data logs are regularly reviewed to ensure that the system is not compromised in any way.
  • Network and Access Controls. Strong security measures are in place to avoid unauthorized access to our technology infrastructure in order to prevent theft of critical information, deny services and compromise the confidentiality of data.
  • ncident Management. All incidents are properly investigated. It is our objective to track, manage and resolve all incidents and determine the root cause to avoid recurrence.
How can I get in touch in case I
suspect fraud or a breach of my account?

If you suspect any breach or your account has been
compromised, contact us immediately at: