All our transactions are in compliance of the PCI DSS Security Standard:

SECURE NETWORK AND SYSTEMS

1. We have Installed and maintain network security controls.
2. We apply secure configurations to all our system components.
 

ACCOUNT DATA PROTECTIONS

3. We use own technology to protect the temporally stored cardholder data.
4. We protect cardholder data with standard strong cryptography during transmission over open, public networks. Using al least SSL certificateswith 4096 bits keys.
 

VULNERABILITY MANAGEMENT PROGRAM

5. Our systems and networks are continually protected from malicious software.
6. Our systems and software are developed and maintained on securebasis.
 

STRONG ACCESS CONTROL MEASURES

7. System components and cardholder data have restricted access.
8. All users and authenticate access to system components are identified.
9. All physical access to cardholder data are restricted all the time.
 

MONITOR AND TEST NETWORKS

10. We always Log and monitor all access to system components and cardholder data.
11. We regularly Test security of systems and networks.
 

INFORMATION SECURITY POLICY

12. We have organizational policies and procedures that are oriented to support information security.
TOP