Contact us +30 22890 24550

SECURITY

DATA STORAGE AND SECURITY

Our store is hosted on Shopify Inc. They provide us with the online e-commerce platform that allows us to sell our products to you.

Your data is stored through Shopify’s data storage, databases and the general Shopify application. They store your data on a secure server behind a firewall.

To protect your personal information, we take reasonable precautions and follow industry best practices to make sure it is not inappropriately lost, misused, accessed, disclosed, altered or destroyed.

If you provide us with your credit card information, the information is encrypted using secure socket layer technology (SSL) and stored with a AES-256 encryption. Although no method of transmission over the Internet or electronic storage is 100% secure, we follow all PCI-DSS requirements and implement additional generally accepted industry standards.

 VIVA WALLET PAYMENT

The payments are being processed though the third-party payment provider,Viva Wallet, who meets all the security standards.

Analytically,Viva Wallet is fully PCI DSS compliant as a Level 1 Service Provider, which is the key security standard within the payments industry. As a principal member and licensed acquirer of Visa and MasterCard, we also adhere to the card schemes’ operating regulations. Viva Wallet is subject to yearly audits by a third party PCI Qualified Security Assessor, Visa, MasterCard and the banks we partner with.

www.vivawallet.com/en-be/security/

Information Security

Viva Wallet, focus on all aspects of information security for our systems, services and data, extending compliance requirements to offer a maximum level of safety, resilience and trust.

Our infrastructure implements multiple levels of protection using industry accepted mechanisms & best practices that ensure Availability (cloud infrastructure with DDOS protection, load balancing and DR configurations), Confidentiality (HTTPS & Point-to-point Encryption, use of certified Hardware Security Modules, strict key management controls, near real-time threat detection) and Integrity (transaction fingerprinting, database backups, access control, code review process).