Security

Back

General

Reliability and safety are essential for managing records via the Internet. Information security is our top priority. We do everything we can to keep your data confidential and use the most advanced security methods and the strongest encryption systems that are cleared for civil use on the Internet.

The information security in the system is intended to provide for identification of the customer and encryption of identification data and records that are transferred in the process

As a rule, during every login to the service, you shall be asked to enter your email and password. Every such login will involve verification and confirmation of data. Your personal email and password are permanent and will identify you whenever you log in

Note!

Never give your password to another person. You shall never be requested by us to give your personal password by telephone. Even if you get a request to give your personal password, do not give it!

Before entering the username, code and password, it is important to ensure that the communication is secure, i.e. that the key / padlock (according to your browser) appears at the bottom of the screen.

Encryption

The communication between your browser and the server is encrypted and secured using modern, strict encryption methods and using encryption methods that are standards for information encryption in the Internet world. Secure contact prevents exposure of the information to other Web users. When browsing the login screen, you must ensure that the closed padlock logo appears at the bottom of your browser window. This logo indicates that the data transferred from your computer to the server is encrypted. It is very important to check for the padlock logo starting from the login screen but also after logging in!

Using “Explorer”, the padlock looks like this:

When the communication is not secure, the key appears broken and the padlock is open accordingly. Double clicking the padlock logo displays a digital certificate that indicates that you are on the correct site.

Server security

We do everything to keep your data secret: Constant supervision and control of all of the communications with the service via the Internet and regular updates on technological developments in software and hardware fields for providing our customers the best possible protection against intrusion or hacking.

Saving report

You may save the results of the various messages that are displayed on the site using the Save Report button. The report is saved to the selected filter, and includes the data displayed in the system.

For your information: The access to the saved information page is at the level of security of your own computer. For your information, the information in your computer may be modified using an HTML page editor.

Debit by credit card

Debiting is performed at the highest security level.

Collection is performed using a clearing system that ensures high reliability when performing online transactions. The data is transferred in an encrypted format and is secured at high standards (ssl).

Collection is performed using the acquiring system Tranzila.

Image Wait