Here are some security protocols
- strict authentication processes, all data is guarded by it
- Safe filtering, you can only access transaction data that is relevant to your program / partner
- Encrypted data - our database is encrypted at rest for safe data storage
- Alert monitoring - we have system monitoring + alerts in place when something unexpected happens
Comments
0 comments
Please sign in to leave a comment.