How secure is your platform

Information Security at Prezzee

 

At Prezzee, we don’t just say that we take information security seriously, we actually take all the required steps to stand by this commitment. Among many other principles, we prioritise “least privilege”, “need to know”, “secure by design”, and “defence in depth” to deploy risk-commensurate security controls to appropriately protect all information through its lifecycle.

 

  1. We only collect the information we need, to provide optimal services to our customers and partners
  2. We only use encrypted channels to collect information from our senders, or to transfer data to the third-party systems we use to provide our services
  3. We store all information in an industry leading Cloud platform which holds various reputed security certifications such as ISO/IEC 27001:2013, ISO/IEC 27017:2015, ISO/IEC 27018:2014, ISO/IEC 9001:2015, CSA STAR CCM v3.0.1, PCI DSS Level 1, etc. Our storage systems use the latest industry standard encryption and hashing algorithms; we don’t use any deprecated algorithm or cipher
  4. All information remains encrypted even when it travels between our various processing engines
  5. Only authorised employees have access to only the information they need to perform their roles, and such accesses are reviewed regularly to avoid access creep
  6. We do not share any personally identifiable information with any third-party service provider for any purpose other than for the purpose of providing our services. For more details, please refer to our privacy policy
  7. After validating the accuracy of the information stored in our storage systems, we securely destroy the files/media that may have been used to transmit that information to us

 

Where does Prezzee store your data

We store all information in an industry leading Cloud platform (Amazon Web Servers) which holds various reputed security certifications such as ISO/IEC 27001:2013, ISO/IEC 27017:2015, ISO/IEC 27018:2014, ISO/IEC 9001:2015, CSA STAR CCM v3.0.1, PCI DSS Level 1, etc. Our storage systems use the latest industry standard encryption and hashing algorithms; we don’t use any deprecated algorithm or cipher

Have more questions? Submit a request

0 Comments

Please sign in to leave a comment.