Security Policy

1. Introduction

At Axiontic LTD, we take the security of your personal information and data seriously. We are committed to ensuring that your data is protected and kept secure from unauthorized access, breaches, or misuse. This Security Policy outlines the steps we take to protect the data you provide us and the security measures we implement across our systems.

2. Encryption and SSL Technology

We use Secure Socket Layer (SSL) technology to encrypt data transmitted between your browser and our servers. SSL ensures that all sensitive information, such as personal details and payment information, is encrypted and cannot be intercepted by unauthorized third parties during transmission.

You can verify that SSL is in use by checking for the “https://” in your browser’s address bar and a padlock symbol, indicating that your connection is secure.

3. Data Protection Measures

In addition to SSL encryption, we have implemented the following security measures to ensure the safety and confidentiality of your data:

  • Access Controls: Only authorized personnel have access to sensitive information. All access is restricted based on role and job requirements, ensuring that data is only accessible to those who need it.
  • Firewalls: We use firewall technology to prevent unauthorized access to our systems and to monitor incoming and outgoing traffic for potential threats.
  • Intrusion Detection Systems: We use systems that monitor and detect any unusual activity that could indicate a potential breach or threat to our systems. These systems help us identify and respond to threats in real time.
  • Regular Security Audits: We regularly audit our systems and security practices to ensure they meet current industry standards. This includes vulnerability testing and assessment of potential threats.

4. Data Storage and Access

All data collected and processed by Axiontic LTD is stored in secure servers with multiple layers of protection. Our servers are hosted in secure data centers with strict physical and digital access controls, ensuring the security of your data at all times.

Data access is limited to authorized staff and third-party service providers who are required to follow our strict security protocols and confidentiality agreements. We enforce strong password policies and multi-factor authentication for all individuals with access to our systems.

5. Third-Party Security

When we engage with third-party service providers (e.g., for hosting, analytics, or payment processing), we ensure that they comply with high security standards. We require all third-party providers to implement industry-standard security measures to protect any personal data they process on our behalf.

We regularly review the security measures and certifications of these third parties to ensure they meet our requirements.

6. Protection Against Data Breaches

While we take all necessary precautions to protect your data, no system is 100% secure. In the unlikely event of a data breach, we have procedures in place to promptly contain and mitigate the impact of the breach. This includes:

  • Immediate Assessment: We will quickly assess the nature and scope of the breach.
  • Notification: If your data has been compromised, we will notify you in compliance with applicable laws and regulations.
  • Corrective Action: We will take the necessary steps to prevent further breaches and ensure that any vulnerabilities are addressed.

7. User Responsibilities

While we take every precaution to ensure the security of your data, users also play a role in safeguarding their own information. We encourage you to:

  • Use Strong Passwords: Ensure that your passwords are unique and strong, with a combination of letters, numbers, and symbols. Avoid using the same password across multiple sites.
  • Keep Your Software Updated: Ensure that your browser, operating system, and any relevant software are kept up-to-date to protect against known vulnerabilities.
  • Avoid Phishing Scams: Be cautious of unsolicited emails or messages requesting personal information. Axiontic LTD will never ask for sensitive information such as passwords via email.

8. Compliance with Legal Requirements

We comply with all applicable data protection and security regulations, including the General Data Protection Regulation (GDPR), to ensure that your data is processed securely and transparently. This means that we adhere to stringent standards for data collection, storage, and processing, and provide you with the rights and information you need to make informed choices about your personal data.

9. Changes to This Security Policy

We may update this Security Policy from time to time in response to technological advancements, legal requirements, or changes in our business operations. We encourage you to review this policy regularly to stay informed about how we are protecting your data.

Any significant changes to this policy will be communicated to users through our website or other means, where appropriate.

10. Contact Us

If you have any questions or concerns about the security of your data, or if you suspect a security issue, please contact us immediately at:

Phone: +40 770 309 902

Emailoffice@axiontic.com

Scroll to Top

Let's drink a Coffee

Follow