Security Policy
Leading technologies including encryption software are used to protect data and adhering to strict security standards are maintained to prevent unauthorized access.
All electronic storage and transmission of personal data are secured and stored with appropriate security technologies.
Our system is designed and developed with the first and ultimate intent to always protect the safety and integrity of all information and transactions.
We also adopt a variety of monitoring and review measures upon the security and integrity of our system, which include but are not limited to:
- Enhanced data-encryption methods.
- Anti-virus detection, prevention, and protection procedures.
- Firewall barriers.
- 24/7 surveillance and detection.