1
Quality of service
Our services are controlled by mailings of automatic type, but constantly monitored by our assistance.
2
Application security
Our security system prevents any Customer to access the data of another user.
3
Security of data
Communications and information of our users are encrypted and protected by SSL technology.
4
Database security
Our databases are protected by separate entrances and limited.
5
Access security
Our servers are located in protected environments and sterile degree of temperature and humidity controlled. The access is limited to a small number of employees.
Protection from outside Our network is protected by a firewall with intrusion detection systems.
6
Protection from outside
Our network is protected by a firewall with intrusion detection systems.
7
User Authentication
Each user must authenticate to access the reserved area with login and password.
8
Protection of customer data
Our clients are owners of their data that are not used for other purposes only after authorization by the User.
9
Saving
The data passing through our servers are saved and stored before being sent to these centers.