1. Our Approach To Data Security
Izam Inc (“the Company”, “we, “us” or “our”) is committed to providing our customers with suitable protections for their personal and financial information submitted by them to the website.
2. The Purpose Of This Data Security Statement
The purpose of this Data Security statement is to describe how data security is implemented, to illustrate the overall commitment to data security issues within the Company and is not intended as a stand-alone document. It is supported by detailed internal process operating procedures to form a set of working documents, which define the Company’s security activities.
3. Methods Of Protection
Access ControlYou have the right to include as many users to the Application, as the Company may allow from time to time, however, you or the party responsible for managing the Personal User Account is responsible to maintain secure records of the username and password at all times to avoid unauthorized access.
Password SecurityWe use industry standard one-way password encryption to protect User passwords on the website.
Secure Data CentresThe Company uses off site data centers that have strict physical access controls. These controls include 24/7/365 monitoring and surveillance; and on site security staff.
Credit Card SafetyWe do not store your credit card information and this information is transmitted securely between you and our third party providers, based on your preferred payment method (PayPal, Authorize.net, Stripe, etc.).
Security Testing and MonitoringThe Company’s security team continuously monitors security systems, event logs, notifications and alerts from all systems to identify and manage threats.
BackupsWe keep full backups of each database on the following basis: one hourly back up every day, one daily for seven days and one a week for four weeks.
Independent Security AuditsThe Company is regularly audited by independent companies to perform audits and penetration tests. Our security team receives the results and takes appropriate corrective measures whenever it is necessary.
4. Reporting Security Vulnerabilities
If you need to report a security vulnerability please contact us here. These reports are treated with high priority and the problem is immediately assessed and solved by the Company’s security team.