1) Data in Transit
Your data is most vulnerable when in transit. Communications between you and Check-Out are always secured in transit using HTTPS with SSL 256-bit encryption powered by ECDSA Signature with SHA-256.
2) Data Storage
Check-Out does not store your data at it’s locations. Your data is encrypted using AES-256
and access protected by 2 level security. No customer data or resources are exposed to the
public internet. We use an independent service that specializes in data storage and protection, the same service trusted by banks and medical services, and is SOC and ISO Compliant.
3) Company Security and Privacy Policies
Access to our users' data is strictly limited to a very small number of employees, who are
carefully screened and who have signed a non-disclosure agreement. Access is restricted by company policies to limit access to the bare minimum of data required, and only when required, to manage the Check-Out's services. Any third parties that are relied upon to provide a service necessary to deliver the Check-Out's services to you are covered by Non-Disclosure Agreements and are carefully vetted by us to ensure they have the same high level security and privacy standards.
4) Monitoring
Check-Out constantly monitors application servers, infrastructure, and the network
environment, constantly checking for any signs of bad actors and also to ensure the best performance and user experience. Security Audits are performed by an independent third party
testing firm to ensure that Check-Out remains at the forefront of data integrity and protection.
5) Data Back-Up
Data is backed-up on an ongoing daily basis and at multiple data centres to ensure your data is
never lost.
6) Credit Card Security
Check-Out does not itself process or store any of your payment information as our PCI DSS
Level 1 payment processor handles all payment data on our behalf.
7) Authorization and Access Control
Access to your data is protected with advanced firewalls, encryption and intrusion prevention systems.
8) Firewall and Intrusion Prevention
Advanced firewall and intrusion detection and prevention systems are used to guard against
unauthorized access.