Data Security Policy for ZetBanker.com
Effective Date: 01-01-2025
At Zetbanker.com, we take the security of our users' data seriously. Our Data Security Policy outlines the practices and measures we implement to ensure the protection of sensitive information and maintain the highest standards of data integrity. This policy applies to all users of our website and app, including visitors, registered users, and customers.
1. Data Collection and Use
We collect and process personal information only when necessary for the operation of our services, including for user authentication, transaction processing, and user support. The data we collect may include, but is not limited to, user credentials, transaction details, and usage patterns. We will not collect more data than is needed for the intended purpose.
2. Data Storage and Access Control
- Database Storage: All data is securely stored in a master database developed by Microsoft and powered by the MSSQL Database. Access to the database is strictly controlled and restricted by the use of complex usernames and passwords.
- Access Restrictions: Only authorized personnel are permitted to access sensitive data, and access is granted based on a "least privilege" model.
3. Encryption and Data Protection
- Data Encryption: All stored data within our database is encrypted using the AES (Advanced Encryption Standard) algorithm. This ensures that data remains secure even if unauthorized access occurs.
- Data Transmission: Any data exchanged between our app/website and the database is transmitted using AES-encrypted communication to prevent unauthorized interception or alteration of data.
- API Security: All APIs used by our app/website are developed within the Dot Net Framework, which is known for its robust security features. Each API is further protected by multiple passwords, creating an additional layer of security.
4. Secure Communication and Server Protection
- SSL Encryption: We use Sectigo Secure SSL certificates to encrypt all communications between users and our server. This ensures that all data transmitted between your device and our website/app remains confidential and secure.
- Server Protection: The hosting server located in India is secured with firewalls, intrusion detection systems, and regular security patches to prevent unauthorized access or attacks.
5. Payment Security
- Payment Processing System: Our payment collection and disbursement system utilizes a 3-Tier Architecture along with block-wise verification to ensure the integrity and security of all payment transactions.
- Data Handling: All payment information is processed and stored securely, in compliance with industry standards for secure financial transactions.
6. Backup and Disaster Recovery
In the event of a system malfunction, data breach, or malicious attack, our organization is equipped with robust backup and disaster recovery capabilities. Our app and website are designed to restore systems to full functionality within a few hours, minimizing disruption and ensuring continuity of service.
7. User Rights and Data Access
Users have the right to request access to, correction of, or deletion of their personal data stored on our systems. We are committed to providing transparency and responding to such requests within a reasonable timeframe.
8. Third-Party Services
We may engage third-party services to assist with various aspects of our website/app operations. These third parties are required to comply with the same strict security protocols and data protection standards outlined in this policy.
9. Compliance with Regulations
We adhere to applicable data protection laws and regulations, including the General Data Protection Regulation (GDPR) and any other relevant privacy laws in the jurisdictions we operate.
10. Monitoring and Updates
We continuously monitor the security of our systems and update our security protocols as necessary. This includes regular security audits, patch management, and the adoption of new security technologies to address emerging threats.
11. Incident Response and Reporting
In the unlikely event of a data breach or security incident, we will notify affected users promptly and take appropriate measures to mitigate any potential harm. Our incident response team is trained to handle security incidents efficiently and in compliance with regulatory requirements.
12. Policy Review
This Data Security Policy will be reviewed periodically to ensure it remains aligned with best practices and regulatory requirements. Any updates to this policy will be communicated to users through appropriate channels.
Contact Information
For any questions or concerns regarding our Data Security Policy, or if you wish to exercise your rights regarding your personal data, please contact us at:
- Zet Banker
- Email: support@zetbanker.com
By using our website and services, you acknowledge that you have read, understood, and agree to the terms of this Data Security Policy.