Security & Privacy
We are committed to protecting the privacy and security of your personal data and information. By using our services, you agree to the terms of this policy.
Data Security
Physical Security
All physical access points to company premises containing sensitive data will be secured using multifactor authentication and individual keyed doors. Access to server rooms and data storage facilities will be restricted to authorized personnel only. Surveillance cameras will monitor critical areas, and regular security audits will be conducted to ensure compliance with physical security protocols. In the event of any breach or suspicious activity, immediate action will be taken, including notifying appropriate authorities, and implementing necessary measures to mitigate risks.
Password & Credential Storage
Employees must adhere to strict password policies, including regular updates and complexity requirements. Multi-factor authentication will be enforced for accessing sensitive systems or data repositories. User credentials will be stored using secure encryption methods, and access privileges will be regularly reviewed and updated based on role changes or employee status. Any suspected compromise of passwords or credentials must be reported immediately for investigation and remediation.
Communication Security
All electronic communication channels, including email, messaging platforms, and file sharing services, will be encrypted using industry-standard protocols. Employees will receive training on identifying phishing attempts and other forms of social engineering attacks. Confidential information will only be shared through secure channels, and encryption will be applied to sensitive data both in transit and at rest. Regular audits will be conducted to ensure compliance with communication security standards.
Credit Card Security
Credit card information will be stored and processed in compliance with Payment Card Industry Data Security Standard (PCI DSS) regulations. Access to credit card data will be strictly limited to authorized personnel, and encryption will be applied to all transactions and storage systems. Regular security assessments and penetration testing will be conducted to identify and address vulnerabilities. Any suspected or confirmed breach of credit card data will be reported to relevant authorities and cardholders promptly, and appropriate steps will be taken to mitigate risks and prevent future incidents.
Maintaining Security
Employee Access & Security
Access to company systems is tailored to employees’ roles, with strict confidentiality and strong password protocols enforced. Unauthorized access attempts result in disciplinary action, including termination. Regular access reviews are conducted to ensure alignment with current job functions, and access permissions are promptly adjusted upon termination or role changes.
Our QA Approach
Quality assurance procedures are integrated into the software development lifecycle to identify and mitigate security vulnerabilities at every stage.
QA reports detailing identified vulnerabilities, their severity, and recommended remediation actions are communicated to relevant stakeholders for prompt resolution.
Report a Security Vulnerability
Employees encountering or suspecting a security vulnerability must promptly inform the designated security contact. Reports should be comprehensive, detailing the nature, potential impact, and evidence or steps to reproduce the vulnerability. Confidentiality is maintained, and reporters are protected from retribution. Upon receipt, our team evaluates and prioritizes the vulnerability, implementing necessary measures like patches, temporary fixes, or further investigation to mitigate risks effectively.
Offsite Pentest Hosting and Data Storage
Third-party penetration testing (pentesting) and data storage providers must comply with rigorous security and privacy standards set by the company. Before engagement, a comprehensive security assessment evaluates their capabilities, regulatory compliance, and past performance in safeguarding sensitive data. Pentesting activities are coordinated to minimize disruption, following agreed-upon rules. All data transmitted or stored by the provider must be encrypted both in transit and at rest, accessible only to authorized personnel. Regular audits and monitoring verify adherence to security protocols.
Privacy policy
Introduction
We are committed to protecting the privacy and security of your personal data and information. This Privacy Policy outlines our practices regarding the collection, use, and disclosure of your personal information. By using our services, you agree to the terms of this policy.
Scope
This policy applies to all personal data and information collected, processed, and stored by Leukart Design Company whether through our website, mobile applications, or any other means.
Collection of Personal Data
We collect personal data and information that you provide to us voluntarily when using our services. This may include, but is not limited to, your name, email address, phone number, house address, and payment information. We may also collect information automatically through cookies and similar technologies when you interact with our website or applications.
Use of Personal Data
We use the personal data and information we collect for the following purposes:
- Providing and improving our services
- Communicating with you about your account and our services
- Personalizing your experience
- Processing payments
- Analyzing usage trends and preferences
- Complying with legal obligations
Disclosure of Personal Data
We may disclose your personal data and information to third parties in the following circumstances:
- When requested by law
- We do not sell your personal information to third parties
Data Security
We take appropriate technical and organizational measures to protect your personal data and information against unauthorized access, alteration, disclosure, or destruction.
Retention of Personal Data
We retain your personal data for as long as necessary to fulfill the purposes outlined in this Privacy Policy, unless a longer retention period is required or permitted by law.
Your Rights
You have the right to:
- Access and update your personal information
- Receive a copy of your personal data in a structured, commonly used, and machine-readable format
To exercise any of these rights, please contact us using the information provided below.
Changes to this Policy
We may update this Privacy Policy from time to time to reflect changes in our practices or legal requirements. We will notify you of any material changes by posting the updated policy on our website or through other appropriate means.
Contact Us
If you have any questions or concerns about this Privacy Policy or our data practices, please contact us at [email protected]
Effective Date: 01.01.2024
By using our services, you acknowledge that you have read and understood this Privacy Policy and agree to be bound by its terms.