|
|
|
|
Specials  |
|
|
|
|
|
|
|
 |
We, at allVoIP.gr, take the privacy and security
of our customers very seriously. We realise the importance of personal data confidentiality
and electronic transactions security. We have put a number
of technological protections in place to ensure that our transaction
process is extremely safe and that our customers' information is secure.
Specifically, the following methods are used:
- User login
User authentication is ensured by two codes: the entry code (e-mail or username) and
the password.
Whenever the users enter these codes they gain access to their personal
account in a secure environment. All users have the ability to modify their
personal password as frequently and as many times as they want. The only ones that
have access to these codes are the users that entered them and it is their responsibility
to maintain their privacy and confidentiality. Anybody who knows your password can enter
your personal account. If you lose your password or you suspect that others know it, you
must contact allVoIP.gr. You are strongly advised to modify your password frequently and
avoid using terms that are easy to guess.
- Ensuring confidentiality of sensitive data exchange
Sensitive information exchange between our customers and allVoIP.gr, is protected with
SSL-128bit encryption. This process is verified by Geotrust (RapidSSL), which is a company
that specializes in online security sevices.
- Automatic sign off
If, after logging-in to your account, you do not perform any activity within 20 minutes
you are automatically disconnected.
- Firewall
User interactions with allVoIP.gr is controlled and filtered by a firewall, allowing
use of certain services and prohibiting access to systems and databases
that contain confidential information about our customers and our company.
- Encryption
All sensitive information entered by users (passwords, addresses, telephone numbers,
credit card numbers etc.) is protected by SSL-128bit encryption. Data encryption means
that data is encoded before they are sent to the recipient, who - in order to read
them - use a key to decode them. Each time the users log in to allVoIP.gr, data transfer
between their computers and allVoIP.gr is encrypted by a 128-bit encryption key.
More specifically,
every time the users enter information, the browser installed on their computer encodes
the information using a 128-bit key and then sends it to allVoIP.gr. As soon as allVoIP.gr
receives the user information, the 128-bit key is used to decode the information. The same
encryption process is followed for information sent by allVoIP.gr to users.
- Privacy of transactions
Privacy of transactions is a very important issue. On-line commercial transactions (e-commerce)
are governed by the same laws and regulations that apply to all commercial transactions.
All information we receive from allVoIP.gr members is treated as confidential and we have
taken all necessary measures to protect its privacy. A few of these measures are the following:
- Limited authorized personnel have access to sensitive information provided by
allVoIP.gr customers and only whenever it is necessary in order to process their order.
- allVoIP.gr never shares customer information with third parties, unless a
written consent is provided by the customer or a court decision or public
authorities order obligates allVoIP.gr to do so.
- Whenever allVoIP.gr has to use third-party service providers for maintenance or
support purposes, the privacy and confidentiality of custome information is protected.
- The customers have the right to request a list of information that allVoIP.gr keeps
for them and to request the update of any information that changed.
- The customers are advised to handle their own personal accounts themselves and to guard
the privacy of their sensitive information.
In any case allVoIP.gr fully respects and understand the importance of privacy of customer
information and never shares this information with third parties. Any information that is
provided by allVoIP.gr members is only used for the processing of their orders, it is encrypted
and it is kept in databases where access is protected.
|
|
 |
|
|
|