Privacy and Security

At AB Handshake, we remain committed to security and privacy. Our objectives center on crafting state-of-the-art, secure products while upholding superior privacy standards. We stand at the intersection of technological innovation and privacy, upholding values that include clear and effective communication, reliability, and adherence to legal requirements. For us, security and privacy aren’t just priorities, they’re the foundation from which we develop our innovative solutions and products, all designed to meet and exceed privacy benchmarks.

1. PRIVACY POLICY

Our Privacy Policy outlines the types of data we collect, the ways in which we process it, and its usage.

Read the Policy

3. INFORMATION SECURITY POLICY

Review our comprehensive approach to high-level information security through this policy.

Read the Policy

4. DATA PROTECTION POLICY

Access our principal policy on personal data protection and learn about our commitment to safeguarding your information.

Read the Policy

5. SECURITY AND PRIVACY MEASURES

We apply all comprehensive and standard security measures, including data encryption and unauthorized access protection, alongside regular audits and monitoring to spot any potential threats. These measures ensure the utmost security and confidentiality of your data.

5.1. Physical Security

Utilization of secure data centers in America and Europe provides suitably high levels of physical security for both data and equipment. Consequently, infrastructure resilience is achieved.

5.2. Access Control Management

We implement access control and right management systems, coupled with secure communication channels for remote access, to safeguard against unauthorized use of data processing systems.

5.3. Traffic Encryption

Strong encryption techniques are utilized to secure SMS and voice data, both in transit and when stored, guaranteeing confidentiality and integrity.

5.4. Multi-Factor Authentication

To strengthen security for data processing centers and crucial systems, such as SMS and voice message processing systems, we employ multi-factor authentication. This approach prevents unauthorized access and is guided by the principle of least privilege.

5.5. Security Monitoring Systems

We use monitoring systems to identify anomalies in network traffic and quickly respond to potential security incidents.

5.6. Regular Security Audits

Periodic security audits are conducted to identify and mitigate any possible weaknesses in infrastructure and applications.

5.7. Traffic Filtering

Traffic filtering systems are utilized to intercept malicious data and block network-level attacks.

5.8. Account Management Policy

A stringent policy for managing accounts is in place, encompassing regular password changes and the management of access rights.

5.9. Protection Against Phishing and Social Engineering

Employee training programs are implemented to improve the identification and prevention of phishing and social engineering attacks, strengthening the human aspect of security.

5.10. Data Backup and Recovery

Regular data backups, including communications, are created, with subsequent testing of recovery processes to ensure reliable restoration in the event of an incident.

5.11. Software Updates

Operating systems, server software, and applications are quickly updated to mitigate known vulnerabilities and maintain the overall stability of the security system.

5.12. Vendor Assessment

Security evaluations of third-party vendors are carried out to verify their compliance with our security standards, incorporating security obligations into supplier contracts.

6. SUB-PROCESSORS

Check the list of sub-processors we work with to securely manage your personal data.

View List of Sub-Processors

7. DO NOT SELL OR SHARE MY PERSONAL DATA

Your privacy is important to us. Selecting 'Do Not Sell or Share My Personal Information' allows you to manage the use of your information and guarantees it won’t be sold to third parties. In line with the California Consumer Privacy Act (CCPA), we are committed to honoring your rights, offering clear choices, and ensuring transparency in our data practices.

Do Not Sell or Share My Personal Information

8. CONTACT US

Should you have any questions or issues related to privacy and security, feel free to contact us:

1) For questions regarding privacy, contact: privacy@abhandshake.com

2) For questions regarding security, contact: security@abhandshake.com

3) Alternatively, mail us at: 66 West Flagler Street, Suite 900 — #2329, Miami, FL, USA, 33130

If you wish to make use of your privacy rights or gain further insight into our approach to the handling of personal data, please fill out the form provided below. Additional information about your rights and guidance on exercising them can be found in our Privacy Policy.

The information submitted through this form will be used exclusively to enable the processing of your request and will be managed in compliance with applicable data protection laws and regulations.

Submit a request

For myself
For someone else
*
*
*
*

If the information provided is not enough to identify you or your request will require additional verification of your identity in order to prevent fraud, we will contact you via email to request additional details. We try to process your request as quickly as possible, the maximum processing time will be no more than 30 days. If you still have questions, you can contact us at  privacy@abhandshake.com