At AB Handshake, we remain committed to security and privacy. Our objectives center on crafting state-of-the-art, secure products while upholding superior privacy standards. We stand at the intersection of technological innovation and privacy, upholding values that include clear and effective communication, reliability, and adherence to legal requirements. For us, security and privacy aren’t just priorities, they’re the foundation from which we develop our innovative solutions and products, all designed to meet and exceed privacy benchmarks.
1. PRIVACY POLICY
Our Privacy Policy outlines the types of data we collect, the ways in which we process it, and its usage.
3. INFORMATION SECURITY POLICY
Review our comprehensive approach to high-level information security through this policy.
4. DATA PROTECTION POLICY
Access our principal policy on personal data protection and learn about our commitment to safeguarding your information.
5. SECURITY AND PRIVACY MEASURES
We apply all comprehensive and standard security measures, including data encryption and unauthorized access protection, alongside regular audits and monitoring to spot any potential threats. These measures ensure the utmost security and confidentiality of your data.
5.1. Physical Security
Utilization of secure data centers in America and Europe provides suitably high levels of physical security for both data and equipment. Consequently, infrastructure resilience is achieved.
5.2. Access Control Management
We implement access control and right management systems, coupled with secure communication channels for remote access, to safeguard against unauthorized use of data processing systems.
5.3. Traffic Encryption
Strong encryption techniques are utilized to secure SMS and voice data, both in transit and when stored, guaranteeing confidentiality and integrity.
5.4. Multi-Factor Authentication
To strengthen security for data processing centers and crucial systems, such as SMS and voice message processing systems, we employ multi-factor authentication. This approach prevents unauthorized access and is guided by the principle of least privilege.
5.5. Security Monitoring Systems
We use monitoring systems to identify anomalies in network traffic and quickly respond to potential security incidents.
5.6. Regular Security Audits
Periodic security audits are conducted to identify and mitigate any possible weaknesses in infrastructure and applications.
5.7. Traffic Filtering
Traffic filtering systems are utilized to intercept malicious data and block network-level attacks.
5.8. Account Management Policy
A stringent policy for managing accounts is in place, encompassing regular password changes and the management of access rights.
5.9. Protection Against Phishing and Social Engineering
Employee training programs are implemented to improve the identification and prevention of phishing and social engineering attacks, strengthening the human aspect of security.
5.10. Data Backup and Recovery
Regular data backups, including communications, are created, with subsequent testing of recovery processes to ensure reliable restoration in the event of an incident.
5.11. Software Updates
Operating systems, server software, and applications are quickly updated to mitigate known vulnerabilities and maintain the overall stability of the security system.
5.12. Vendor Assessment
Security evaluations of third-party vendors are carried out to verify their compliance with our security standards, incorporating security obligations into supplier contracts.
6. SUB-PROCESSORS
Check the list of sub-processors we work with to securely manage your personal data.
8. CONTACT US
Should you have any questions or issues related to privacy and security, feel free to contact us:
1) For questions regarding privacy, contact: privacy@abhandshake.com
2) For questions regarding security, contact: security@abhandshake.com
3) Alternatively, mail us at: 66 West Flagler Street, Suite 900 — #2329, Miami, FL, USA, 33130
If you wish to make use of your privacy rights or gain further insight into our approach to the handling of personal data, please fill out the form provided below. Additional information about your rights and guidance on exercising them can be found in our Privacy Policy.
The information submitted through this form will be used exclusively to enable the processing of your request and will be managed in compliance with applicable data protection laws and regulations.