Security Policy
1. GDPR compliance
Precoro is a fully GDPR compliant service. Read more about our Privacy Policy here.
2. End-to-end Security
Precoro is hosted on DigitalOcean servers, providing end-to-end security and privacy features built-in. Our team takes additional proactive measures to ensure a secure infrastructure environment. For additional, more specific details regarding DigitalOcean security, please refer to https://www.digitalocean.com/security/.
3. Data Center Security
DigitalOcean maintains an impressive list of reports, certifications, and third-party assessments to ensure complete and ongoing state-of-the-art data center security.DigitalOcean infrastructure is housed in DigitalOcean-controlled data centers throughout the world. Only those within DigitalOcean who have a legitimate business need to have such information know the actual location of these data centers, and the data centers themselves are secured with a variety of physical controls to prevent unauthorized access.It is safe to say DigitalOcean is much better at physical security than we are capable of being, so we leave it to them.
4. Application Security
All Precoro web application communications are encrypted over 256 bit SSL, which cannot be viewed by a third party and is the same level of encryption used by banks and financial institutions.Precoro maintains ongoing Level 1 PCI compliance, abiding by stringent industry standards for storing, processing and transmitting credit card information online.Precoro actively monitors ongoing security, performance and availability 24/7/365. We run automated security testing on an ongoing basis.
5. Infrastructure Security
Precoro's infrastructure is hosted in a fully redundant, secured VPN environment, with access restricted to operations support staff only. This allows us to leverage complete firewall protection, private IP addresses, and other security features.
6. Security Policy
Precoro employs strict security standards and measures throughout the entire organization. Every team member is trained and kept up to date on the latest security protocols. We regularly undergo testing, training, and auditing of our practices and policies.