Information Security
General
V-CHECK Ltd. sees the utmost importance in maintaining the confidentiality of its customers information and the privacy of the customer in relation to information stored in the system and identified with it. As detailed below, the Company's policy on these matters includes a number of security circles consisting of a variety of mechanisms aimed at securing and protecting the information and protecting the privacy of the customer.
It should be noted that the company has a registered database in the Ministry of Justice whose number 700061910 and is careful to act in accordance with the Privacy Protection Law-1981 and its regulations.
The company is licensed by the Capital Market Authority to provide basic financial asset service (63100) and to provide basic credit (68896).
The Bank of Israel assigned to the company identification code: 75.
How Do We Protect The Information?
The company's policy on information security includes a number of security circles consisting of a variety of security mechanisms, including adopting an internal procedure consistent with the recommendation of a named security company; appointing an information security officer in charge of this area; and conducting aperiodic review of the security mechanisms.
In addition, the company has technological information security measures aimed at creating layers of protection for the systems to prevent the realization of risks, to identify the realization of risks quickly, to stop the spread of attacks on the company's systems, and to prevent the recovery of the system, and to minimize damages that may be caused as a result of the realization of the risks.
In addition, the company has network security and remote access such as strong means of identification and permissions. The company also links its systems to the Internet while implementing separation measures aimed at preventing the infiltration and/or activation of hostile code, encryption, identification procedures and more.
It is clarified that the Company will secretly keep all the information it has about the user, unless it is obligated to provide this information in line with any law and/or incases where the transfer of the details to a third party is committed for the purpose of the company's activities and/or the provision of the service to the user and/or for the purpose of charging the user for them and/or by law that requires the Company to provide information about the user to a particular entity, whether governmental or not. This is as stated in accordance with the provisions of any law.
Where Do We Keep The Information?
Like most of the SaaS software, the Company is hosted by industry-leading companies located in Israel that have a high level of security.
How To Use Cookies
The Company uses Cookies files to operate the system, verify details, secure information and improve the user experience. The user can at any time block ordelete the cookies by changing the settings in the browser through which he browses his smartphone.
Securing Information, Systems And Means Of Communication
The company has a TLS 1.3 certificate that is currently subject to the highest level of security (against identity theft) and constitutes the standard accepted among financial entities.
For information security, the company uses firewall; encrypts data base; toughens servers and current information security updates; activates user-identifiable security mechanisms (such as passwords, authentication code, account locking mechanism; and IP Address locking).
The system also detects and sends automatic alerts in case of exceptional actions such as: typing an incorrect password multiple times, sending a large number of payments, paying an unusual amount, etc.
The Period Of Data Retention And Deletion Of Information
The information about actions performed by the user is stored for 7 years in the company's backup stores. The client cannot delete information from the personal area.