What is the process for reporting and resolving security-related issues or suspicious activities?
Related Articles
How we use collected information
We use collected information for various purposes aimed at optimising operational efficiency, ensuring regulatory compliance, and fostering a seamless user experience. Furthermore, stringent risk management practices are employed, leveraging data ...
The use of cookies and similar technologies
Cookies and similar technologies play a crucial role by enhancing user experience, ensuring security, and facilitating smooth transactions. Here are some common uses: Authentication and Session Management: Cookies help in maintaining user sessions ...
Do you comply with industry-standard security certifications, such as PCI DSS (Payment Card Industry Data Security Standard)?
Yes, we comply with PCI DSS by implementing rigorous security measures and adhering to specific requirements outlined in the standard. Here is how we typically achieve compliance with PCI DSS: Data Encryption: Transactpay and merchants encrypt ...
How do you handle third-party integrations or partnerships to ensure security?
We ensure the security of third-party integrations or partnerships by thoroughly checking vendors and partners to make sure they comply with security standards like PCI DSS and ISO 27001. This ensures they meet our strict security requirements, ...
Release Notes: Introducing the Transactpay Dashboard (Version 2.0)
Release Notes: Introducing the Transactpay Dashboard (Version 2.0) We have redesigned our dashboard! This major update focuses on improving your workflow efficiency, enhancing security, and simplifying navigation. We have listened to your feedback ...