Acaste e-shop recognizes the importance of the issue of the security of your Personal Data and your electronic transactions, and takes all the necessary measures with the most modern and advanced methods, thus ensuring the maximum possible security. All information, which is related to your personal data and your transactions, is secure and confidential. The security of the Acaste e-shop is achieved by the following methods:
The passwords used for your identification are two: the Password (e-mail or username) and the Personal Secret Security Code (password), which every time you enter them provide you with absolute security access to your personal information. Allows you to change your Personal Security Password as often as you wish. The only one who has access to your data is you through the above codes and you are solely responsible for maintaining its confidentiality and concealment from third parties. In case of loss or leakage you must notify us immediately, otherwise the online store of Acase e-shop is not responsible for the use of the secret code by an unauthorized person. For security reasons, we recommend that you change your password at regular intervals and avoid using the same and easily traceable codes (eg date of birth). We also suggest that you use not only letters and numbers but also symbols to create a password.
If there is no activity for 120 minutes, the members of Acaste online store will be automatically disconnected.
CONTROLLED ACCESS (FIREWALL)
Access to the systems of Acaste e-shop (servers) is controlled by a firewall, which allows the use of specific services by customers / users while prohibiting access to systems and databases with confidential data and information of the company.
The Acaste platform first decrypts the information it receives using the same key (predefined when you start connecting to the service) and then processes it. Acaste systems send you information following the same encryption process.
All pages of the store are protected by SSL-256bit encryption.
Encryption is essentially a way of encrypting information until it reaches its intended recipient, who will be able to decrypt it using the appropriate key. This means that all information exchanged between your browser and our servers is not accessible to anyone else.
Confidentiality is taken for granted. The same basic principles that govern traditional transactions apply in the case of e-commerce. All information transmitted by the user / member to Acaste e-shop is confidential and Acaste has taken all necessary measures to use them only to the extent deemed necessary in the context of the services provided. Some of the measures that have been taken are the following:
Only authorized employees have access to your transaction information and only when necessary, e.g. to process your applications.
Acaste does not disclose the details of its customers and transactions, unless it has a written authorization from you or this is required by a court decision or decision of another public authority.
In any case, the online store of Acaste in no way discloses or publishes your personal data and information that you trust us. The personal data that you make available to us by registering as a member are used exclusively for the execution of your transactions.
SSL SECURITY PROTOCOL
The Website www.acaste.gr uses the SSL protocol of the company COMODO, for secure online commercial transactions. This encrypts all personal information so that it cannot be read or altered when transmitted over the Internet.
SSL (Secure Sockets Layer) protocol is currently the global standard on the Internet for certifying websites (web sites) to network users and for encrypting data between network users and network servers (web servers). An encrypted SSL communication requires that all information sent between a client and a server be encrypted by the sending software and decrypted by the receiving software, thus protecting personal information during its transfer. In addition, all information sent with the SSL protocol is protected by a mechanism that automatically detects whether data has changed during the transfer.