Security Policy

Security Policy

Last Updated: November 24, 2025

1. Our Commitment to Security

At Bytora Tech, we take the security of your personal and payment information seriously. We implement industry-leading security measures to protect your data and ensure safe transactions.

2. Payment Card Security

We use comprehensive security measures to protect your payment information:

2.1 SSL/TLS Encryption

  • All data transmitted between your browser and our servers is encrypted using SSL/TLS (Secure Sockets Layer/Transport Layer Security) technology
  • We use 256-bit encryption for all sensitive data transmission
  • Our SSL certificates are regularly updated and validated
  • Look for the padlock icon in your browser address bar to confirm secure connection

2.2 3D Secure Authentication

  • All card payments are processed with 3D Secure authentication
  • Verified by Visa: Additional verification step for Visa cardholders
  • MasterCard SecureCode: Additional verification step for MasterCard cardholders
  • This adds an extra layer of security by requiring authentication from your card issuer
  • 3D Secure helps prevent unauthorized card use

2.3 PCI DSS Compliance

  • We use PowerTranz SPI (Simplified Payment Integration) which is PCI DSS Level 1 compliant
  • PCI DSS (Payment Card Industry Data Security Standard) is the highest level of security certification
  • We do NOT store full credit card numbers on our servers
  • We only store the last 4 digits of your card for order identification
  • All payment processing is handled by PowerTranz's secure infrastructure

2.4 Secure Payment Gateway

  • All payments are processed through PowerTranz, a trusted and secure payment gateway
  • PowerTranz is certified and compliant with international security standards
  • Payment data never touches our servers directly
  • All payment transactions are encrypted end-to-end

3. Data Transmission Security

We protect your data during transmission:

  • HTTPS Protocol: All website pages use HTTPS (secure HTTP) for encrypted communication
  • Encrypted Connections: All data sent to and from our servers is encrypted
  • Secure API Communication: All API calls use encrypted connections
  • Regular Security Updates: We regularly update our security protocols and software
  • Certificate Validation: SSL certificates are validated and renewed regularly

4. Data Storage Security

We protect your stored information with multiple layers of security:

4.1 Database Security

  • All databases are encrypted at rest
  • Database access is restricted to authorized personnel only
  • Regular database backups are encrypted and stored securely
  • Database access is logged and monitored

4.2 Access Controls

  • Multi-factor authentication for administrative access
  • Role-based access controls limit who can access what data
  • Regular access reviews and audits
  • Employee access is granted on a need-to-know basis only
  • All access attempts are logged and monitored

4.3 Data Minimization

  • We only collect and store data necessary for service delivery
  • We do NOT store full payment card numbers
  • We do NOT store CVV codes
  • Sensitive data is encrypted in our databases
  • Old data is securely deleted when no longer needed

5. Account Security

We help protect your account:

  • Strong Password Requirements: Passwords must meet security criteria
  • Password Hashing: Passwords are hashed using industry-standard algorithms
  • Account Lockout: Accounts are temporarily locked after multiple failed login attempts
  • Session Management: Secure session handling with automatic timeout
  • Email Verification: Email verification required for account creation

6. Website Security

We maintain website security through:

  • Regular Security Audits: We conduct regular security assessments
  • Vulnerability Scanning: Regular scans for security vulnerabilities
  • Firewall Protection: Web application firewalls protect against attacks
  • DDoS Protection: Protection against distributed denial-of-service attacks
  • Malware Scanning: Regular scanning for malware and threats
  • Security Updates: Prompt application of security patches and updates

7. Third-Party Security

We work only with trusted, secure third-party service providers:

  • Payment Processors: PowerTranz (PCI DSS compliant)
  • Hosting Providers: Secure, reputable hosting with security certifications
  • Service Providers: All third-party services are vetted for security
  • Data Processing Agreements: All third parties sign data protection agreements

8. Incident Response

In the event of a security incident:

  • We have an incident response plan in place
  • We will notify affected customers promptly
  • We will work to resolve issues quickly
  • We will cooperate with authorities if required
  • We will take steps to prevent future incidents

9. Your Security Responsibilities

You play an important role in keeping your information secure:

  • Strong Passwords: Use strong, unique passwords for your account
  • Don't Share Credentials: Never share your account password with anyone
  • Secure Devices: Keep your devices and browsers updated
  • Log Out: Always log out when using shared devices
  • Report Suspicious Activity: Contact us immediately if you notice suspicious activity
  • Verify Communications: Be cautious of phishing attempts

10. Phishing and Fraud Prevention

Important Security Reminders:

  • We NEVER ask for your password via email or phone
  • We NEVER ask for your full credit card number via email
  • We NEVER ask for your CVV code
  • If you receive such a request, it is FRAUDULENT - do not respond
  • Always verify emails are from @bytora.tech domain
  • When in doubt, contact us directly through our official channels

11. Security Certifications and Compliance

We maintain compliance with:

  • PCI DSS: Payment Card Industry Data Security Standard (via PowerTranz)
  • SSL/TLS: Secure data transmission standards
  • Data Protection Laws: Compliance with applicable data protection regulations

12. Security Updates

We continuously improve our security measures:

  • Regular security assessments and audits
  • Implementation of new security technologies
  • Staff training on security best practices
  • Monitoring of security threats and vulnerabilities
  • Prompt response to security advisories

13. Reporting Security Issues

If you discover a security vulnerability or have security concerns:

  • Email: security@bytora.tech (for security issues)
  • General Support: support@bytora.tech
  • Phone: 876 788 8816
  • Please provide detailed information about the issue
  • We take all security reports seriously and will investigate promptly

14. Contact Us

For security concerns or questions about this policy:

  • Email: support@bytora.tech
  • Phone: +1 (876) 788-8816
  • Address: 34 National Heroes Circle, Kingston, Jamaica
  • Business Hours: Monday - Friday, 9:00 AM - 5:00 PM (Jamaica Time)

Your security is our priority. We are committed to protecting your information and providing a safe shopping experience.