Skip to main content

Security and Compliance

Orsunpay maintains the highest security standards to protect your data and ensure compliance with global regulations.

Security Standards

Data Encryption

  • At Rest: AES-256 encryption for all stored data
  • In Transit: TLS 1.3 for all API communications
  • Key Management: Hardware security modules (HSMs)
  • Database: Encrypted database storage with column-level encryption for sensitive data

Network Security

  • Firewall Protection: Multi-layer firewall architecture
  • DDoS Protection: Advanced DDoS mitigation
  • Network Segmentation: Isolated network zones for different services
  • VPN Access: Secure VPN access for administrative functions

Access Controls

  • Multi-Factor Authentication: Required for all administrative access
  • Role-Based Access Control: Granular permission management
  • API Key Security: Scoped API keys with configurable permissions
  • Session Management: Secure session handling with automatic expiration

Compliance Certifications

PCI DSS Level 1 (Planned)

Orsunpay is working toward PCI DSS Level 1 certification:
  • Current Status: PCI DSS Level 2 compliant
  • Target: Level 1 certification by Q2 2024
  • Scope: Full compliance for card data processing
  • Benefits: Enhanced security for card transactions

SOC 2 Type II

  • Certification: SOC 2 Type II compliant
  • Scope: Security, availability, processing integrity
  • Audit Frequency: Annual third-party audits
  • Reports: Available to enterprise customers

ISO 27001

  • Status: ISO 27001:2013 certified
  • Scope: Information security management system
  • Coverage: All Orsunpay operations and data centers
  • Maintenance: Continuous monitoring and improvement

Data Protection

GDPR Compliance

Full compliance with European General Data Protection Regulation:
  • Data Minimization: Collect only necessary personal data
  • Purpose Limitation: Use data only for specified purposes
  • Retention Limits: Automatic data deletion after retention periods
  • Data Subject Rights: Support for access, rectification, and deletion requests
  • Privacy by Design: Built-in privacy protections

Data Processing Agreements

  • Standard DPAs: Available for all merchants
  • Custom Terms: Enterprise-specific data processing agreements
  • Lawful Basis: Clear legal basis for all data processing
  • International Transfers: Appropriate safeguards for cross-border transfers

Data Retention Policies

Data TypeRetention PeriodPurpose
Transaction Records7 yearsRegulatory compliance
Customer PII3 years after last activityBusiness operations
API Logs90 daysSecurity monitoring
Audit Logs7 yearsCompliance requirements
Marketing DataUntil consent withdrawnMarketing communications

Regional Compliance

United States

  • PCI DSS: Payment Card Industry compliance
  • SOX: Sarbanes-Oxley Act compliance for public merchants
  • State Laws: Compliance with state-specific privacy laws
  • AML/KYC: Anti-money laundering and know-your-customer requirements

European Union

  • GDPR: General Data Protection Regulation
  • PSD2: Payment Services Directive 2
  • AML5: Fifth Anti-Money Laundering Directive
  • SEPA: Single Euro Payments Area regulations

Other Regions

  • Canada: PIPEDA compliance
  • Australia: Privacy Act compliance
  • Brazil: LGPD (Lei Geral de Proteção de Dados)
  • Singapore: PDPA (Personal Data Protection Act)

Security Monitoring

24/7 Security Operations Center

  • Threat Detection: Real-time threat monitoring
  • Incident Response: Immediate response to security incidents
  • Vulnerability Management: Regular security assessments
  • Penetration Testing: Quarterly third-party security testing

Monitoring Capabilities

  • Network Monitoring: Continuous network traffic analysis
  • Application Security: Real-time application security monitoring
  • Database Activity: Database access and query monitoring
  • API Security: API endpoint monitoring and rate limiting

Incident Response

Response Process

  1. Detection: Automated and manual threat detection
  2. Assessment: Immediate impact assessment
  3. Containment: Isolate and contain security incidents
  4. Investigation: Detailed forensic investigation
  5. Resolution: Implement fixes and security improvements
  6. Communication: Notify affected parties as required

Communication Protocol

  • Internal Escalation: Immediate internal notification
  • Customer Notification: Within 72 hours for data breaches
  • Regulatory Reporting: As required by applicable laws
  • Public Disclosure: When legally required or appropriate

Merchant Responsibilities

Security Best Practices

  • API Key Management: Secure storage and rotation of API keys
  • HTTPS Enforcement: Use HTTPS for all integrations
  • Input Validation: Validate all user inputs
  • Access Controls: Implement proper access controls
  • Regular Updates: Keep systems and dependencies updated

Compliance Requirements

  • Data Handling: Follow data protection requirements
  • Audit Cooperation: Participate in compliance audits
  • Incident Reporting: Report suspected security incidents
  • Documentation: Maintain proper security documentation

Audit and Reporting

Regular Audits

  • Internal Audits: Quarterly internal security audits
  • External Audits: Annual third-party security assessments
  • Compliance Audits: Regular compliance verification
  • Penetration Testing: Quarterly penetration testing

Reporting

  • Compliance Reports: Available to merchants upon request
  • Audit Results: Summary reports for certified merchants
  • Security Metrics: Regular security posture updates
  • Incident Reports: Post-incident analysis and improvements

Data Subject Rights

GDPR Rights Support

We support all GDPR data subject rights:
  • Access: Right to access personal data
  • Rectification: Right to correct inaccurate data
  • Erasure: Right to deletion (“right to be forgotten”)
  • Portability: Right to data portability
  • Restriction: Right to restrict processing
  • Objection: Right to object to processing

Request Process

  1. Submit Request: Email [email protected]
  2. Identity Verification: Verify identity to prevent fraud
  3. Request Processing: Process within 30 days
  4. Response: Provide requested information or action
  5. Appeals: Right to appeal decisions

Security Resources

Documentation

  • Security Policies: Detailed security policy documentation
  • Integration Guides: Security best practices for integration
  • Incident Procedures: Security incident response procedures
  • Compliance Guides: Compliance requirement documentation

Support

  • Security Team: Dedicated security support team
  • Compliance Consultation: Compliance guidance for merchants
  • Training: Security awareness training programs
  • Resources: Security tools and resources library

Contact Information

Security and compliance are shared responsibilities. While Orsunpay provides a secure platform, merchants must implement appropriate security measures in their own systems.
Report any security incidents or vulnerabilities immediately to [email protected]. Do not publicly disclose security issues before coordinating with our security team.