Security Capabilities and Payment Card Transmission Policy
To ensure safe handling of payment card information, PeTAL Consultancy follows these protocols:
1. SSL/TLS Encryption
All payment transactions are processed over a secure connection using SSL/TLS encryption, which protects cardholder data during transmission and prevents unauthorized access.
2. PCI Compliance
PeTAL Consultancy’s third-party payment processors are PCI-DSS compliant. This ensures industry-standard security protocols are used during all transactions.
3. No Card Data Storage
PeTAL does not store credit card numbers or CVV codes. Instead, tokenization is used to replace sensitive data with secure, one-time-use tokens.
4. Secure Payment Gateways
Users’ subscription payments are handled through trusted gateways that handle all sensitive data securely.
5. User Awareness
Users are encouraged to verify that the URL displays a padlock icon and starts with “https://” before entering any payment information.
