Security Policy

Last updated January 6, 2025

At Bold Data, Inc. (doing business as BOLData Systems) ("Company," "we," "us," or "our"), we are committed to maintaining a secure environment for every customer who interacts with our online systems. This Security Policy explains the technical and procedural steps we take to protect data exchanged during browsing, account access, and order processing. It is intentionally limited to security-related practices; matters involving personal data handling, privacy rights, and cookies are addressed in separate policies.

1. Commitment to a Secure Online Environment

We place significant emphasis on ensuring that online transactions and account-related activities are protected from interception, alteration, or unauthorized access. Our security controls are designed to safeguard the integrity of communications between you and our website and to help maintain the confidentiality of information shared during the course of a transaction.

2. Secure Transmission Technologies

2.1. Encryption Protocols

Our website uses industry-standard encryption methods to secure data transmitted between your browser and our servers. All transactional information—including names, addresses, payment details, and authentication credentials—is encrypted in transit using Transport Layer Security (TLS).

TLS ensures that:

  • Your browser verifies the authenticity of our server before a secure session begins.
  • Information sent during checkout or account management is encrypted so it cannot be read if intercepted.
  • Data is protected against tampering while in transit.

We strongly encourage customers to use up-to-date browsers and operating systems so that current security enhancements are applied.

2.2. Website Identification & Certificate Validation

Before your browser exchanges sensitive data, it confirms that it is communicating with our legitimate website through the validation of our digital security certificate. If the certificate cannot be confirmed, your browser will notify you and stop the secure connection from proceeding. This prevents attackers from impersonating the site or redirecting you to untrusted destinations.

3. Payment and Transaction Security

3.1. Secure Checkout Environment

Our checkout process is designed to isolate sensitive payment data from unauthorized parties. All payment entry fields and transaction workflows occur within encrypted, authenticated sessions.

3.2. Protection of Payment Information

We do not store full credit-card numbers in our systems. Card data is transmitted directly to our payment processor through secure, PCI-compliant channels designed to minimize exposure and reduce the risk of compromise.

3.3. Fraud Prevention & Monitoring

We use automated and manual monitoring controls to detect unusual activity, repeated failed login attempts, or transaction patterns indicative of fraud. When necessary, additional verification steps may be required before an order is approved.

4. Account Security

4.1. Password Protection

Customer passwords are stored using secure, non-reversible hashing techniques. System-level access to authentication data is restricted to authorized personnel using role-based permissions.

4.2. Session Protection

For your protection, account sessions are automatically terminated after periods of inactivity. Sensitive areas of the site may require re-authentication.

5. Infrastructure and Server Security

5.1. Firewalls, Monitoring, and Intrusion Prevention

Our servers are protected by enterprise-grade firewalls, intrusion detection systems, and continuous monitoring that alerts our security team to suspicious activity or attempted breaches.

5.2. Regular Security Updates

We routinely apply patches, updates, and configuration improvements to maintain a hardened environment. Software, operating systems, and supporting services are reviewed periodically to ensure they meet current security best practices.

6. Reporting Security Issues

If you believe you have identified a vulnerability or irregular activity involving our website, systems, or online services, we encourage you to notify us immediately using the contact information provided on our Contact page. Reports are reviewed promptly, and appropriate action is taken to investigate and resolve any confirmed issues.

7. Changes to This Security Policy

We may update this Security Policy from time to time to reflect improvements in our security technologies, operational changes, or industry standards. Updates will be posted on this page, and your continued use of our website signifies acceptance of any revisions.