Security Policy
Last updated January 6, 2025
At Bold Data, Inc. (doing business as BOLData Systems) ("Company," "we," "us," or "our"), we are committed to maintaining a secure environment for every customer who interacts with our online systems. This Security Policy explains the technical and procedural steps we take to protect data exchanged during browsing, account access, and order processing. It is intentionally limited to security-related practices; matters involving personal data handling, privacy rights, and cookies are addressed in separate policies.
1. Commitment to a Secure Online Environment
We place significant emphasis on ensuring that online transactions and account-related activities are protected from interception, alteration, or unauthorized access. Our security controls are designed to safeguard the integrity of communications between you and our website and to help maintain the confidentiality of information shared during the course of a transaction.
2. Secure Transmission Technologies
2.1. Encryption Protocols
Our website uses industry-standard encryption methods to secure data transmitted between your browser and our servers. All transactional information—including names, addresses, payment details, and authentication credentials—is encrypted in transit using Transport Layer Security (TLS).
TLS ensures that:
- Your browser verifies the authenticity of our server before a secure session begins.
- Information sent during checkout or account management is encrypted so it cannot be read if intercepted.
- Data is protected against tampering while in transit.
We strongly encourage customers to use up-to-date browsers and operating systems so that current security enhancements are applied.
2.2. Website Identification & Certificate Validation
Before your browser exchanges sensitive data, it confirms that it is communicating with our legitimate website through the validation of our digital security certificate. If the certificate cannot be confirmed, your browser will notify you and stop the secure connection from proceeding. This prevents attackers from impersonating the site or redirecting you to untrusted destinations.
3. Payment and Transaction Security
3.1. Secure Checkout Environment
Our checkout process is designed to isolate sensitive payment data from unauthorized parties. All payment entry fields and transaction workflows occur within encrypted, authenticated sessions.
3.2. Protection of Payment Information
We do not store full credit-card numbers in our systems. Card data is transmitted directly to our payment processor through secure, PCI-compliant channels designed to minimize exposure and reduce the risk of compromise.
3.3. Fraud Prevention & Monitoring
We use automated and manual monitoring controls to detect unusual activity, repeated failed login attempts, or transaction patterns indicative of fraud. When necessary, additional verification steps may be required before an order is approved.
4. Account Security
4.1. Password Protection
Customer passwords are stored using secure, non-reversible hashing techniques. System-level access to authentication data is restricted to authorized personnel using role-based permissions.
4.2. Session Protection
For your protection, account sessions are automatically terminated after periods of inactivity. Sensitive areas of the site may require re-authentication.
5. Infrastructure and Server Security
5.1. Firewalls, Monitoring, and Intrusion Prevention
Our servers are protected by enterprise-grade firewalls, intrusion detection systems, and continuous monitoring that alerts our security team to suspicious activity or attempted breaches.
5.2. Regular Security Updates
We routinely apply patches, updates, and configuration improvements to maintain a hardened environment. Software, operating systems, and supporting services are reviewed periodically to ensure they meet current security best practices.
6. Reporting Security Issues
If you believe you have identified a vulnerability or irregular activity involving our website, systems, or online services, we encourage you to notify us immediately using the contact information provided on our Contact page. Reports are reviewed promptly, and appropriate action is taken to investigate and resolve any confirmed issues.
7. Changes to This Security Policy
We may update this Security Policy from time to time to reflect improvements in our security technologies, operational changes, or industry standards. Updates will be posted on this page, and your continued use of our website signifies acceptance of any revisions.