We protect your data with industry best practices and clear policies. Learn how we secure payments, handle data, and communicate status.
Security at a glance
PCI-aware practices
Card data handled with PCI DSS best practices and tokenization.
Encryption
TLS 1.2+ in transit; modern encryption at rest with key rotation.
Access controls
SSO/MFA for staff, least-privilege, audited access logs.
Monitoring & backups
24/7 monitoring, alerting, and regular encrypted backups.
Data protection
Encryption
TLS 1.2+ for all data in transit; HSTS enforced on dashboards.
Modern encryption at rest (e.g., AES-256), with key rotation and restricted KMS access.
Tokenization & storage
Sensitive payment data is tokenized; we avoid storing raw card data.
Data retention follows contractual and legal requirements, with secure deletion workflows.
Access & identity
SSO/MFA required for staff. Role-based access control and least privilege.
Access logs are retained and reviewed; changes require peer review.
Compliance programs
PCI DSS
We follow PCI DSS best practices and work with audited partners for card processing and tokenization. Attestations and scope details are available under NDA.
GDPR/CCPA
Data subject rights supported on request. A Data Processing Addendum (DPA) is available for customers processing personal data.
SOC 2
We align to SOC 2 controls for security, availability, and confidentiality. Formal reporting is available from certain partners.
Subprocessors
We maintain a list of critical vendors (e.g., cloud hosting, email delivery, analytics). Subprocessor list available on request with notification of changes.
Incident response
Monitoring & handling
24/7 monitoring and alerting; on-call response rotation.
Severity-based SLAs with triage, containment, and remediation steps.
Customer notifications according to legal and contractual obligations.
Responsible disclosure
If you believe you’ve found a security vulnerability, please email
security@uniquitysolutions.com with details and steps to reproduce.
Request compliance documents
Need our DPA, subprocessor list, or PCI documentation? Submit a request and we’ll follow up.