Privacy policy
1. We at Welex implement measures that are sensible and proportionate to the level of risk associated with handling personal information. These precautions may include physical, technical, and organizational safeguards such as
encryption, access controls, staff training, and regular security assessments.
2. Industry Best Practices: By adhering to industry best practices, we at Welex ensure that our privacy protection measures are in line with widely accepted standards and guidelines within our specificed sector and industry.
3. We endeavor to prevent such losses by implementing robust backup systems, disaster recovery plans, and data retention policies
4. We ensure that personal data is only used for lawful and legitimate purposes and may implement measures such as data access controls and user authentication to prevent unauthorized or improper use.
5. We employ access controls, authentication mechanisms, and monitoring systems to restrict access to personal data to authorized personnel only and to detect and respond to unauthorized access attempts promptly.
6. We implement measures such as data sharing agreements, confidentiality clauses, and privacy impact assessments to ensure that personal data is only disclosed when necessary and under lawful and appropriate circumstances.
7. We employ measures such as data encryption, digital signatures, and version control to detect and prevent unauthorized changes to personal data and to ensure its accuracy and reliability.
8. We implement data disposal procedures such as secure deletion methods, shredding of physical documents, and data sanitization of storage media to ensure that personal data is effectively and securely destroyed at the end of its
lifecycle.
In summary, the privacy policy outlines we at Welex's commitment to protecting personal information by taking reasonable precautions and following industry best practices to prevent inappropriate loss, misuse, access, disclosure,
alteration, or destruction of such data.
Pricing policy
This statement outlines the security measures taken when processing payments through Razorpay. Let's break it down step by step:
1. Use of Razorpay: Razorpay is the payment processing platform utilized for handling transactions.
2. Non-storage of Card Data: Neither you nor Razorpay stores your card data on their servers. This is a crucial security measure as it prevents sensitive financial information from being vulnerable to potential breaches or unauthorized
access.
3. Encryption via PCI-DSS: The card data is encrypted using the Payment Card Industry Data Security Standard (PCI-DSS) during the payment process. PCI-DSS is a set of security standards designed to ensure that all companies that accept,
process, store, or transmit credit card information maintain a secure environment.
Limited Use of Transaction Data: Your purchase transaction data is used only for the duration necessary to complete the transaction. Once the transaction is finalized, your purchase information isn't retained. This ensures that your
data isn't unnecessarily stored, minimizing the risk of exposure in the event of a security breach.
In summary, Razorpay ensures the security of your payment information by not storing card data, encrypting it during processing, and limiting the use of transaction data to only what is necessary for completing the transaction. This
approach aligns with industry standards and best practices for safeguarding sensitive financial information.