Loymax, 2024

Information security


The information security of the Loymax system includes a number of tools and methods for safe working with data

The information presented in this section takes the form of a recommendation. To ensure the security of your customers' data and operations, we recommend using ALL the security measures listed in this section. Otherwise, Loymax is not responsible for any information leakage.

All the funds presented are aimed at protecting the personal data of customers and users of the system, and also provide a secure exchange of data between the server and final users without loss and the possibility of interception. Moreover, each member in the process gets access to the data that he/she can get, and does not get access to what he/she should not be available to. The system stores only reliable information about customers, purchases, and other operations.

Data protection at the start

Before launching the loyalty program and issuing cards, we recommend to make the following settings that will help protect you and your customers from confidential information leakage:

  • Use a complex algorithm to generate card/coupon numbers
The number of each card must be unique and consist of 15-16 digits, formed by a special algorithm. Read our recommendations about the formation of card number templates. The Loymax system in turn provides the issuance of cards during registration in such a way that one card can belong to only one customer.
  • Set critical limits

We have allocated several limits that we recommend configuring in the first place. This will help to prevent abuse by employees of POSs and customers, fraudulent activities with the data of the LP Members, and possible financial losses associated with them.

  • Configure captcha in Personal Account on the website

To protect against hacking, customer authorization in the Personal Account on the site can be protected by an invisible captcha that recognizes user behavior and, in case of suspicious actions, issues additional tasks for verification.

Additional methods to protect information:

Server Data Protection

  • Operations logging
  • Data backup

Processing Protection Against Attacks

  • Using captcha
  • Access limits

Authorization Protection

  • OAuth authorization
  • Single access point to the system
  • Differentiation of access rights

Data Transferring Protection

  • Encrypted channel of data transmission
  • Digital signature
  • Masking card numbers
  • Impersonal wording of errors

Security of Conducting Operations 

  • Two-phase operation
  • Limits of operations with a bonus account
  • Confirmation of bonus points deduction
  • Card block

Enforcement of Legislation

  • Age limit when registering 
  • Public Offer and processing of personal data
  • MRP limits
  • Phone number validation

 

News
Version history
Tags
Glossary
Site