Security Policy

Last updated: October 2025

1. Introduction

ASYNC INTEGRATIONS d.o.o. is committed to maintaining the security and confidentiality of client data and payment information.

This Security Policy outlines our practices for protecting sensitive information, particularly in relation to payment processing and data transmission.

We implement industry-standard security measures and comply with applicable data protection regulations including GDPR.

2. Payment Security

We use Wise Europe SA as our payment processor for all card and online payment transactions.

Payment Card Industry Data Security Standard (PCI DSS) Compliance:

• Wise is PCI DSS Level 1 certified

• We do NOT store, process, or transmit payment card data on our systems

• All payment card information is handled exclusively by Wise

• Payment transactions are processed through Wise's secure payment gateway

When you make a payment:

• You are redirected to Wise's secure payment platform

• Payment data is transmitted directly to Wise using encryption

• We receive only confirmation of payment status, not your card details

We never ask for your payment card details via email, phone, or unsecured channels.

3. Data Transmission Security

All data transmitted between you and our systems is protected:

• Our website uses HTTPS/TLS encryption for all connections

• Email communications contain only non-sensitive information when possible

• Sensitive project files are shared via secure, encrypted channels

• We use secure file transfer protocols for deliverables

• Access to our systems requires strong authentication

We recommend that clients also use secure communication methods when sharing sensitive information.

4. Access Controls

We implement strict access controls to protect your data:

• Access to client data is limited to authorized personnel only

• Team members are granted minimum necessary access (principle of least privilege)

• All access is logged and monitored

• Strong passwords and multi-factor authentication are required

• Regular access reviews ensure only current team members have access

• Contractors and subcontractors are bound by confidentiality agreements

5. Infrastructure Security

Our technical infrastructure includes multiple layers of security:

• Secure, regularly updated servers and hosting environments

• Firewalls and intrusion detection systems

• Regular security patches and updates

• Encrypted data storage where applicable

• Regular backups with encrypted storage

• Disaster recovery and business continuity plans

Client projects may be hosted on reputable cloud platforms (AWS, DigitalOcean, etc.) that maintain ISO 27001 and SOC 2 certifications.

6. Secure Development Practices

We follow secure coding practices in all development work:

• Code reviews and security testing

• Regular dependency updates and vulnerability scanning

• Protection against common vulnerabilities (OWASP Top 10)

• Secure authentication and authorization implementations

• Input validation and output encoding

• Secure session management

• Regular security audits of our deliverables

We design systems with security as a core principle, not an afterthought.

7. Monitoring and Incident Response

We actively monitor for security threats:

• System logs are monitored for suspicious activity

• Automated alerts for potential security incidents

• Regular security assessments and penetration testing

• Incident response plan for rapid response to breaches

In the event of a security incident:

• We investigate immediately to contain and remediate the issue

• Affected clients are notified within 72 hours (as required by GDPR)

• We work with clients to minimize impact

• We report to relevant authorities as required by law

• We implement measures to prevent recurrence

8. Employee Security Training

All team members receive security training:

• GDPR and data protection awareness

• Secure coding practices

• Phishing and social engineering recognition

• Incident reporting procedures

• Confidentiality and non-disclosure obligations

Team members sign confidentiality agreements and are bound by our security policies.

9. Client Responsibilities

Clients share responsibility for security:

• Maintain strong passwords for any accounts we provide

• Do not share login credentials

• Report suspicious activity immediately

• Keep their own systems and software updated

• Follow our security recommendations for deployed applications

• Review and approve security measures in project agreements

We provide security guidance and recommendations, but cannot control client-side security.

10. Regulatory Compliance

We comply with relevant security and privacy regulations:

• EU General Data Protection Regulation (GDPR)

• Croatian Data Protection Act

• PCI DSS (through our payment processor Wise)

• Payment Services Directive 2 (PSD2) where applicable

We stay current with evolving regulations and update our practices accordingly.

11. Third-Party Security

When we use third-party services on behalf of clients:

• We vet vendors for security practices

• We require data processing agreements (DPAs) where appropriate

• We verify compliance with relevant standards (ISO 27001, SOC 2, etc.)

• We limit data sharing to what is necessary

Key third-party services:

• Wise (payment processing) - PCI DSS Level 1, GDPR compliant

• Hosting providers - ISO 27001, SOC 2 certified

• Email services - GDPR compliant

12. Policy Updates

This Security Policy is reviewed regularly and updated as needed.

Changes reflect evolving security threats, new technologies, and regulatory requirements.

Material changes will be communicated to active clients.

The 'Last Updated' date at the top of this policy indicates the most recent revision.

13. Security Concerns and Reporting

If you have security concerns or wish to report a security issue:

Email: hello@asyncintegrations.hr

Subject line: 'SECURITY - [Brief Description]'

Phone: +385 97 7877 127

We take all security reports seriously and respond promptly.

For responsible disclosure of vulnerabilities in our systems, please contact us privately before public disclosure.