Back to Home

Security

We prioritize the safety of your data and transactions

Our Security Features

Data Encryption

All data is encrypted in transit using industry-standard SSL/TLS 1.2 or higher protocols.

Secure Payment Processing

We utilize PCI DSS Level 1 compliant payment processors to handle all financial transactions.

Secure Infrastructure

Our servers are hosted in secure, redundant data centers with 24/7 monitoring and access controls.

Fraud Detection

Advanced fraud detection systems monitor transactions in real-time to prevent unauthorized access.

Regular Audits

We conduct regular security audits and penetration testing to identify and address vulnerabilities.

Access Control

Role-based access controls ensure employees only access information necessary for their roles.

1. Encryption and Data Protection

All data transmitted between your device and our servers is encrypted using TLS 1.2 or higher. This includes:

  • Login credentials and authentication information
  • Personal and financial information
  • Payment details and banking information
  • Correspondence and support communications

2. Payment Security

We comply with PCI DSS (Payment Card Industry Data Security Standard) Level 1 requirements. Our payment processing includes:

  • Tokenization of payment information
  • Real-time fraud detection and monitoring
  • Secure handling of sensitive authentication data
  • Regular security assessments by qualified security assessors

3. Access Control and Authentication

We implement strict access controls to protect your information:

  • Multi-factor authentication options
  • Strong password requirements
  • Session timeout for inactive accounts
  • Role-based access control for employees
  • Audit logs for all account access

4. Infrastructure Security

Our infrastructure includes multiple layers of security:

  • Firewalls and intrusion detection systems
  • Regular security patches and updates
  • Network segmentation and isolation
  • Redundant systems and backup data centers
  • DDoS protection and mitigation

5. Employee Security

Our employees are trained and bound by strict security protocols:

  • Background checks and security clearances
  • Mandatory security awareness training
  • Confidentiality and non-disclosure agreements
  • Limited access to customer information
  • Regular security training updates

6. Vulnerability Management

We actively identify and address security vulnerabilities:

  • Regular vulnerability assessments and scanning
  • Penetration testing by authorized security professionals
  • Bug bounty program for responsible disclosure
  • Incident response procedures
  • Security updates and patches

7. Data Retention and Deletion

We maintain data only as long as necessary:

  • Retention policies based on legal requirements
  • Secure deletion procedures for outdated data
  • User request compliance for data deletion
  • Regular purging of unnecessary information

8. Compliance and Certifications

Bill Support LLC complies with applicable regulations including:

  • PCI DSS Level 1 Compliance
  • GDPR (General Data Protection Regulation)
  • CCPA (California Consumer Privacy Act)
  • State and federal data protection laws
  • Industry best practices and standards

9. Incident Response

In the event of a security incident, we follow a comprehensive response plan:

  • Immediate incident detection and containment
  • Thorough investigation and root cause analysis
  • Customer notification as required by law
  • Remediation and preventive measures
  • Documentation and continuous improvement

10. Security Best Practices for Users

To protect your account, we recommend:

  • Use a strong, unique password
  • Enable two-factor authentication
  • Keep your devices updated with security patches
  • Do not share your login credentials
  • Log out when using shared computers
  • Be cautious of phishing attempts
  • Monitor your account activity regularly

11. Report a Security Issue

If you discover a security vulnerability or have security concerns, please report it to us immediately:

Security Contact

Email: security@billsupport.store

Please provide detailed information about the vulnerability and allow us time to respond.

12. Contact Us

For security questions or concerns, please contact us:

Bill Support LLC

18 Keller St

Valley Stream, NY 11580

Email: support@doxo.online

12. Contact Us

For security questions or concerns, please contact us:

BILLSUPPORT LLC

18 Keller St

Valley Stream, NY 11580

Email: support@doxo.online