SECURE TRANSACTIONS
PRIVACY AND SECURITY POLICY
The Xamam Wear e-shop is fully aware of the significance entailed in the Protection of your Personal Data and of your electronic transactions. For this purpose, it has taken all necessary steps by means of cutting-edge technology to ensure that your security is safeguarded to the fullest. All information pertinent to our personal details and transactions are secure and confidential. The Xamam Wear e-shop succeeds in this task by means of the following methods:
CUSTOMER IDENTIFICATION
There are two codes we use in identifying you when you log in: Your Entry Code (e-mail or username); and your Confidential Access Code (password). Every time you log in to our website or e-store, these two pieces of data keep your personal details safe and secure. You can change your Password as often as you like. You and only you have access to your personal details by means of these two codes and you are therefore responsible for keeping them confidential as well as inaccessible by third parties. In the event that your password is lost or third parties become privy to it you must notify us immediately as our Xamam Wear e-shop cannot be held responsible for the use of your password by an unauthorized party. For reasons of security, we recommend that you change your password at regular intervals and avoid using as passwords easily traceable phrases or sequences (e.g., your date of birth). We also advise you to use symbols for the creation of your password (not only letters and numbers).
AUTOMATIC DISCONNECTION
If there is no activity for 120 minutes, the members of the Xamam Wear online store will be automatically disconnected.
FIREWALL
Access to www.xamamwear.gr servers is protected by a firewall, something which, on the one hand, allows access to our online store by our customers/users while, on the other, bars access to the servers and databases where our company’s confidential data and information are stored.
ENCRYPTION
The Xamam Wear platform first decrypts the information it receives using the same key (predefined when you start connecting to the service) and then processes it. Xamam Wear systems send you information following the same encryption process.All pages of the store are protected by SSL-256bit encryption.Encryption is essentially a way of encrypting information until it reaches its intended recipient, who can decrypt it using the appropriate key. This means that all information exchanged between your browser and our servers is not accessible to anyone else.
TRANSACTION CONFIDENTIALITY
Confidentiality is taken for granted. The same basic principles that govern traditional transactions apply in the case of e-commerce. All information transmitted by the user / member to the Xamam Wear e-shop is confidential and Xamam Wear has taken all necessary measures to use them only to the extent deemed necessary in the context of the services provided. Some of the measures that have been taken are the following:
Only authorized employees have access to your transaction information and only when necessary, e.g. to process your applications.
Xamam Wear does not disclose the details of its customers and transactions, unless it has a written authorization from you or this is required by a court decision or decision of another public authority.
In any case, the online store of Xamam Wear in no way discloses or publishes your personal data and information that you trust us. The personal data that you make available to us by registering as a member are used exclusively for the execution of your transactions.
SSL SECURITY PROTOCOL
The Website www.xamamwear.gr uses the SSL protocol of the company COMODO, for secure online commercial transactions. This encrypts all personal information so that it cannot be read or altered when transmitted over the Internet.
SSL (Secure Sockets Layer) protocol is currently the global standard on the Internet for certifying websites (web sites) to network users and for encrypting data between network users and network servers (web servers).
An encrypted SSL communication requires that all information sent between a client and a server be encrypted by the sending software and decrypted by the receiving software, thus protecting personal information during its transfer. In addition, all information sent with the SSL protocol is protected by a mechanism that automatically detects whether the data has changed during the transfer.