User credentials are hashed to ensure the privacy of the highest standard, while user access is manageable through our dashboard.
We protect the confidentiality, integrity, and availability of your transactional data using encryption protocols like TLS (Transport Layer Security).
Host, network, web application and database assessment, penetration testing, and other best practices are applied in our everyday security work.
We meet and exceed industry regulations and compliance requirements, such as GDPR, ensuring the safety and compliance of your and your customers’ transactional data.
Certification & Compliance
We are GDPR-compliant, prioritizing the privacy and security of personal data. This regulation guides our data processing, storage, and protection protocols, reinforcing trust and compliance.
We are GDPR-compliant, prioritizing the privacy and security of personal data. This regulation guides our data processing, storage, and protection protocols, reinforcing trust and compliance.
We are GDPR-compliant, prioritizing the privacy and security of personal data. This regulation guides our data processing, storage, and protection protocols, reinforcing trust and compliance.
We are GDPR-compliant, prioritizing the privacy and security of personal data. This regulation guides our data processing, storage, and protection protocols, reinforcing trust and compliance.
Yes. Fonoa operates a vulnerability disclosure program, enabling security researchers to safely report vulnerabilities. We are committed to investigating and resolving issues promptly. Contact us at security@fonoa.com.
How can I report a security vulnerability?
Does Fonoa conduct third-party penetration testing?
What measures are in place to prevent data breaches?
Visit the Trust Center for detailed documentation on our security, privacy, and compliance practices.