Jupico Help Docs
  • Overview
  • Onboarding
    • TIN Matching - IRS TIN Validation
    • Required Owner Information
    • Change of Ownership
    • Fields Requested
    • Business Type & Structure Explained
  • Login
    • Reset Password
    • Reset Username
    • Locked Account
  • Transactions
    • Card Transaction Types
    • How to run a 'Sale' transaction
    • Review, Refund, and Void Transactions
    • Running a 'Sale' for an existing customer
    • Locating a previous transaction
  • Customers
    • Create a new customer
    • Creating a new customer from a transaction
  • Payouts
    • When will I get my deposits?
    • How to update your bank account?
    • How payouts display in your bank account.
  • Chargebacks
    • Responding to Disputes and Chargebacks
    • Mitigating Chargebacks
  • Reporting
    • Payouts Report
    • Fees Report
    • Settlement Report
  • Users
    • User Type Descriptions
  • Accounts
    • How do I disconnect my bank data from Jupico?
    • How to add a location
    • Why can't I see my account details?
    • How do I locate my merchant ID number?
    • What to do when Account status is Archive?
    • How do I update my account details?
  • Taxes & Compliance
    • What is a 1099k?
    • Access Your 1099-K via Tax1099
    • PCI DSS Compliance
      • What is PCI Compliance?
  • References & Resources
    • Our Commitment to Security
    • Legal
      • Terms of Service
      • Privacy Policy
      • Consumer Privacy Policy
      • Intellectual Property Policy
      • Restricted Businesses
    • Payments Glossary
    • Contact Us
    • Payment Brand Resources
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. References & Resources

Our Commitment to Security

At Jupico, we prioritize the protection of your sensitive information by adhering to the highest security standards. Our commitment extends beyond just meeting the Payment Card Industry Data Security Standard (PCI DSS); it encompasses a comprehensive approach to security that includes all relevant regulatory requirements and best practices.

Adhering to the Highest Security Standards

  1. PCI Compliance and Beyond:

  • We are dedicated to meeting and exceeding PCI DSS requirements to ensure the secure handling of payment card information. Our adherence to PCI standards is just one component of our broader security strategy, which includes compliance with other regulatory frameworks and industry standards.

  1. Robust Data Protection:

  • We employ advanced encryption techniques to safeguard sensitive data during transmission and storage. Our encryption protocols ensure that your information is secure from unauthorized access at all stages.

  1. Enhanced Access Controls:

  • Our systems are protected by stringent access controls, including multi-factor authentication and role-based permissions. This ensures that only authorized personnel have access to critical information and systems.

  1. Ongoing Security Assessments:

  • Regular security audits and vulnerability assessments are integral to our approach. These evaluations help us identify and address potential risks, allowing us to maintain a proactive stance against emerging threats.

  1. Advanced Network Security:

  • We utilize cutting-edge firewall and intrusion detection technologies to safeguard our network infrastructure. This robust protection helps prevent unauthorized access and attacks on our systems.

  1. Comprehensive Incident Response:

  • Our incident response plan is designed to quickly address and mitigate any security incidents. Continuous monitoring enables us to detect and respond to potential threats in real-time, minimizing potential impact.

  1. Continuous Employee Training:

  • Our employees receive ongoing training on data security best practices and regulatory requirements. This ensures that everyone involved in handling sensitive information is well-informed and prepared to uphold our security standards.

Your Security is Our Priority

We are committed to ensuring that your data is protected through rigorous security measures and adherence to the highest standards. Our dedication to security reflects our ongoing effort to provide you with a safe and trustworthy experience.

Access to Compliance Documentation

If you have any questions or wish to review our security and compliance documentation, please contact our support team. You can reach us at support@jupico.com. We are here to provide you with the information you need and address any concerns regarding our security practices.

Thank you for trusting Jupico. We are committed to maintaining the highest levels of security to protect your information every step of the way.

PreviousWhat is PCI Compliance?NextLegal

Last updated 9 months ago

Was this helpful?