Personal Data & Transaction Security
All information that relates to your personal information is safe and confidential. Safety is achieved by the following methods:
Α. User Identification
The codes used to identify you as a user are two: the E-mail or username and the Personal Security Password, which each time they are entered give access with absolute security to your personal information. It is possible to change your personal secret code as often as you wish. The user is solely responsible for maintaining secrecy and hiding it from third parties. In case of loss or leakage, we must immediately notify you, otherwise we are not responsible for the use of the password by an unauthorized person. Secure security codes are stored in our database using a one-way hash algorithm, making it even impossible for administrators to recover it, and this way the system is protected even in the event of a malicious attack.
To ensure the confidentiality of the transfer of personal data, we use the SSL-256 bit encryption protocol. The system has been certified by Geotrust, which specializes in transaction security issues. Encryption is essentially a way to encode the information until it reaches its intended recipient, which will be able to decode it using the appropriate key (this is automatically done by the ssl protocol). Encryption and ssl usage is mandatory on all pages, whether they contain sensitive data or not.
Β. Controlled Access - Security Systems
Access to our servers is controlled by a firewall, which allows for the use of specific services by customers / users, while at the same time prohibiting access to information systems and databases with private information and business information. All servers have an Antivirus service that checks for potential malware that could cause data leakage. For server management, access is only allowed through a VPN service that only our technical team has access to, preventing any access from a public network, even if the administrator access information leaks for any reason. The filesystem of the server is encrypted, so even if one gets a physical access to a server with our data, data cannot be decrypted.
Bigoods.eu system first decrypts the information it receives using the same key (which is pre-defined by the start of your connection to the service) and then processes them. Bigoods.eu systems send you information by following the same encryption process. Anywhere on the site you enter personal data (password, addresses, telephones, credit cards, etc.) there is 256-bit SSL encryption. Encryption is essentially a way of encoding the information until it reaches its intended recipient, which will be able to decode it using the appropriate key. When ordering and if the user / customer is logged in with their username and personal code at the bigoods.eu online store, all communication between your computer and bigoods.eu systems is encrypted using a 256-bit key. That is, each time you send information to the system, your browser first encrypts it using a 256-bit key and then sends it to the system. The bigoods.eu system first decrypts the information it receives using the same key (which is pre-defined by the start of your connection to the service) and then processes them. bigoods.eu systems send you information by following the same encryption process.
D. Back Up
We back up every day backups of all data to prevent any hardware failure at a safe point. Copies are automatically deleted from our systems with a maximum lifespan of one month. Copies are stored in the same datacenter but in a separate storage unit, having exactly the same access and protection principles as the original data. Backups are encrypted so that even if they are leaking, they cannot be recovered.
Ε. Data Leakage
If we experience any data leakage either from malicious attack on our systems or from a user's fault, our moves are as follows: a) Temporary shutdown of the application until we ensure that any security gap is closed. b) Immediate notification of users and / or customers of the violation, its size - and if the error has come from a member, the possible way of dealing with it. c) Immediate notification of any authority is responsible depending on the type of leakage (eg in the case of a malicious attack the Greek police's online crime department is notified).
If you prefer not to see ads from Coffees.gr, you can unsubscribe in one of the following ways: -
- Unsubscribe from using cookies through Google Ads settings by clicking here.
- Unsubscribe from using third-party cookies by clicking here.
This policy can be renewed from time to time, e.g. due to changes in the relevant legislation. We encourage users to periodically check this page for the latest information on privacy practices.
G. Further Questions and Contact:
If you have any questions about this policy or if you wish to exercise your right as described herein, please contact us at email@example.com, by mail to Aksakov 10, Sofia 1000 , Bulgaria or by phone .
H. Trading secrecy
Confidentiality is self-evident. The same basic principles governing classic transactions also apply to e-commerce. All information transmitted by the user at Coffees.gr is confidential and bigoods.eu takes all necessary measures to use them only to the extent necessary in the context of the services provided. Only authorized employees have access to your transaction information and only when necessary, e.g. to process your requests. In the event that Coffees.gr uses third parties to support its systems, it ensures secrecy. For your own safety, you should also treat all information provided through the service as confidential and confidential and not make any disclosure to third parties.