Shopping Cart

0 items

Personal Data & Transaction Security

                                  Personal Data & Transaction Security

All information that relates to your personal information is safe and confidential. Safety is achieved by the following methods:


Α. User Identification

The codes used to identify you as a user are two: the E-mail or username and the Personal Security Password, which each time they are entered give access with absolute security to your personal information. It is possible to change your personal secret code as often as you wish. The user is solely responsible for maintaining secrecy and hiding it from third parties. In case of loss or leakage, we must immediately notify you, otherwise we are not responsible for the use of the password by an unauthorized person. Secure security codes are stored in our database using a one-way hash algorithm, making it even impossible for administrators to recover it, and this way the system is protected even in the event of a malicious attack.

To ensure the confidentiality of the transfer of personal data, we use the SSL-256 bit encryption protocol. The system has been certified by Geotrust, which specializes in transaction security issues. Encryption is essentially a way to encode the information until it reaches its intended recipient, which will be able to decode it using the appropriate key (this is automatically done by the ssl protocol). Encryption and ssl usage is mandatory on all pages, whether they contain sensitive data or not.


Β. Controlled Access - Security Systems

Access to our servers is controlled by a firewall, which allows for the use of specific services by customers / users, while at the same time prohibiting access to information systems and databases with private information and business information. All servers have an Antivirus service that checks for potential malware that could cause data leakage. For server management, access is only allowed through a VPN service that only our technical team has access to, preventing any access from a public network, even if the administrator access information leaks for any reason. The filesystem of the server is encrypted, so even if one gets a physical access to a server with our data, data cannot be decrypted.


C. Encryption system first decrypts the information it receives using the same key (which is pre-defined by the start of your connection to the service) and then processes them. systems send you information by following the same encryption process. Anywhere on the site you enter personal data (password, addresses, telephones, credit cards, etc.) there is 256-bit SSL encryption. Encryption is essentially a way of encoding the information until it reaches its intended recipient, which will be able to decode it using the appropriate key. When ordering and if the user / customer is logged in with their username and personal code at the online store, all communication between your computer and systems is encrypted using a 256-bit key. That is, each time you send information to the system, your browser first encrypts it using a 256-bit key and then sends it to the system. The system first decrypts the information it receives using the same key (which is pre-defined by the start of your connection to the service) and then processes them. systems send you information by following the same encryption process.


D. Back Up

We back up every day backups of all data to prevent any hardware failure at a safe point. Copies are automatically deleted from our systems with a maximum lifespan of one month. Copies are stored in the same datacenter but in a separate storage unit, having exactly the same access and protection principles as the original data. Backups are encrypted so that even if they are leaking, they cannot be recovered.


Ε. Data Leakage

If we experience any data leakage either from malicious attack on our systems or from a user's fault, our moves are as follows: a) Temporary shutdown of the application until we ensure that any security gap is closed. b) Immediate notification of users and / or customers of the violation, its size - and if the error has come from a member, the possible way of dealing with it. c) Immediate notification of any authority is responsible depending on the type of leakage (eg in the case of a malicious attack the Greek police's online crime department is notified).


F. Cookies

You can visit our website without disclosing your identity to us and without disclosing any personal information. Our site uses cookies to ensure the best possible user experience. Cookies are small text files that are placed on the user's device to track usage patterns and registration preferences. Cookies may be either "permanent" cookies or "periodic" cookies: a permanent cookie will be stored by a web browser and will remain in effect until its specified expiration date unless deleted by the user before the expiration date. A periodic cookie, on the other hand, will expire at the end of the user's period when the web browser is closed. We use both, periodic and permanent cookies on our site. Generated information about our website is used to generate reports about our website and about the traffic of our site. In this way we can constantly improve our website and adapt it constantly to your needs. Users can check and / or delete cookies as they wish - for details (see Blocking or deleting all cookies will have a negative effect on the stability of many websites. If users choose to close our cookies, then they will not be able to use all the features of our site. We also use cookies to serve ads through third-party vendor tools, including Google Ads and Remarketing. Third-party vendors, including Google, use cookies to display ads related to previous visits to our site. These cookies provide no information about you and do not allow any access to your computer or other device.

If you prefer not to see ads from, you can unsubscribe in one of the following ways: -

  - Unsubscribe from using cookies through Google Ads settings by clicking here.

 - Unsubscribe from using third-party cookies by clicking here

This policy can be renewed from time to time, e.g. due to changes in the relevant legislation. We encourage users to periodically check this page for the latest information on privacy practices.


G. Further Questions and Contact:

If you have any questions about this policy or if you wish to exercise your right as described herein, please contact us at, by mail to Aksakov 10, Sofia 1000 , Bulgaria or by phone .


H. Trading secrecy

Confidentiality is self-evident. The same basic principles governing classic transactions also apply to e-commerce. All information transmitted by the user at is confidential and takes all necessary measures to use them only to the extent necessary in the context of the services provided. Only authorized employees have access to your transaction information and only when necessary, e.g. to process your requests. In the event that uses third parties to support its systems, it ensures secrecy. For your own safety, you should also treat all information provided through the service as confidential and confidential and not make any disclosure to third parties.