"Power your SaaS business, control your data"

Nicolas Albana, CEO at AppXite

Information Security in AppXite

We place information security at the core of all services. All our services are designed to empower the scalability of SaaS businesses. That is why we continuously work to improve our services and implement new features via the data provided to us. In doing so, we want to reassure that our customers and end-users remain confident that their data is well protected.

Therefore, we maintain a rigorous compliance strategy which includes maintaining compliance with the following ISO Standards.

Bureau Veritas Certification 9001

Quality Management Standard which requires AppXite to ensure that our products and services consistently meet the Best Industry Practice and that service quality is continuously improved.

Bureau Veritas Certificaton 20000

Information Technology Service Management Standard which requires AppXite to ensure that service design, transition, and delivery fulfil the service requirements.

Bureau Veritas Certification 27001

Information Security Standard which establishes a framework of security controls to safeguard internal and external data.

 

Bureau Veritas Certification 27017

Code of practice for information security controls based on ISO/IEC 27002 for cloud services, which provides additional cloud-specific implementation guidance and provides additional controls to address cloud-specific information security threats and risks considerations.

Bureau_Veritas_Certificato_27018v2

Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors which establishes control objectives, controls, and guidelines for implementing measures for the protection of PII in line with the privacy principles.

PCI-DSS

AppXite Platform supports various features designed to help our partners to manage their subscription-based business. Among such features is the ability to smoothen the customer payment experience by enabling payment card transactions.

For that reason, AppXite Platform is integrated with the leading PCI-DSS Level 1 service providers that adhere to the highest level of cardholder data protection standards.

 

Our information security strategy is built around the following principles:

•   Lawfulness: We maintain compliance with the highest regarded information security standards and data protection laws.
•   Transparency: We provide full information regarding how we use data to make informative choices while respecting privacy rights.
•   Purpose limitation and minimization: We do not access more data than necessary while following security preferences.
•   Improvements: We use the collected data to provide and improve our services.
•   Control: We provide the functionality to customize security preferences.
•   Integrity and Confidentiality: We apply measures to protect customer data against unauthorized access, loss and destruction.

What Kind of Data Do We Collect?

girl and boy icon

Contact Information

We process information about organizations, such as the company name, address, organization number, and company logo. For contact, we may ask you to provide your name, surname, email and phone number. This information is needed to carry out registration, customization, and management for your account within the AppXite Platform in addition to providing other AppXite services. Other contact data may be required for technical, legal or financial contact.

arrows

End-Customer Data

We process information about end-customers, including contact information and purchases made via AppXite Platform. This information is required to enable the purchasing process and to manage customer billing. Please make sure that customers consent to such data being available.

invoice in dollars

Financial Data

We process information about sales made via AppXite Platform to provide billing output and reports.

Visit our Legal page to read the documents that ensure AppXite's legal transparency and compliance or visit our Knowledge Base to learn more about our approach towards information security