Security & Compliance

Your Security is Our Priority

Enterprise-grade security protecting your transactions, data, and peace of mind

256-bit Encryption

Bank-level encryption protects all data transmissions

PCI DSS Level 1

Highest level of payment card industry compliance

24/7 Monitoring

Continuous threat detection and response

99.9% Uptime

Redundant infrastructure ensures availability

Our Security Framework

At Neto Payment, security isn't an afterthought—it's embedded in everything we do. As a registered Money Services Business with FINTRAC (M22349044) and PCI DSS Level 1 certified payment processor, we implement multiple layers of security to protect your funds, data, and transactions.

Data Encryption & Protection

Encryption at Rest and in Transit

All sensitive data is encrypted using industry-standard AES-256 encryption when stored and TLS 1.3 encryption during transmission. This ensures that your information remains secure whether it's being transmitted across networks or stored in our databases.

Tokenization

We use tokenization to replace sensitive payment card data with unique identification symbols. This means your actual card numbers are never stored on our servers, significantly reducing the risk of data breaches.

Key Management

Our encryption keys are managed through hardware security modules (HSMs) that meet FIPS 140-2 Level 3 standards. Keys are rotated regularly and access is strictly controlled through multi-party authorization.

Access Control & Authentication

Multi-Factor Authentication (MFA)

We require multi-factor authentication for all account access, combining something you know (password) with something you have (mobile device) or something you are (biometric). This dramatically reduces the risk of unauthorized access even if passwords are compromised.

Biometric Security

Our mobile applications support biometric authentication including fingerprint and facial recognition, providing convenient yet highly secure access to your account.

Role-Based Access Control

Internal access to systems and data is governed by the principle of least privilege. Employees only have access to the information necessary for their specific roles, and all access is logged and audited.

Session Management

Sessions automatically expire after periods of inactivity, and you can remotely log out of all devices from your account settings. We also provide real-time notifications of login attempts from new devices or locations.

Fraud Prevention & Detection

AI-Powered Fraud Detection

Our advanced machine learning algorithms analyze transaction patterns in real-time to identify and prevent fraudulent activity. The system continuously learns from new data to improve detection accuracy while minimizing false positives.

Transaction Monitoring

Every transaction is screened against multiple risk factors including:

  • Historical transaction patterns and behavior
  • Geographic location and device fingerprinting
  • Transaction velocity and amount anomalies
  • Known fraud indicators and blacklists
  • Merchant and beneficiary risk profiles

3D Secure Authentication

We support 3D Secure 2.0 (3DS2) for card transactions, adding an extra layer of authentication that significantly reduces fraud while maintaining a smooth user experience. The protocol uses risk-based authentication to minimize friction for legitimate transactions.

Chargeback Protection

Our chargeback prevention system integrates with networks like Ethoca and Verifi to receive real-time alerts, allowing us to resolve disputes before they become chargebacks. We also maintain detailed transaction records to support dispute resolution.

Infrastructure Security

Cloud Security

Our infrastructure is hosted on leading cloud providers with SOC 2 Type II certification. We utilize multiple availability zones to ensure redundancy and implement network segmentation to isolate sensitive systems.

DDoS Protection

Advanced DDoS mitigation protects our services from volumetric attacks, ensuring continuous availability even during attack attempts. Traffic is filtered through multiple layers of protection before reaching our infrastructure.

Firewall & Intrusion Detection

Next-generation firewalls and intrusion detection/prevention systems (IDS/IPS) monitor all network traffic for malicious activity. Any suspicious behavior triggers immediate alerts and automated responses.

Data Backup & Recovery

We maintain encrypted backups across geographically distributed locations with automated daily backups and point-in-time recovery capabilities. Our disaster recovery plan ensures business continuity with a Recovery Time Objective (RTO) of under 4 hours.

Compliance & Regulations

PCI DSS Level 1

Highest level of Payment Card Industry Data Security Standard compliance for processing, storing, and transmitting card data.

FINTRAC Registered

Registered Money Services Business (MSB: M22349044) with Canada's Financial Transactions and Reports Analysis Centre.

AML/KYC Compliance

Comprehensive Anti-Money Laundering and Know Your Customer procedures meeting international standards.

GDPR Compliant

Full compliance with EU General Data Protection Regulation for handling personal data of EU residents.

We undergo regular third-party audits and penetration testing to ensure ongoing compliance and identify potential vulnerabilities before they can be exploited.

Security Testing & Audits

Penetration Testing

We engage independent security firms to conduct quarterly penetration tests, simulating real-world attacks to identify vulnerabilities. All findings are remediated based on severity, with critical issues addressed immediately.

Code Security Reviews

All code undergoes automated security scanning and manual peer review before deployment. We use static application security testing (SAST) and dynamic application security testing (DAST) tools integrated into our CI/CD pipeline.

Bug Bounty Program

We maintain a responsible disclosure program, welcoming security researchers to report vulnerabilities. Eligible findings are rewarded based on severity and impact.

Employee Security

Security is a collective responsibility:

  • All employees undergo comprehensive security training during onboarding and annually
  • Background checks are conducted for all personnel with access to sensitive systems
  • Security awareness programs include phishing simulations and social engineering tests
  • Strict policies govern the use of company devices and access to customer data
  • Incident response procedures are regularly tested through tabletop exercises

Your Role in Security

While we implement robust security measures, you play a crucial role in protecting your account:

Use Strong Passwords

Create unique passwords with a mix of uppercase, lowercase, numbers, and symbols. Never reuse passwords across multiple sites.

Enable Two-Factor Authentication

Add an extra layer of security by enabling 2FA. Use authenticator apps rather than SMS when possible.

Beware of Phishing

We will never ask for your password or 2FA codes via email. Always verify URLs before entering credentials.

Monitor Your Account

Regularly review your transaction history and enable email/SMS notifications for account activity.

Keep Software Updated

Ensure your devices, browsers, and apps are running the latest security updates.

Incident Response

In the event of a security incident, our dedicated Security Incident Response Team (SIRT) follows a structured process:

  1. Detection & Analysis: Identify and assess the incident scope and impact
  2. Containment: Isolate affected systems to prevent further damage
  3. Eradication: Remove the threat and close vulnerabilities
  4. Recovery: Restore services and verify system integrity
  5. Communication: Notify affected parties as required by law
  6. Lessons Learned: Document and implement improvements

Report Security Issues

If you discover a security vulnerability or suspicious activity:

Security Team Contact

Email: security@comonpay.com

24/7 Support: supported@comonpay.com

We appreciate responsible disclosure and will respond to security reports within 48 hours.