Correct.email - General Security
Correct.email website attaches great importance to the protection of information of our clients. Sensitive information of our users are protected both online and off-line.
While we use TLS encryption to protect sensitive information online, we also do everything in our power to protect user-information off-line. All of our users’ information, not just the sensitive information mentioned above, are restricted in our offices. Only employees who need the information to perform a specific job (for example, our billing clerk or a customer service representative) are granted access to personally identifiable information. Every action on information in our office is confirmed by password to ensure great security and transparency of information management.
Information are managed by highly qualified staff with regular trainings to keep them perfectly prepared. Our servers with your personal information is kept in a very secured environment, in locked room.
Extended Validation Certificate (EV)
Correct.email website attaches great importance to the protection of information of our clients. Sensitive information of our users are protected both online.
When our registration/order form asks users to enter sensitive information (such as credit card number), that information is encrypted and is protected with industry-standard strong encryption - TLS.
In addition to improving security and confirming trust in our company. We have undergone full verification of company data by receiving an EV certificate.
Secure by design
The system is designed as part of the so-called “secure by design” - means the system in the design phase is created so that it is a safe space excluding the possibility of external interference, hiding back-doors that allow unauthorized access to system resources.
The algorithms, mechanisms and cryptographic protocols used in the solution make it resistant to the known methods of cryptanalysis and the product itself is very safe.
Writing secure codes
Creating a secure software requires strictly defining the security requirements that the program must meet. Our company has developed above-average standards for writing safe applications. Our software engineers are constantly improving their skills in terms of security. Designing for security is the DNA-Code of our company.
In information security, computer science, and other fields, the principle of a computing environment, every module must be able to access the information and resources
We use the best dedicated servers is the best solution for our project, which requires full control over the entire infrastructure and its individual elements.
We choose the server configuration that best meets our needs. It guarantees reliability and high computing power. Dedicated servers are based on the latest technologies of leading IT equipment manufacturers.
Customers can be sure that servers and IT systems are stored in a secure environment.
We leave clouds in the sky ;)