At Esycare HealthTech Sdn Bhd, we prioritize the security of your personal and
payment information. We implement industry-standard security measures to
protect your data from unauthorized access, alteration, or disclosure.
2. Encryption
All sensitive information, such as payment details, is encrypted using SSL (Secure Socket
Layer) technology to ensure secure transmission over the internet.
We use encryption protocols for data storage to protect against unauthorized access or
breaches.
3. Access Control
Access to personal data within our company is restricted to authorized personnel only. All
staff members who handle personal information are trained on data protection and are
bound by strict confidentiality agreements.
4. Account Security
If you register for an account on our website, you are responsible for maintaining the
security of your account credentials (username and password). Please ensure that you:
Use a strong password.
Do not share your login information with others.
Immediately notify us of any unauthorized access to your account.
5. Third-Party Services
We work with trusted third-party service providers (e.g., payment gateways, cloud hosting
providers) to help deliver our services. These partners are carefully selected and comply with
security and data protection standards.
6. Monitoring and Alerts
Our systems are continuously monitored to detect and prevent potential security breaches.
In the event of a breach, we will take immediate action to protect your data and notify
affected users as required by law.
7. Security Updates
We regularly update our security protocols and software to address emerging threats and
vulnerabilities. This includes timely updates to our website, server, and applications to
ensure maximum protection.
8. Phishing and Fraud Prevention
Esycare HealthTech Sdn Bhd will never request sensitive information (e.g., passwords, credit
card details) through unsolicited communications such as email or phone calls. If you suspect
fraudulent activity, please contact us immediately.
9. Your Role in Security
While we take significant measures to safeguard your data, it is also important for users to
follow best practices, such as:
Using updated antivirus software.
Avoiding public or unsecured networks when accessing sensitive information.
Logging out after using shared devices.
10. Changes to Security Policy
We reserve the right to modify this Security Policy as needed to stay compliant with the
latest standards and regulations. Any updates will be posted on this page, and users are
encouraged to review the policy periodically.