Security Policy

1. Data Protection
  • At Esycare HealthTech Sdn Bhd, we prioritize the security of your personal and payment information. We implement industry-standard security measures to protect your data from unauthorized access, alteration, or disclosure.
2. Encryption
  • All sensitive information, such as payment details, is encrypted using SSL (Secure Socket Layer) technology to ensure secure transmission over the internet.
  • We use encryption protocols for data storage to protect against unauthorized access or breaches.
3. Access Control
  • Access to personal data within our company is restricted to authorized personnel only. All staff members who handle personal information are trained on data protection and are bound by strict confidentiality agreements.
4. Account Security
  • If you register for an account on our website, you are responsible for maintaining the security of your account credentials (username and password). Please ensure that you:
    • Use a strong password.
    • Do not share your login information with others.
    • Immediately notify us of any unauthorized access to your account.
5. Third-Party Services
  • We work with trusted third-party service providers (e.g., payment gateways, cloud hosting providers) to help deliver our services. These partners are carefully selected and comply with security and data protection standards.
6. Monitoring and Alerts
  • Our systems are continuously monitored to detect and prevent potential security breaches. In the event of a breach, we will take immediate action to protect your data and notify affected users as required by law.
7. Security Updates
  • We regularly update our security protocols and software to address emerging threats and vulnerabilities. This includes timely updates to our website, server, and applications to ensure maximum protection.
8. Phishing and Fraud Prevention
  • Esycare HealthTech Sdn Bhd will never request sensitive information (e.g., passwords, credit card details) through unsolicited communications such as email or phone calls. If you suspect fraudulent activity, please contact us immediately.
9. Your Role in Security
  • While we take significant measures to safeguard your data, it is also important for users to follow best practices, such as:
    • Using updated antivirus software.
    • Avoiding public or unsecured networks when accessing sensitive information.
    • Logging out after using shared devices.
10. Changes to Security Policy
  • We reserve the right to modify this Security Policy as needed to stay compliant with the latest standards and regulations. Any updates will be posted on this page, and users are encouraged to review the policy periodically.