Client information like business details, phone number and Emails are protected with multiple layers of security.
Payment gateways, used by us, comply with highest standards of security and guarantee 'zero' data leakage.
We work with extreme transparency and clarity of thoughts. We believe in adhering to ethical code of conduct and refrain from indulging in illegal practices which result in moral infringement. The Jewel Soft is a billing application fuelled by only a required amount of information which ensures its effective functioning. Information of any kind remains secure and is not exported to other sources under any circumstances whatsoever.
We, however, reserve the right to alter the above Privacy Statement at any given point of time. Kindly visit this page regularly to stay updated on any policy changes, affecting your privacy concerns directly or indirectly.
The Jewel Soft is one of the most user-friendly online billing applications which is designed with information security and reliability in mind. The Jewel Soft follows a customer centric approach and strives to deliver the ultimate experience with 'Zero Compromise' on security.
SSL Information transferred between browsers and The Jewel Soft servers is protected from external intrusion with the help of a 256-bit SSL encryption technique. The lock symbol indicates that you are actually communicating with the authentic site of The Jewel Soft and not its impersonator.
Physical Security AWS is one of the finest solution providers in building and managing large scale data centers. Dedicated The Jewel Soft servers are protected from physical security threats such as earthquakes and other natural calamities as well.
Protecting Sensitive Data Banking related sensitive information like account details, credit card details stays encrypted on the highly secure '2checkout' online payment gateway servers. Such information is NOT stored on the The Jewel Soft server at any point of time.
Data Security & Accessibility Total Data security is ensured with the implementation of powerful cryptographic algorithms like Advanced Encryption Standards (AES) and many others. The user information stays concealed from the The Jewel Soft staff network as well.
Vulnerability ScanningOur high-end data security providers scan The Jewel Soft servers for vulnerabilities to attacks. These scans check for vulnerability at the server and internet level as well.
Backups The Jewel Soft is devoid of data failures owing to the distribution of data across multiple servers which prevent data loss in case of single server failures.