1. Our Commitment to Security
At GamesTurkeyAcc, we are committed to protecting your personal and financial information. We implement industry-standard security measures to ensure that your data is safe and secure when you use our services.
This Security Policy outlines the technical and organizational measures we have implemented to protect your information from unauthorized access, alteration, disclosure, or destruction.
2. SSL/TLS Encryption
256-bit SSL Encryption
Our website uses industry-standard SSL (Secure Socket Layer) and TLS (Transport Layer Security) encryption to protect your data during transmission.
What SSL Protects:
- Login credentials (username and password)
- Personal information (name, email, phone number)
- Payment information during transactions
- All data transmitted between your browser and our servers
You can verify our SSL certificate by looking for the padlock icon in your browser's address bar. All pages on our website are served over HTTPS, ensuring end-to-end encryption.
3. Secure Payment Processing
3D Secure Authentication
All credit card payments are processed using 3D Secure technology (Verified by Visa and Mastercard SecureCode), adding an extra layer of security to your transactions.
PCI DSS Compliant
Our payment processing partners are PCI DSS (Payment Card Industry Data Security Standard) compliant, ensuring the highest level of security for card transactions.
Payment Security Features:
- We Never Store Card Details: Credit card information is processed directly by certified payment gateways
- 3D Secure Verification: Additional authentication with your bank for all card payments
- Fraud Detection: Advanced algorithms monitor transactions for suspicious activity
- Secure Tokenization: Payment information is tokenized and encrypted
- Multi-Layer Protection: Multiple security layers protect against unauthorized access
4. Supported Payment Methods
We support secure payment methods with industry-leading security standards:
- Credit Cards: Visa, Mastercard (with 3D Secure)
- Debit Cards: All major debit cards (with 3D Secure)
- Cryptocurrency: Bitcoin, USDT, and other cryptocurrencies
- Digital Wallets: Secure and instant transfers
All payment methods are processed through encrypted channels with no payment data stored on our servers.
5. Data Protection Measures
Technical Safeguards:
- Encryption at Rest: All sensitive data is encrypted in our databases
- Secure Password Storage: Passwords are hashed using industry-standard algorithms
- Firewall Protection: Advanced firewalls protect our servers from unauthorized access
- Regular Security Audits: Continuous monitoring and testing for vulnerabilities
- DDoS Protection: Protection against distributed denial-of-service attacks
- Intrusion Detection: Real-time monitoring for suspicious activities
Organizational Safeguards:
- Access Controls: Strict access controls limit who can view your data
- Employee Training: Staff are trained on data protection and security best practices
- Confidentiality Agreements: All employees sign confidentiality agreements
- Regular Backups: Data is backed up regularly to prevent loss
6. Account Security
How We Protect Your Account:
- Secure password requirements (minimum length and complexity)
- Account activity monitoring for unusual behavior
- Session management with automatic logout
- Password reset verification via email
- Login attempt limiting to prevent brute force attacks
How You Can Protect Your Account:
- Use a strong, unique password
- Never share your password with anyone
- Log out when using shared or public computers
- Keep your email account secure
- Be cautious of phishing attempts
- Report any suspicious activity immediately
7. Fraud Prevention
We employ advanced fraud detection and prevention systems to protect both you and our platform:
- Real-time transaction monitoring
- Machine learning algorithms to detect fraudulent patterns
- IP address verification and geolocation checks
- Device fingerprinting technology
- Manual review of suspicious orders
- Cooperation with payment processors for fraud prevention
8. Security Incident Response
In the unlikely event of a security breach, we have a comprehensive incident response plan:
- Immediate investigation and containment of the breach
- Assessment of affected data and users
- Notification to affected users within 72 hours (as required by KVKK)
- Cooperation with law enforcement if necessary
- Implementation of additional security measures to prevent future incidents
- Transparent communication about the incident and remediation steps
9. Continuous Improvement
Security is an ongoing process. We continuously improve our security measures through:
- Regular security audits and penetration testing
- Keeping software and systems up to date
- Monitoring security news and emerging threats
- Implementing new security technologies
- Employee training and awareness programs
- Compliance with industry standards and regulations
10. Reporting Security Issues
If you discover a security vulnerability or suspicious activity, please report it immediately:
Security Team: info@gamesturkeyacc.com
Phone: +90 553 616 17 61
We take all security reports seriously and will respond promptly. For responsible disclosure, please do not publicly disclose the vulnerability until we have had a chance to address it.
11. Contact Information
For questions about our security practices or to report a security concern:
GamesTurkeyAcc
Address: SOĞUKSU MAH. ATAK SK. ÇAMLIK SİTESİ B BLOK 1 B/8 ORTAHİSAR/TRABZON, Turkey
Phone: +90 553 616 17 61
Email: info@gamesturkeyacc.com
Last Updated: January 22, 2025