{
    "id": 1484,
    "date": "2024-02-07T12:57:00",
    "date_gmt": "2024-02-07T12:57:00",
    "guid": {
        "rendered": "https:\/\/bingoo.ge\/?page_id=1484"
    },
    "modified": "2024-02-07T14:15:41",
    "modified_gmt": "2024-02-07T14:15:41",
    "slug": "security",
    "status": "publish",
    "type": "page",
    "link": "https:\/\/bingoo.ge\/en\/security\/",
    "title": {
        "rendered": "Security"
    },
    "content": {
        "rendered": "<div data-elementor-type=\"wp-page\" data-elementor-id=\"1484\" class=\"elementor elementor-1484\" wpc-filter-elementor-widget=\"1\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66e302f e-flex e-con-boxed e-con e-parent\" data-id=\"66e302f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea228c3 elementor-widget elementor-widget-heading\" data-id=\"ea228c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Trader\u2019s Security Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-064fe3e elementor-widget elementor-widget-heading\" data-id=\"064fe3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">1. The Purpose <\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eaa90de elementor-widget elementor-widget-text-editor\" data-id=\"eaa90de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The purpose of the security policy is to create control mechanisms to protect the information under the trader\u2019s control and thereby ensure confidentiality, integrity and availability.<br \/>The policy aims to create information security protection mechanisms against internal and external threats, basic rules of behavior against crisis situations and intentional injuries.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbb81c2 elementor-widget elementor-widget-heading\" data-id=\"fbb81c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">2. Security Policy Entities<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d6372d elementor-widget elementor-widget-text-editor\" data-id=\"7d6372d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>2.1. Security policy requirements apply to:<br \/>a) persons hired by the trader \u2013 hereinafter &#8220;Subjects&#8221;;<br \/>b) to all persons who may have access to information protected by the merchant.<\/p><p>2.2. Entities are obliged to comply with the requirements of the policy and take responsibility for the complete and thorough implementation of the standards and rules set for them.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1964cd3 elementor-widget elementor-widget-heading\" data-id=\"1964cd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">3. Safety measures<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a38a7d elementor-widget elementor-widget-text-editor\" data-id=\"8a38a7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>3.1. The trader carries out continuous control over the information processing devices in order to ensure their correct and safe use.<\/p><p>3.2. The trader shall ensure the creation of documentation of the information processing systems, including the configurations of the technologies used. Information that contains data important for information security will be stored in a safe place and access to it will be restricted depending on the need to receive information.<\/p><p>3.3. Information carriers containing highly critical information based on information classification will be recorded and their use, storage and destruction will be subject to strict control.<\/p><p>3.4. Subjects are obliged to make sure before using any computer program that the use of the program will not lead to the spread of viruses and damage to the technical equipment, which would endanger the security of information.<\/p><p>3.5. The trader should continuously educate\/train the subjects to avoid any mistakes related to information security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e85ce6f elementor-widget elementor-widget-heading\" data-id=\"e85ce6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">3. Risk assessment and management<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85c04bc elementor-widget elementor-widget-text-editor\" data-id=\"85c04bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>3.1. Risk assessment is the starting point before any safety management plan is developed. Risk assessment identifies existing and foreseeable security risks associated with the project \/ with operations.<\/p><p>3.2. The risk assessment will be reviewed annually or upon any significant safety-related incident. The risk assessment will also be revised in case of any changes in the relevant legislation.<\/p><p>During the risk assessment, the following issues should be taken into consideration:<\/p><p>3.3.\u00a0 Regularly conduct vulnerability assessments on the website and associated systems to identify potential security weaknesses or loopholes that could be exploited by attackers.<\/p><p>3.4. Ensure that payment service provider is compliant with the PCI DSS, which includes maintaining a secure network, protecting cardholder data, regularly monitoring and testing networks, and implementing strong access control measures.<\/p><p>3.5.\u00a0 Implement secure protocols, such as HTTPS, for transmitting cardholder data over the internet to protect against unauthorized interception or access.<\/p><p>3.6. Use strong encryption mechanisms (e.g., SSL\/TLS) to encrypt sensitive data, including credit card information, both during transit and at rest, to prevent unauthorized access or data theft.<\/p><p>3.7.\u00a0 Implement strict access controls to restrict access to sensitive areas of the website, including the payment processing systems, to authorized personnel only. This includes strong password policies.<\/p><p>3.8.\u00a0 Ensure that all website software, including content management systems, and plugins, up to date with the latest security patches and updates to mitigate risks.<\/p><p>3.9. Use intrusion detection and prevention systems (IDS\/IPS) to monitor network traffic and identify potential attacks or suspicious activities. Implement measures to block or mitigate these threats in real-time.<\/p><p>3.10.\u00a0 Ensure hostage of the website and associated databases on a secure and reputable hosting provider that implements robust security measures, such as firewalls, intrusion detection systems, and regular security audits.<\/p><p>3.11. Conduct periodic security audits by independent third-party assessors to evaluate the effectiveness of the security controls and identify any potential weaknesses or areas for improvement.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce91194 elementor-widget elementor-widget-heading\" data-id=\"ce91194\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">4. Responsibility<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a13ae9d elementor-widget elementor-widget-text-editor\" data-id=\"a13ae9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>4.1. The trader is responsible for the security policy and the fulfillment of the requirements established by the security policy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fcf657b elementor-widget elementor-widget-heading\" data-id=\"fcf657b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">5. Other Provisions<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-937e3b6 elementor-widget elementor-widget-text-editor\" data-id=\"937e3b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>5.1. The security policy is public and accessible to any consumer of the trader.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>",
        "protected": false
    },
    "excerpt": {
        "rendered": "<p>Trader\u2019s Security Policy 1. The Purpose The purpose of the security policy is to create control mechanisms to protect the information under the trader\u2019s control and thereby ensure confidentiality, integrity and availability.The policy aims to create information security protection mechanisms against internal and external threats, basic rules of behavior against crisis situations and intentional injuries&#8230;.<\/p>",
        "protected": false
    },
    "author": 1,
    "featured_media": 0,
    "parent": 0,
    "menu_order": 0,
    "comment_status": "closed",
    "ping_status": "closed",
    "template": "elementor_theme",
    "meta": {
        "_bst_post_transparent": "",
        "_bst_post_title": "show",
        "_bst_post_layout": "fullwidth",
        "_bst_post_sidebar_id": "",
        "_bst_post_content_style": "unboxed",
        "_bst_post_vertical_padding": "hide",
        "_bst_post_feature": "hide",
        "_bst_post_feature_position": "",
        "_bst_post_header": false,
        "_bst_post_footer": false,
        "footnotes": ""
    },
    "class_list": [
        "post-1484",
        "page",
        "type-page",
        "status-publish",
        "hentry"
    ],
    "yoast_head": "<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security - Bingoo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bingoo.ge\/en\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security - Bingoo\" \/>\n<meta property=\"og:description\" content=\"Trader\u2019s Security Policy 1. The Purpose The purpose of the security policy is to create control mechanisms to protect the information under the trader\u2019s control and thereby ensure confidentiality, integrity and availability.The policy aims to create information security protection mechanisms against internal and external threats, basic rules of behavior against crisis situations and intentional injuries....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bingoo.ge\/en\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"Bingoo\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-07T14:15:41+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bingoo.ge\\\/security\\\/\",\"url\":\"https:\\\/\\\/bingoo.ge\\\/security\\\/\",\"name\":\"Security - Bingoo\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bingoo.ge\\\/ka\\\/#website\"},\"datePublished\":\"2024-02-07T12:57:00+00:00\",\"dateModified\":\"2024-02-07T14:15:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bingoo.ge\\\/security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bingoo.ge\\\/security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bingoo.ge\\\/security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/bingoo.ge\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bingoo.ge\\\/ka\\\/#website\",\"url\":\"https:\\\/\\\/bingoo.ge\\\/ka\\\/\",\"name\":\"Bingoo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bingoo.ge\\\/ka\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bingoo.ge\\\/ka\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bingoo.ge\\\/ka\\\/#organization\",\"name\":\"Bingoo\",\"url\":\"https:\\\/\\\/bingoo.ge\\\/ka\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bingoo.ge\\\/ka\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bingoo.ge\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cropped-bingo-logo-07.png\",\"contentUrl\":\"https:\\\/\\\/bingoo.ge\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cropped-bingo-logo-07.png\",\"width\":434,\"height\":122,\"caption\":\"Bingoo\"},\"image\":{\"@id\":\"https:\\\/\\\/bingoo.ge\\\/ka\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->",
    "yoast_head_json": {
        "title": "Security - Bingoo",
        "robots": {
            "index": "index",
            "follow": "follow",
            "max-snippet": "max-snippet:-1",
            "max-image-preview": "max-image-preview:large",
            "max-video-preview": "max-video-preview:-1"
        },
        "canonical": "https:\/\/bingoo.ge\/en\/security\/",
        "og_locale": "en_US",
        "og_type": "article",
        "og_title": "Security - Bingoo",
        "og_description": "Trader\u2019s Security Policy 1. The Purpose The purpose of the security policy is to create control mechanisms to protect the information under the trader\u2019s control and thereby ensure confidentiality, integrity and availability.The policy aims to create information security protection mechanisms against internal and external threats, basic rules of behavior against crisis situations and intentional injuries....",
        "og_url": "https:\/\/bingoo.ge\/en\/security\/",
        "og_site_name": "Bingoo",
        "article_modified_time": "2024-02-07T14:15:41+00:00",
        "twitter_card": "summary_large_image",
        "twitter_misc": {
            "Est. reading time": "3 minutes"
        },
        "schema": {
            "@context": "https:\/\/schema.org",
            "@graph": [
                {
                    "@type": "WebPage",
                    "@id": "https:\/\/bingoo.ge\/security\/",
                    "url": "https:\/\/bingoo.ge\/security\/",
                    "name": "Security - Bingoo",
                    "isPartOf": {
                        "@id": "https:\/\/bingoo.ge\/ka\/#website"
                    },
                    "datePublished": "2024-02-07T12:57:00+00:00",
                    "dateModified": "2024-02-07T14:15:41+00:00",
                    "breadcrumb": {
                        "@id": "https:\/\/bingoo.ge\/security\/#breadcrumb"
                    },
                    "inLanguage": "en-US",
                    "potentialAction": [
                        {
                            "@type": "ReadAction",
                            "target": [
                                "https:\/\/bingoo.ge\/security\/"
                            ]
                        }
                    ]
                },
                {
                    "@type": "BreadcrumbList",
                    "@id": "https:\/\/bingoo.ge\/security\/#breadcrumb",
                    "itemListElement": [
                        {
                            "@type": "ListItem",
                            "position": 1,
                            "name": "Home",
                            "item": "https:\/\/bingoo.ge\/"
                        },
                        {
                            "@type": "ListItem",
                            "position": 2,
                            "name": "Security"
                        }
                    ]
                },
                {
                    "@type": "WebSite",
                    "@id": "https:\/\/bingoo.ge\/ka\/#website",
                    "url": "https:\/\/bingoo.ge\/ka\/",
                    "name": "Bingoo",
                    "description": "",
                    "publisher": {
                        "@id": "https:\/\/bingoo.ge\/ka\/#organization"
                    },
                    "potentialAction": [
                        {
                            "@type": "SearchAction",
                            "target": {
                                "@type": "EntryPoint",
                                "urlTemplate": "https:\/\/bingoo.ge\/ka\/?s={search_term_string}"
                            },
                            "query-input": {
                                "@type": "PropertyValueSpecification",
                                "valueRequired": true,
                                "valueName": "search_term_string"
                            }
                        }
                    ],
                    "inLanguage": "en-US"
                },
                {
                    "@type": "Organization",
                    "@id": "https:\/\/bingoo.ge\/ka\/#organization",
                    "name": "Bingoo",
                    "url": "https:\/\/bingoo.ge\/ka\/",
                    "logo": {
                        "@type": "ImageObject",
                        "inLanguage": "en-US",
                        "@id": "https:\/\/bingoo.ge\/ka\/#\/schema\/logo\/image\/",
                        "url": "https:\/\/bingoo.ge\/wp-content\/uploads\/2024\/01\/cropped-bingo-logo-07.png",
                        "contentUrl": "https:\/\/bingoo.ge\/wp-content\/uploads\/2024\/01\/cropped-bingo-logo-07.png",
                        "width": 434,
                        "height": 122,
                        "caption": "Bingoo"
                    },
                    "image": {
                        "@id": "https:\/\/bingoo.ge\/ka\/#\/schema\/logo\/image\/"
                    }
                }
            ]
        }
    },
    "_links": {
        "self": [
            {
                "href": "https:\/\/bingoo.ge\/en\/wp-json\/wp\/v2\/pages\/1484",
                "targetHints": {
                    "allow": [
                        "GET"
                    ]
                }
            }
        ],
        "collection": [
            {
                "href": "https:\/\/bingoo.ge\/en\/wp-json\/wp\/v2\/pages"
            }
        ],
        "about": [
            {
                "href": "https:\/\/bingoo.ge\/en\/wp-json\/wp\/v2\/types\/page"
            }
        ],
        "author": [
            {
                "embeddable": true,
                "href": "https:\/\/bingoo.ge\/en\/wp-json\/wp\/v2\/users\/1"
            }
        ],
        "replies": [
            {
                "embeddable": true,
                "href": "https:\/\/bingoo.ge\/en\/wp-json\/wp\/v2\/comments?post=1484"
            }
        ],
        "version-history": [
            {
                "count": 11,
                "href": "https:\/\/bingoo.ge\/en\/wp-json\/wp\/v2\/pages\/1484\/revisions"
            }
        ],
        "predecessor-version": [
            {
                "id": 1523,
                "href": "https:\/\/bingoo.ge\/en\/wp-json\/wp\/v2\/pages\/1484\/revisions\/1523"
            }
        ],
        "wp:attachment": [
            {
                "href": "https:\/\/bingoo.ge\/en\/wp-json\/wp\/v2\/media?parent=1484"
            }
        ],
        "curies": [
            {
                "name": "wp",
                "href": "https:\/\/api.w.org\/{rel}",
                "templated": true
            }
        ]
    }
}