TravelBank takes the protection of customer’s
Playing it safe.
To support our clients, we use a multi-tiered approach based on proven industry standards and continue to evolve our security capabilities with the highest standards available.
Our systems use powerful Transport Layer Security (TLS) to encrypt any data transmitted between us and our users, and between our servers and data centers. It’s as strong as the encryption used by online banks and payment systems, and it ensures that outside parties can’t read or intercept your information.
Both our data center and our head office are private and secure, and have strict multi-layer security protocols including gatekeeping by security officers, visitor vetting and authentication, and badging. Our data center is built to make sure we can keep delivering the best experience to you even if things happen that are out of our control. This includes disaster-compliant construction and architecture, backup generators, high performance HVAC systems, and internal systems to detect smoke, fire, and water.
Protecting Your Information
We have and will continue to maintain a formal data protection program, managed centrally in a dedicated Information Security Management role, supported through a federated administration model involving all areas of the organization. We'll continue to evolve our data protection capabilities to address a dynamic threat landscape.
This architecture also allows us to proudly stand behind our track record of 99.9% uptime, providing you with the confidence necessary to focus on your core business products and services.
Real-time Audit Log
To ensure traceability of activity in our system, TravelBank maintains real-time audit logs of access to the system and your personal information. Transactions are recorded and stored in a specialized logging system for access and changes made by our administrators, your employees and our automated system.
This architecture also allows us to proudly stand behind our track record of 99.9% uptime, providing you with the confidence necessary to focus on your core business products and services
We cross-shred sensitive printed information, and irrevocably delete sensitive information that lives on hard drives and other media formats.
Redundancy & Recoverability
Leveraging state-of-the-art cloud computing technology, we are uniquely positioned to incorporate some of the most advanced disaster recovery capabilities in the world today. With redundant fault tolerant systems, our recovery capabilities are one of our proudest architectural areas.
As part of our recovery strategy, backups are scheduled and taken on a regular and ongoing basis, ensuring no matter how bad a disaster may affect the geographic area we operate from, our service will be up and running when you need it.
Email our Security Team at email@example.com