We have a strong commitment to security best practices and industry standards. The most secure way for guests to pay for a vacation rental is on our website. Guests who pay on our website are covered by our Book with Confidence Guarantee.
Secure system infrastructure
We are PCI-DSS certified. This means that we've taken the required steps to ensure our systems are secure to protect sensitive payment card information. We've adopted leading-edge security technologies and provide an enhanced security infrastructure. Also, we uphold our payment processing partners to the same security standards and best practices.
Regulatory compliance
We also prioritize compliance with the applicable government regulations regarding data privacy, notifications, and security concerns. As a result, we've adopted a market-leading approach to keeping our customers informed about our key privacy-related policies and procedures.
Learn more about our Privacy Policy.
FAQs
In general, it protects data by encoding the information in such a way that it is only accessible to authorized parties or individuals. It is a way of safeguarding data, documents, or information from this generation's threats such as malicious hackers, spies, and criminals.
How do I secure my payment information? ›
10 best practices for secure online payment processing
- Understand your PCI compliance requirements. ...
- Encrypt data with TLS. ...
- Implement 3D Secure 2. ...
- Multi- or Two-Factor Authentication. ...
- Require Card Verification Value (CVV) ...
- Use payment tokenization. ...
- Ensure your website platform is secure. ...
- Implement a fraud detection tool.
How can I keep my personal and financial information secure? ›
The following tips can help.
- #1 – Use strong passwords. ...
- #2 – Keep your operating system and software up to date. ...
- #3 – Never click on suspicious emails. ...
- #4 – Don't share personal information over public Wi-Fi connections. ...
- #5 – Maintain security software. ...
- #6 – Shred financial documents. ...
- #7 – Monitor your accounts.
What is personal security in information security? ›
Personnel security protects your people, information, and assets by enabling your organisation to: reduce the risk of harm to your people, customers and partners. reduce the risk of your information or assets being lost, damaged, or compromised.
What are 5 examples of personal information? ›
Examples of personally identifiable information (PII) include : Social security number (SSN), passport number, driver's license number, taxpayer identification number, patient identification number, and financial account or credit card number.
What are the 4 types of information security? ›
In this article, we will explore four types of information security: network security, application security, endpoint security, and data security. Each of these types plays a crucial role in protecting valuable assets and ensuring the confidentiality, integrity, and availability of information.
How do I know my payment is secure? ›
Check for 'https://' at the beginning of the website URL and the padlock symbol in the address bar. This indicates that the site has an SSL certificate, suggesting that any data transferred is encrypted and secure.
What is a payment security? ›
What is payment security? Payment security refers to the systems, processes, and measures employed to protect financial transactions from unauthorized access, data breaches, and fraud.
What is the most secure payment method? ›
Secure online payment methods
- Credit cards. By and large, credit cards are easily the most secure and safe payment method to use when you shop online. ...
- ACH payments. ...
- Stored payment credentials. ...
- Credit cards with EMV chip technology. ...
- Credit cards with contactless payment. ...
- Payment apps.
How do I lock down my personal information? ›
A guide to protecting your personal information
- Avoid oversharing on social media. ...
- Use strong passwords for your devices and accounts. ...
- Use two-factor authentication. ...
- Find secure networks. ...
- Evaluate links for signs of phishing before clicking. ...
- Update your systems and software.
Here are a few tips to ensure your personal information doesn't end up in the wrong hands.
- Create strong passwords. ...
- Don't overshare on social media. ...
- Use free wi-fi with caution. ...
- Watch out for links and attachments. ...
- Check to see if the site is secure. ...
- Consider additional protection.
What is the most secure way to keep money? ›
Where Is the Safest Place To Keep Cash? Deposit accounts—like savings accounts, CDs, MMAs, and checking accounts—are a safe place to keep money because consumer deposits are insured for up to $250,000, either by the FDIC or NCUA.
What are the 5 principles of personal security? ›
These principles are preparation, detection, deterrence, delay, and defense.
How to maintain personal security? ›
Personal Security Tips
- Be alert and aware! While you are walking, keep your mind on what is going on around you. ...
- Display confidence. Walk with purpose, scan the area around you and make casual eye contact with others to display confidence. ...
- Keep your hands free. ...
- Trust your instincts. ...
- Ask for help.
What is personal security in your own words? ›
Personal security refers to the state of being safe from danger or harm. It is the protection of oneself and one's property from threats such as theft, violence, or cyber attacks. Examples of personal security measures include: Locking doors and windows to prevent break-ins.
How do you secure personal information? ›
Take steps to protect your privacy online. Ensure that your computer, smartphone and other mobile devices are password protected. Only download from reputable sources. Install the latest operating system, anti-virus, anti-spam and firewall programs and keep them updated.
What is considered protected personal information? ›
Protected personally identifiable information (Protected PII) refers to an individual's first name or first initial and last name in combination with any one or more of types of information, including, but not limited to, social security number, passport number, credit card numbers, clearances, bank numbers, biometrics ...
What are the 5 A of information security? ›
Those five pillars start with the three elements of the CIA triad; confidentiality, integrity, and availability, and then they add on two more elements; authenticity and non-repudiation. Authenticity in information security refers to the verification that data, transactions, communications, or documents are genuine.
What is considered personal security? ›
Personal security refers to the state of being safe from danger or harm. It is the protection of oneself and one's property from threats such as theft, violence, or cyber attacks. Examples of personal security measures include: Locking doors and windows to prevent break-ins.