GDPR Compliant

GDPR (General Data Protection Regulation) is the European Union’s push to ensure the safety of private data and customer information. follows GDPR regulations to ensure that all users and their customers’ data is safely processed. Aside from a sound architecture, multiple additional security regulations are in place to stop unauthorized access or processing of private information.

Powered by AWS Cloud Computing

AWS Security

Amazon Web Services (AWS) is the world’s leading cloud hosting provider. High flexibility as well as strong physical and virtual protective measures ensure that private customer data is stored and processed securely. With an international net of hosting regions set up on all continents, our AWS users can not only always be sure where their data is stored, but also that it is stored safely and all local regulations are adhered to (e.g. GDPR).

PCI DSS Compliant

The Payment Card Industry (PCI) Security Standards Council is responsible for managing the security standards for the payment card industry. PCI-DSS is an information security standard used by Lost and Found Software to process branded payment cards. PCI-DSS sets standards such as proper storage or transmission of payment and cardholder data in order to prevent theft, fraud, or loss.

Software Security

Lost and Found Software takes software security very seriously. Our “Security by Design” approach is one of many measures implemented to ensure our solutions are free from internal and external vulnerabilities or cyber attacks. Best programming practices are in place for all software developments as well as authentication and verification safeguards. Continuous testing of the Software (including penetration testing) is standard practice

Fraud Detection

Lost and Found Software preemptively intercepts suspicious and fake requests in real-time. Once such a case is identified, the Software prevents further processing of the case within the system. The algorithms developed specifically for this purpose check all requests for a variety of suspicious features. The entire analysis allows the algorithms to assess the current threat levels. If a possible fraud attempt is detected, the Lost and Found Software users receive a message. Similar to the SPAM filter of an email inbox, the system marks and deactivates all suspicious requests automatically.