SECURITY

User Website Usage Agreement

HardshipHero Security Policy

Last Updated: September 5, 2024
Effective Date: September 5, 2024

At HardshipHero, LLC (“HardshipHero,” “we,” “our,” or “us”), the security of your personal information is a top priority. We implement industry-standard security practices to protect the confidentiality, integrity, and availability of your data when you use our website, services, or interact with us.

This Security Policy outlines the steps we take to safeguard your information and describes what you can do to help protect your personal information. By using hardshiphero.com (the “Site”) or our related services, you acknowledge and agree to the terms outlined in this Security Policy.



1. Overview of Security Measures

We employ a variety of administrative, technical, and physical safeguards to protect your information. These measures are designed to ensure the confidentiality, integrity, and availability of your personal information against unauthorized access, alteration, disclosure, or destruction. These safeguards include:

  • Encryption: We use industry-standard encryption (SSL/TLS) to protect your data during transmission over the Internet. This ensures that any personal or financial information transmitted between your device and our servers is secure and cannot be easily intercepted.

  • Secure Servers: All data is stored on secure servers behind firewalls designed to prevent unauthorized access. Our servers reside in highly secured facilities with 24/7 monitoring and multiple layers of physical security.

  • Access Controls: Access to personal information is restricted to authorized personnel only. We implement role-based access controls and regularly review access permissions to ensure that only those who need to access sensitive data for business purposes are granted access.

  • Regular Audits: We regularly audit our systems, procedures, and access controls to ensure that our security protocols remain up to date with evolving security threats. This includes internal and external security assessments.

  • Security Software: We utilize antivirus, anti-malware, intrusion detection, and prevention systems to monitor and defend against potential threats. These systems are updated regularly to ensure the highest level of protection.



2. Secure Data Transmission

When you submit sensitive information (such as credit card or Social Security numbers) through our Site, we encrypt that information using SSL (Secure Sockets Layer) technology. This encryption ensures that your information is protected during transmission from your browser to our servers.

  • SSL Certificates: Our Site uses SSL certificates to verify the authenticity of our server and encrypt your data.
  • HTTPS Protocol: The entire website operates on the HTTPS protocol, ensuring secure browsing for all users.


3. Data Storage and Protection

We follow strict protocols for storing your personal information, ensuring that data is protected both during transmission and when at rest.

  • Encryption at Rest: Sensitive information, such as financial details, is encrypted while stored on our secure servers, preventing unauthorized access even in the unlikely event of a breach.
  • Backup and Redundancy: We regularly back up your data in secure locations to ensure that it remains safe and recoverable in the event of system failure, cyberattacks, or natural disasters.


4. Access Control and Authentication

We limit access to personal information to authorized employees, contractors, and agents who need to know that information to operate, develop, or improve our services.

  • Role-Based Access: Employees are granted access only to the data necessary for their roles. We enforce strict role-based access control measures and conduct regular access audits.

  • Multi-Factor Authentication (MFA): We use multi-factor authentication for access to sensitive systems, requiring users to authenticate via multiple verification methods, such as passwords and verification codes, to prevent unauthorized access.

  • Password Management: We enforce strong password policies requiring employees and users to create complex passwords and periodically change them. All passwords are hashed and securely stored.



5. Monitoring and Response

We continuously monitor our systems for suspicious activity and potential threats. Our security team is dedicated to responding quickly to any incident or vulnerability.

  • Intrusion Detection Systems: We use state-of-the-art intrusion detection systems (IDS) to monitor, detect, and alert us to unauthorized activities or potential threats in real-time.

  • Incident Response Plan: In the event of a security breach or suspicious activity, we have a comprehensive incident response plan to identify, contain, and remediate any vulnerabilities quickly and efficiently.

  • Security Audits and Penetration Testing: We conduct regular vulnerability assessments and penetration testing on our systems to ensure they remain secure and resilient against attacks.



6. User Responsibilities

While we take extensive measures to protect your information, security is a shared responsibility. We encourage our users to adopt the following best practices:

  • Create Strong Passwords: Use complex passwords that include letters, numbers, and special characters, and avoid using easily guessable information such as birthdays or common words.

  • Enable Two-Factor Authentication (2FA): We recommend enabling two-factor authentication when available, adding an extra layer of security to your account.

  • Beware of Phishing Scams: Be cautious of unsolicited emails, phone calls, or messages asking for your personal information. Always verify the legitimacy of communications before providing sensitive details.

  • Log Out of Accounts: Always log out of your account after using our services, especially on public or shared computers.



7. Protection Against Fraud and Unauthorized Transactions

HardshipHero is committed to protecting you from fraud and unauthorized activity. To safeguard your account and personal information, we have implemented the following measures:

  • Fraud Monitoring: We monitor account activity for signs of suspicious transactions or unauthorized activity.

  • Verification Protocols: We may request additional identity verification when suspicious activity is detected or during high-risk transactions.

  • Transaction Notifications: You may receive alerts for certain account activities, helping you monitor and respond quickly to potential issues.



8. Vulnerability Disclosure Program

If you believe you have identified a security vulnerability in our systems, we encourage responsible disclosure through our Vulnerability Disclosure Program. Please report potential vulnerabilities to us at security@hardshiphero.com. We will investigate all reports and respond promptly.

  • No Legal Action: If you follow our responsible disclosure process, we will not pursue legal action against you for identifying and reporting vulnerabilities, provided your actions do not violate any laws or harm our systems.


9. Security for Mobile Devices

If you access our Site or Services via a mobile device, we recommend the following security practices:

  • Use Trusted Applications: Only download and use trusted applications from recognized app stores (e.g., Google Play, Apple App Store).

  • Keep Software Updated: Ensure your device operating system and applications are up to date to protect against known vulnerabilities.

  • Enable Device Encryption: If supported by your device, enable encryption to protect your stored information.



10. Third-Party Security

We work with third-party service providers to assist with services such as payment processing, customer support, and analytics. These providers may access personal information but are bound by confidentiality agreements and required to follow industry-standard security practices.

  • Service Provider Audits: We vet and regularly assess third-party service providers to ensure they meet our security standards.

  • Data Sharing: Only necessary personal information is shared with third-party service providers to facilitate specific tasks, and they are prohibited from using your information for any other purpose.



11. Reporting Security Concerns

If you believe your account has been compromised, or if you detect any suspicious activity related to your personal information, please report it immediately to our support team at:

HardshipHero, LLC
30 N Gould St Ste R, Sheridan, WY 82801, USA
Email: info@hardshiphero.com
Phone: 1-888-811-1972

We will investigate all reports and take appropriate actions to protect your account and information.



12. Updates to This Security Policy

We may update this Security Policy from time to time to reflect changes in technology, legal requirements, or our security practices. Any changes will be posted on this page, and the “Last Updated” date will be revised accordingly. Continued use of the Site and Services after such changes will constitute your acknowledgment and acceptance of the updated terms.



Contact Information

If you have any questions about this Security Policy or our security practices, please contact us at:

HardshipHero, LLC
30 N Gould St Ste R, Sheridan, WY 82801, USA
Email: info@hardshiphero.com
Phone: 1-888-279-2106