© 2025 | Shopperoll | All rights reserved.
Company Security
Security is built into the Shopperoll experience—secure checkout, protected accounts, and marketplace monitoring designed to reduce fraud while keeping shopping smooth.
Clear safeguards, real monitoring, and practical guidance—security that’s measurable, not marketing.
Secure checkout
Payments handled via trusted providers with security-focused flows and risk checks.
Data protection
Encrypted transport, strong password hashing, and controlled access to sensitive systems.
Account safety
Abuse controls and monitoring to reduce account takeovers and suspicious behavior.
Responsible reporting
A clear path to report vulnerabilities so we can fix them quickly and safely.
We continuously improve controls as new features, categories, and regions launch.
I. OUR SECURITY MODEL
II. ENCRYPTION AND DATA PROTECTION
- Encryption in transit: supported services use HTTPS/TLS to reduce interception risk.
- Strong credential handling: passwords are stored using strong one-way hashing (we do not store plaintext passwords).
- Least-privilege access: internal access is limited to what’s necessary, reviewed, and logged where appropriate.
- Auditability: security-relevant actions may be recorded to support investigations, compliance, and abuse prevention.
III. PAYMENT SECURITY AND CHECKOUT
- Provider-secured payment flows: helps limit direct handling of sensitive card data by Shopperoll systems.
- Risk and fraud signals: checks may flag suspicious activity (e.g., unusual purchase behavior, repeated failures, or account anomalies).
- Dispute workflows: chargebacks and payment disputes follow provider rules and may require evidence and cooperation.
IV. ACCOUNT SECURITY AND ABUSE CONTROLS
- Integrity checks: we may require verification steps and apply protections against suspicious logins or actions.
- Rate limiting: controls help reduce brute-force attempts and abusive automation.
- Session protections: safeguards are used to reduce unauthorized reuse of credentials or session data.
- User responsibility: avoid password reuse, be cautious of phishing links, and report unusual behavior quickly.
V. MARKETPLACE SAFETY AND FRAUD PREVENTION
- Listing enforcement: prohibited items, unsafe products, and IP-infringing content may be removed or restricted.
- Behavior monitoring: we look for patterns linked to fraud, abuse, or manipulation of marketplace systems.
- Operational integrity: shipment and tracking behaviors may be reviewed to reduce “false shipped” or delivery disputes.
- User reporting: we investigate reports submitted through support channels and may request additional evidence.
VI. INTERNAL ACCESS, CHANGE CONTROL, AND LOGGING
- Access controls: least-privilege permissions and restricted access to sensitive tools.
- Environment separation: practices may be used to reduce the risk of accidental changes impacting production.
- Audit logs: sensitive actions may be recorded to support investigations and accountability.
VII. INCIDENT RESPONSE
- Triage: verify impact and scope, preserve evidence, and prioritize user safety.
- Containment: stop ongoing abuse (e.g., revoke access, block patterns, rotate keys, disable risky functions).
- Remediation: patch vulnerabilities, harden controls, and reduce recurrence.
- Communication: notify users and regulators when required and provide guidance for protective steps.