Security, Risk Assessment and Incident Response

Risk Assessment Process

Our organization maintains a risk assessment process designed to identify, evaluate, and manage potential risks related to data access, system usage, and operational activities.
Risk assessments are conducted periodically and when operational changes occur, focusing on access permissions, data handling, and system security.

Monitoring and Detection

We monitor system access and operational activity to detect unauthorized access, anomalies, or potential security incidents.Access to Seller Central and Amazon APIs is limited to authorized personnel and restricted to read-only permissions.

Incident Response Plan

In the event of a suspected or confirmed security incident, we follow a documented incident response process that includes:

Data Access and Protection

Access to systems and data is granted based on role-based permissions and the principle of least privilege.We do not store seller credentials and handle all data in accordance with applicable data protection and security requirements.