top of page
We work with high standard technology to protect and process your data. This is because we want to guarantee:
![](https://static.wixstatic.com/media/a4597d_d57c030b660e4645aa9f30ffcae3f61b~mv2.png/v1/fill/w_44,h_37,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/a4597d_d57c030b660e4645aa9f30ffcae3f61b~mv2.png)
![](https://static.wixstatic.com/media/a4597d_d57c030b660e4645aa9f30ffcae3f61b~mv2.png/v1/fill/w_44,h_37,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/a4597d_d57c030b660e4645aa9f30ffcae3f61b~mv2.png)
![](https://static.wixstatic.com/media/a4597d_d57c030b660e4645aa9f30ffcae3f61b~mv2.png/v1/fill/w_44,h_37,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/a4597d_d57c030b660e4645aa9f30ffcae3f61b~mv2.png)
Confidentiality of data: so that it is accessible only to authorized people
Data integrity: information is always processed to preserve veracity, accuracy and completeness, and without unauthorized changes
The availability of data: so that it is accessible and usable on demand
These measures are present from the creation phase of the Zoox product until delivery to you
![Customer using the zoox system on their cell phone](https://static.wixstatic.com/media/a4597d_b453b08423d1490ca10172cd2aec81d3~mv2.png/v1/fill/w_561,h_639,al_c,q_85,enc_auto/back-left.png)
![](https://static.wixstatic.com/media/a4597d_fc1f24c7cff6400884201a4f3a23319c~mv2.jpg/v1/fill/w_97,h_55,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/a4597d_fc1f24c7cff6400884201a4f3a23319c~mv2.jpg)
We apply
Technical security measures: in the systems and tools we use
Administrative security measures: such as internal policies, standards and procedures, employee training and awareness, among others.
bottom of page