Skip to Main Content

Website Security Policy

Effective Date: 8/18/2006
Last Updated: 6/22/2025
Security Commitment: Purdy's Powersports is committed to protecting the security and integrity of our website, customer data, and business operations. This Security Policy outlines our comprehensive approach to cybersecurity and data protection.

1. Overview and Scope

This Security Policy applies to all aspects of Purdy's Powersports's website operations, including but not limited to:

  • Website infrastructure and hosting environment
  • Customer data collection, storage, and processing
  • Payment processing and financial transactions
  • Employee access and authentication systems
  • Third-party integrations and vendor relationships
  • Physical security of data centers and office facilities

2. Data Protection and Encryption

Data in Transit

  • SSL/TLS Encryption: All data transmitted between your browser and our servers is protected using industry-standard SSL/TLS encryption (minimum TLS 1.2)
  • HTTPS Protocol: Our entire website operates exclusively over HTTPS to ensure secure communication
  • Certificate Management: We maintain valid SSL certificates from trusted Certificate Authorities

Data at Rest

  • Database Encryption: Customer data is encrypted using AES-256 encryption standards
  • Payment Information: Credit card data is tokenized and never stored in plain text on our servers
  • Backup Security: All backups are encrypted and stored in secure, geographically distributed locations

3. Payment Security

PCI DSS Compliance: We maintain Payment Card Industry Data Security Standard (PCI DSS) compliance to ensure the highest level of payment security.

Payment Processing Standards

  • Secure Payment Gateways: We use only PCI-compliant payment processors (Stripe, PayPal, Square, etc.)
  • Tokenization: Credit card numbers are immediately tokenized and never stored on our servers
  • 3D Secure Authentication: Additional verification layers for credit card transactions when available
  • Fraud Detection: Advanced fraud detection algorithms monitor all transactions
  • Regular Security Scans: Quarterly security scans and annual penetration testing

4. Access Control and Authentication

Customer Account Security

  • Strong Password Requirements: Minimum 8 characters with complexity requirements
  • Account Lockout Protection: Automatic lockout after multiple failed login attempts
  • Session Management: Secure session tokens with automatic timeout
  • Two-Factor Authentication: Optional 2FA available for enhanced account security

Administrative Access

  • Role-Based Access Control: Employees have access only to systems necessary for their job functions
  • Multi-Factor Authentication: Required for all administrative access
  • Regular Access Reviews: Quarterly review and update of user access permissions
  • Privileged Account Management: Enhanced security for high-privilege accounts

5. Infrastructure Security

Web Application Security

  • Web Application Firewall (WAF): Protection against common web attacks (SQL injection, XSS, etc.)
  • DDoS Protection: Distributed Denial of Service attack mitigation
  • Security Headers: Implementation of security headers (HSTS, CSP, X-Frame-Options)
  • Input Validation: Comprehensive validation of all user inputs
  • Error Handling: Secure error handling that doesn't expose sensitive information

Server and Network Security

  • Network Segmentation: Separation of different network zones with appropriate access controls
  • Intrusion Detection: Real-time monitoring for suspicious network activity
  • Regular Updates: Timely application of security patches and updates
  • Backup Systems: Regular automated backups with tested recovery procedures

6. Monitoring and Incident Response

Continuous Monitoring

  • 24/7 Security Monitoring: Round-the-clock monitoring of security events
  • Automated Alerting: Immediate notification of potential security incidents
  • Log Management: Comprehensive logging and analysis of security events
  • Vulnerability Scanning: Regular automated scans for security vulnerabilities

Incident Response Plan

  • Response Team: Dedicated incident response team with defined roles
  • Escalation Procedures: Clear escalation paths for different types of incidents
  • Communication Plan: Procedures for notifying affected customers and stakeholders
  • Recovery Procedures: Documented steps for system recovery and business continuity

7. Third-Party Security

Vendor Management

  • Security Assessments: All third-party vendors undergo security evaluations
  • Contractual Requirements: Security requirements included in all vendor contracts
  • Regular Reviews: Ongoing monitoring of third-party security practices
  • Data Processing Agreements: Formal agreements governing data handling by third parties

Integration Security

  • API Security: Secure authentication and authorization for all API connections
  • Data Minimization: Only necessary data is shared with third-party services
  • Encrypted Communications: All third-party communications use encrypted channels

8. Employee Security Training

  • Security Awareness Training: Regular training on cybersecurity best practices
  • Phishing Simulation: Ongoing phishing awareness testing and training
  • Incident Reporting: Training on how to identify and report security incidents
  • Clean Desk Policy: Requirements for securing physical workspaces
  • Social Engineering Awareness: Training to recognize and prevent social engineering attacks

9. Compliance and Standards

Regulatory Compliance

  • PCI DSS: Payment Card Industry Data Security Standard compliance
  • GDPR: General Data Protection Regulation compliance for EU customers
  • CCPA: California Consumer Privacy Act compliance
  • SOC 2: Service Organization Control 2 compliance (if applicable)

Security Frameworks

  • NIST Cybersecurity Framework: Alignment with NIST standards and best practices
  • OWASP Guidelines: Implementation of OWASP security recommendations
  • ISO 27001: Adoption of ISO information security management principles

10. Data Backup and Recovery

Backup Procedures

  • Regular Backups: Daily automated backups of all critical data
  • Multiple Locations: Backups stored in geographically diverse locations
  • Backup Testing: Regular testing of backup integrity and restoration procedures
  • Retention Policies: Defined retention periods for different types of data

Disaster Recovery

  • Recovery Time Objectives: Defined targets for system restoration
  • Business Continuity Plan: Procedures to maintain operations during incidents
  • Communication Plan: Customer notification procedures during outages

11. Customer Security Responsibilities

Important: While we implement comprehensive security measures, customers also play a crucial role in maintaining security.

Customer Best Practices

  • Strong Passwords: Use unique, complex passwords for your account
  • Account Monitoring: Regularly review account activity and report suspicious behavior
  • Secure Browsing: Always log out of your account when finished shopping
  • Software Updates: Keep your browser and devices updated with latest security patches
  • Public Wi-Fi Caution: Avoid making purchases over unsecured public Wi-Fi networks
  • Phishing Awareness: Be cautious of suspicious emails claiming to be from our company

12. Security Incident Reporting

How to Report Security Issues

If you discover a security vulnerability or suspect a security incident, please report it immediately:

Security Team Contact:

Email: [email protected]
Phone: 865-408-7315
Response Time: We respond to security reports within 24 hours

What to Include in Reports

  • Detailed description of the issue or incident
  • Steps to reproduce the problem (if applicable)
  • Screenshots or evidence (if available)
  • Your contact information for follow-up

13. Security Audits and Testing

Regular Security Assessments

  • Penetration Testing: Annual third-party penetration testing
  • Vulnerability Assessments: Quarterly vulnerability scans
  • Code Reviews: Security-focused code reviews for all updates
  • Configuration Audits: Regular reviews of system configurations

14. Policy Updates and Communication

This Security Policy is reviewed and updated regularly to address evolving threats and regulatory requirements. Material changes will be communicated through:

  • Website notifications
  • Email notifications to registered users
  • Updates to the policy effective date

15. Contact Information

For questions about this Security Policy or our security practices:

Purdy's Powersports
Security Team
Address: 905 Mulberry St, Loudon TN 37774
Email: [email protected]
Phone: 865-408-7315

Business Hours: Monday - Friday, 10:00 AM - 6:00 PM eastern time
Emergency Contact: 1-865-408-7315

Commitment to Security: We are committed to maintaining the highest standards of security and will continue to invest in technologies, processes, and training to protect our customers and business operations.
PayPal Acceptance Mark
Loading...