When you checkout with Instant we create you an account and securely save your payment and shipping details so that you can instantly check out across any store using Instant Checkout.
At Instant, we prioritise the security and privacy of our customers' sensitive information. We understand the importance of safeguarding credit card details and have implemented robust measures to ensure their security, giving you peace of mind when transacting through our platform.
Two-Factor Authentication (2FA)
Instant uses two-factor authentication (2FA). This requires you to authenticate your identity using a one-time password (OTP) sent via SMS. This verifies you as the authorised user
Secure Data Transmission
Instant employs industry-standard encryption protocols to safeguard the transmission of credit card details. All communication between your browser and our servers is secured using Transport Layer Security (TLS) encryption, ensuring that your data remains confidential and protected from unauthorized access.
PCI-DSS Compliance
Instant process payments though a certified Level 1 PCI Service Provider, which is the highest level of certification in the payment card industry. We adhere to the Payment Card Industry Data Security Standard (PCI-DSS), a set of stringent requirements established to protect cardholder data. By meeting these standards, we ensure that your credit card details are stored, processed, and transmitted securely.
Tokenisation
When you provide your credit card details to Instant, we use a process called tokenisation. This means that instead of storing your actual card details, we create a unique identifier, known as a token. This token is what we store in our systems, while your sensitive information remains securely encrypted in our token vault. This approach minimises the risk of data breaches and enhances the overall security of your credit card details.
Secure Data Storage
Instant employs robust security measures to protect the storage of credit card details. We use secure data centers with restricted access, advanced firewalls, and intrusion detection systems to ensure that your information is protected from unauthorized access or potential threats. Our infrastructure undergoes regular security audits and assessments to maintain the highest level of data protection.