What encryption methods are employed for sensitive data?

Sehal Sein

Sehal Sein

2 min read

Dgymbook uses industry-standard encryption to protect sensitive data both while it is being transmitted and while it is stored.

Encryption in transit

All communication between your device (phone, browser, or desktop app) and Dgymbook’s servers uses TLS (Transport Layer Security). This is the same encryption standard used by banks and e-commerce platforms. It ensures that data cannot be read or tampered with as it travels over the internet.

Encryption at rest

Sensitive data stored in Dgymbook’s databases — including member personal information and payment records — is encrypted at rest. This means that the underlying data files are not readable without the correct decryption keys, protecting your data even in the unlikely event of unauthorised server access.

Password hashing

User passwords are never stored in plain text. Dgymbook uses a strong hashing algorithm with per-user salts to store password credentials securely. This means even our own team cannot retrieve a user’s original password.

Key management

Encryption keys are managed securely and are rotated periodically. Access to keys is restricted to the systems that need them to operate — they are not exposed to application code or staff.

Staying current

Dgymbook keeps its encryption standards up to date as best practices evolve. Outdated cipher suites and protocols are disabled in favour of current, hardened configurations.

For more information, refer to our Privacy Policy or contact us.

Was this article helpful?