{"id":860,"date":"2025-12-02T03:30:19","date_gmt":"2025-12-02T03:30:19","guid":{"rendered":"https:\/\/thesilvertunamarketplace.com\/seller-network\/?page_id=860"},"modified":"2025-12-07T19:23:17","modified_gmt":"2025-12-07T19:23:17","slug":"data-and-security-standards-document","status":"publish","type":"page","link":"https:\/\/thesilvertunamarketplace.com\/seller-network\/data-and-security-standards-document\/","title":{"rendered":"Data and Security Standards Document"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"860\" class=\"elementor elementor-860\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bbeffe7 e-flex e-con-boxed magic-button-disabled-no e-con e-parent\" data-id=\"bbeffe7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0d8ac5 elementor-widget elementor-widget-heading\" data-id=\"b0d8ac5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Data and Security Standards<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b368665 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"b368665\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64f42a4 elementor-widget elementor-widget-text-editor\" data-id=\"64f42a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">THE SILVER TUNA MARKETPLACE\u2122<\/span><\/p><p><span style=\"font-weight: 400;\">INCLUDED DOCUMENT: DATA &amp; SECURITY STANDARDS<\/span><\/p><p><span style=\"font-weight: 400;\">Incorporated into Seller Agreement<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">Document Version: 1.0<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">Last Updated: November 2024<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29b47a9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"29b47a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1bbf99 elementor-widget elementor-widget-text-editor\" data-id=\"e1bbf99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>PURPOSE<br \/><br \/><\/strong>This document establishes the data security standards, protocols, and requirements for The Silver Tuna Marketplace and its sellers. These standards ensure the protection of sensitive business data, customer information, and payment data from unauthorized access, breaches, and cyber threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c4e88f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6c4e88f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec28029 elementor-widget elementor-widget-text-editor\" data-id=\"ec28029\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>1. SECURITY FRAMEWORK<\/strong><br \/><br \/><strong>1.1 Security Principles<\/strong><br \/>Our security framework is built on:<br \/>Confidentiality: Protecting data from unauthorized access<br \/>Integrity: Ensuring data accuracy and preventing tampering<br \/>Availability: Maintaining reliable access to systems and data<br \/>Accountability: Tracking and auditing all data access<br \/>Compliance: Meeting legal and regulatory requirements.<br \/><br \/><strong>1.2 Security Standards<\/strong><br \/>We comply with:<br \/>PCI DSS: Payment Card Industry Data Security Standard<br \/>GDPR: General Data Protection Regulation<br \/>CCPA: California Consumer Privacy Act<br \/>SOC 2: Service Organization Control 2 (Type II)<br \/>NIST: National Institute of Standards and Technology guidelines.<br \/><br \/><strong>1.3 Security Certifications<\/strong><br \/>Our infrastructure providers maintain:<br \/>ISO 27001 (Information Security Management)<br \/>SOC 2 Type II (Security, Availability, Confidentiality)<br \/>PCI DSS Level 1 (Payment Card Industry compliance)<br \/>HIPAA compliance (where applicable).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f063206 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f063206\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b872e15 elementor-widget elementor-widget-text-editor\" data-id=\"b872e15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>2. INFRASTRUCTURE SECURITY<br \/><\/strong><br \/><strong>2.1 Hosting &amp; Servers<\/strong><br \/>Our hosting infrastructure includes:<br \/>Enterprise-grade cloud hosting (AWS, Google Cloud, or similar)<br \/>Redundant servers across multiple availability zones<br \/>Automatic failover and disaster recovery<br \/>DDoS protection and mitigation<br \/>Regular security patches and updates<br \/>24\/7 monitoring and alerting<br \/>2.2 Network Security<br \/>Network protection includes:<br \/>Firewalls and intrusion detection systems (IDS)<br \/>Intrusion prevention systems (IPS)<br \/>Virtual Private Networks (VPN) for administrative access<br \/>Network segmentation and isolation<br \/>Traffic filtering and rate limiting<br \/>Regular vulnerability scanning.<br \/><br \/><strong>2.3 Physical Security<\/strong><br \/>Data center security includes:<br \/>24\/7 physical security and surveillance<br \/>Biometric access controls<br \/>Environmental controls (temperature, humidity, fire suppression)<br \/>Redundant power and cooling systems<br \/>Secure disposal of hardware and media.<br \/><br \/><strong>2.4 Backup &amp; Recovery<\/strong><br \/>Data backup procedures:<br \/>Daily automated backups of all websites and databases<br \/>30-day backup retention for point-in-time recovery<br \/>Encrypted backups stored in secure, geographically distributed locations<br \/>Regular backup testing to ensure recoverability<br \/>Recovery Time Objective (RTO): 24 hours<br \/>Recovery Point Objective (RPO): 24 hours (maximum data loss).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87b8866 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"87b8866\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68a2525 elementor-widget elementor-widget-text-editor\" data-id=\"68a2525\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>3. APPLICATION SECURITY<br \/><br \/>3.1 Secure Development<\/strong><br \/>Our development practices include:<br \/>Secure coding standards and guidelines<br \/>Code review and peer review processes<br \/>Static and dynamic code analysis<br \/>Dependency scanning for vulnerabilities<br \/>Regular security testing and penetration testing<br \/>Bug bounty program for responsible disclosure.<br \/><br \/><strong>3.2 Authentication &amp; Access Control<\/strong><br \/>User authentication includes:<br \/>Strong password requirements (minimum 12 characters, complexity rules)<br \/>Multi-factor authentication (MFA) for administrative access<br \/>Session management and timeout policies<br \/>Account lockout after failed login attempts<br \/>Password reset and recovery procedures<br \/>Single Sign-On (SSO) options where applicable.<br \/><br \/><strong>3.3 Authorization &amp; Permissions<\/strong><br \/>Access control includes:<br \/>Role-based access control (RBAC)<br \/>Principle of least privilege (minimum necessary access)<br \/>Separation of duties for critical functions<br \/>Regular access reviews and audits<br \/>Immediate revocation upon termination.<br \/><br \/><strong>3.4 API Security<\/strong><br \/>API protection includes:<br \/>API key authentication and authorization<br \/>Rate limiting and throttling<br \/>Input validation and sanitization<br \/>Output encoding to prevent injection attacks<br \/>HTTPS\/TLS encryption for all API calls<br \/>API versioning and deprecation policies<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c82268 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8c82268\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1efc74e elementor-widget elementor-widget-text-editor\" data-id=\"1efc74e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>4. DATA ENCRYPTION<br \/><br \/>4.1 Encryption in Transit<\/strong><br \/>All data transmitted is encrypted using:<br \/>TLS 1.2 or higher for HTTPS connections<br \/>Strong cipher suites (AES-256, RSA-2048 or higher)<br \/>Perfect Forward Secrecy (PFS) to protect past sessions<br \/>HSTS (HTTP Strict Transport Security) to enforce HTTPS<br \/>Certificate pinning for mobile applications<br \/><br \/><strong>4.2 Encryption at Rest<\/strong><br \/>All stored data is encrypted using:<br \/>AES-256 encryption for databases and file storage<br \/>Encrypted file systems for server storage<br \/>Encrypted backups with separate encryption keys<br \/>Key management systems for secure key storage and rotation<br \/>Hardware Security Modules (HSM) for key protection<br \/><br \/><strong>4.3 Payment Data Encryption<\/strong><br \/>Payment information is protected by:<br \/>Stripe&#8217;s PCI DSS Level 1 compliance<br \/>Tokenization (no storage of full card numbers)<br \/>End-to-end encryption from customer to payment processor<br \/>No storage of CVV\/CVC codes<br \/>Secure payment forms (Stripe Elements or hosted checkout)<br \/><br \/><strong>4.4 Key Management<\/strong><br \/>Encryption keys are:<br \/>Generated using cryptographically secure random number generators<br \/>Stored separately from encrypted data<br \/>Rotated regularly (at least annually)<br \/>Protected with access controls and auditing<br \/>Backed up securely with separate encryption<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dbd020 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2dbd020\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e8c6b2 elementor-widget elementor-widget-text-editor\" data-id=\"7e8c6b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>5. SECURITY MONITORING &amp; INCIDENT RESPONSE<br \/><br \/>5.1 Security Monitoring<\/strong><br \/>We continuously monitor for:<br \/>Unauthorized access attempts<br \/>Unusual traffic patterns or behavior<br \/>Malware and virus infections<br \/>System vulnerabilities and exploits<br \/>Configuration changes and anomalies<br \/>Performance degradation or outages<br \/>Monitoring tools include:<br \/>Security Information and Event Management (SIEM)<br \/>Intrusion Detection Systems (IDS)<br \/>Log aggregation and analysis<br \/>Anomaly detection and alerting<br \/>Threat intelligence feeds<br \/><br \/><strong>5.2 Vulnerability Management<\/strong><br \/>We proactively manage vulnerabilities through:<br \/>Regular vulnerability scanning (weekly automated scans)<br \/>Penetration testing (annual third-party assessments)<br \/>Patch management (critical patches within 48 hours)<br \/>Security advisories monitoring and response<br \/>Zero-day vulnerability rapid response procedures<br \/><br \/><strong>5.3 Incident Response Plan<\/strong><br \/>Our incident response process includes:<br \/>1. Detection &amp; Analysis:<br \/>Identify and classify security incidents<br \/>Assess severity and potential impact<br \/>Determine scope and affected systems<br \/>2. Containment:<br \/>Isolate affected systems to prevent spread<br \/>Preserve evidence for investigation<br \/>Implement temporary fixes or workarounds<br \/>3. Eradication:<br \/>Remove malware, backdoors, or unauthorized access<br \/>Patch vulnerabilities that were exploited<br \/>Restore systems from clean backups if necessary<br \/>4. Recovery:<br \/>Restore normal operations<br \/>Monitor for signs of persistent threats<br \/>Verify system integrity and security<br \/>5. Post-Incident:<br \/>Conduct root cause analysis<br \/>Document lessons learned<br \/>Update security controls and procedures<br \/>Notify affected parties as required by law.<br \/><br \/><strong>5.4 Breach Notification<\/strong><br \/>In the event of a data breach:<br \/>Affected sellers notified within 24 hours of discovery<br \/>Affected customers notified within 72 hours (as required by GDPR)<br \/>Regulatory authorities notified as required by law<br \/>Detailed incident report provided within 7 days<br \/>Remediation plan implemented to prevent recurrence<br \/>Notification includes:<br \/>Description of the breach and affected data<br \/>Potential impact and risks<br \/>Steps taken to contain and remediate<br \/>Recommended actions for affected parties<br \/>Contact information for questions and support<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ace3459 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ace3459\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bac3029 elementor-widget elementor-widget-text-editor\" data-id=\"bac3029\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>SELLER SECURITY RESPONSIBILITIES<br \/><br \/><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">6.1 Account Security<br \/><\/span><\/strong>Sellers are responsible for:<br \/><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">Maintaining strong, unique passwords<br \/><\/span>Enabling multi-factor authentication (MFA)<br \/>Not sharing login credentials<br \/>Logging out of shared or public computers<br \/>Reporting suspicious activity immediately<br \/>Keeping contact information up-to-date<br \/><br \/><strong>6.2 Data Protection<br \/><\/strong>Sellers must:<br \/>Protect customer data with appropriate security measures<br \/>Use secure methods for storing and transmitting data<br \/>Not store payment card data (use Stripe tokenization)<br \/>Encrypt sensitive data at rest and in transit<br \/>Implement access controls for employees\/contractors<br \/>Conduct background checks for employees with data access.<br \/><br \/><strong>6.3 Device Security<br \/><\/strong>Sellers must:<br \/><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">Use up-to-date operating systems and software<br \/><\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">Install and maintain antivirus\/anti-malware software<br \/><\/span>Enable firewalls on all devices<br \/>Encrypt hard drives and mobile devices<br \/>Use secure Wi-Fi networks (avoid public Wi-Fi for sensitive operations)<br \/>Implement mobile device management (MDM) for business devices<br \/><br \/><strong><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">6.4 Employee Training<br \/><\/span><\/strong>Sellers must:<br \/>Train employees on security best practices<br \/>Educate staff on phishing and social engineering<br \/>Establish clear security policies and procedures<br \/>Conduct regular security awareness training<br \/>Test employees with simulated phishing exercises<br \/><br \/><strong>6.5 Third-Party Security<br \/><\/strong>When working with contractors or service providers, sellers must:<br \/>Conduct security due diligence<br \/>Require NDAs and confidentiality agreements<br \/>Limit access to only necessary data and systems<br \/>Monitor third-party access and activity<br \/>Terminate access immediately upon contract end<br \/><br \/><strong><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">6.6 Incident Reporting<br \/><\/span><\/strong>Sellers must report to the Platform immediately:<br \/>Suspected or confirmed data breaches<br \/>Unauthorized access to customer data<br \/>Lost or stolen devices containing customer data<br \/>Phishing attempts or social engineering attacks<br \/>Malware infections or security incidents<br \/>Any suspicious activity or security concerns<br \/>Failure to report incidents may result in:<br \/>Liability for damages<br \/>Termination of Master Seller Agreement<br \/>Legal action and regulatory penalties<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6aa89a7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6aa89a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8dc5c5 elementor-widget elementor-widget-text-editor\" data-id=\"c8dc5c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>7. COMPLIANCE &amp; AUDITING<br \/><br \/>7.1 Security Audits<\/strong><br \/>We conduct regular security audits:<br \/>Internal audits: Quarterly reviews of security controls<br \/>External audits: Annual third-party security assessments<br \/>Penetration testing: Annual ethical hacking exercises<br \/>Compliance audits: Regular reviews for PCI DSS, GDPR, CCPA<br \/>Vendor audits: Annual reviews of service provider security<br \/><br \/><strong>7.2 Compliance Monitoring<\/strong><br \/>We continuously monitor compliance with:<br \/>PCI DSS requirements (quarterly scans, annual assessments)<br \/>GDPR data protection requirements<br \/>CCPA consumer privacy requirements<br \/>Industry best practices and standards<br \/>Contractual obligations to sellers and customers<br \/><br \/><strong>7.3 Audit Logs<\/strong><br \/>We maintain detailed audit logs of:<br \/>User authentication and access<br \/>Administrative actions and changes<br \/>Data access and modifications<br \/>System configuration changes<br \/>Security events and incidents<br \/>API calls and integrations<br \/>Audit logs are:<br \/>Retained for at least 1 year<br \/>Protected from tampering or deletion<br \/>Reviewed regularly for anomalies<br \/>Available for investigation and compliance<br \/><br \/><strong>7.4 Seller Audits<\/strong><br \/>The Platform reserves the right to:<br \/>Audit seller security practices<br \/>Request documentation of security controls<br \/>Conduct on-site or remote security assessments<br \/>Require remediation of identified vulnerabilities<br \/>Terminate sellers who fail to meet security standards<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-560e06e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"560e06e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0c228d elementor-widget elementor-widget-text-editor\" data-id=\"f0c228d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>8. PAYMENT SECURITY (PCI DSS)<br \/><br \/>8.1 PCI DSS Compliance<\/strong><br \/>We maintain PCI DSS compliance through:<br \/>Stripe integration: All payment processing through PCI Level 1 compliant Stripe<br \/>No card data storage: We never store full card numbers, CVV, or magnetic stripe data<br \/>Tokenization: Card data replaced with secure tokens<br \/>Secure transmission: All payment data encrypted in transit<br \/>Regular scanning: Quarterly vulnerability scans by approved vendors<br \/>Annual assessments: Self-Assessment Questionnaire (SAQ) completion<br \/><br \/><strong>8.2 Seller PCI Responsibilities<\/strong><br \/>Sellers using a Payment Processor integration:<br \/>Are responsible for SAQ A compliance (simplest level)<br \/>Must use Payment Processor hosted checkout (no direct card handling)<br \/>Must not store, process, or transmit card data<br \/>Must maintain secure websites (HTTPS, security patches)<br \/>Must train employees on payment security<br \/>Sellers who handle card data directly:<br \/>Must achieve full PCI DSS compliance independently<br \/>Must provide evidence of compliance to the Platform<br \/>Assume all liability for payment data breaches<br \/>May be required to obtain additional insurance<br \/><br \/><strong>8.3 Payment Fraud Prevention<\/strong><br \/>We implement fraud prevention measures:<br \/>Address Verification Service (AVS)<br \/>Card Verification Value (CVV) checks<br \/>3D Secure authentication (when available)<br \/>Velocity checks and transaction limits<br \/>IP geolocation and risk scoring<br \/>Machine learning fraud detection<br \/><br \/><strong>8.4 Chargeback Management<\/strong><br \/>We assist with chargeback prevention:<br \/>Clear product descriptions and policies<br \/>Proof of delivery and tracking<br \/>Customer communication records<br \/>Transaction documentation<br \/>Dispute response support<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54a3227 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"54a3227\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-359181b elementor-widget elementor-widget-text-editor\" data-id=\"359181b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>9. DISASTER RECOVERY &amp; BUSINESS CONTINUITY<br \/><br \/>9.1 Disaster Recovery Plan<\/strong><br \/>Our disaster recovery plan includes:<br \/>Backup systems: Redundant infrastructure across multiple regions<br \/>Failover procedures: Automatic switching to backup systems<br \/>Data recovery: Restoration from encrypted backups<br \/>Communication plan: Notification procedures for sellers and customers<br \/>Testing: Annual disaster recovery drills<br \/><br \/><strong>9.2 Recovery Objectives<\/strong><br \/>Our recovery targets:<br \/>Recovery Time Objective (RTO): 24 hours (maximum downtime)<br \/>Recovery Point Objective (RPO): 24 hours (maximum data loss)<br \/>Critical systems: 4-hour RTO for payment processing and checkout<br \/>Non-critical systems: 48-hour RTO for reporting and analytics<br \/><br \/><strong>9.3 Business Continuity<\/strong><br \/>We maintain business continuity through:<br \/>Redundant staff and cross-training<br \/>Remote work capabilities<br \/>Alternative communication channels<br \/>Vendor redundancy and backup providers<br \/>Regular plan updates and testing<br \/><br \/><strong>9.4 Seller Continuity<\/strong><br \/>Sellers should maintain:<br \/>Backup inventory and supplier relationships<br \/>Alternative shipping and fulfillment options<br \/>Emergency contact information<br \/>Business continuity insurance<br \/>Disaster recovery plans for their own operations<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0400ddd elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0400ddd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4af1f42 elementor-widget elementor-widget-text-editor\" data-id=\"4af1f42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>10. EMERGING THREATS &amp; FUTURE SECURITY<br \/><br \/><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">10.1 Threat Intelligence<br \/><\/span><\/strong>We stay informed about emerging threats:<br \/>Monitoring security advisories and bulletins<br \/>Participating in threat intelligence sharing<br \/>Analyzing attack trends and patterns<br \/>Adapting defenses to new threats<br \/>Implementing proactive security measures<br \/><br \/><strong>10.2 Security Roadmap<\/strong><br \/>Our ongoing security initiatives:<br \/>2024-2025: Enhanced monitoring and AI-powered threat detection<br \/>2025-2026: Zero-trust architecture implementation<br \/>2026+: Quantum-resistant encryption preparation<br \/>Continuous: Regular security assessments and improvements<br \/><br \/><strong>10.3 Seller Security Support<\/strong><br \/>We provide sellers with:<br \/>Security best practices documentation<br \/>Training materials and webinars<br \/>Security alerts and advisories<br \/>Incident response guidance<br \/>Access to security experts for consultation<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cea436 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2cea436\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b87a8f7 elementor-widget elementor-widget-text-editor\" data-id=\"b87a8f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>11. SECURITY VIOLATIONS &amp; ENFORCEMENT<br \/><br \/>11.1 Prohibited Activities<\/strong><br \/>Sellers must NOT:<br \/>Attempt to access other sellers&#8217; data or systems<br \/>Circumvent security controls or authentication<br \/>Introduce malware, viruses, or malicious code<br \/>Conduct unauthorized security testing or scanning<br \/>Share login credentials or access with unauthorized parties<br \/>Store customer payment data outside of your payment processor<br \/><br \/><strong>11.2 Consequences of Violations<\/strong><br \/>Security violations may result in:<br \/>First offense: Written warning and mandatory remediation<br \/>Second offense: Suspension of services for 30 days<br \/>Third offense: Termination of Master Seller Agreement<br \/>Severe violations: Immediate termination and legal action<br \/>Severe violations include:<br \/>Data breaches caused by negligence<br \/>Intentional security circumvention<br \/>Malicious activity or sabotage<br \/>Failure to report known breaches<br \/>Repeated violations after warnings<br \/><br \/><strong>11.3 Liability &amp; Indemnification<\/strong><br \/>Sellers are liable for:<br \/>Data breaches caused by their negligence<br \/>Damages resulting from security violations<br \/>Regulatory fines and penalties<br \/>Legal costs and settlements<br \/>Remediation and notification costs<br \/>Sellers agree to indemnify the Platform for:<br \/>Claims arising from seller security failures<br \/>Damages caused by seller data breaches<br \/>Regulatory actions resulting from seller violations<br \/>Legal costs defending against seller-related claims<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18240e4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"18240e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-458c2db elementor-widget elementor-widget-text-editor\" data-id=\"458c2db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>12. CONTACT &amp; REPORTING<br \/><br \/><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">12.1 Security Questions<br \/><\/span><\/strong><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">For questions about security:<br \/><\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">Email: support@thesilvertunamartketplace.com<br \/><\/span>Dashboard: Submit inquiry through seller dashboard<br \/>Phone: 470-422-9199<br \/><br \/><strong>12.2 Incident Reporting<\/strong><br \/>To report security incidents:<br \/>Email: support@thesilvertunamarketplace.com<br \/>Phone: 470-422-9199<br \/>Include in your report:<br \/>Description of the incident<br \/>Date and time of discovery<br \/>Affected systems or data<br \/>Actions taken so far<br \/>Contact information for follow-up<br \/><br \/><strong>12.3 Vulnerability Disclosure<\/strong><br \/>To report security vulnerabilities:<br \/>Email: security@thesilvertuna.com<br \/>Subject line: &#8220;Vulnerability Disclosure&#8221;<br \/>Include: Detailed description, steps to reproduce, potential impact<br \/>We commit to:<br \/>Acknowledge receipt within 24 hours<br \/>Investigate and respond within 7 days<br \/>Provide updates on remediation progress<br \/>Credit responsible disclosure (if desired)<br \/>Not pursue legal action against good-faith researchers<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8bf141 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e8bf141\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e795d79 elementor-widget elementor-widget-text-editor\" data-id=\"e795d79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>13. SELLER DATA &amp; PRIVACY REQUIREMENTS<br \/><br \/>13.1 Customer Data Use<\/strong><br \/>Sellers must:<br \/>Use customer data only for fulfilling orders, customer support, and legally required communications.<br \/>Not sell, share, rent, or disclose customer information to any third party except as required to complete transactions.<br \/>Not use buyer contact information for off-platform marketing unless the customer has explicitly opted in.<br \/><br \/><strong>13.2 Data Handling &amp; Storage<\/strong><br \/>Sellers must:<br \/>Store customer information securely using encrypted systems and devices.<br \/>Limit access to customer data to authorized personnel only.<br \/>Delete customer information when no longer required for business or legal purposes.<br \/>Never store payment card data in any form.<br \/><br \/><strong>13.3 Compliance With Privacy Laws<\/strong><br \/>Sellers agree to comply with all applicable privacy laws, including:<br \/>CCPA (California Consumer Privacy Act)<br \/>GDPR (General Data Protection Regulation)<br \/>State privacy laws (Virginia, Colorado, etc.)<br \/>Any applicable federal or international data regulations<br \/>Sellers are responsible for ensuring their own business operations meet legal compliance.<br \/><br \/><strong>13.4 Customer Rights &amp; Requests<\/strong><br \/>Sellers must:<br \/>Cooperate with the Platform to fulfill customer data requests (access, deletion, correction).<br \/>Respond to Platform requests related to customer privacy inquiries within 3 business days.<br \/>Not impede customer privacy rights protected under applicable laws.<br \/><br \/><strong>13.5 Prohibited Uses of Buyer Data<\/strong><br \/>Sellers must NOT:<br \/>Add buyers to external mailing lists without consent.<br \/>Share buyer data with unrelated third parties.<br \/>Use buyer information for profiling or targeted advertising outside the Platform.<br \/>Scrape, mine, or export buyer data in bulk formats.<br \/>13.6 Data Breach Obligations<br \/>In the event of a seller-related breach involving customer data, sellers must:<br \/>Notify the Platform within 12 hours of discovery.<br \/>Provide all known details relevant to the breach.<br \/>Cooperate fully with the Platform\u2019s incident response efforts.<br \/>Follow Platform instructions for containment and remediation.<br \/>Bear all costs related to breaches caused by seller negligence, including notifications, regulatory fines, and remediation.<br \/><br \/><strong>13.7 Shared Responsibility Model<\/strong><br \/>Sellers acknowledge that data protection is shared:<br \/>Platform responsibilities: hosting environment, encryption, server security, platform monitoring, backup infrastructure.<br \/>Seller responsibilities: handling of customer data, device security, staff training, access control, and compliance in their independent operations.<br \/><br \/><strong>13.8 Privacy &amp; Cookie Policy Acknowledgment<\/strong><br \/>Sellers agree to the Platform\u2019s publicly posted:<br \/>Privacy Policy<br \/>Cookie Policy<br \/>These policies govern how customer data is collected and processed across the Platform.<br \/><br \/><strong>13.9 Termination for Privacy Violations<\/strong><br \/>Violations of Seller Data &amp; Privacy requirements may result in:<br \/>First offense: Written notice and mandatory remediation<br \/>Second offense: 30-day suspension<br \/>Third offense: Termination of Master Seller Agreement<br \/>Severe violations (e.g., willful misuse of customer data): Immediate termination and legal action<br \/><br \/><strong>13.10 Liability &amp; Indemnification<\/strong><br \/>Sellers are liable for:<br \/>Misuse of customer data<br \/>Violations of privacy laws<br \/>Data breaches caused by seller negligence<br \/>Regulatory fines and penalties<br \/>Damages or loss resulting from improper data handling<br \/>Sellers agree to indemnify the Platform for all claims arising from seller-side privacy failures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b91f17e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b91f17e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81c1c83 elementor-widget elementor-widget-text-editor\" data-id=\"81c1c83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Policy Updates<br \/><br \/><\/strong>This policy may be updated with 30 days&#8217; notice. Continued participation in the marketplace constitutes acceptance of updates. Material changes will be clearly communicated via email and seller dashboard notifications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b924aab elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b924aab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15f9214 elementor-widget elementor-widget-text-editor\" data-id=\"15f9214\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">These <strong>Data &amp; Security Standards<\/strong> are incorporated into your Seller Agreement and are binding upon all sellers.<br \/><br \/><\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">By participating in The Silver Tuna Marketplace, you agree to the advertising services, strategies, and terms outlined in this document.<br \/><br \/><\/span><strong style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">Questions and Support<br \/><br \/><\/strong><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">Email Support: support@thesilvertunamarketplace.com<br \/><\/span>Phone: 470-422-9199 | Support Hours: Daily 9 AM &#8211; 9 PM EST <br \/>Emergency Support: 365\/24\/7 for critical issues | Issues not deemed critical after hours may be charged for time and service.<br \/><br \/><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">Questions about this or any other document? Contact us &#8211; we&#8217;re here to help you succeed.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc73ebb elementor-widget elementor-widget-html\" data-id=\"bc73ebb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p style=\"font-family: 'Open Sans', sans-serif; font-size: 15px; color: #ffffff; line-height: 1.4;\">\n  &copy; <span id=\"currentYear\"><\/span>\n  <script>\n    var currentYear = new Date().getFullYear();\n    document.getElementById('currentYear').textContent = currentYear;\n  <\/script>\n  The Silver Tuna Marketplace\u2122 is a trademark of Branded Brain Studio. All rights reserved. No part of this document may be reproduced, distributed, or transmitted in any form or by any means without the prior written permission of Branded Brain Studio.\n<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3f15e0 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f3f15e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/thesilvertunamarketplace.com\/seller-network\/seller-included-documents\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-left\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Back<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Data and Security Standards THE SILVER TUNA MARKETPLACE\u2122 INCLUDED DOCUMENT: DATA &amp; SECURITY STANDARDS Incorporated into Seller AgreementDocument Version: 1.0Last Updated: November 2024 PURPOSE This document establishes the data security standards, protocols, and requirements for The Silver Tuna Marketplace and its sellers. These standards ensure the protection of sensitive business data, customer information, and payment [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","content-type":"","footnotes":""},"class_list":["post-860","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/thesilvertunamarketplace.com\/seller-network\/wp-json\/wp\/v2\/pages\/860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesilvertunamarketplace.com\/seller-network\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thesilvertunamarketplace.com\/seller-network\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thesilvertunamarketplace.com\/seller-network\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thesilvertunamarketplace.com\/seller-network\/wp-json\/wp\/v2\/comments?post=860"}],"version-history":[{"count":14,"href":"https:\/\/thesilvertunamarketplace.com\/seller-network\/wp-json\/wp\/v2\/pages\/860\/revisions"}],"predecessor-version":[{"id":951,"href":"https:\/\/thesilvertunamarketplace.com\/seller-network\/wp-json\/wp\/v2\/pages\/860\/revisions\/951"}],"wp:attachment":[{"href":"https:\/\/thesilvertunamarketplace.com\/seller-network\/wp-json\/wp\/v2\/media?parent=860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}