Skip to main content
All CollectionsShipping SupportShipping Guidelines
Luwjistik’s personal and general data protection code of practice
Luwjistik’s personal and general data protection code of practice
Updated over a week ago

At Luwjistik, we understand the importance of personal and general data protection, especially in cross-border shipping. We take responsibility for handling your shipment information seriously and are committed to complying with applicable data protection laws and regulations.

To help you better understand Luwjistik’s data security measures, we will cover the following:

Why Luwjistik prioritizes data security in supply chain management

Data security measures are integral to supply chain management. The ultimate goal of data security measures in supply chains is to mitigate the risks of doing business locally and globally through the digital supply chain network.

Moreover, reducing exposure to data breaches can help guard against lost shipments, downtime, compromised data, lost proprietary information, and loss of customer trust.

How Luwjistik keeps client data secure and safe

We maintain and process your data securely and manage it in the most up-to-date condition and with utmost accuracy. For added security, all client and network partner personal data is housed in our encrypted database using the industry standard AES-256 encryption algorithm.

All personal data is also accessible only on our private, secure network on Amazon Virtual Private Cloud (Amazon VPC). This ensures only authorised personnel can access client and network partner personal data.

What data Luwjistik collects

It is Luwjistik’s responsibility that we consistently and continuously comply with every aspect of any applicable and relevant personal data protection code.

The personal data or records may include (but are not limited to) the following: -

  1. Names and addresses of the orders on our systems.

  2. Phone numbers and email addresses, including those included as contact information on our orders and those our users use for authentication.

  3. Identification numbers such as Tax IDs on Orders.

  4. Manifests, order labels, or order sheets.

  5. System logs that may include any of the above.

  6. Statistical data, e.g., numbers of orders.

  7. Payment information, e.g., credit or debit card information, including the cardholder's name, card number, billing address and expiry date.

Important

Any external party, such as customs, etc., must make inquiries or requests for information regarding a customer's information or personal details through an official channel in writing

Did this answer your question?