Security by Design
Servifyr was built from the ground up with security as a core principle. Dynamic sessions, encrypted communications, and data minimization protect both your guests and your business.
The "Quishing" Problem
Static QR codes on table tents are vulnerable to "Quishing" (QR phishing). Bad actors can easily replace legitimate QR stickers with malicious ones that redirect guests to fake payment pages.
Static QR Risks:
- ✗ QR stickers can be replaced undetected
- ✗ Links never change, easy to spoof
- ✗ No way to verify authenticity
- ✗ Payment data theft liability
Servifyr Solution:
- ✓ Dynamic sessions - new token each visit
- ✓ E-paper can't be "stickered over"
- ✓ Cryptographically signed sessions
- ✓ Instant fraud detection
Dynamic Session Token
Generated fresh for each guest visit
Security Architecture
Multiple layers of protection from device to cloud.
Device Security
- • Secure boot verification
- • Encrypted local storage
- • Hardware-based key storage
- • Tamper detection sensors
Network Security
- • TLS 1.3 encryption
- • Certificate pinning
- • Isolated mesh network
- • No guest network dependency
Cloud Security
- • SOC 2 Type II (roadmap)
- • Data encryption at rest
- • Multi-region redundancy
- • 24/7 security monitoring
Data Minimization
We only collect what's necessary to provide the service. Guest privacy is paramount.
What We Collect
- ✓ Order information (items, timing)
- ✓ Session identifiers (anonymized)
- ✓ Service request types
- ✓ Payment completion status
What We Don't Collect
- ✗ Guest names or personal info
- ✗ Payment card numbers (PCI scope)
- ✗ Location tracking beyond venue
- ✗ Biometric data
Compliance & Certifications
GDPR
Compliant
CCPA
Compliant
PCI DSS
Out of Scope*
SOC 2
In Progress
*Payment processing handled by certified payment partners. Servifyr never stores or processes card data.
Security Whitepaper
Download our comprehensive security architecture document for your IT and compliance teams.
Request WhitepaperQuestions About Security?
Our team is happy to discuss security requirements with your IT and compliance teams.
Contact Security Team