Personal Data Safety Policy - MixMarket

Personal Data Safety Policy

All information related to your personal information is secure and confidential. Safety is achieved by the following methods:

A. User Identification

The codes used to identify you as a user are two: the Password (e-mail or username) and the Personal Security Code (password), which provide complete access to your personal information every time they are registered. It is possible to change your personal security code as often as you wish. The user is solely responsible for maintaining the privacy and confidentiality of third parties. Should it be lost or leaked, it should immediately notify us otherwise we are not responsible for the use of the unauthorized password. The secret security codes are stored in our database using a one-way hash encryption algorithm, making it impossible even for administrators to retrieve it, thus protecting the system even in the event of a malicious attack.

We use SSL-256bit encryption protocol to ensure the confidentiality of the transfer of personal data. The system has been certified by Geotrust, a company specializing in transaction security. Encryption is essentially a way of encoding the information until it reaches its designated recipient, who can decode it using the appropriate key (this is done automatically by the ssl protocol). Encryption and use of ssl is mandatory on all pages, whether or not they contain sensitive data.

B. Controlled Access – Security Systems

Access to our systems (servers) is controlled by a firewall, which allows the use of specific services by customers / users, while preventing access to systems and databases with confidential business information and information. All servers have Antivirus service that checks for possible malware that could cause data leakage. For server management, access is only allowed through a VPN service that only our technical team can access, thus preventing any access from the public network, even if the administrators’ access information is leaked for any reason. The server’s filesystem is encrypted so that even if someone has physical access to our data server, they will not be able to decrypt the data.

C. Encryption

The system first decrypts the information it receives using the same key (which is predetermined when you first connect to the service) and then processes it. systems send you information following the same encryption process. Enter personal data (passwords, addresses, phones, credit cards, etc.) anywhere in the site with 256-bit SSL encryption. Encryption is essentially a way of encoding information until it reaches its designated recipient, who can decode it using the appropriate key. When ordering and after the user / customer has logged in with the username and password at, all communication between your computer and systems at is encrypted using a 256 bits key. That is, every time you send information to the system, your browser first encrypts it using a 256 bits key and then sends it to the system. The system first decrypts the information it receives using the same key (which is predetermined when you first connect to the service) and then processes it. systems send you information following the same encryption process.

D. Back Up

We keep daily backups of all data to prevent any hardware failure in a secure location. Copies are automatically deleted from our systems with a maximum life of one month. The copies are stored in the same datacenter but in a separate storage unit, having exactly the same access and protection principles as the original data. Backups are stored with encryption so that even if they leak, they cannot be recovered.

E. Data Leakage

If any case of data leakage comes to our attention, either maliciously on our systems or by a user’s mistake, our actions are as follows:

a) Temporary shutdown of the application until we ensure that any security gaps are closed.

b) Immediately notify users and / or customers of the breach, its size – and in the event that a member has made a mistake, the possible remedy.

c) Immediate alert of any authority is responsible depending on the type of leak (eg in case of malicious attack, the Greek police cybercrime department is notified).

F. Cookies

You can visit our site without disclosing your identity to us and without revealing any personal information. Our website uses cookies to ensure the best possible user experience. Cookies are small text files that are placed on the user’s device to track usage patterns and registration preferences.

Cookies can be either “persistent” cookies or “periodic” cookies: a persistent cookie will be stored by a web browser and will remain in effect until its specified expiry date unless the user deletes it before the expiration date. A cookie journal, on the other hand, will expire at the end of the user’s period when the web browser is closed. We use both cookies, magazines and persistent cookies on our site.

information generated about our site is used to generate reports about our site and the traffic of our site. This way we can continually improve our website and constantly adapt it to their needs.

Users can control and / or delete cookies as they wish – for details (see Blocking or deleting all cookies will have a negative effect on the stability of many websites. If users choose to close our cookies then they will not be able to use all of the features of our site.

We also use cookies to display ads through third-party tools, including Google Ads and Remarketing. Third parties, including Google, use cookies to display ads related to previous visits to our site. These cookies do not provide any information about you and do not allow access to your computer or other device.

If you prefer not to see ads from, you can sign up in one of the following ways:

– Sign up to use cookies through Google Ads settings by clicking here.

– To opt out of using a third party cookie, click here.

This policy may be updated from time to time, e.g. due to amendments to the relevant legislation. We encourage users to periodically check this page for the latest information on privacy practices.

H. Questions and communication:

For any questions about this policy or if you wish to exercise any of your rights as described here, please contact us by e-mail at, or by phone at 2310123456.

I. Trading secrecy

Confidentiality is considered self-evident. The same basic principles that apply to classical transactions apply to e-commerce. All information transmitted by the user to is confidential and takes all necessary steps to use them only to the extent necessary in the context of the services provided. Only authorized employees have access to your transaction information and only when necessary, e.g. to process your applications. If uses third parties to support its systems, it ensures confidentiality. For your own safety, you should also treat all information provided through the service as confidential and confidential and not disclose it to third parties.