• Home
  • Shop
  • What's New!
  • Event Schedules
  • FAQ's
  • Contact Us
  • More
    • Our Story
    • All About Candles
    • Our Blog
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

HOLIDAY DEADLINE: Order by Dec 15th for Christmas delivery!

Signed in as:

filler@godaddy.com

  • Home
  • Shop
  • What's New!
  • Event Schedules
  • FAQ's
  • Contact Us
  • More
    • Our Story
    • All About Candles
    • Our Blog

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

🛡️ Chaizing Fireflies Internal Website Security Policy

🛡️ Chaizing Fireflies Internal Website Security Policy

 Effective Date: 11/07/2025 Owner: Dawn M. Mitchell Revision: 1.0 

1. Purpose & Scope

 This policy outlines the security measures and protocols necessary to protect Chaizing Fireflies’ digital assets, customer data, and website infrastructure (e-commerce platform, hosting environment, and customer accounts) from unauthorized access, disclosure, modification, or destruction. This policy applies to all employees, contractors, and third-party vendors with access to the Chaizing Fireflies website and related systems. 

2. Data Protection & Privacy

 

2.1 Customer PII (Personally Identifiable Information)

  • Collection: Only necessary PII (Name, Address, Email, Phone Number) shall be collected for order fulfillment, communication, and account management.
  • Storage: PII must be stored securely within encrypted databases provided by the e-commerce platform ([e.g., Shopify, WooCommerce]). Sensitive data access logs must be maintained.
  • Retention: PII shall be retained only as long as necessary for business and legal requirements (e.g., tax records, warranty periods). Old or inactive data shall be securely purged periodically.

2.2 Payment Information

  • Compliance: Chaizing Fireflies shall never store customer credit card numbers or sensitive payment data directly on its servers. All payment processing must utilize PCI DSS Compliant third-party gateways (e.g., Stripe, PayPal, Shop Pay) that handle encryption and authorization.
  • Validation: Payment gateway compliance must be verified annually.

3. Website Security & Infrastructure

  

3.1 Hosting & Platform Security

  • Updates: The e-commerce platform, themes, and all installed plugins/extensions must be monitored and updated immediately upon release of security patches.
  • Monitoring: Implement continuous monitoring for malware, suspicious login activity, and file integrity changes.
  • Backups: Complete website and database backups shall be performed [State Frequency, e.g., Daily] and stored securely off-site.

3.2 Secure Transmission (SSL/TLS)

  • Requirement: The entire Chaizing Fireflies website must operate over HTTPS using a valid, up-to-date SSL/TLS certificate (e.g., TLS 1.2 or higher). Unencrypted HTTP traffic must be permanently redirected (301) to HTTPS.

3.3 Security Software

  • Implement and regularly update security software (e.g., firewall applications, WAF) within the hosting environment to prevent common web attacks (e.g., XSS, SQL injection).

4. Access Control & User Management

 3.1 Hosting & Platform Security

  • Updates: The e-commerce platform, themes, and all installed plugins/extensions must be monitored and updated immediately upon release of security patches.
  • Monitoring: Implement continuous monitoring for malware, suspicious login activity, and file integrity changes.
  • Backups: Complete website and database backups shall be performed [State Frequency, e.g., Daily] and stored securely off-site.

3.2 Secure Transmission (SSL/TLS)

  • Requirement: The entire Chaizing Fireflies website must operate over HTTPS using a valid, up-to-date SSL/TLS certificate (e.g., TLS 1.2 or higher). Unencrypted HTTP traffic must be permanently redirected (301) to HTTPS.

3.3 Security Software

  • Implement and regularly update security software (e.g., firewall applications, WAF) within the hosting environment to prevent common web attacks (e.g., XSS, SQL injection).

5. Incident Response Plan

 

5.1 Reporting

  • Any employee or contractor who suspects a security breach, unauthorized access, or vulnerability must immediately report it to the [Owner/Manager Contact Info].

5.2 Response Steps

  1. Containment: Immediately isolate the compromised area (e.g., take the site offline, disable the compromised account).
  2. Assessment: Determine the scope of the breach, the source, and the specific data that may have been accessed.
  3. Remediation: Patch the vulnerability, eliminate the threat, restore the system from a clean backup.
  4. Notification: If PII was compromised, affected customers must be notified promptly and clearly, as required by law.
  5. Review: Document the incident, analyze the root cause, and update policies/controls to prevent recurrence.

6. Employee Training

  All employees with access to the website backend or customer data must complete mandatory security awareness training [State Frequency, e.g., Annually], covering topics like phishing, safe password practices, and identifying security threats.

Connect With Us

Copyright © 2025 Chaizing Fireflies  - All Rights Reserved.

  • Home
  • Shop
  • What's New!
  • Event Schedules
  • FAQ's
  • Contact Us
  • Privacy Policy
  • Security Policy
  • Terms & Conditions
  • Shipping & Returns
  • Where is my order?
  • Product Disclaimers
  • Our Story
  • All About Candles
  • Our Blog

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept

 

 Our favorite products and categories have new, enchanting names to enhance your ritual. 

Formulas and magic remain unchanged! 

See the full updates.



Find out more