República Dominicana
SEGUROS

Privacy Policy


Change to Spanish version

  1. Get to know all the tools for your safety

At Seguros Sura S.A., we have the necessary tools to control access to our information systems, and we continually investigate and update our infrastructure to achieve a level of security in line with market standards.

To provide you with greater security when making inquiries and transactions, we recommend that you always log in to your account using the Log in option on the right-hand section of the page.
Report any irregularity and help us put an end to electronic fraud.

If you receive an email that appears to be from Seguros Sura S.A. and you are suspicious of its origin, or if you notice something suspicious or unusual when accessing the site to make transactions, immediately contact the Customer Service Line at 809-985-5000 option 2.

  1. Password management and use

To be registered on some of our pages, you must meet the minimum conditions required in the password request procedure; otherwise, SEGUROS SURA reserves the right to reject the request.

For your safety, when using the password assigned to you for the first time, the system will automatically request that you change it. This new password should not be related to events like birthdays, anniversaries, license plate numbers, or any information that is easy to know or find out.

Recommendations:

  • Try to change your password at least once a month (especially if you have been forced to use it from a public place) or sooner if you suspect you have lost confidentiality. In this case, you should also contact the customer service line to report the case.
  • Your username and password are personal and non-transferable. Memorize them and keep them absolutely confidential.
  • When entering your password, make sure no one is watching you.
  • If you forgot your password, you must go to the option: Forgot your password? located in the right section of the page and follow the procedure indicated there.

  1. Security measures on your mobile devices and PCs

Recommendations:

  • Install and constantly update an antivirus and firewall system on your personal computer.
  • Install programs or applications from the official app stores of your device.
  • Periodically update your internet browser to make using the pages even safer.
  • Avoid conducting banking or financial operations from public or unknown computers, such as Internet Cafés, Airports, Hotels, or Universities.
  • Make transactions only from your personal computer, from your home or office.
  • For your safety, never provide personal information to people who request it under the pretext of participating in contests, prizes, or any other type of offer.
  • Do not fill out forms that come within emails or respond to requests for confidential information through them.
  • At the end of an internet transaction, make sure to log out, delete temporary files constantly, and NEVER save passwords in the browser.
  • Browse known and secure sites.
  • Read the terms and conditions of the applications or services to which you subscribe.
  • Review the permissions you grant to your installed applications or websites as they may obtain information you do not wish to share.
  • Avoid connecting USB devices or removable media from unknown sources.
  • Make backups of your personal information.

  1. Website security

A secure site ensures that all information travels encrypted, from the client to the server or vice versa.

Recommendations:

  • Directly type into the address field www.segurossura.com.do and verify that the address does not change.
  • Unless the alert option is disabled, a message should appear before logging in, informing you that you are entering a secure page.
  • Lock icon: verify that the lock-shaped icon appears in the lower right corner or at the end of the address bar (depending on the browser type), indicating that the connection is secure.
  • Https: verify that the address field shows the “S” after the protocol (http), indicating that the page is secure.
  • Seguros Sura S.A. has official security certificates, which allow you to make transactions and operations through our web pages safely and securely.

  1. How can your information be compromised?

As internet users, we are exposed to malicious programs, viruses, or different techniques that can be used to obtain confidential information.

  1. Computer virus

Its purpose is to alter the normal functioning of the computer without the user’s permission or knowledge. Viruses usually replace executable files with others infected with their code. Viruses can intentionally destroy the data stored on a computer, although there are also more “benign” ones that are merely annoying.

Computer viruses primarily function to propagate; they are very harmful, and some contain an additional payload with various objectives, from a simple joke to causing significant damage to systems or even blocking computer networks by generating useless traffic.

Some types of computer viruses and techniques used to compromise your information.

  1. Malware: malicious program

From the English malicious software, it is a program designed to infiltrate or damage a device without the owner’s knowledge and for various purposes, including anything from a trojan to spyware.

  1. Spyware: spy programs

These are applications that collect information about a person or organization without their knowledge. The most common function of these programs is to gather information about the user and distribute it to advertising companies or other interested organizations. However, they have also been used in legal circles to collect information against crime suspects, such as in software piracy cases.

  1. Ransomware: data hijacking

From the English ransom, meaning ransom, and ware, a shortening of software, it is a type of malicious program that restricts access to certain parts or files of the infected operating system and demands a ransom to remove this restriction.

  1. KeyLogger: password theft

A keylogger is a key recorder that can be harmful to your mobile device because you don’t know who is watching what you type, especially if it is something confidential like a credit card number or an online account password.

  1. Phishing

Phishing is a form of internet fraud that uses deceptive emails and fraudulent websites designed to confuse recipients into disclosing personal financial information, such as credit or debit card numbers, passwords, usernames, or other personal data like ID numbers.

Phishing is a computer term that refers to a type of crime within the scope of scams and is committed through social engineering techniques aimed at fraudulently acquiring confidential information (such as a password or detailed information about credit cards or other banking information).

  1. How to detect it?

Cybercriminals send an email on behalf of an allegedly trustworthy entity or person, including urgent situations to make people react immediately and respond with the information they want. They usually include a fake link that appears to lead to the legitimate website they are impersonating but actually leads to a fake site or even a pop-up window with the same appearance as the official website of the financial institution. They may also include attachments that in some cases are malware.

  1. Spoofing: identity theft

In network security terms, it refers to the use of identity impersonation techniques, generally for malicious or investigative purposes. There are different types depending on the technology.

  1. How to detect it?

IP Spoofing: IP spoofing. It basically consists of replacing the source IP address of a TCP/IP packet with another IP address that you want to impersonate. Keep in mind that the responses from the host receiving the packets will be directed to the falsified IP.

ARP Spoofing: identity spoofing by ARP table falsification. It involves constructing modified ARP request and response frames with the aim of falsifying the ARP table (IP-MAC relationship) of a victim and forcing them to send packets to an attacking host instead of their legitimate destination.

DNS Spoofing: identity spoofing by domain name. It involves falsifying a “Domain Name-IP” relationship in response to a name resolution query, i.e., resolving a certain DNS name with a fake IP address or vice versa.

Web Spoofing: impersonation of a real website (not to be confused with phishing). It routes the victim’s connection through a fake page to other web pages to obtain information from the victim (web pages visited, form information, passwords, etc.). The fake web page acts as a proxy, requesting the information required by the victim from each original server and even bypassing SSL protection.

Mail Spoofing: email spoofing of other people’s or entities’ email addresses. This technique is used for sending phishing and SPAM emails.

Talleres
para reparación Autos
Proveedores
de Cristales Autos
Visítanos Queremos escucharte,
cuéntanos cómo mejorar
MENU