Secure payment

Attentive to the trust you place in us when you log on to the site, we make it a priority to treat your data with the utmost confidentiality. We use one of the most effective payment security systems on the market (SSL).

Which secure payment system does our site use?

In compliance with French and international interbank regulations, we use the secure payment solution SIPS (Secure Internet Processing Services), marketed by Atos Worldline, which has been working in e-commerce and banking since 1996.

SIPS enables Internet users to make secure online purchases, while providing retailers with a solution that is easy to implement on their site.

Payment security between the purchaser's computer and the payment service is based on the use of SSL forms (128-bit key session, in accordance with French government authorisations), depending on the capabilities of the purchaser's computer applications. The card number is thus encrypted between the browser and the SIPS server. Atos Worldline is the sole recipient of the card information; the merchant is not in a position to know this information.

To guard against any eventuality, the encryption system used is the most powerful on the market: the SSL (Secure Socket Layer). The SSL security server ensures the reliability of your payment by encrypting all the personal data we need to process your order (names, addresses, e-mails, bank details) as it is entered. During transfer via the Internet, it is then impossible to read them. This encryption guarantees total security.

How do you know if you're on a secure page?

There are two things you can do to check whether the page is secure:

  • you will notice the https:// (for http secure) appearing in the address bar
  • A small closed padlock also indicates that your transaction is secure.

What is SSL technology?

The purpose of this communication protocol is to encrypt data sent over the Internet using two 128-bit keys that are reputed to be difficult to crack, and to authenticate client and server workstations. By using cryptographic techniques such as encryption and digital signatures, these protocols enable :

  • browsers and web servers to authenticate themselves.
  • allow site owners to control access to particular servers, directories, documents or services.
  • allow confidential information to be exchanged between browser and server while remaining inaccessible to third parties.
  • and ensure that data exchanges between browser and server cannot be corrupted, either accidentally or intentionally, without detection.



en_GBEnglish (UK)
Retour en haut