Security

Last updated: March 23, 2026

Overview

Protecting customer data is central to Rentaro. This page summarizes our security practices at a high level. It is not an exhaustive list and may change as we improve our platform.

Infrastructure

We rely on reputable cloud providers and follow industry-accepted practices for network isolation, access control, and monitoring. Production environments are separated from development and testing where appropriate.

Data protection

Data is encrypted in transit using TLS. Sensitive data at rest is protected using provider-managed encryption and access policies aligned with least privilege.

Payments

Online payments are processed by Xendit. Payment credentials and card data are handled within Xendit's secure infrastructure and applicable certifications; Rentaro does not store full card numbers on our servers.

Access and authentication

Access to systems and customer data is limited to authorized personnel with a business need. We support strong authentication options for customer accounts where applicable.

Monitoring and incident response

We monitor for anomalies and maintain processes to investigate and respond to potential security issues. If we become aware of a breach affecting personal data in a way that requires notification, we will follow applicable law and contractual commitments.

Vulnerability reporting

If you believe you have found a security vulnerability in Rentaro, please report it responsibly. Do not perform testing that could harm users or the service.

Contact: support@rentaro.ph