+1 (917) 764-4992

Login

It's all about trust

Safe, compliant, and transparent by design.

Payments

Segregated funds

We keep customer funds in separate trust accounts. Your money never mixes with ours, nor other customers'.

We don’t touch the money

Payments flow through licensed partners. Qualy facilitates, but never holds or moves your funds directly.

Licensed global partners

We only work with regulated payment providers who are licensed in their jurisdictions.

Fast disbursements

As soon as funds clear, we disburse them to schools or agents. No unnecessary delays. Minimizing risk and impact in case of breach.

Transparent payment flow

Every payment has a full audit trail. You can track when it's paid, cleared, and disbursed.

PCI DSS compliance

Card data is handled only by PCI DSS-compliant providers.

No card data storage

We never store card details on our systems. All sensitive data is handled by our partners.

Duplicate payment protection

Every payment is protected against accidental duplicates. If a request is retried due to network issues, the system automatically detects it and prevents double-charging — so payers and institutions are always protected.

Secure webhook architecture

Payment notifications from gateways go through a secure, verified channel before reaching our systems. This prevents fake or tampered payment events from ever being processed.

Chargeback protection

We have systems in place to handle chargebacks and disputes efficiently, minimizing impact on schools and agents.

Liability shift priority

Whenever possible use 3D Secure and other measures to ensure liability for fraudulent transactions shifts to the card issuer, protecting our customers for any potential losses.

Technology

Google Cloud hosted

We run on secure Google Cloud infrastructure with best-in-class uptime and security.

Encryption at rest

All data is encrypted at rest using AES-256 encryption. Banking data gets an additional layer of field-level encryption with unique keys for each customer — so even direct database access would not reveal sensitive financial details.

Data in-transit protection, HSTS and TLS 1.2+

We enforce HTTPS with HSTS and use end-to-end TLS 1.2+ for secure communications.

SLSA Level 3

Our build systems follow SLSA 3 standards, protecting against tampering and supply chain attacks.

Database-per-tenant isolation

Each customer gets their own dedicated database — not just row-level filtering, but complete physical separation. There is no shared data layer between tenants.

Firewalls are always on

We use multiple layers of firewalls to protect our infrastructure.

24/7 monitoring

Our infrastructure is monitored around the clock with distributed tracing, error reporting, and structured logging. Every request can be traced end-to-end, giving us full visibility to catch and resolve issues fast.

DDoS protection

We use Cloudflare for DDoS mitigation, traffic filtering, and advanced protections. All connections are validated through Cloudflare to prevent spoofing and ensure only legitimate traffic reaches our systems.

Zero standing privileges (ZSP)

Our systems use ZSP, meaning no one has permanent access to production environments. Access is granted only when needed and logged.

Strict DMARC policy

We enforce a “reject” policy on DMARC to prevent spoofed emails from being delivered.

DNSSEC enabled

DNSSEC is enabled on our primary domains, ensuring DNS lookups are verified and tamper-resistant.

Email delivery monitoring

Outbound email reputation and delivery are continuously monitored to avoid issues with missing invoices or payment links.

Email delivery isolation

We isolate transactional email from marketing or internal communication to reduce reputational risk.

Multi-layer rate limiting

Three independent layers protect against brute force attacks and abuse — rate limiting across all endpoints, smart login blocking that escalates automatically, and account-level lockout powered by Firebase. Repeated attempts trigger increasingly longer blocks.

Protection from malicious payload exploits

All payloads are validated and sanitized to prevent exploits like XSS, NoSQL injection, and other common vulnerabilities.

Subdomain isolation

Our subdomains are isolated at the browser level, preventing cookie-setting from malicious subdomains and strengthening our security against cookie-tossing attacks.

Security vendor validation

Our domain is validated by major security vendors like Norton, McAfee, and Google Safe Browsing to ensure we're recognized as a trusted site.

Per-tenant encryption keys

Each customer's sensitive data is encrypted with its own unique key. Even in the unlikely event of a breach, one customer's data cannot be used to access another's.

Field-level encryption on banking data

Bank account numbers, routing numbers, IBAN, SWIFT, and other banking details are each individually encrypted — not just at the database level, but field by field. Even our own database administrators cannot read these values in plain text.

Automatic PII redaction in logs

Our logs are automatically scrubbed of sensitive data — passwords, tokens, bank account numbers, government IDs, and card details are removed before anything is stored. Your sensitive information never appears in system logs.

Bot protection (Cloudflare Turnstile)

We use Cloudflare Turnstile to protect login pages and public forms from bots and automated attacks — without making real users solve annoying CAPTCHAs.

Internal network protection

Our systems are hardened against server-side request forgery (SSRF). Outbound requests to internal networks, cloud infrastructure, and private addresses are automatically blocked.

Per-customer domain validation

Each customer's allowed web domains are individually verified. We never allow blanket access — only your registered domains can communicate with your data.

Token freshness for sensitive operations

Changing bank account details or security settings requires a fresh login. If too much time has passed since your last sign-in, you'll need to re-authenticate — adding an extra layer of protection for your most sensitive actions.

Startup security validation

Our platform runs mandatory security checks every time it starts up. If anything critical is misconfigured — encryption, authentication, or bot protection — the system refuses to launch. An insecure version can never reach production.

Distributed tracing (OpenTelemetry)

Every request is traced end-to-end across all our services. If something goes wrong, we can pinpoint exactly where and when — making debugging faster and security investigations more thorough.

Structured error codes

We use over 940 unique error codes so you and our support team always get clear, actionable messages when something goes wrong — while internal system details stay hidden.

People

Role-based access

Our team members only see what they need to do their job. No broad access granted.

Background checks

All team members handling sensitive systems undergo background verification.

Security training

All staff complete regular security and compliance training sessions.

Two-factor auth (2FA)

2FA is required for all internal systems, and available for all users on the platform.

Least privilege principle

We follow the principle of least privilege, ensuring team members only have access to what they need.

Support access controls

When support agents need to access a customer account, sessions are time-limited, individually audited, and restricted to a specific set of permissions. Administrative and destructive actions are permanently blocked. Every session requires a documented reason.

Compliance

Operating only with licensed partners

While Qualy is not a financial license holder, our partners are fully licensed and compliant.

Local regulation aligned

We adapt to each region's rules—like Brazilian BACEN rules or Australia's AML laws—through our partners and with our own controls.

Audit-ready logs

All payments and system actions are logged and time-stamped for audit-readiness.

Customer Due Diligence (CDD)

We perform CDD on all customers to ensure compliance with local regulations.

GDPR compliant

We follow GDPR principles, ensuring data privacy and user rights are respected.

Brazil-specific compliance

We comply with Brazilian regulations, including the Lei Geral de Proteção de Dados (LGPD) and BACEN rules for payment handling.

Australia-specific compliance

We comply with Australian regulations, including the Anti-Money Laundering and Counter-Terrorism Financing Act (AML/CTF) and the Privacy Act. Transactions are monitored and reported to AUSTRAC via our payment partners.

Strong Customer Authentication compliance

We comply with the SCA requirements, by implementing 2FA and other measures.

DSAR (Data Subject Access Request) support

You can request access to your personal data at any time, as required by GDPR and LGPD. When we export your data, sensitive fields like banking details are automatically protected before delivery.

Documented lawful bases for processing

We maintain a clear legal basis for every type of personal data we process — whether it's to fulfill a contract, with your consent, for legal obligations, or for legitimate business purposes — as required by GDPR.

Operations

Shared security responsibility model

We share security responsibilities with you, our suppliers, and our partners ensuring a comprehensive approach to security.

Disaster recovery ready

We use queues, backups, and replication for fast recovery. If a retry happens during recovery, the system detects duplicates and prevents double-processing — so no one gets charged twice.

Automated failover

If something fails, systems switch to backups without user disruption.

Reliable message queues

All payments and processes are queued and retried safely in case of failures.

Regular backups

We take regular backups of all critical data, ensuring we can restore quickly if needed.

Release freeze windows

We have scheduled release freeze windows to minimize risk during critical periods.

Error tracking & alerting

We use advanced error tracking and alerting to catch issues before they affect users.

Incident response plan

We know whom to call, what to do, and how to communicate in case of incidents. Our incident response plan is ready and tested.

Transparency

Customer transparency

We never hide who our upstream partners are—we believe transparency builds trust.

Open communication

We communicate openly about incidents, outages, and changes that affect customers.

Public status page

Our status page shows real-time system health, incidents, and maintenance updates.

Clear pricing

Our pricing is straightforward, with no hidden fees or surprises.

Leave anytime

We don’t lock you in with contracts. You can leave anytime, no questions asked.

Security documentation available on request

Need more detail? We provide a comprehensive security and compliance document to enterprise customers upon request. Contact our sales team.

Automate your tuition fee and commission payments.

Qualy was designed for collecting payments for the international education industry. It helps colleges, schools, and education agents of all sizes.

  • Start with a pilot with no strings attached
  • Implementation & training included
  • Transparent fees