A Shared Responsibility
The owner’s, it’s employees, and authorized associates, (hereinafter, the “Company”) of this Website (hereinafter, the “Site”) would like to remind you that security of computerized information is a shared responsibility. The security precautions implemented by the Company may be of little value to you if your computer is being compromised by unchecked viruses, spyware, or other malware which may provide a means for unauthorized third parties to gain access to your information. The Company encourages and reminds you to be an active participant in ensuring the security of your information by installing firewall protection, using anti-virus protection, using anti-spyware protection and downloading security updates and patches onto your computer. For more information concerning how you can protect your computerized information, please contact a computer professional or security expert concerning safeguarding your computer.
We also encourage you to read below for more information on the security measures the Company has in place to protect the confidentiality of your online transactions.
Security Measures Employed
The Company takes user information confidentiality and computer security very seriously.
For Site security purposes and to ensure that this service remains available to all users, the Web servers at this Site use industry-standard methods to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. Unauthorized attempts to upload information or change information on the servers for this Site are strictly prohibited and may be punishable under local, state, and federal laws, including the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
The Company employs strict security measures and Web security best practices to protect user information.
- The Company’s Site uses Secure Sockets Layer (SSL), the industry standard security protocol, to securely communicate with web browsers. SSL ensures your private information is encrypted between your internet browser and the Company computer systems.
- If available, the Company will use digital certificates. The Company will register with a trusted third-party certification authority to receive a digital certificate that you can use to verify the identity of our Site. You can verify that you’re at a trusted the Company Site by clicking on the green area within the browser bar that appears on the secured areas of our Site.
- The Company uses firewalls to block potentially destructive information from entering our computer systems and prevent unauthorized access. Firewall systems are hardware devices and software systems that provide a barrier against hackers and viruses. Firewalls are deployed throughout the Company’s network to allow only authorized network traffic.
- The Company uses intrusion detection systems that continuously monitor our computer network to detect unauthorized attempts to breach our computer systems or the misuse of the Company computer systems.
- The Company regularly patches and monitors its computer systems to ensure that our systems are protected against vulnerabilities that, unfortunately, are so prevalent on the Internet today. Patching and monitoring computer systems provides another layer of protection by closing the loopholes that internet hackers may try to exploit.
- The Company also uses security measures to protect the confidentiality of user information stored on our computer systems. The Company follows industry standard best practices for protecting and securing its information technology assets including, but not limited to, authentication, monitoring, auditing, and encryption. Security procedures have been integrated into the design, implementation, and day-to-day operations of the Company as part of our continuing commitment to security of information.
The Company is committed to protecting your information from unauthorized access, use, or disclosure. Access to confidential information is limited to those personnel who need it to perform their official duties and responsibilities. Employees and contractors who have access to the Company information are regularly trained to follow appropriate procedures when accessing confidential user information. The Company personnel access your information only within the scope of their assigned duties and responsibilities.
How to Contact
If you have any questions about this, the practices of this site, or your dealings with this site, please contact us using our Contact Page.
Last updated: June 26, 2017