The Internet has revolutionized the way we do business. It allows us to interact with you in a personal way to offer information, to add additional value, to listen to your opinions, and to provide services that you can access from the convenience of your home or office. At the same time, the Internet also brings legitimate concerns about privacy and security. Our website is dedicated to protecting your privacy and safeguarding your information. By explaining our position on security to you we hope you will better understand how we will keep your information private and secure while using it to serve you better.
When accessing the interactive business areas of the our web site you will be doing so through a secure server. Our site will only allow secure browsers into the secured areas of our site. Your browser’s secure mode will be in place at all times when connected to these areas of our site. You can confirm you are in secure mode when your browser displays a picture of a closed lock in the lower bar of your browser window and the web site address starts with “HTTPS” instead of “HTTP”. The secure areas of our web site have been secured with a digital certificate. To view this certificate, double click on the image of the closed lock icon in the lower bar of your browser window. A small window displaying the certificate information will pop up.
Protection of Information in Transit
When you use the secure areas of our web site, the information communicated between your web browser and our web server is protected by encrypting the data using Secure Socket Layer (SSL) encryption. Our web site only supports 128-bit encryption.
Protection of Stored Information
We have taken technical and procedural measures consistent with best practices in information security to protect stored information. These measures include:
- Utilizing a series of firewalls to protect the information and computing resources
- Virus protection of all computing resources
- Monitoring system and application logs to identify any unusual activity from authorized and/or unauthorized individuals accessing our systems
- Providing access to information and system functions only to those who have a need and a right
- Physically securing the facilities where the computing resources are located
- Conducting periodic 3rd party vulnerability assessments