Security Policy

Ensuring Your Security

At, our technology and policies are designed to make your online transactions private and secure. Documented steps are taken to safeguard information according to established security standards and procedures and we continually evaluate the newest technology for protecting information.

Sensitive information passed in online transactions such as social security numbers, banking information, and personal data is confidential.

  • Transactions involving sensitive information occur on a secure server. You can look for the “lock” symbol at the bottom of your browser window to verify that you are on a secure server.
  • Our secure socket layer (SSL) software uses strong encryption to ensure that your personal and financial information cannot be intercepted during transmission to our server.
  • All information requests pass through hardware and software security firewalls.
  • Communication between servers/systems and State databases is passed via a secure private network.
  • Encrypted personal information includes credit card numbers as well as social security numbers and banking information.

State of the Art SSL (Secure Socket Layer) Encryption

This enables the encryption of sensitive information during an online transaction. Information sent via SSL can no longer be read as plain text.

Secure Internal Networks

All data transferred between databases is done via secure Virtual Private Networks (VPN) to ensure that only authorized users can access the network and no one can intercept data.

Data Storage Policies does not store sensitive information in a way that may be retrieved or compromised. When storing this information is necessary, the strongest asynchronous encryption available is used. Without your explicit approval, your bank or credit card account number is never stored on our server any longer than necesary to complete the transaction.

Secure Policies and Procedures

Password and network activity audits are performed quarterly.

Physical Location Security

All physical locations where hardware and software are located are physically secured and only accessible by individuals with proper credentials.

Application Security

A software tool is employed to scan for individual application vulnerabilities.

Payment Card Industry Data Security Standards (PCI DSS) Compliant

Adherence to performance measurements outlined in the PCI DSS annual self evaluation, as well as submission to regular scans from Security Metrics to search for network vulnerabilities.

Sarbanes-Oxley Compliant

Adhere to secure change control procedures.