OUR COMMITMENT TO PRIVACY
COLLECTION, USE, AND RETENTION OF CLIENT INFORMATION.
When you visit our Site, you may provide us with two types of information: 1) Personal information you knowingly choose to disclose that is collected on an individual basis; 2) Website use information collected on an aggregate basis as you browse our Site.
PERSONAL INFORMATION – OUR USE OF INFORMATION THAT YOU PROVIDE US
General Policy: Broadly speaking, we use personal information for purposes of administering our business activities, providing customer service and making other products available to our customers and prospective customers. Occasionally, we may also use the information we collect to notify you about important changes to our Site, new services and special offers we think you will find valuable. The lists used to send you products and service offers are developed and managed under our traditional corporate standards designed to safeguard the security and privacy of our customer’s personal information. Credit Card Information: If you choose to purchase products from Company or our partners, you may need to give personal information and authorization to obtain information from various credit services. For example, you may need to provide the following information: Name: Mailing address: E-mail address: Credit card number: Home and/or business phone number: Other personal information (i.e. mother’s maiden name…): Email Information: Sensitive information will not be stored in our data centers. E-Mail: If you choose to correspond with us through email, we may retain the content of your e-mail and our response so that we can more efficiently handle and follow- up questions you may have. Online Applications: When you apply on the Site for accounts or services, you provide personal information that is necessary for us to process your application. Company, along with its affiliates, may keep the information you provide us with, along with the information we collect from outside sources, so that we can offer you accounts and services related to your financial needs. Online Surveys: The information you provide to Company via online surveys and promotions on the Site will be used for internal marketing purposes, including the development of new services and information on the Site.
WEBSITE USE INFORMATION
DISCLOSURE OF INFORMATION
HOW WE SECURE INFORMATION TRANSMISSIONS
Information Security: We utilize encryption/security software to safeguard the confidentiality of personal information we collect from you. Cryptography algorithms scramble messages exchanged between your browser and our online server. 4 Encryption happens as follows: when you go to the sign-in page for the purpose of purchasing, your browser establishes a secure session with our server. The secure session is established using a protocol called Encryption. This protocol requires the exchange of what are called public and private keys. Keys are random numbers chosen for that session, and are only known between your browser and our server. After the keys are exchanged, your browser will use the numbers to scramble (encrypt) the messages sent between your browser and our server. Both sides require the keys because they need to de-scramble (decrypt) the messages when they are received. The Encryption protocol not only ensures privacy but also ensures that no other browser can “impersonate” your browser, not alter any information sent. You can tell whether your browse is in secure mode by looking for the secured lock symbol at the bottom of your browser window, and the “https://” instead of the usual “http://” in the URL field The numbers used as encryption keys are similar to combination locks. The encryption strength is based on the number of possible combinations that a lock can have. As the number of possible combinations grows, it becomes less likely that anyone would be able to guess the right combination in order to decrypt the message. E-mail that you may send without going to the sign-in page for online bidding, may not be secure unless we advise you that security measures will be in place prior to your transmittal of the information. For that reason, we ask that you not send confidential information such as Social Security or account numbers to us through any unsecured e-mail. Network Security: We provide a number of additional security features in online purchasing sessions. Online purchasing sessions will “timeout” after a specified period of inactivity. This prevents people with bad intentions from continuing your home purchasing session in case you have left your PC unattended without logging out. We recommend that you always sign-off (log out) when you are done with your online purchasing session. The network architecture used to provide the online purchasing service was designed using the most advanced network technology available. While the architecture is too complex to explain here, it is important to point out that the computers that store your actual account information are not connected to the Internet. The requests you make through the Internet are handled by our home purchasing servers, which retrieve the information you requested from our mainframe via proxy-based firewall servers. These servers act as an intermediary between you and our mainframe computers. Authorization: It is also important to verify that only authorized people log in using your username and password. This is achieved by verifying your password. When you submit your password, it is compared with the password we have stored in our secure data center. We monitor and record “bad login” attempts to detect any suspicious activity (i.e. someone is trying to guess your password). You play a crucial role in preventing others from logging on to your account. Never use passwords that are easy to guess. Examples of bad passwords are: birth dates, first names, pet names, addresses, phone numbers, social security numbers etc. never reveal your password to another person. You should periodically change your password. Employee Access, Training and Expectations: Our corporate values, ethical standards, policies and practices are committed to the protection of customer information. In general, our business practices limit employee access to confidential information, and limit the use and disclosure of such information to authorized persons, processes and transactions.
OTHER WEBSITES LINKED TO OUR SITE
Our Site is not intended for the use of children. We do not knowingly market to, or solicit data from children.