SECURITY
This site has security measures in place to protect against the loss, misuse or alteration of the information under our control. Portions of our site make extensive use of Secure Sockets Layer (SSL) encryption, the Internet's leading encryption standard, as well as password-like identifying information. SSL is used to encrypt the information being sent between a visitor's computer and our Web site.
In addition, we take great care to safeguard all information that is transmitted to us and stored by us on our computers, servers, and databases. This protection includes the use of network intrusion prevention and detection technology as well as other industry accepted security practices. We protect the physical location of our systems through the use of access control and monitoring technologies. We take extensive measures to limit the risk of damage or loss of any data due to hazards like fire, water damage, power loss, etc.
We recognize that we incur vital obligations when clients entrust their data to us. In order to protect client data, we are committed to secure and reliable client application operations. In order to provide the best security measures, we engage the independent auditing firm KPMG to complete our SAS 70 Type II audit. Often, our clients choose to conduct their own corporate security audits as well.
In addition, we take great care to safeguard all information that is transmitted to us and stored by us on our computers, servers, and databases. This protection includes the use of network intrusion prevention and detection technology as well as other industry accepted security practices. We protect the physical location of our systems through the use of access control and monitoring technologies. We take extensive measures to limit the risk of damage or loss of any data due to hazards like fire, water damage, power loss, etc.
We recognize that we incur vital obligations when clients entrust their data to us. In order to protect client data, we are committed to secure and reliable client application operations. In order to provide the best security measures, we engage the independent auditing firm KPMG to complete our SAS 70 Type II audit. Often, our clients choose to conduct their own corporate security audits as well.