Internet Security Policy
When you are in the process of adding an
item to your shopping cart and checking out, you will see the padlock in the
bottom right-hand corner of your browser. This will let you know that SSL
encryption is in place and that information being sent from this page is safe.
With respect to security:
industry-standard encryption technologies from Go Daddy when transferring
and receiving consumer data exchanged with our site. We have appropriate
security measures in place in our physical facilities to protect against the
loss, misuse or alteration of information that we have collected from you at
CompassioNet.com is a McAfee Secure certified site and is daily tested
to pass the Payment Card Industry (PCI) Data Security Standard requirements of
Visa CISP and AIS, MasterCard SDP and American Express DSS programs. McAfee Secure sites help keep you safe from identity
theft and credit card fraud.
Encryption is the security technology which
protects the privacy of information sent over a network.
What is SSL?
SSL stands for Secure Sockets Layer, a
technology for managing the security of online message transmission. SSL
encrypts or scrambles any information sent from your browser to the server you
are connected to, making it impossible to intercept or tamper with the
information on the way.
Why is encryption
Web or eBusiness systems may hold data that
you wish to protect, such as business critical or personal information.
Encryption increases the security of data transmissions, reducing the risk of
third-party observers being privy to content. Encryption can also be used for
stored data. Encryption can help protect your web site or eBusiness information
assets from unauthorized access.
How does encryption work?
On the Internet, there are two main uses
occurs when you visit a "secure" Website, such as an online
store or shopping mall. This is called server-side encryption because it
uses the Server Certificate given to the server (computer) that runs the
other use occurs when you send or receive encrypted e-mail. In both cases,
the encryption process involves exchanging public keys.
When encrypting information, the encryption
process is done with either a public or a private key and then decrypted with
the matching public or private key. Think of it as a lock that requires one key
to close the lock and another key to open the lock.
For example, when you visit a secure
Website, your computer receives the Website's public key. When your computer
sends information to the Website, your computer encrypts it using the Website's
public key. The only way to decrypt the information you are sending is with the
web site's private key.