Close
Call Us (800) 749-2788 Have a question? Contact Us

Secure Shopping / Payment:

How We Secure Your Information

Securing your information is a company priority. We use reasonable security measures to help protect the confidentiality of personal information.

This Web site has the following types of security measures: limited access data-centers, firewall technology, and secure-socket-layer (SSL) certificate authentication. SSL is encryption technology that provides security for information that's transmitted over the Internet. This site accepts orders only from Web browsers that permit communication through SSL technology-for example, Internet Explorer (version 6.0 or higher), Firefox (version 3.0 or higher), Safari (version 4 or higher), Chrome (version 2 or higher), and AOL (version 9 or higher).

While we implement the above security measures on this site, you should be aware that 100% security is not always possible.

Online Protections

Your account information is protected by the password you use to access your online account. Please keep this password confidential. We also use a technology called Secure Sockets Layer (SSL). If your browser is capable of SSL (and most are), your account information will be protected during transport across the Internet. You can see a representation of this when you enter a secure portion of our online website (not including our mobile applications), which is any page containing any of your account information, where an image of a closed lock or a solid key should appear in the bottom bar of your browser window. If you click on this image, a small pop-up window displaying website security information will appear. This display indicates that your personal information is transmitted in encrypted form to an authorize.net web server, not to some unknown or unauthorized server.

Hard Copy and Electronic Storage Protections
Personal information that is maintained in our office is subject to physical, administrative, and technical controls as well. Hard copies of sensitive personal information are maintained in locked locations or cabinets with similar restrictions for electronic storage. When disposed of, the information is shredded, destroyed, erased, or otherwise sought to be made unreadable.