"United We Stand" We Support Our Armed Forces, Fire Fighters & Law Enforcement Agencies!
To provide total security, we use 3-Way Encryption™ technology, which is an advanced processing method, which you can feel confident in because order information is encrypted through EACH step of the online transaction.
If you plan on selling online, you must provide additional security to protect your customers' order information such as credit card numbers. Using ordering systems without security is like broadcasting a credit card number worldwide. E-mail and many online order forms are NOT fully secure mediums to pass sensitive information.
To provide total security, we have developed 3-Way Encryption™ technology. With this advanced processing method you can feel confident that sensitive information will be safe through each step of the online transaction.
With 3-Way Encryption™, the information is encrypted when your customer places their order, when the order is stored on the computer, and when you retrieve the order. This ensures full protection through the entire path of the order!
Encrypting data requires sophisticated technology to prepare information for transfer over the Internet. 3-Way Encryption™ utilizes Secure Socket Layer (SSL) encryption which composes the most advanced security routines available today.
SSL encryption works like this; two computers connect over the Internet and prepare to pass sensitive data. The computers enter a secure mode through which they, in essence, develop a language which is unique to them. Only after the secure connection is made and the "new language" has been developed is the data passed. With 3-Way Encryption™, this happens three times for every transaction!
Transactions are only totally secure when information is coded or "encrypted" in three areas. The diagram above demonstrates the 3-Way Encryption process.
Information is first coded between the customer and our server. Second, the information is coded on our own hard drive. At this point an e-mail is sent to the merchant notifying them of the order. Finally, when the merchant retrieves the order, the third coding takes place.