Whenever you use our web site or any other web site, the computer on which the web pages are stored (the Web server) needs to know the network address of your computer so that it can send the requested web pages to your Internet browser. The unique network address of your computer is called its "IP address," and is sent automatically each time you access any Internet site. From a computer's IP address, it is possible to determine the general geographic location of that computer, but otherwise it is anonymous.
We do not keep a record of the IP addresses from which users access our site except where you have specifically provided us with information about yourself, in which case we also record your IP address for security purposes. An example of this would be when proceeding to a checkout to finalise an order you may wish to make. After completing the form provided, your IP address will be stored along with a transaction number that allows us to track your order.
This website uses industry standard Secure Socket Layer (minimum of 256-bit) encryption technology to secure communication sessions with customers and merchants. Using firewalls in front of the Payment Gateway and within the system, it restricts access to information regarding the payment transactions.
This website only allows customers with browsers supporting SSL encryption technology to access the payment facility. This facilitates secure transmission of transaction details.
You can verify that your session is secure by locating the lock icon in the bottom right-hand corner of your screen.
This website fully complies with Visa’s AIS program and MasterCard’s Site Data Protection Programme. Specifically this website complies with the following PCI standards:
- Install and maintain a firewall configuration to protect data
- Do not use vendor-supplied defaults for system passwords and other security parameters
- Protect stored data
- Encrypt transmission of cardholder data and sensitive information across public networks
- Use and regularly update anti-virus software
- Develop and maintain secure systems and applications
- Restrict access to data by business need-to-know
- Assign a unique ID to each person with computer access
- Restrict physical access to cardholder data
- Track and monitor all access to network resources and cardholder data
- Regularly test security systems and processes
- Maintain a policy that addresses information security