We take the security of all your personal information seriously and have in place a variety of methods/procedures to protect against physical or online theft. All information collected is stored in a technically and physically secure environment. For example, when we transmit highly confidential or Sensitive Information over the internet, we protect it through the use of encryption, such as the Secure Socket Layer (SSL) protocol. In addition, to keeping your personal information secure through online transmission we also maintain a physically safe environment for all stored information by restricting access to those employees who need to access to that information in order to provide products or services to you. Our employees are dedicated in maintaining the privacy of your personal information. Employees who are found not adhering to our strict privacy policies will be subject to disciplinary action.
It is important to understand that you also have a significant role in protecting your personal information. No one can see or edit your personal information without knowing your login information; do not share your login information with others. If you use this site you are responsible for the confidentiality of your account, password, and restricting access to your computer. By creating an account with our Website you agree to accept responsibility for all activities that occur under your account and password.
Always remember to use caution when sending information online.
While we take the security of all your personal information seriously, it is important to understand that no data transmission over the Internet is guaranteed to be 100% secure. Therefore, we cannot secure or warrant any information that you transmit to us, and you do so at your own risk. In compliance with applicable federal and tribal law, we shall notify you via email in the event we discover that there has been a security breach of your personal information. Please be advised that notice to you may be delayed in order to allow proper law enforcement time to investigate the extent of network damage, and to engage in remedial measures.
Check out these links for even more great tips on how to protect your personal information and prevent identity theft: