Your Privacy Is Important to Us
Internet security is a top priority at law|inc. We recognize that whether you are an existing client or are considering a relationship with us, you have an interest in how we collect, retain and use information about you and your relationship with us. Our systems and policies have been engineered to provide maximum protection against unauthorized access to sensitive customer information. The following information details what we have done to answer your privacy concerns.
When Website Information is Collected and Not Collected
During the process of delivering content to you, we do not collect personally identifiable information about you, such as your name, address, phone number or email address. We do not require any information from you to simply access the information on our website.
The client information that is collected to process your service request might include contact information (name, mailing address, telephone number, fax number and/or email address); corporate information (business name and description of business, information regarding directors, officers, members, stockholders and registered agent and information regarding shares of stock); and financial information (name on account, credit card number and expiration date), depending upon the nature of your service request. In order to obtain corporationâs tax identification numbers and/or make an S corporation election for tax purposes, your service request will require us to obtain personal information including social security numbers.
The contact information, corporate information, financial information and personal information from the questionnaire are used to process your request. The clientâs contact, corporate, financial and personal information is private and confidential.
We Do Not Share Your Information With Any Other Company or Individual
law|inc does not sell any customer information to third party marketing companies. At times, we may be legally required to disclose information about you, such as in response to a subpoena, to prevent fraud or to comply with a legally permitted inquiry by a governmental agency or regulator. We may also exchange your information, to the extent permitted by law, to perform necessary credit checks, collect or report debts owed to us, to protect our rights or property, for verification and risk management, and for other legally permissible purposes.
We may preserve the content of your email, your email address and our response so that we can more efficiently handle any questions you may have and also to meet legal and regulatory requirements. If we think that a particular law|inc product or service may help you, we may occasionally contact you at your email address to inform you of its potential benefits and availability. We request that you not send sensitive, confidential information such as social security or account numbers to us via an unsecured email, because it is possible that the information could be intercepted during transmission. Any communications of sensitive or confidential information should be sent using our online applications or by U.S. mail.
We have established and continually maintain security standards and procedures to help us protect you from unauthorized access to confidential information we may have about you, including through the Internet.
Secure Sockets Layer (SSL) Encryption
Using cryptography ensures the privacy of the communications between you (your browser) and our server. Cryptography simply scrambles messages exchanged between your internet browser and our Internet Account Access server. Encryption happens as follows: when you go to the Sign In page for a Corporation, LLC, Minutes or Trademark application, your browser establishes a secure session with our server. The secure session is established using a protocol called Secure Sockets Layer (SSL) Encryption. The SSL protocol requires the exchange of what are called public and private keys. Keys are random numbers chosen for that session and are only known between your browser and our server. After the keys are exchanged, your browser will use the numbers to scramble (encrypt) the messages sent between your browser and our server. Both sides require the keys because they need to de-scramble (decrypt) the messages when they are received. The SSL protocol, not only ensures privacy, but also ensures that no other browser can âimpersonateâ your browser, nor alter any of the information sent. You can tell whether your browser is in secure mode by looking for the secured lock symbol at the bottom of your browser window. You will also know your are in the secure site by the https:/ designation in the location bar of your web browser. Todayâs browsers offer 40-bit, 56-bit or 128-bit encryption. All result in a very large number of possible combinations. Our servers are compatible with these encryption levels, however we recommend the use of 128-bit capable browsers for the highest level of security.
We provide a number of additional security features in our online Internet Account Access service. Internet Account Access will âtimeoutâ or sign you off after pre-determined period of inactivity. This prevents curious persons from continuing your Internet Account Access session in case you have left your PC unattended without logging out. However, we strongly recommend that you always sign-off (log out) when you are done with your Internet Account Access session.
Your unique User ID (âUIDâ) and password also protect access to accounts you may have with us and to transactional information through our on-line services. You can also help maintain the security of your financial information by not sharing your UID or password with anyone, and by remembering to sign off of our Web site when you have finished your session.
It is important to point out that the computers that store your actual account information are not hooked up to the Internet. The requests you make through the Internet are handled by our Internet Account Access servers, which retrieve the information you requested from our data processorâs mainframe via a proxy-based firewall server. All incoming IP (internet protocol) traffic is actually addressed to the firewall, which only allows authorized information to flow into the credit unionâs servers. This firewall server acts as the go-between when you conduct transactions on our online Internet Account Access computers, which are secured as discussed earlier. To protect the accuracy of data and guard against unanticipated threats, standard data processing practices are employed for regular backup of data. This includes archiving and off-site storage, computer virus protection and identification as part of our formal disaster recovery plan. This plan includes regular testing of this plan as well as a business resumption plan in the event of a disaster. We have also instituted data processing auditing processes to regularly review processes for appropriate access to customer data and other standard security objectives. Our Internet processes also include data security devices to protect against unauthorized access. We will permit only authorized employees who are trained in the proper handling of member information to have access to your information.