|
|
GeneralPrivacy And Security
|
Privacy And Security - Questions |
|
Privacy And Security - Answers |
|
1. Does ACI Payments, Inc. have a privacy policy?
Yes. ACI Payments, Inc. is a wholly-owned subsidiary of ACI Worldwide Corp. Please click here to review the Privacy Policy.
[ T O P ]
2. How secure is my payment and personal information?
We secure personal information entered into our Web site through Secure Sockets Layer (SSL) 128-bit encryption, which creates a protected connection between users and the web server. This means your card number and personal data are never sent over the Internet unencrypted. For more information, visit our Privacy Policy.
[ T O P ]
3. Does the ACI Payments, Inc. Web site use "cookies"?
The web sites operated by ACI Payments, Inc. do not utilize cookies to store or manage any personal or financial information. A cookie is a piece of data stored on a user's computer that contains information about that user. Web sites often use cookies to help them analyze web traffic, maintain user preferences, or create a richer user experience. In very limited cases, ACI Payments, Inc. partners with known and trusted companies which use cookies to provide analytical tracking of navigation conditions which helps create a better experience for our users. The use of these cookies is not covered by this privacy statement.
[ T O P ]
4. Is ACI Payments, Inc. part of the Internal Revenue Service?
No. ACI Payments, Inc. is a wholly-owned subsidiary of ACI Worldwide Corp., a publicly traded company. ACI Payments, Inc. has a contract with the Internal Revenue Service to facilitate credit card and debit card acceptance for the payments of various types of federal personal and business taxes.
[ T O P ]
5. Does the IRS or other government agencies receive my credit or debit card information?
No. The only information that is passed directly to the IRS is the Social Security Number (or ITIN) or Employer Identification Number, the amount paid and the date payment was made. Likewise, other government agencies receive only the minimum information required to appropriately apply you payment to a particular government agency. Your credit or debit card information is never shared with our government clients.
[ T O P ]
6. How secure is the credit or debit card information I'm using to make this payment?
ACI Payments, Inc. uses the best encryption technology available. Card information is not passed to any of our clients and payment data is passed using hardware encryption. Transactions are processed using a leased line connection to the card issuers. ACI Payments, Inc. partners with VeriSign to ensure the highest level of security. For more information regarding privacy and security, visit our Privacy Policy.
[ T O P ]
7. How does ACI Payments, Inc. protect you?
ACI Payments, Inc. remains committed to protecting your privacy through the utilization of the latest technology and by the employment and administration of a pro-active privacy and security policy for its customers. Specifically, ACI Payments, Inc. engages in the following privacy and security measures:
- • Individualized Password - My Account: My Account enrollment requires that a username and password be created by our customers. Access to personal information is only accessible by providing the proper username and personal password. This information is encrypted during transmission and will remain a secret as long as you do not disclose it.
- • Firewall: ACI Payments, Inc. computer systems are protected 24 hours a day by a powerful firewall that blocks unauthorized entry.
- • Encryption: From the moment account information leaves your computer to the time that it enters our system, all online access and sessions are encrypted. Our minimum requirement of 128-bit encryption turns your information into a coded sequence with billions of possible variations, making it nearly impossible for unwanted intruders to decipher.
- • Secure Sockets Layer (SSL): In order to further enhance the connection between web users and ACI Payments, Inc. systems, our systems only accept SSL version 3. This enables us to provide our web users the highest form of acceptable industry security standards.
- • Constant Surveillance: ACI Payments, Inc. security team maintains and monitors all security systems to make sure that your accounts are safe and secure.
- • Technology Updates: In order to confront constantly evolving online threats, ACI Payments, Inc. is committed to keeping current with and utilizing the latest technology to ensure your account security.
- • Timed Log-off: ACI Payments, Inc. will automatically log you off from the page and redirect you back to Homepage after 10 minutes of inactivity. This reduces the risk of others accessing your information from your unattended computer.
- • Pop-up Windows: Pop-up windows, are the small windows or ads that appear suddenly over or under the window that you a currently viewing. ACI Payments, Inc. will never display a pop-up window on our site that you haven't requested by clicking on a link - all of our pop-up windows are user-initiated.
- • E-mails: ACI Payments, Inc. does not send e-mails containing attachments and will never require its customers to send personal information via an e-mail. Moreover, ACI Payments, Inc. does not provide or sell its customer e-mail list to any outside party, whatsoever.
For more information, visit our Privacy Policy.
[ T O P ]
8. How can I protect myself?
With the proper precautions, you can help protect your personal information from fraud and identity theft:
- • Activate a pop-up window blocker. There are free programs available online that will block pop-up windows.
- • Scan your computer regularly for spyware (programs installed on your computer that look into your Web viewing activity and that regularly come hidden inside many free downloads such as music sharing software or screen savers). You can eliminate potentially risky pop-up windows by removing any spyware installed on your computer. Free spyware removal programs can be found on the Internet.
- • Avoid downloading programs from unknown sources.
- • Keep your computer operating system and Web browser current.
- • Guard against fake e-mails and Web sites. Online thieves often direct you to fraudulent Web sites via e-mail and pop-up windows and try to collect your personal information.
- • Delete suspicious e-mails without opening them. If you do open a suspicious e-mail, do not open any attachments or click on any links it may contain.
- • Never provide sensitive account or personal information in response to an e-mail.
- • Install and regularly update virus protection software.
For more information, visit our Privacy Policy.
[ T O P ]
9. What is "phishing"?
"Phishing" or "spoofing" is a form of online fraud in which someone poses as a legitimate company to obtain sensitive personal data and then, using this information, illegally conducts transactions on your existing accounts or on new fraudulently created accounts using your sensitive personal data. The most current methods of "phishing" are fake e-mails that contain links to Web sites that seek to illegally obtain personal information, fake or fraudulent Web sites and non-user initiated pop-up windows, or any combination of these.
[ T O P ]
10. What can be done to reduce my exposure to "phishing" scams?
Keep in mind that ACI Payments, Inc. will never send e-mail containing attachments or require its customers to send personal information to us via e-mail. Any unsolicited request for ACI Payments, Inc. account information you receive through e-mails, Web sites or pop-up windows should be considered fraudulent and reported immediately. Nevertheless, it is your responsibility to be prudent and vigilant in the use of your sensitive personal data when conducting transactions over the Internet. Be suspicious of and delete e-mails that:
- • Ask you for personal information.
- • Appear to come from a legitimate source.
- • Contain fraudulent job offers.
- • Contain prizes or gift certificate offers.
- • Link to counterfeit Web sites (or even to real Web sites to make the fake e-mail appear real).
- • Contain fraudulent phone numbers (or even real phone numbers to make the fake e-mail appear real).
Please visit our Privacy Policy to view a fraud prevention checklist.
[ T O P ]
|
|
|
|
|
|