|
|
|
Home »
Customer Service »
Security Policy
Security Policy
When you shop with Botanica – Flowers, Balloons & Gifts, your payment and personal information is always safe -- guaranteed. In fact, we were the first floral shop on the web to actually offer a secured transaction flower shop in 1995. We haven’t experienced any security incident ever since.
Our Secure Sockets Layer (SSL) software is the industry standard and among the best software available today for secure commerce transactions. It encrypts all of your personal information, including credit card number, name, and address, so that it cannot be read over the internet as if we both were using a impenetrable private tunnel.
These is two easy ways to confirm that you have entered a secured confidential zone in our shop. First, the first element of the page address in the address bar will switch from http:// to https://. Also, your browser will display a little key or a little lock at the left bottom of the display window.
Here is how it works for the computer literate: The Secure Sockets Layer (SSL) protocol, is a set of rules governing server authentication, client authentication, and encrypted communication between servers and clients. SSL is widely used on the Internet, especially for interactions that involve exchanging confidential information such as credit card numbers. SSL requires a server SSL certificate, at a minimum. As part of the initial "handshake" process, the server presents its certificate to the client to authenticate the server's identity. The authentication process uses Public-Key Encryption and Digital Signatures to confirm that the server is in fact the server it claims to be. Once the server has been authenticated, the client and server use techniques of Symmetric-Key Encryption , which is very fast, to encrypt all the information they exchange for the remainder of the session and to detect any tampering that may have occurred. Servers may optionally be configured to require client authentication as well as server authentication. In this case, after server authentication is successfully completed, the client must also present its certificate to the server to authenticate the client's identity before the encrypted SSL session can be established.
The SSL protocol runs above TCP/IP and below higher-level protocols such as HTTP or IMAP. It uses TCP/IP on behalf of the higher-level protocols, and in the process allows an SSL-enabled server to authenticate itself to an SSL-enabled client, allows the client to authenticate itself to the server, and allows both machines to establish an encrypted connection.
For further information on ways we're working to protect your personal information, please read our privacy policy.
|
|
|