Scroll to top
Build analytics capability


Information and Credit Card Security

The Site has security measures designed to protect against the loss, misuse and/or alteration of the Information under the control of The Consultants’ Consultant.
Using SSL

The Secure Sockets Layer (SSL) protocol, originally developed by Netscape, has become the universal standard on the Web for encrypting communications between browser users and Web servers.

What is encryption?

An encrypted SSL connection requires all information sent between a client and a server to be encrypted by the sending software and decrypted by the receiving software, protecting private information from interception over the Internet. In addition, all data sent over an encrypted SSL connection is protected with a mechanism for detecting tampering – that is, for automatically determining whether the data has been altered in transit. This means that users can confidently send private data, such as credit card numbers, to a Web site, trusting that SSL keeps it private and confidential.

How does the security work?

A customer contacts our site and accesses a secured URL: a page secured by a Server ID (indicated by a URL that begins with “https:” instead of just “http:” or by a message from the browser).

Our server responds, automatically sending our site’s digital certificate, which authenticates our site.

Your Web browser generates a unique “session key” to encrypt all communications with the site.

Your browser encrypts the session key itself with the site’s public key so only the site can read the session key.

A secure session is now established. It all takes only seconds and requires no action by you. Depending on the browser, you may see a key icon becoming whole or a padlock closing, indicating that the session is secure.


All incoming encrypted Information is also routed through our firewall, which serves as a gatekeeper for our system. Only data containing the corrected authorisation is permitted past the firewall. Attempts to pass the firewall are monitored for suspicious activity.

Related posts