eSoft Planner’s Security Statement
Our eSoft Planner software encrypts all communication between the browser running on your PC and eSoft Planner software’s servers.
The eSoft Planner software utilizes a 256 bit encryption process called Secure Socket Layer (SSL). All pages within the esoft Planner software use SSL. You never need to be concerned about which pages within our software are secure and which pages are not.
For SSL encryption to work, your browser must support SSL. Commonly used browsers that support SSL include Microsoft Internet Explorer version 7+ and Firefox version 3+.
eSoft Planner aims to provide a secure Internet environment. However, users should note that there are inherent risks associated with the submission of information over the Internet. For those who do not wish to use public networks, eSoft Planner does provide alternative methods to obtain and provide information, including toll-free telephone numbers, facsimile or Parcel Post. In some circumstances, we may require information by non-electronic means.
It is important to note that e-mail is not a secure means of transmitting data. Because of the unsecured nature of e-mail, eSoft Planner strongly discourages its use for the transmission of sensitive information such as credit card or financial information.
In addition to using SSL for Internet communication, eSoft Planner does the following to protect your data:
- Maintains a working firewall
- Uses and regularly updates anti-virus software
- Monitors web server logs for potential problems
- Protects stored data
- Assigns unique IDs to each person with computer access
- Restricts physical access to servers & data (Building, Floor and Room Security)
Unauthorized modification is strictly prohibited Unauthorized attempts to upload or change information, or otherwise modify or cause damage to this software, are strictly prohibited and may be punishable under both state and federal laws, including the federal Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act. Intrusion detection and other software security tools may collect data regarding unauthorized activity, and that data may be used or made available in order to conduct investigations.
Note: External sites linked or associated to this site are not under eSoft Planner’s control and you are advised to review their privacy and security statements.