Australasian Menopause Society take your security and privacy very seriously.
Australasian Menopause Society view the protection of your privacy as an integral part of its commitment towards complete accountability and integrity in all its activities and programs. This commitment is supported by the new laws dealing with personal information about you that is stored or received by Australasian Menopause Society .
Consequently, we will:
- Only use personal information provided by you for the purposes for which it was collected and for any other authorised use.
- Not disclose your personal information to a third party and will take all necessary measures to prevent unauthorised access or disclosure.
- Ensure that your personal information is not disclosed to other institutions and authorities except if required or authorised by law.
Australasian Menopause Society have established an online eCommerce system with RealTime payment options. This is undertaken with Verisign.com.au and all online transfer of sensitive details will be via their highly secure website. See below for a brief description of the versign process and their data storage capabilities, or download the Versign Australia's Public Security policy in PDF format
Centralised and Secure Data Management
Data is hosted in VeriSign's high-security, fully redundant, risk-free data center. All transactions between consumers and VeriSign occur over secure 128-bit SSL connections.
How secure is the VeriSign payment platform?
A critical concern for electronic commerce is the secure transmission of data. To protect consumer data during transmission, VeriSign uses the latest 128-bit SSL encryption technology that securely passes transaction data to the VeriSign gateway. However, an even bigger security threat to electronic commerce is the storage of sensitive data. To prevent data compromise in the storage server, VeriSign stores sensitive transaction information on secure systems that cannot be accessed through the Internet. Furthermore, VeriSign uses hardware and software firewall technology and additional encryption technology to eliminate all opportunity for intruders to break into a server and compromise information.