0

Safe, Secure Orders at seton.ca

Setonunderstands your concerns over Internet security. Because we share your concerns, we've worked closely with IBM to develop a highly secure online ordering process – one that lets you shop and order with confidence. The result is a Web site that offers you the high level of service, convenience and trustworthiness our customers have come to expect from us during our 45-year history.

The Secure Order Process

Our site provides advanced security for your online purchases. The following section describes how the secure order process works, from start to finish.

1. Starting Your Order

 Every order at seton.ca is secure, and clicking a Checkout button on the Shopping Cart page is all it takes to get started. The security features are automatic; you don't need to do anything special to invoke them.

2. Making a Positive ID

Once you've clicked the Checkout button, your browser looks for a digital certificate to confirm that it is communicating with seton.ca. Once a positive ID is made, your order continues.

We use VeriSign software to enable the use of digital certificates. You can click on the VeriSign logo at right to verify that seton.ca is a VeriSign secure site. For your security, the verification process happens in the background every time you place an order on our site.

3. Entering Secure Mode

Next, your computer and our server begin communicating in secure mode, sending data back and forth in an encrypted format. After your browser has entered secure mode, we'll ask you to enter, or if you're a registered shopper, to confirm, your credit card information. The encryption features of browser software are exceptionally powerful and ensure the security of this data as it is transmitted to our server. Our site makes use of the Secure Sockets Layer (SSL) protocol and 128-bit strong encryption to provide the highest level of security available.

4. My Order Is Complete. What Happens Next?

Security measures continue even after you've placed your order, as we process your order in a highly secure computing environment.