LEASETRADER SECURES YOUR DATA
At LeaseTrader.com, the privacy and security of customer data is as important to us as it is to you. Physical safeguards, procedural controls and data access controls protect your data from unauthorized access. We continually monitor our systems to prevent unauthorized attempts at intrusion.
LeaseTrader.com uses strong, 128-bit encryption and SSL, short for Secure Sockets Layer, a protocol for transmitting private information via the Internet. SSL uses a private key to encrypt data that is transferred over the SSL connection. This protocol is a standard used by many websites when you submit confidential information, such as credit card numbers and other personal data. SSL creates a secure connection between your browser and our server. Addresses of web pages using an SSL connection start with https: instead of http: and most browsers also display an icon of a closed padlock when you visit a page using SSL.
We use the digital certificate services of VeriSign so that you always know you are doing business with LeaseTrader.
Other things you can do to enhance your security whenever you are online include the following:
Use an Internet firewall (hardware or software).
Use current software and operating system versions; get updates and security patches regularly.
Use anti-virus software and download updates frequently.
Use your own PC.
Choose a hard-to-guess password; change your password regularly.
Use a unique Username/Password, not one you use on other websites.
Use strong 128-bit encryption available in the latest version of your browser.
When finished, logoff the website and close your browser.
For additional security, you can also clear your browser's cache and temporary Internet files.
Even if you take all these steps, you could still be fooled by a well-crafted e-mail. Learn more about phishing scams and protecting your identity.
Phishing is a slang term used to describe how criminals trick consumers into divulging sensitive information such as bank or credit card account numbers or passwords. These criminals may send you an e-mail, show you a popup online, or call you and claim that they represent a business and that they need you to update or confirm or validate sensitive information. Sometimes they threaten consequences if you don't divulge this information. No matter how innocent phishing sounds, it allows criminals to put a nasty hook into your personal information. Basically, phishing is a criminal enterprise which uses phony e-mail messages and fake websites to steal personal information - the kind of information that leads to identity theft.
How Phishing Works
A typical phishing scam, or spoof, works like this:
You receive an e-mail message claiming to be from a well-known company with important information about your account.
The message urges you to take action - even warning of possible account suspension - and includes a link to the company's website.
The web site instructs you to update or verify certain personal information, such as your password, credit card number or Social Security number.
While the e-mail and website appear to be legitimate, they are bogus and exist only to steal your information.