Information Security Statement
INFORMATION SECURITY - INTRUSION COUNTERMEASURES AND DATA SECURITY
Tax Credit Group, Inc utilizes a server which employs the following intrusion countermeasures designed to mitigate security breaches:
- All sensitive data which requires being stored is encrypted using AES-256 encryption.
- Access to this application is encrypted with extended validation SSL with 4096 bit encryption.
- Brute force attacks are immediately blocked by our firewall.
- OpenSSL is patched against "Heartbleed" bug.
- Anti-virus software is constantly running and being monitored.
- Data center is monitored 24 hours a day.
INFORMATION SECURITY - HOW WE PROTECT YOUR PERSONAL INFORMATION
Tax Credit Group, Inc prides itself on relationships based on integrity and trust, and the privacy of our customers’ personal information is of the utmost importance to us. We maintain a comprehensive Privacy and Information Security Program (“Program”) of which Information Security is an integral part. The Information Security aspect of our Program includes administrative, technical, and physical safeguards that are reasonably designed to safeguard the security, confidentiality, and integrity of the personal information of our customers. Some of the central features of our Program are:
- The use of policies and standards to govern information technology resources, protect information assets, and safeguard personal information;
- The use of technology, where reasonable and appropriate, such as firewalls and encryption;
- Testing and ongoing vulnerability scanning of online customer applications;
- Monitoring of our systems infrastructure to detect weaknesses and potential intrusions;
- Maintaining access controls which are reasonably designed to restrict such access to employees with a legitimate business need;
- Taking reasonable steps to select and retain service providers capable of protecting personal information in accordance with Tax Credit Group, Inc policies and standards, and applicable legal and regulatory requirements;
- Requiring service providers by contract to implement and maintain reasonable safeguards consistent with Tax Credit Group, Inc policies and standards and applicable legal and regulatory requirements;
- Reviewing, assessing and updating our security practices at reasonable intervals and in light of emerging risks and developments;
- Maintaining reasonably designed policies and procedures intended to prevent, monitor, identify, investigate, and respond to suspected information security incidents that may impact the confidentiality, security or integrity of personal information; and
- Providing notification, where appropriate, to impacted individuals in the event the investigation of a particular incident results in a finding that personal information may have been subject to unauthorized access, acquisition, disclosure or use.
USER SYSTEM REQUIREMENTS
We want our users to have the best experience possible. To user our online system, your computers should be reasonably up to date. Users must have the following technologies:
- Operating System: Microsoft Windows Vista or later, Apple Macintosh OSX or later.
- Browser: Microsoft Internet Explorer 9 or later, Mozilla Firefox 24 (February 2014) or later, Google Chrome 32 (January 2014) or later
ONLINE SECURITY TIPS
While Tax Credit Group, Inc is committed to maintaining administrative, technical, and physical safeguards to protect the security of our systems, you as the end-user also play an important role to ensure that you are protected when you use the Internet. We would like to recommend you consider the following security best practices:
- Install antivirus and anti-spyware software on your computer and make sure it is up to date with the most recent virus/spyware signatures.
- Make sure your computer is up to date with the most recent software patches. Patches are software updates that often address software vulnerabilities that phishing scams and viruses exploit.
- Install a firewall between your computer and the Internet. A firewall is software or hardware that may act as a buffer between your computer and the Internet that may limit access to your computer and may block communications from unauthorized sources.
- Beware of unsolicited email: Never click on a link or open an attachment in an unsolicited email.
STATEMENT SUBJECT TO CHANGE
This statement may be updated periodically and any changes will be posted to this website. We recommend that you review this statement periodically for any changes.