Login or Register

Call Acorn Live
+44 (0) 77 90 90 41 22

Acorn House
7 Fydell Court
St. Neots
PE19 1UJ


Secure Acorn

AcornLive.com takes every precaution to protect our users information. When users submit sensitive information via the website, your information is protected both online and off-line. When our entry form asks users to enter sensitive information (such as credit card number), that information is encrypted and is protected with the best encryption software in the industry - SSL. While on a secure page, the lock icon on the bottom of Web browsers such as Microsoft Internet Explorer (as shown below) and Netscape Navigator becomes locked, as opposed to un-locked, or open, when you are just 'surfing'. To learn more about SSL, see the section below.

While we use SSL encryption to protect sensitive information online, we also do everything in our power to protect user-information off-line. All of our users information, not just the sensitive information mentioned above, is restricted in our offices. Only employees who need the information to perform a specific job (for example, billing or a customer services) are granted access to personally identifiable information. Our employees must use password-protection when they leave their desk. When they return, they must re-enter their password to re-gain access to your information. Furthermore, ALL employees are kept up-to-date on our security and privacy practices. Every quarter, as well as any time new policies are added, our employees are notified and/or reminded about the importance we place on privacy, and what they can do to ensure our customers information is protected. Finally, the servers that we store personally identifiable information on are kept in a secure environment.

SSL Defined

Recent developments in browser/server technology have made it easy for people to use Web services without worrying about electronic fraud. Two examples are Secure Sockets Layer (SSL) developed by Netscape, and Secure Hypertext Transfer Protocol (S-HTTP) developed by Terisa Systems, Inc. Both of these security protocols have been submitted to the Internet Engineering Task Force (IETF) as an Internet-Drafts. Basically, these protocols allow the browser and server ends of a Web session to authenticate one another and secure information which subsequently flows between them. Through the use of cryptographic techniques such as encryption and digital signature, these protocols: Allow Web browsers and servers to authenticate each other; Permit Web site owners to control access to particular servers, directories, files or services; Allow sensitive information (e.g., credit card numbers) to be shared between browser and server, yet remain inaccessible to third parties; and Ensure that data exchanged between browser and server cannot be corrupted - accidentally or deliberately - without detection.

Need More Help?

If you still have any concerns about security or privacy please contact us at: safina@AcornLive.com