Our Security Practices
We are committed to providing secure services. As such, all sensitive transactions are protected through encryption that complies with international standards. Our servers are well protected, and access to information on these servers is restricted to authorized personnel only.
At every level, we ensure all business and information technology related procedures are carried out securely, both online and offline.
Our systems, both human and electronic, have been tuned to ensure a safe, secure and worry free environment for processing transactions.
We maintain physical, electronic and procedural safeguards to protect all customer information. Our operational and data processing systems are contained in a secure environment and that environment is access-controlled.
To secure sensitive communications, we have implemented digital certificates and enabled strong encryption. We use secure sockets layer, or SSL, a security protocol to protect all exchanges of information via our web pages that are considered private or confidential.
We use various authentication technologies to validate all visitors to the portions of our system that may allow access to private or confidential information.
We have implemented other security controls such as firewalls, intrusion detection and intrusion prevention to protect our systems and networks and your information. Our security systems are constantly on the alert to ensure peace of mind for our customers and partners.
We employ up-to-date anti-virus protection technology to detect viruses and prevent them from entering our computer network.
This never-ending effort ensures that malicious or financially motivated viruses and other malware do not pose a threat to our customers and trusted partners.
Our virus defense system updates continuously, and any attempt by a virus to compromise the system is flagged at once and dealt with immediately.
The use of our services is for authorized users only. Access to these services requires multiple items (e.g. usernames, password & verification codes).
It is your responsibility to protect any and all security data assigned to you by Resonance Trinidad Limited with the same degree of care and secrecy that you would use to protect other sensitive nonpublic personal information.
We have dedicated resources that provide a variety of monitoring techniques to detect unusual or unauthorized activity.
This measure is used in order to quickly and efficiently respond to potential inappropriate use of our systems or unauthorized access attempts, even from seemingly legitimate sources.