- How Ask This CFO Protects You?At Ask This CFO, keeping your data safe and secure is an important part of our business
When you choose to work with our software products, Ask This CFO securely maintains customer records that allow us to process your purchase, fulfill your order, and provide you with support services in the event you need help. Customer records are always carefully maintained and protected.
- Do you store my information and if so, how do you protect it?
Ask This CFO data centers, where your information is processed and stored, are secure and monitored by professional staff and automated tools, 24 hours a day, 7 days a week. Our data centers are designed and built with reliability and availability in mind,so that your information is available when you need it.
We rely on advanced, industry-recognized security safeguards to keep your information private and protected. With password-protected logins, firewall protected servers, and the same encryption technology used by the world’s top banking institutions, we have the security elements in place to give you peace of mind.
- Am I at a greater level of risk from using your product or service?
No, you are not at greater risk from using Ask This CFO’s products and/or services. While deploying industry leading safeguards, Ask This CFO also ensures that access to information within our products and services (and the customer information that is stored there) is limited to those who need it to do their jobs In general, Ask This CFO employees do not see the information you enter into our services. When you contact Ask This CFO for help, a support person may, at your direction, see some information you have entered in one of our services. In difficult cases, your problem may be referred to a developer for further diagnosis and remedy. Or we may discover a problem in our service that requires us to try and determine which customers were affected by the problem so that we can help you make any necessary changes. We would determine how to select the affected records so you could be notified. The information you send to, through, and from Ask This CFO’s services is protected as appropriate during transmission.
- Do your employees have access to my information?
If so, why and how can I be certain my information is protected?
Ask This CFO ensures that access to information within our products and services (and the customer information that is stored there) is limited to those who need it to do their jobs. The same is true for vendors and contractors. When Ask This CFO employs others to help provide services to you, we require them to observe our information and security policies. That means the vendors and contractors are not allowed to use any of your information for anything other than the task for which they were hired, and they must protect your information just like every Ask This CFO worker is required to do.We value privacy as much as you do. We build privacy into everything we do. It’s not an afterthought. It’s not corporate rhetoric. It’s how we choose to treat — and respect — our customers on a daily basis. That’s why we follow a strict set of guidelines and practices to protect all of your confidential information. We do not sell, rent, or share your information with third parties for their promotional use.
- What are the best things for me to do to protect my information in your product or service?
- Don’t share your password with anyone
- Make sure that your password is complex, including both numbers and capital letters
- Be certain that you have virus protection and a firewall on any computer you use to access your Ask This CFO product or service.
- Don’t install programs from people or companies you don’t know
- Learn to prevent identity theft and identify phishing attempts.
- If someone manages to steal my information, how will you help me?
First of all, remember that our goal is that no one ever steals your information. The best way to ensure that this doesn’t happen is to follow these security guidelines. However, as soon as you suspect that someone has stolen your information, you should follow the steps outlined by the FTC.