PCI Compliance - The credit card industry's standard for security
PCI compliance is a must for any organization that wants to accept credit card payments online. Our security is comprehensive enough to be certified as PCI Level 1 compliant, the most stringent cardholder data security certification. Click here to see what this means for you.
Protected by redundant enterprise class hardware. 24x7 security monitoring of firewalls by certified security technicians.
SSL encryption using modern TLS standards
128-bit Secure Sockets Layer (SSL) data encryption using modern versions of Transport Layer Security (TLS). All data passed on protected organization membership sites is transmitted via SSL.
Data Center Security
All hardware and services are located in a secure data center (an ISO 9001:2000-certified provider) that is monitored onsite 24x7x365. Multiple security checkpoints must be cleared to gain access to data center. Closed-circuit television cameras record all data center activity. Data center network infrastructure provides multiple security layers to safeguard against unauthorized access.
Access to private areas of your MemberClicks service requires a login using your unique username and password and transmit via an SSL page. To ensure safety, these passwords can be changed at anytime.
Each user's login session becomes logged out after 60 minutes of inactivity to prevent unintended access by others. For user convenience, a timeout notification box appears minutes before the logout and gives the option to continue the session. "Keep Me Logged In" options are also available to maintain sessions beyond 60 minutes. *Only on the MemberClicks product line.
User group permissions
You can decide what access to member information and product feature each type of user (member, staff, board member, vendor, etc.) has.
We store your data, and that is all we do with it. Unlike other companies, we do not share your data with anyone.
Secure, redundant backups
We have continuous backups for nearly all of our data stores that stream updates in near-real time to secondary data stores that are off-site. We also supplement that mirroring with hourly snapshots to guard against logical corruption of the data store.