Skip to main content

Information Collected and Stored Automatically

For site security purposes and to ensure that this service remains available to all users, we employ software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.

For site management, information may be collected for statistical purposes. Computer software programs may be used to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas. No personal information, such as your name or address, is collected or used for this analysis. We collect no information which would identify you personally.

Information Collected from E-mails and Web Forms

When you send us personally identifying information, for example, in an electronic mail message containing a question or comment or by filling out a form or application that E-mails us this information, we use this information to fulfill or respond to your requests. We may store these requests to support the application process. We may forward your e-mail to staff who are better able to respond to your request. We do not create individual profiles with the information you provide.

Internet Protocol Address

We collect an IP address from all visitors to our Site. An IP address is a number that is automatically assigned to your computer when you use the Internet. We use IP addresses to help diagnose problems with our server, administer our Site, analyze trends, track users’ movement, gather broad demographic information for aggregate use in order for us to improve the site, and deliver customized, personalized content. IP addresses are not linked to personally identifiable information.

Use of “Cookies”

Our Site may use cookies to enhance your experience while using our Site. Cookies are pieces of information that some Web sites transfer to the computer that is browsing that Web site and are used for record-keeping purposes. Use of cookies makes Web-browsing easier by performing certain functions such as saving your passwords, your personal preferences regarding your use of the particular Web site and to make sure you don’t see the same ad repeatedly. The use of cookies is common to be an industry standard.

Your browser is probably set to accept cookies. However, if you would prefer not to receive cookies, you can alter the configuration of your browser to refuse cookies. If you choose to have your browser refuse cookies, it is possible that some areas of our Site will not function properly when you view them.

Other Web Sites

Our Site may contain links to other Web sites. Please note that when you click on one of these links, you are entering another Web site for which the Home Ownership Financial Literacy Council has no control over or responsibility for content. We encourage you to read the privacy statements on all such sites as their policies may be different than ours.

Secure Server

Transferring information securely over the internet is the key to the e-commerce revolution on the web.

Secure Forms

The purpose of a secure server is to encrypt the information clients enter in forms on their browser before it is sent to the server. Our servers use 128 bit or 168 bit encryption, the most security available for civilian purposes. It will keep our member’s information as private as technology will allow.

Why is Authenticated SSL Necessary?

Notions of identity and authentication are fundamental concepts in every marketplace. People and institutions need to get to know one another and establish trust before conducting business. In traditional commerce, people rely on physical credentials — such as a business license or letter of credit — to prove their identities and assure the other party of their ability to consummate a trade. In the age of e-business, authenticated SSL certificates provide crucial online identity and security to help establish trust between parties involved in online transactions over digital networks.

Authenticated SSL certificates enable a Web site visitor to:

  • Securely communicate with the Web site, such that information provided by the Web site visitor cannot be intercepted in transit (confidentiality) or altered without detection (integrity)
  • Verify that the site the user is actually visiting is the company’s Web site and not an imposter’s site (authentication)
  • The SSL certificate providers assure trust by coupling their authentication service with state-of-the-art encryption technology in digital certificate solutions. The certificate provider will only issue an authenticated SSL certificate after:
  • Verifying our identity and confirming that our organization is a legal entity
  • Confirming that that we have the right to use the domain name included in the certificate
  • Verifying that the individual who requested the SSL certificate on behalf of the organization was authorized to do so

How Authenticated SSL Certificates Work

An authenticated SSL certificate allows the receiver of a digital message to be confident of both the identity of the sender and the integrity of the message. Fundamental to the process of issuing high-assurance SSL certificates to an organization for use on its Web site are three basic authentication and verification steps:

  • Confirmation that the organization named in the certificate has the right to use the domain name included in the certificate
  • Confirmation that the organization named in the certificate is a legal entity
  • Confirmation that the individual who requested the SSL certificate on behalf of the organization was authorized to do so

When Web visitors connect to Web sites, they reach one of two kinds of servers. If they reach servers that are secure, they will get messages indicating that fact. Similarly, if they reach servers that are not secure, there will be warnings to that effect. A truly secure Web server is one that has an authenticated SSL certificate. The authenticated certificate tells users that an independent, trustworthy third party has verified that the server belongs to the company it claims to belong to. A valid authenticated certificate means that users can have confidence that they are sending confidential information to the place to which they think they are sending it.

Changes to the Privacy Policy

We reserve the right to change to revise our privacy policy as business needs change or as required by law without prior notice.  All changes will be effective immediately after posting or otherwise noted.

Go to top