Safe, Secure Orders at seton.com
Seton understands your concerns over Internet security. Because we share your concerns, we've worked closely with IBM to develop a highly secure online ordering process – one that lets you shop and order with confidence. The result is a Web site that offers you the high level of service, convenience and trustworthiness our customers have come to expect from us during our 45-year history.
The Secure Order Process
Our site provides advanced security for your online purchases. The following section describes how the secure order process works, from start to finish.
1. Starting Your Order
Every order at seton.com is secure, and clicking a Checkout button on the Shopping Cart page is all it takes to get started. The security features are automatic; you don't need to do anything special to invoke them.
2. Making a Positive ID
Once you've clicked the Checkout button, your browser looks for a digital certificate to confirm that it is communicating with seton.com. Once a positive ID is made, your order continues.
We use VeriSign software to enable the use of digital certificates. You can click on the VeriSign logo at right to verify that seton.com is a VeriSign secure site. For your security, the verification process happens in the background every time you place an order on our site.
3. Entering Secure Mode
Next, your computer and our server begin communicating in secure mode, sending data back and forth in an encrypted format. After your browser has entered secure mode, we'll ask you to enter, or if you're a registered shopper, to confirm, your credit card information. The encryption features of browser software are exceptionally powerful and ensure the security of this data as it is transmitted to our server. Our site makes use of the Secure Sockets Layer (SSL) protocol and 128-bit strong encryption to provide the highest level of security available.
4. My Order Is Complete. What Happens Next?
Security measures continue even after you've placed your order, as we process your order in a highly secure computing environment.