We know that when you share your personal information online, security is of the highest priority. SHS Corporation shares your concern and employs sophisticated security methods. The instant you sign in to your member account, your user ID and password are encrypted using Secure Sockets Layer (SSL) technology. This precaution is intended to prevent anyone other than yourself and SHS Corporation from accessing your information. All information submitted by doctor offices and patients will be kept confidential and will be used solely by the doctor offices. Only authenticated doctor office personnel have access to its patients' information. All transactions that involve personal information are encrypted.
Although we track the total number of visitors to our site in an aggregate form to allow us to update and improve our site, personally identifiable information is not extracted in this process.
SHS Corporation only collects personally identifiable data, such as names, addresses, e-mail addresses, and the like, when voluntarily submitted by a visitor who requests that SHS Corporation contact him or her, either via email, phone, or by land carrier. The information we collect is used by us to follow up on these requests and is not shared with organizations outside the affiliated companies of SHS Corporation for commercial purposes.
SHS Corporation will respond to visitors who send us e-mail addressed to us using specified addresses regarding particular topics, including, without limitation, advertising, partnering, or general comments. SHS Corporation will use the information submitted in those e-mails only to respond to the purpose specified by the sender.
SHS Corporation does not sell or release any information gathered on its site to any third parties. All information gathered here will be used only by SHS Corporation for internal marketing analysis and to improve our products, services and our web sites' online user experience.
Frequently Asked Questions to protect your personal identity online:
Protect your Personal Identity
One way a thief can get personal information about you is from your home computer. The following tips detail how you can add to the security of personal information on your home computer.
Passwords and User Ids
For each computer or online service you use, you should have a user
ID and password. Try to create the most bizarre and original password,
and make sure you protect it. Commit your password to memory and don't
share it with anyone.
The following easily identifiable items should be avoided when creating passwords:
- Names of family members or pets
- Your birth date or a family member's birth date
- Social Security number
- Phone numbers
- Dates of important events, such as anniversaries
Tips for creating strong passwords:
- Use a combination of numbers, letters and punctuation.
- Longer passwords are better.
- Make sure it's something you can remember without writing it down.
Install and Use Anti-Virus Programs
Viruses can infect a home computer in many ways: through floppy disks, CDs, e-mail, Web sites and downloaded files. Anti-virus programs help protect your computer against most viruses, worms, Trojans and other unwanted invaders that can make your computer "sick." Viruses, worms and the like often perform malicious acts, such as deleting files, accessing personal data or using your computer to attack other computers. If a file is found to be infected with a virus, most anti-virus programs provide you with options of how to respond, such as removing the harmful item or deleting the file. Installing an anti-virus program and keeping it up-to-date is the best defense for your home computer.
Firewalls: What Are They and How Do I Use Them?
Before you connect your computer to the Internet, you should install a firewall. A firewall can be generally described as a security guard for your home computer. The guard is a piece of software or hardware that helps protect your PC against hackers and many computer viruses and worms. With a firewall, you define which connections between your computer and other computers on the Internet are allowed and which are denied. There are firewall programs, both free and available for purchase, that provide the capabilities you need to help make your home computer more secure.
E-mail Scams: Phishing
What is phishing?
All Internet users should be aware of the online scam known as
"phishing" (pronounced "fishing"). Phishing involves the use of e-mail
messages that appear to come from your bank or another trusted
business, but are actually from imposters.
Phishing e-mails typically ask you to click a link to visit a Web site, where you're asked to enter or confirm personal financial information such as your account numbers, passwords, Social Security number or other data. Although these Web sites may appear legitimate, they are not. Thieves can collect whatever data you enter and use it to access your personal accounts.
How can I spot a phishing scam?
Language and tone.
The message you receive may urge you to act quickly by suggesting that your account is threatened. It may say that if you fail to update, verify or confirm your personal or account information, access to your accounts will be suspended. The wording may also be sloppy and contain misspellings.
Requests for personal information.
Scam e-mails typically ask for personal or account information such as: - Account numbers - Credit and check card numbers - Social Security numbers - Online banking user IDs and passwords - Mother's maiden name - Date of birth - Other confidential information.
E-mailed instructions to download software.
All online purchases should be done through our secure Web site, and we will not send you e-mail instructions to download any software to your computer. Do not install software downloads directly from e-mail messages, or from companies or Web sites you do not recognize. When in doubt, contact the company directly or call our customer service number at 408.
Non-secure Web pages.
Clever thieves can build a fake Web site that looks nearly identical to an authentic one. They can even alter the URL (the Web address) that appears in your browser window. Watch out for non-secure Web pages that ask for sensitive information (secure sites will typically display a lock in the status bar at the bottom of your browser window).
How can I decrease my risk of being a phishing victim?
Be suspicious of demanding messages.
Messages threatening to terminate or suspend your account without your quick response should be treated as suspicious. A legitimate business should not request personal information from you over an unsecured Web site. When in doubt, call the business' customer service number to confirm the status of your account. Do not use telephone numbers found on the suspected Web site.
Be cautious of downloads.
Installing unknown software on your computer can put your personal information at risk and potentially harm your computer's hard drive. Make sure the software comes from a legitimate Web site, not an e-mail message. If you're not sure whether you should download a program, contact a customer service representative for more information.
Always type in the URL of the Web page you need.
Phishing scams rely on embedded links that take you to fake Web
sites. It's safer to type your Web address directly into your browser
so you know you're visiting the legitimate site.
Protect your password.
Don't write down sensitive personal information such as your
password or Social Security number. Change your password
Keep your computer up to date.
SHS Corporation and it?s affiliates recommends that you install
anti-virus and firewall programs to help keep your computer safe.
E-mail viruses and worms are fairly common. Here are steps you can
use to help you decide what to do with every e-mail message attachment
You should only open and read a message that passes all of these tests:
- The know test?is the e-mail from someone you know?
- The received test?have you received e-mail from this person before?
- The expect test?were you expecting e-mail with an attachment from this sender?
- The sense test?does the e-mail subject make sense based on who is sending the e-mail?
- Would you expect this type of attachment from this person?
- The virus test?does this e-mail contain a virus?
- To determine this, you need to purchase and install anti-virus software.
Keep Your System Up to Date
Most software vendors provide free patches to fix problems in their
products. You can usually download these patches from the vendor's Web
site. When you purchase a program, it's a good idea to find out how the
vendor provides customer support.
How important are backups?
It is a good practice to back up important files and folders on your
computer. To back up files, you can make copies onto media that you can
safely store elsewhere, such as CDs or floppy discs.
How do to report an online scam?
If you receive suspicious e-mail that appears to come from SHS
Corporation and it?s affiliated companies, please notify us immediately
by forwarding the e-mail to email@example.com (do not
open any attachments or click any links found in the suspicious
If you believe you have provided personal or account information in response to a fraudulent e-mail or Web site, please contact SHS Corporation at (408) 597.0062.