About Cobalt Security Policy
Our privacy policies are unimportant if we cannot maintain the security of our systems. All of our sensitive information forms are submitted and stored securely using tried and proven industry-standard protocols.
While no security system is 100% airtight (you should be wary of anyone making that claim), we have taken every reasonable, prudent and effective step to maintain the security of our systems.
Data Communications Security
Information you send us must pass through your own computer, your own Internet Service Provider, our Internet Provider, and eventually to us. As soon as the personal information that you have put into your browser leaves your computer, it is encrypted using "SSL" (Secure Sockets Layer) technology. Any network between you and us, including your ISP and our ISP, will see only garbled encrypted data if they were to "eavesdrop" on our connection. Netscape Navigator and Internet Explorer indicate that the transfer is secure via two mechanisms. First, the URL on any secured page will begin with https:// rather than http://. Secondly, the browser may display a lock, a blue bar or other indicator showing that your data will be encrypted prior to transmission.
Once we receive your encrypted information, our system decrypts your data and places it into a password-protected database on a secured network that is again accessed through another password-protected system, located behind a firewall. This triple protection is the digital equivalent of our "Fort Knox" that protects your sensitive data. The only other way to get at this information is to use our Web site and the administration password that you supply during the account creation process. This is why you should keep this password in a safe place, and why we send your password only to your email address. However, as soon as we send your password in email, you should immediately log in and change your password to prevent someone on the Internet from obtaining your password and, hence, access to your private information.
It is our goal to provide the most intuitive and hassle-free experience at our Web site. As a result, we use a technology called a "cookie." The way a cookie functions is that our Web site, after authenticating who you are by having you verify your email address and password, passes a unique cookie to your computer. Once your computer obtains this cookie, it will present this cookie back to us. Our site checks to see if the cookie that you are presenting to us matches what we initially gave you. If it does, then we allow you access to our site without having to re-enter your username. This cookie exists only while the browser is running. It is always a good idea to quit the browser (or restart the computer) if you share your computer with others.
The Good Cookie
The Bad Cookie
However, there are cases when you may not want to use a cookie. For example, if multiple people use your computer, it is possible for someone to sit down after you have gotten up, visit your history or bookmarks, visit our site, and have access to your sensitive data on our Web site. This is because our "cyber bouncer" is only sophisticated enough to know that your computer has been trusted. There is no way for us to determine that you are still at your computer. The best thing you can do is quit the browser when you are finished; the cookie will be removed.
Updates to Our Policies
This website complies with the Platform for Privacy Preferences Specification (P3P 1.0).