To help protect our members, we are unable to publicly specify certain security procedures. The following guide should serve as a general outline.
General practices:
Our server runs on the latest Linux operating system. We perform regular software update®s, as security update®s become available. Each server is placed behind a firewall and is monitored by a team of hosting professionals. We carefully record access attempts and follow up on any suspicious activity. We also employ several software programs to help guard against unauthorized access. Finally, the servers are kept within a secure-access facility with 24/7 on-site security.
Protection of image files:
All large (for-sale) images are kept in a secure location within our server. This makes it impossible to direct-link any of our retail-size image files. Access to this folder is restricted to server control only, which provides the highest level of security for our images. Images are never available not even when they are purchased, and are restricted to authorized members only. When purchasing files will be sent within a email to the email address specified by the user upon signup. Please be sure you checked all folders of your email account and all filter settings to allow emails to be sent by our site. In order to test if your email address accepts our email you may download the free photo as many times as you wish.
Protection of personal information:
Your personal information is kept securely within our database. Database access is password protected and kept behind a restricted-access firewall. Access is restricted by a series of passwords and validation tests. Only top-level system administrators have access to the database.
We reserve the right to modify this policy at any time.
Security Policy – Nigerian Stock Photography
July 9, 2016 by maximios • Blog
To help protect our members, we are unable to publicly specify certain security procedures. The following guide should serve as a general outline.
General practices:
Our server runs on the latest Linux operating system. We perform regular software update®s, as security update®s become available. Each server is placed behind a firewall and is monitored by a team of hosting professionals. We carefully record access attempts and follow up on any suspicious activity. We also employ several software programs to help guard against unauthorized access. Finally, the servers are kept within a secure-access facility with 24/7 on-site security.
Protection of image files:
All large (for-sale) images are kept in a secure location within our server. This makes it impossible to direct-link any of our retail-size image files. Access to this folder is restricted to server control only, which provides the highest level of security for our images. Images are never available not even when they are purchased, and are restricted to authorized members only. When purchasing files will be sent within a email to the email address specified by the user upon signup. Please be sure you checked all folders of your email account and all filter settings to allow emails to be sent by our site. In order to test if your email address accepts our email you may download the free photo as many times as you wish.
Protection of personal information:
Your personal information is kept securely within our database. Database access is password protected and kept behind a restricted-access firewall. Access is restricted by a series of passwords and validation tests. Only top-level system administrators have access to the database.
We reserve the right to modify this policy at any time.