OK
Security and Privacy


At Invesco, we take the issue of internet security very seriously. To allow you to purchase online, our site is built using industry standard technology inside a powerful security framework. Active oversight of all systems is maintained as part of our efforts to protect the security and privacy of client information.

In addition to the security we provide, there are a number of measures you should implement which, when used together, will enhance the security of your personal information.

1. Protect Yourself

To help protect yourself and your personal data, do not trust any email communications that request your personal information, delete them without opening any attachment. Criminals are convincing and use many techniques to make their fraudulent emails appear to come from legitimate sources attempting to gather personal and financial information - known as phishing.

2. How to add an address to your Address Book or Safe Senders list

Putting an email address into your Address Book or Safe Senders list helps ensure that the message arrives in your inbox instead of ending up in a spam filter. We want you to receive the emails we send to you. Please add your preferred senders to your Address Book or Safe Senders List. Please visit your email provider’s site for instructions on how to do this. For Gmail and Hotmail please see below.

Gmail

  1. Open a message from your preferred sender.
  2. Click the arrow next to the Reply button.
  3. Select Add <Sender> to Contacts list.
  4. Gmail notifies you that the sender is on your Contacts list.

Hotmail

  1. Open a message from your preferred sender.
  2. Click the Add to Contacts link next to the sender's name.
  3. Hotmail now contains the sender's email address in your address book. You can click the Edit Contact link next to the name now to add more information.
  4. Enter more contact information and click Save when you finish.

3. Protect your PC

With more than 2,000 new viruses detected every month, ensuring your PC is well protected is a critical step in protecting your personal details. Ensure you have a firewall, anti-virus and anti-spyware software installed on your computer and that this is kept up-to-date.

4. Use Secure Wireless Networks

If you connect to the internet via a wireless network, make sure it is secure. No matter how good your virus software and other methods of protection, if your network is not secure, the information you enter into websites can be accessed by anyone looking to fraudulently obtain this. Details on how to secure your wireless network are normally supplied by your internet service provider or included in the documentation of the equipment connecting to your telephone line or satellite link.

5. SSL (Secure Sockets Layer)

When you connect to our web server, a secure link will be made with your browser. This SSL connection uses powerful industry-standard technology to encode all personal data that is passed over the internet. This ensures that all details are fully protected and cannot be read by others.

6. Data Storage and Monitoring

Our data is stored on servers located in secure environments that can only be accessed by authorised personnel. Access to our data is secured through a number of industry standard techniques which are monitored and security checked on a regular basis.

Help Help