The security of Business Plus’s services encompasses multiple layers and many components, from policies and methodologies to service architecture; capability to detect potential fraud and service abuse, and user controlled service administration. Security capabilities and settings reside in the application and infrastructure layers, within the service delivery and operations processes, and the company’s security policies and governance practices.
The security of member services is shared among members, who manage their policies, user permissions, and login information, and Business Plus, who manages service delivery, architects and designs security into the product, and ensures physical and environmental security of the service. We employ a multi-layered security model, with security at the perimeter, at the service delivery layer, SSL on our web applications, tier 1 data centers, and settings in the interface that a customer controls.
In addition, Business Plus has a full-time security and fraud-prevention department with a security program that is based on industry best practices; our security program also includes communications fraud monitoring where we monitor members’ service.
Business Plus’s cloud services include front-end settings that members control to manage their policies and their users.
These settings include: Adding/removing devices, setting user and group permission levels, managing PINs, and enabling features. In addition, member admins and individual users can review activity history.
Your Google Account
You may need a Google Account in order to use some of our Services. You may create your own Google Account, or your Google Account may be assigned to you by an administrator, such as your employer or educational institution. If you are using a Google Account assigned to you by an administrator, different or additional terms may apply and your administrator may be able to access or disable your account.
To protect your Google Account, keep your password confidential. You are responsible for the activity that happens on or through your Google Account. Try not to reuse your Google Account password on third-party applications. If you learn of any unauthorized use of your password or Google Account, follow these instructions on the Google Website.
Password Information Security
You agree that You are responsible for all Password Information that You or any End User use with our Services. You further agree to ensure that all such Password Information: (i) shall be immediately changed in the event that You or Your End Users learn of or suspect that any Account Security Incident has occurred; (ii) shall not be not transmitted or stored in any unsecure manner (including without limitation through any auto-storage, caching, “remember,” or auto-fill feature); and (iii) shall be protected from theft or unauthorized access, use, or disclosure with at least a reasonable degree of care and diligence.
You agree to protect all End Points using, at minimum, generally accepted security measures, including without limitation: (i) effective passwords or other credentials; (ii) network segmentation and access restrictions utilizing an accurate and up-to-date access control list; (iii) session time-out and/or locking screen saver features; and (iv) use of an effective and up-to-date firewall for all networks to or through which any End Point might connect. YOU ACKNOWLEDGE AND AGREE THAT THESE REQUIREMENTS APPLY TO IP DEVICES, WHICH UTILIZE THE SAME CONNECTIVITY – AND ARE SUBJECT TO THE SAME SECURITY RISKS – AS COMPUTERS.
Update of Security Features
You acknowledge that some Services security features may require activation or installation of software or firmware updates, and software may be de-activated or uninstalled. You agree to promptly download and install all updates to software and/or hardware or firmware used in conjunction with the Plan Services, and generally to ensure the activation and use of all features that are necessary or appropriate to protect the Accounts, users, End Users, or Your organization’s assets and operations. You acknowledge and agree that if You decide not to install updates, this may result in the functionality of the Services to be diminished and unstable.