We guard your privacy like it was our own!
Under no circumstances is your info given, sold or shared with others. Period!
Sound Therapy seeks to provide the best possible service to its clients and users alike.
We understand how important it is to protect your personal information.
This web site has been created for the education of those interested in Sound Therapy. There is no membership or registration required for you to peruse and study this large library of information. Thus you may come and go anonymously on this web site without disclosing any personal information. However, if you wish to subscribe to our Ezine Newsletter or sign up for our free Reports or Information Packs then your name & email address is, of course, necessary.
However, you need to submit ONLY your email address. Your Name and email address is NEVER given, sold or transferred to anyone else and is used ONLY to send you the information requested. Further you may unsubscribe from any of our mailings by the simple procedure described at the bottom of each such mailing
If you order products from us you will need to submit your name, address, credit card and contact information (email address and phone number). This information is NEVER given, sold or transferred to anyone else and is used ONLY to process your order and to contact you about your order, if necessary.
We use an outside shipping company to fulfill orders in the USA, and a credit card processing company (Eway.com.au) to clear your credit card purchases. These companies do not retain, share, store or use personally identifiable information for any other purposes.
Worried about security issues and software uptime? Yeah, so were we. Which is why we use first rate infrastructure. In fact, you may consider it “over-kill.” We just think of it as protecting your investment (and ours).
A high level overview of our security system begins with our Tier 4 co-location facility at Sterling Network Center located in Phoenix, Arizona. We host all of our production systems at Sterling. There are 5 levels of security, including a biometric palm scan our technicians must pass just to get physical access to our systems. In addition to our bullet-proof co-location facility, we also employ many other security features, such as:
· State-of-the-art Firewall
· Limited User Access
· Rootkit Assistance
· Immutable System Binaries
· Buffer Overflow Resistance
· Hardened, Read-Only Operating System
Additionally, we have implemented redundancy and fail-over at every level, including:
· Uninterruptible Power
· Fail Proof A/C- HVAC
· Database Servers
· Web Servers
· Campaign Servers
· Email Servers
He have 99.97% availability average across all servers and applications. Now, we only expect a handful of people to understand all that. But, put simply, the systems we use are ultra safe and reliable.