Security Policy

We take your online security seriously. Our website uses advanced encryption technology to keep your information private and hidden from view during transmission, and your credit card transactions on this site are processed securely using a trusted payment partner. Firewalls are employed to further protect data and keep it from prying eyes.


Frequently Asked Questions about Security

Guarding your personal and financial information is important to Ellis Music. A variety of methods are used. We use SSL (secure socket layers) and encryption technology to ensure that your connection to our website is secure and information is transmitted securely. For your protection, you will be automatically logged out of your account after 15 minutes of inactivity. When placing orders, you will be asked to provide the three-digit code on the back of your credit/debit card any time you purchase items through the website. Our autopay system uses tokenization (the replacement of your actual credit/debit card number with a randomly generated string of alphanumeric characters) when transmitting data. As a customer, of course, you also have a role to play. Your email address and the password you set for your online account are like a key to a lock; choose a secure password and do not share your login details with others.
As more of our day-to-day transactions are computerized, it becomes ever more important to think about security. Here are some tips to keep in mind when using EllisMusic.com or any other website:
  • Your password should be secure. That means a mix of upper- and lower-case letters, numbers, and symbols. If your password is ‘ellismusic’ or any pronounceable word, it's probably not secure. A variety of password managing tools are available for computers and smartphones to help you generate and recall passwords.
  • Anytime you use a computer that is not your own to transact personal business, you may be compromising your security. Whenever possible, avoid using public computers to conduct transactions that involve entering or modifying your personal or financial information.
  • Use only trusted network connections. Like public computers, public wireless internet connections vary in their security settings.
Loading...