Enable Accessibility & Security Statement
Accessibility and security are among the most important values of our company. It's also what we consider when building new products and services, such as [insert new feature/service name]. In fact, we firmly believe that all of our customers can benefit from these principles, regardless of whether they are individuals or businesses.
Ease of Accessibility of Customers at E-Okie
Ensuring that our customers have an accessible and secure user experience is a top priority for E-Okie. That's why we put accessibility at our core from day one, ensuring that all of our applications are fully accessible to people with disabilities, without compromising usability or functionality. We partner with leading accessibility consultants and designers in addition to adhering to all of WCAG 2.0 Level AA compliance requirements. For more information on how you can work with us to ensure your site meets these standards, please contact us.
Accessibility Features At E-okie
Hassel-free accessibility features of our website with the latest technology
Our website offers complete product information to help you make an informed purchase decision.
In addition, we have access to your customer feedback system where you can submit product reviews
Secure Shopping at E-Okie
E-Okie is committed to protecting your privacy. To learn more about our commitment to you and secure shopping, please read our security statement. This policy also covers any personally identifiable information (PII) such as your name, address, phone number, or credit card information. We will never share your PII with third parties without prior authorization or consent from you.
Our Security Statement
The security of our customer data is our highest priority. We work around the clock, using multiple layers of protection to ensure that we protect all of your personal information and payments. Although no company can fully guarantee that any system is 100% secure, we back up our promise with a $1,000,000 guarantee for fraud or ID theft. We have multiple layers of protection in place throughout our systems to prevent unauthorized access or use by third parties such as hackers or viruses.

We maintain physical, electronic, and procedural safeguards to protect personal information from unauthorized access or disclosure. Our data centers have locked entryways and computer servers are in a secure environment behind locked doors. All sensitive data including cardholder name, address, CVV2 number (the three-digit security code on your card), account number, and expiration date are encrypted using secure socket layer technology (SSL) to ensure that your payment information is protected during transmission over the Internet.
Keeping Your Information Safe
According to our security statement, We take the security and privacy of your personal information very seriously. We use industry-standard Secure Socket Layer (SSL) technology to encrypt your credit card number, name, and address for secure transactions. When you provide sensitive information such as a credit card number on our order forms, we protect it both online and offline.

We know that your information is valuable to you, and we're committed to keeping it safe. We employ industry-standard systems and procedures to protect your data from unauthorized access or improper use. To learn more about how we safeguard your information, please read our Privacy Policy.
Keeping Your Account Info Safe
We recognize that security is a shared responsibility and that all stakeholders-customers, suppliers, regulators, governments, and industry partners-have roles to play in ensuring information security. IBM's security professionals have built tools designed to help our customers achieve industry-recognized compliance with many industry standards, such as ISO _____ for information security management systems (ISMS) and other global or regional requirements. We enable our customers to meet both regulatory obligations as well as business objectives through relevant technologies and services.
Keeping Your Privacy Safe
These days, it seems like everyone is looking for ways to hack into your personal information. Unfortunately, that makes keeping your account info safe a top priority. Here are some easy ways to keep your account safe and secure: (And please share these with anyone who shares passwords with you!)

Use different passwords for each of your accounts-and don't forget them! While there are plenty of tools out there designed to help you remember all of your passwords, we still recommend using separate ones for each site or service. If one site gets hacked or compromised, having different passwords will help protect all of your other accounts from being accessed as well. And don't forget them! Password managers can be a big help here, but it's always a good idea to keep track of things in more than one place. After all, if you lose access to your password manager and have no other way to get into it, that could be a problem!

Keep an eye on your credit report: It might seem like something only credit card companies and banks would care about, but keeping an eye on your credit report is important for protecting yourself against identity theft too.


Keeping Your Devices Safe
Protecting your devices is of vital importance to us, which is why we offer comprehensive security measures that encompass both physical and digital information. Our professionals are dedicated to working with you to ensure that our services meet all of your accessibility needs. We work closely with our customers to ensure all data remains secure in compliance with federal, state, and industry regulations. If you have any questions or concerns about your technology equipment, please contact our office for further assistance.
Keeping Your Wireless Network Safe
Like any other part of your home, keeping your wireless network safe should be a top priority. Be sure to limit access only to those you trust, update your security passwords often, and keep an eye on traffic for any activity that looks unusual.
Protect Yourself From Scammer
Scammers are everywhere, and your customers are vulnerable to them. A strong security statement can help ensure that you're always putting your customers first. Protect yourself and your customers by keeping your security practices top-notch with an accessible security policy.
Identify eCommerce Scam
As e-commerce continues to take market share from traditional brick-and-mortar businesses, new concerns have arisen surrounding security. For both established and new e-commerce companies, one of your biggest issues is protecting your customers. No matter how big or small your company is, it's essential to protect yourself against scammers. Here are a few steps you can take to help ensure that scammers don't get a hold of your customers' sensitive information.

The first thing you need to do is make sure that your checkout process isn't hiding any malicious code. That code can collect payment information and other personally identifiable information, and then either steal it or use it for financial gain. To avoid these issues, ask an IT professional to check your website for dangerous code. You should also make sure you have a secure server; again, an IT pro can help you with both of these steps.
Fake Emails v/s Real Emails
If you're unsure about whether an email is real or not, but have to respond regardless, take a second to try and verify it before sending a response. This can be done by checking with someone else in your organization who might know more about what's going on than you do, by searching for additional information online (or through other channels), or by calling someone directly at their office number (if they included that). It may seem like overkill, but responding to phishing emails can put your entire organization at risk of being hacked.
Figure out Fake URLs
Many website URLs are long and complicated, with seemingly random numbers and letters. However, all of these URLs follow a simple pattern called a Uniform Resource Locator (URL). A URL is simply a label that allows users to access a web page or website. In order to verify whether a URL is legitimate or not, we will need to figure out its structure. By figuring out how these fake URLs work, we can create our own security checker.

Fake URLs can come in many different forms, but they're easy to spot if you know what to look for. When a link looks like it goes somewhere on your site, but doesn't actually go anywhere, that's a fake URL. When a link opens up a new tab and goes to another website entirely, that's also considered a fake URL.
Special Notice For Our Sellers
Incorporated is not responsible for unauthorized access to or alteration of your transmissions or data, any material or data sent or received or not sent or received, any transactions entered into through our site, or as a result of an offer on our site. We make no guarantees as to privacy and security of information at any website linked to ours, including (without limitation) information and your transactions that you post.
We Provide Dedicated Team To Resolve Any Security Concern
One of our dedicated team, a security expert, or a manager will contact you within 24 hours. If you prefer not to disclose any information over call or chat and want to talk privately via email, please provide your name, organization's name, e-mail address, phone number, and country in a private email and send it to us at [email protected] We ensure every problem gets fixed.
Instant Help When Your Account Hacked
If you cannot log in to your account for security or accessibility reasons, we will investigate and restore your account access within five (5) business days of receiving full documentation that verifies ownership of your account. To do so, please submit a request from a secure computer/device and include copies of proof of ownership. We may ask you to provide additional information if necessary. We will not be able to restore access if more than five (5) business days have passed since your initial request.
Fake Emails - How To Deal With Them
Over the past few years, we've been receiving more and more complaints regarding fake emails. If you're expecting a critical or sensitive email, it's best to turn on two-factor authentication. Not only does two-factor authentication protect your account from fake emails, but it also adds an extra layer of security to all other emails and makes accessing sensitive information easier. Enable two-factor authentication to keep your account safe: _______. com/security#two-factor_authentication.
We Are Dedicated To Security Research
Everyone using our service will have security and privacy. We are dedicated to researching the security and privacy of our customers. The data used by us are under strict surveillance, and we will protect them well. Our site has an SSL certificate, any information you send us is transmitted over SSL encryption so that no one can intercept them in between or steal your information such as credit card number or password.
Our Responsible Disclosure
Designing and building for a digital world mean ensuring people can use your product, service, or website with various digital technologies. For example, a person who is blind may use voice recognition software and braille input devices to interact with your site. A deaf individual may need captions on videos and audio files so they can access them as easily as any other content on your site.

People with learning disabilities may need extra time to complete forms that others find easy to complete in less time. The same goes for individuals using assistive technology such as screen readers and magnifiers. It's important to ensure that all users are able to use your products, services, or websites regardless of their disability. We encourage you to build products that embrace accessibility and security best practices by design - not by chance - because it's good business practice and makes good sense.
Security Vulnerability to E-okie
This paper discusses the security vulnerability in e-okie eCommerce websites. It is found that the website contains various vulnerabilities and it is possible to exploit these vulnerabilities to access sensitive data. The paper also includes a list of the identified security risks. Website VulnerabilitiesThe following are the vulnerabilities identified on the e-okie.com website: CORPSE_HACK, SQL Injection, Clickjacking, and Cross-site Scripting.

The paper discusses how hackers can exploit the vulnerabilities in e-okie eCommerce websites to steal users' personal information, such as their credit card number, contact information, and so on. This is not the first time a security flaw has been found on an e-okie eCommerce website and reported on a paper.