Internet Insurance Security

As part of our commitment stipulated in our Customer Charter, we aim to give our clients with the highest possible level of confidentiality of their information, as the law will permit. We are also committed to providing safe and secure operations in the conduct of online transactions.

Our Privacy and Security Policy, which can be found in our web page and a copy of which is also included here, states how we ensure the security and confidentiality of our clients’ information and how we manage it carefully. This document describes the security practices governing and supplements our Privacy and Security.


Security Arrangements and Features

We do recognize that technological attacks are inevitable. That is why we aim to maintain a strong cyber defense and response mechanism. We are also aware that absolute cyber security is unlikely ever to be achieved, thus we continuously monitor and strengthen our cyber security.

How We Store and Save Data

Both Good Intentions Professional Services OPC and web pages store all information that are necessary to process an insurance coverage application in a MYSQL database.

Who Will Have Access

We have made procedures to ensure that only authorized personnel/representatives of Good Intentions Professional Services OPC and Bethel General Insurance and Surety Corporation may view our insurance clients’ information. Thus, Good Intentions Professional Services OPC and have designated administrators who have full access to and can authenticate the data in the system. All other personnel have limited access with designated usernames and passwords issued by the administrators, depending on their roles as employees or as referrers.

Only employees – who are policy users as well – are authorized to manage the list of referrers, user accounts, policy issuances, and the customer experience rating of every client. Referrers are only authorized to insert credentials of clients and provide quotations of premiums.

Access to our systems is logged. Any possibility of breach can be traced right away.

How Data is Protected

We have implemented authentication mechanisms and security features to ensure the safety of confidential information, availability and integrity of data that is processed, stored and communicated through electronic or similar means via

Information collected from the clients and other information gathered for every transaction and stored within the system are encrypted with SSL certificates.

A copy of the initial application, quotation, and e-policy is also sent to the email address of the client.