The following includes only the text portion of the document. We invite you to consult the original document or multimedia presentation to benefit from the integral information which was prepared for your intention.
Two options can be available to give you access to the original document:
When available:
Click on the PDF or RobotDemo document on top of this screen
Otherwise:
Copy the following URL link to your WEB browser:
http://www.c-surance.ca/help_en/edit_article.asp?id=1380&ucat=240&detail=93
A “Members access” is available via the www.c-surance.ca web site,
Screen 1 - access to the www.c-surance.ca site
Once on the link, you can either click on the title “C-surance.ca Client Access” or, directly on the image to reach the first level of security.
Protection and security are elements of extreme concern for MDI. Your data, just like those of carriers, advisors or sponsors, are highly confidential must be subject to the very strict MDI policies. To ensure a maximum of comfort for all the participants, MDI have chosen to partner with and outsource to a world class provider the responsibilities for the first level of safety. Thus, the servers are located in a highly secured dedicated bunker on the St-Jacques Street, whereas the accesses to the sites as well as the management of the access are controlled by world class professionals.
A.1 Security Levels
To clear the first security level, you will need your user name and password. This information is provided to you when you sign up for the services. It is of your responsibility to protect its confidentiality.
A second security level is ensured by a module called the GAP for “General Access Provider”. This module objective is to add another level of safety to your data.
You will need a second and different user name and password to pass through this second phase.
Once entered, C-surance.ca identifies the operator and defines the files as well as the available options for the designated user. The access management is closely related to the “Role(s)” which will be authorized to each user. An automatic user signature will then be labeled on changes and activities realized during the daily operations. Ensure yourself confidentiality of this precious access information.
|