Secure Payment

The payment service allows you to make on-the-spot purchases by credit card. This service guarantees a high level of security, reliability and efficiency. The website has a number of features that ensure your financial transaction is processed securely.


Secure transmission of the credit card number to the payment server, which, for authorization purposes, redirects the transaction to the institution that issued the card;
Encryption of the information sent over the Internet; and Immediate processing of the request to authorize the amount of the purchase.


When you use the payment form, the information retrieved from your credit card is transmitted over the Internet using the SSL (Secure Socket Layer) protocol. This protocol used by your browser enables secured transmission of information via the Internet to the payment service.


Encryption consists of turning clearly worded text into unintelligible text (a cryptogram) using cryptographic techniques such as algorithms and a key. Access to a secret key is necessary to decode the information. Cryptographic systems use a variable length key. Here is how you can be sure the information is being transmitted securely:
Depending on your browser, a small locked padlock appears in either the address bar or status bar when you are connected to a secure website;
When the session switches to encrypted mode, you will see in the address bar that the address becomes, indicating that the SSL (Secure Socket Layer) protocol is being used to transmit information securely.


Cryptography is the science of encrypting messages so that the content can be understood only by the designated recipient. Encryption in various forms has been used since time immemorial. Today, encryption is used to transmit digital data via a computer network or, increasingly, to ensure the confidentiality of important files stored on your computer. Clearly worded text is turned into unintelligible text using complex mathematical algorithms and cryptograms known as keys. A reverse operation is applied for decryption. Security experts foresee a growing use of encryption for non-classified computer data. Encryption can be either symmetrical or asymmetrical. In symmetrical encryption, the same key is used for both encrypting and decrypting. The sender has to convey the key to the recipient with the utmost security. Asymmetrical encryption requires one key for encrypting and another for decrypting. Decrypting requires knowing both keys, as one cannot be deduced from the other. To send an encrypted message, the sender uses the encryption key, commonly known as a public key. The recipient can only decrypt the message by using a decryption key, commonly known as a private key.
No keys change hands when this method is used. However, it requires more time than symmetrical encryption. The payment service uses asymmetrical encryption, which ensures your credit card number is transmitted securely over the Internet.


At the time of payment, displays a form on which you are asked to enter your credit card number, the expiry date (month/year) and the security code.


Most major credit cards offer an additional security feature for online purchases, called the security code. The security code consists of three or four numbers (embossed on the front of the card or printed on the signature strip) that allows for cryptographic control of the information and protects the card owner against fraud. When making online purchases, entering these numbers proves that the card is authentic. As the security code is not contained on the card’s magnetic stripe, it does not appear on transaction receipts. To guarantee confidentiality, the information you enter on the payment form is encrypted before being transmitted over the Internet. The encrypted information is then sent to the financial institution for immediate processing. This guarantees that your credit card information is kept strictly confidential.


The sending of fraudulent email messages (phishing*) is a technique used by scammers to try to reroute funds by usurping the identities of established companies. Scammers do this by sending authentic-looking email messages to obtain personal information from recipients. Please note that the MTI AUTOMATION QUEBEC never sends email messages requesting personal information such as your address, date of birth or credit card number..
If you ever receive an email message that appears to come from the MTI AUTOMATION QUEBEC and asks for such information, do not reply to it. Instead, please contact our Customer Relations Centre immediately at 1-877-629-9191 or by emai:
*“Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. […] Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter personal information at a fake website, the look and feel of which are identical to the legitimate site, the only difference being the URL of the website concerned. Communications purporting to be from social websites, auction sites, banks, online payment processors or IT administrators are often used to lure victims. Phishing emails may contain links to websites that distribute malware.” Source: Wikipedia, the Free Encyclopedia.


When we were considering which payment gateways to use on our website, the choice narrowed down to 3 most universal ones: Visa; MasterCard; Amex.


Also, it is comforting to know that should you experience any kind of technical bump in the road during the checkout process, you can always address our customer support department with your billing questions!