Purchase Order Information

A purchase order (PO) is an official document in which your company commits to purchasing SSL Certificates from us. It includes the names of both the buyer and us, along with company information and the number of SSL Certificates being purchased.

For example, if you need 50 SSL Certificates for your websites, you will send a purchase order to Trustico® to confirm your intent to buy that quantity.

While it might seem like an extra step in the procurement process, creating a purchase order for SSL Certificates helps track your upcoming expenses and commitments. It not only allows you to monitor how many SSL Certificates you've ordered from us, but it also helps you understand your cash flow. The total value of outstanding purchase orders represent money you're scheduled to pay to Trustico® in the coming months.

In all cases, the buyer is responsible for issuing purchase orders. Trustico® only accept standard or single use purchase orders, meaning a new purchase order must be provided for each order. Once a purchase order has been approved by Trustico® it becomes a legally binding agreement. You’re officially committed to pay for the goods outlined in the purchase order, regardless of whether payment terms exist.

We also use the PO to prepare for issuing the SSL Certificates, ensuring we deliver the correct number and meet the specifications required by your organization.

Invoice vs Purchase Order

A purchase order is a document sent by a buyer to a supplier that specifies the items or services being requested. It serves as a binding agreement between both parties, outlining the terms and conditions of the purchase.

On the other hand, an invoice is a document sent by the supplier to the buyer, detailing the total amount due for the goods or services provided. Generally, it is issued after the purchase is completed and acts as a record of the transaction.

An example of a purchase order is displayed above for reference.

Payment Terms

When we receive a purchase order, we'll review any additional payment terms that have been specified or are being negotiated. The nature of your industry, location and corporate structure may determine accepted payment terms - for example, government departments may require sixty-day payment terms whereas smaller businesses tend to negotiate a maximum of thirty-days.

Create a purchase order request and provide it to us for processing. If you require terms and are unable to provide a purchase order, we are able to accept a request on 

If you require terms and are unable to provide a purchase order, you can instead provide a signed letter authorizing the order and requesting your payment terms. The letter should be printed on company letterhead, include the order particulars, specify the payment amount and currency, any request the desired payment terms. Your request must include the signature of an authorized representative.

Some payment methods don't work automatically in conjunction with payment terms and it's expected that orders with payment terms are settled via bank deposit. Visit our Banking 🔗 page to find out more information on how to pay for your outstanding invoice via bank transfer.

Submit Purchase Order

You must submit your purchase order using the following form. This ensures that your purchase order has been saved into our systems.

If payment terms have been negotiated, any existing quote or draft invoice will have the payment terms applied and the order subsequently processed. If no order exists, a new order will be created.

If payment terms have not been negotiated, payment is required. If no order exists, a new order will be created, and you will be notified shortly to continue the checkout and payment process.

Trustico® Monitoring Protects Your Search Ranking - SEO and SSL Certificates

Trustico® Monitoring Protects Your Search Ranki...

By detecting issues before search engines encounter them, Trustico® Monitoring maintains the consistent security signals that protect and enhance your SEO investment.

Trustico® Monitoring Protects Your Search Ranki...

By detecting issues before search engines encounter them, Trustico® Monitoring maintains the consistent security signals that protect and enhance your SEO investment.

Trustico® Monitoring : Automatic SSL Certificate Expiration Protection

Trustico® Monitoring : Automatic SSL Certificat...

Trustico® Monitoring is specifically designed to prevent SSL Certificate expiration through an intelligent, multi-tier alert system that gives your business the time and information needed to renew SSL Certificates before...

Trustico® Monitoring : Automatic SSL Certificat...

Trustico® Monitoring is specifically designed to prevent SSL Certificate expiration through an intelligent, multi-tier alert system that gives your business the time and information needed to renew SSL Certificates before...

How GREASE from Google Protects the Future of Secure Connections and SSL Certificate Compatibility

How GREASE from Google Protects the Future of S...

By randomly injecting unknown values into Transport Layer Security (TLS) connections, GREASE ensures that servers and network devices properly handle new protocol features rather than rejecting them.

How GREASE from Google Protects the Future of S...

By randomly injecting unknown values into Transport Layer Security (TLS) connections, GREASE ensures that servers and network devices properly handle new protocol features rather than rejecting them.

Delegated Credentials : The New Standard for Securing SSL Certificate Private Keys at Scale

Delegated Credentials : The New Standard for Se...

Delegated Credentials provide an elegant solution to the private key distribution problem by separating the long-lived SSL Certificate from the short-lived credentials used to actually terminate Transport Layer Security (TLS)...

Delegated Credentials : The New Standard for Se...

Delegated Credentials provide an elegant solution to the private key distribution problem by separating the long-lived SSL Certificate from the short-lived credentials used to actually terminate Transport Layer Security (TLS)...

How Time Synchronization Affects SSL Certificate Validation : Why Incorrect Clocks Cause Certificate Errors

How Time Synchronization Affects SSL Certificat...

When a browser or application connects to a server over HTTPS, it compares these timestamps against the current system time to verify that the SSL Certificate is within its valid...

How Time Synchronization Affects SSL Certificat...

When a browser or application connects to a server over HTTPS, it compares these timestamps against the current system time to verify that the SSL Certificate is within its valid...

How DNSSEC Record Types Work Together to Validate Domain Name System (DNS) Responses

How DNSSEC Record Types Work Together to Valida...

Every time you visit a website, send an e-mail, or connect to an online service, your device relies on the Domain Name System (DNS) to find the correct destination. Without...

How DNSSEC Record Types Work Together to Valida...

Every time you visit a website, send an e-mail, or connect to an online service, your device relies on the Domain Name System (DNS) to find the correct destination. Without...

1 / 6