A method for enabling an individual, business, or other entity to exchange confidential
information or to make purchases or conduct financial or other transactions over
a public or quasi-public network while limiting the transmission of confidential,
sensitive, financial or other information over the public or quasi-public network
and limiting access to such information by unauthorized individuals. The method
includes storing confidential, sensitive, financial or other information on a processing
computer connected to the computer system or systems of one or more businesses
or financial or other institutions by way of a private, non-public network. A first
electronic message is sent from a first computer to a central network computer
through transmission over the public or quasi-public network. At least a portion
of the first electronic message received by the central network computer is stored
on data storage or data transfer media. The data storage or data transfer media
is then disconnected from the central network computer and connected to the processing
computer. The processing computer reads the portion of the first electronic message
stored on the data storage or data transfer media, identifies the source of the
first electronic message, and accesses stored information concerning the source.
Information from the first electronic message, and stored information concerning
its source, can then be transmitted over the private, non-public network to the
computer system or systems of one or more businesses, financial institutions, or
other entities for processing.