Purchase Order Information

A purchase order (PO) is an official document in which your company commits to purchasing SSL Certificates from us. It includes the names of both the buyer and us, along with company information and the number of SSL Certificates being purchased.

For example, if you need 50 SSL Certificates for your websites, you will send a purchase order to Trustico® to confirm your intent to buy that quantity.

While it might seem like an extra step in the procurement process, creating a purchase order for SSL Certificates helps track your upcoming expenses and commitments. It not only allows you to monitor how many SSL Certificates you've ordered from us, but it also helps you understand your cash flow. The total value of outstanding purchase orders represent money you're scheduled to pay to Trustico® in the coming months.

In all cases, the buyer is responsible for issuing purchase orders. Trustico® only accept standard or single use purchase orders, meaning a new purchase order must be provided for each order. Once a purchase order has been approved by Trustico® it becomes a legally binding agreement. You’re officially committed to pay for the goods outlined in the purchase order, regardless of whether payment terms exist.

We also use the PO to prepare for issuing the SSL Certificates, ensuring we deliver the correct number and meet the specifications required by your organization.

Invoice vs Purchase Order

A purchase order is a document sent by a buyer to a supplier that specifies the items or services being requested. It serves as a binding agreement between both parties, outlining the terms and conditions of the purchase.

On the other hand, an invoice is a document sent by the supplier to the buyer, detailing the total amount due for the goods or services provided. Generally, it is issued after the purchase is completed and acts as a record of the transaction.

An example of a purchase order is displayed above for reference.

Payment Terms

When we receive a purchase order, we'll review any additional payment terms that have been specified or are being negotiated. The nature of your industry, location and corporate structure may determine accepted payment terms - for example, government departments may require sixty-day payment terms whereas smaller businesses tend to negotiate a maximum of thirty-days.

Create a purchase order request and provide it to us for processing. If you require terms and are unable to provide a purchase order, we are able to accept a request on 

If you require terms and are unable to provide a purchase order, you can instead provide a signed letter authorizing the order and requesting your payment terms. The letter should be printed on company letterhead, include the order particulars, specify the payment amount and currency, any request the desired payment terms. Your request must include the signature of an authorized representative.

Some payment methods don't work automatically in conjunction with payment terms and it's expected that orders with payment terms are settled via bank deposit. Visit our Banking 🔗 page to find out more information on how to pay for your outstanding invoice via bank transfer.

Submit Purchase Order

You must submit your purchase order using the following form. This ensures that your purchase order has been saved into our systems.

If payment terms have been negotiated, any existing quote or draft invoice will have the payment terms applied and the order subsequently processed. If no order exists, a new order will be created.

If payment terms have not been negotiated, payment is required. If no order exists, a new order will be created, and you will be notified shortly to continue the checkout and payment process.

Certificate Signing Request (CSR) Generator Tool

Certificate Signing Request (CSR) Generator Tool

The Trustico® CSR Generator eliminates the complexity of command-line tools and platform-specific requirements through an intuitive web interface that guides you through each step.

Certificate Signing Request (CSR) Generator Tool

The Trustico® CSR Generator eliminates the complexity of command-line tools and platform-specific requirements through an intuitive web interface that guides you through each step.

DNS Stamp Generator and Decoder Tool

DNS Stamp Generator and Decoder Tool

The Trustico® DNS Stamp generator simplifies creation of properly formatted stamps for any DNS resolver configuration. Users input their resolver details including protocol type, server address, and security properties through...

DNS Stamp Generator and Decoder Tool

The Trustico® DNS Stamp generator simplifies creation of properly formatted stamps for any DNS resolver configuration. Users input their resolver details including protocol type, server address, and security properties through...

SSL Certificates with Client Authentication EKU - Available Through Trustico® Until May 2026

SSL Certificates with Client Authentication EKU...

All Sectigo® branded SSL Certificates issued through Trustico® automatically include this capability without requiring special requests or additional configuration through May 15th, 2026.

SSL Certificates with Client Authentication EKU...

All Sectigo® branded SSL Certificates issued through Trustico® automatically include this capability without requiring special requests or additional configuration through May 15th, 2026.

Beyond the Padlock : How Customers Really Evaluate Payment Security

Beyond the Padlock : How Customers Really Evalu...

SSL Certificates from established providers like Trustico® form the foundation of payment security trust, but customers evaluate numerous additional signals before deciding to share sensitive financial information.

Beyond the Padlock : How Customers Really Evalu...

SSL Certificates from established providers like Trustico® form the foundation of payment security trust, but customers evaluate numerous additional signals before deciding to share sensitive financial information.

Understanding Multi-Factor Authentication and Two-Factor Authentication

Understanding Multi-Factor Authentication and T...

Multi-Factor Authentication requires users to provide two or more verification factors to gain access to resources, combining something they know, something they have, and something they are.

Understanding Multi-Factor Authentication and T...

Multi-Factor Authentication requires users to provide two or more verification factors to gain access to resources, combining something they know, something they have, and something they are.

Why Do Major Data Breaches Happen to Companies with SSL Certificates?

Why Do Major Data Breaches Happen to Companies ...

Organizations suffering breaches despite having SSL Certificates typically failed in other security domains, or implemented SSL Certificates incorrectly, creating vulnerabilities that attackers leveraged for unauthorized access.

Why Do Major Data Breaches Happen to Companies ...

Organizations suffering breaches despite having SSL Certificates typically failed in other security domains, or implemented SSL Certificates incorrectly, creating vulnerabilities that attackers leveraged for unauthorized access.

1 / 6