Teligence places great emphasis on customer confidence and confidentiality. To support this, we follow strict security practices in order to protect your information while you enjoy products like Interactive Male®.
At Interactive Male, access to our member services, databases and financial systems is strictly managed. We have technology and procedures in place to ensure security is not breached, including the physical security of our computer hardware and telecommunications systems. However, it is important to note that you also have a role to play in the security of your personal information.
What Can I Do?
Keep your membership number and pass code secure. Never share them with anyone, as they are your private keys to your membership, your personal information, and the time you have enjoyed on Interactive Male.
- Keep your numbers secure and confidential. No sharing!
- Do not choose a pass code that is easy to guess, like "1234" or your date of birth.
- If you have to write your numbers down, make sure you store them in a place that only you have access to.
- Most importantly, no one should ever ask for your membership number or pass code while you are using Interactive Male. The only exception to this is if you have placed a call to our Customer Service. Our agents may ask for your numbers to verify your identity. If someone you are talking with on Interactive Male asks for your numbers, please flag him or her for the attention of Customer Service by pressing 0 (zero) on your phone.
- Keep tabs on your membership balance. Any changes that are not familiar may indicate someone has gained access to your membership. Contact our toll-free, 24-hour Customer Service at 1-800-661-6168 immediately if this happens.
What About my Computer?
Our communication with you is strictly confidential. However, once an email arrives in your computer, it is up to you to protect the information contained in it. For example, if you change your pass code online, we will send you an email to confirm the change. Since this email will contain your pass code, it should be kept secure. The safest route is to delete the mail, but some applications use a Recycle Bin feature, so that must be emptied after deleting the mail, or it will still be available to prying eyes. Here are some general security practices for your computer, many of which are practical if you share your computer with other users, or if you use a public computer to access the Internet:
- Never leave your computer unattended when signed in to our Members area.
- It's easy to sign out with one click and, if you have activated the Remember Me option, signing back in to the Members area only requires you to enter your pass code. For more complete security, close your browser window when leaving your computer.
- Periodically clear your cache/Temporary Internet Files
- Your Web browser stores information from the Web on your hard drive (in unencoded form) to improve performance. These files remain until they are erased. In Internet Explorer, you can erase these files by going to Tools\Internet Options\General\Temporary Internet Files and clicking the Delete Files button. In Netscape Navigator, you can find it under Edit\Preferences\Advanced\Cache.
- Disable the automatic password save features in your Web browser.
- This feature is meant to be a convenience, but actually memorizes your passwords and auto-completes them for you (or for anyone else!) when you start to type them in.
- Use an anti-virus program and keep virus definitions up to date.
- Use a firewall.
- Either available in hardware or software form (some are even downloadable for free!), a firewall will keep intruders out of your computer. A firewall is even more critical if you have a full-time Internet connection (such as a cable modem or DSL line).
- Use the latest versions of your software, and install all security patches released for it.
- Browser manufacturers update their software with patches whenever a security hole is discovered. Check their Web sites regularly and install everything security-related.
- Turn off your computer when not in use, or disconnect it from the Internet.
- Disable scripting features in email software.
- Some email applications use the same code, and therefore have the same vulnerabilities, as Web browsing applications.
- Back up your data!
- Store important information outside of your computer, on CD-ROMs, floppy disks or ZIP disks. Password protect these disks for extra security.
- Make a boot disk
- In case of major damage to your system, a boot disk will enable you to start your computer and retrieve critical data before you make repairs.
What are you doing about my security?
The success of our business depends on the security of our customer information. To this end:
- We ensure your personal and financial information is protected within our in-house member service systems and databases.
- We ensure that your personal and financial information is protected while in transit between your PC and our servers through the use of industry-standard security techniques, which include Secure Socket Layers (SSL) and encryption on all the pages in our Members area. This guarantees that in the remote chance that your information is intercepted, that it cannot be read or altered.
- We ensure that access to your membership is only given when a correct combination of membership number and pass code is provided.
- For further protection, we automatically sign you out of your session after a few minutes when there has been no activity. You will need to sign back in to the Members area if this happens.