The effective date of this policy as posted is January 27, 2006.
Use of Customer Information
Two primary types of information are gathered about our customers:
Financial Information is payment information used for or gathered during the buying/registration process and includes, but is not limited to, credit card numbers, financial institutions and expiration dates. This information is not used for any purpose other than that for which it is being provided to us, and is used for processing the transaction or to facilitate future transactions.
If you would like to opt out of communications you are receiving from Information Strategies, Inc. or from third parties that Information Strategies, Inc. believes may be of interest to you, please click the link that appears at the bottom of every message that we send. Your opt-out request will be implemented immediately. If at any time you desire to resume receiving such communications, please click the subscription signup links that appear on each of our websites. Please note that notwithstanding your opting-out, your subsequent request for information will be deemed an affirmative request by you to withdraw your prior opt-out and by submitting any such request for information you are agreeing to receive communications from Information Strategies, Inc. and selected third parties.
Cookie information is used only by Information Strategies, Inc. and our agents and is not provided to any other organization. It is used to provide relevant information to our visitors. It is also used for website and system administration, including research and development, user analysis and business decision-making.
We use industry-standard encryption technologies when transferring and receiving payment data. We have security measures in place in our physical facilities to protect against the loss, misuse or alteration of information that we have collected from or about you.
It has come to our attention that email messages have recently been distributed which have been marked as having been sent from members of our staff (e.g. from "firstname.lastname@example.org," "email@example.com," etc.). Many of these messages have in fact not been sent by our organization, and have rather been sent by other individuals in an illegal attempt to hide their identity by "spoofing" our organization's email addresses and corporate identity (see below for details).
Email misuse is a significant and growing problem, and we all suffer from its effects. We at Information Strategies hope to engage our customers and partners in a fight against the criminal misuse of email. What can we do? We hope that you'll find the following information helpful.
Prosecution of Email Abuse
The misuse of Internet email services is illegal and is punishable under federal and local laws, including the Lanham Act, the Computer Fraud and Abuse Act and the Economic Espionage Act, among others.
The courts have already recognized that such misuse causes economic harm and can adversely affect a company's reputation; judges have awarded affected companies sums in excess of the assessed damages and also the costs incurred during litigation.
What is "misuse"? The standards have been clearly laid down by the courts, and there are established legal precedents. In interstate commerce, designating goods and services in a way that is likely to cause confusion and to deceive consumers with regard to the origin, sponsorship, or approval of a company's goods or services is clearly illegal and is a form of fraud.
Information Strategies will not hesitate to bring legal action against any individual or corporation when there are grounds to believe that such individuals/companies are or have been deliberately and intentionally "spoofing," misrepresenting, impersonating, or in any way misappropriating any of Information Strategies' Internet domain names or other corporate identifications. Both criminal and civil redress will be sought; all suspected criminal misuse will be reported to the Federal Bureau of Investigation and the Federal Trade Commission.
Much of the malicious email that now permeates the Internet is generated by the "Klez" virus. This takes addresses from an email client on an infected computer and sends infected mail to everyone in that client's e-address book. The "from" address is randomly set to one of these addresses to deceive recipients that they know the sender's identity and that the message may therefore be safely opened. To avoid propagating this pernicious virus and to protect your own system, virus-protection software is absolutely essential.
Information Strategies, Inc. encourages all who receive email that appears to be impersonating an Information Strategies entity as its sender and contains unsolicited "spam" or malicious attachments, to notify the company immediately by contacting firstname.lastname@example.org. Be sure to identify yourself and to include the message and the header information.
For more information about address spoofing and other forms of email abuse, we recommend these links:
For information about the Klez virus and how to protect yourself against it, please visit:
Virus protection software:
We appreciate the attention you have given this matter and encourage you to contact us with any questions or concerns.
Information Strategies values and respects the privacy of all users of the Internet.