Data and Content Powered by Information Strategies, Inc.

Travel for Small Businesses - Information Strategies, Inc. - Small Business Digest Information

Privacy Policy

The effective date of this policy as posted is January 27, 2006.

Information Strategies, Inc. respects the personally identifying information provided by our customers. Because we gather certain types of information when our customers communicate with us, we believe you should fully understand the terms and conditions surrounding the information we capture through our websites and the use of that information. This Privacy Policy discloses the type of information we capture about our customers, how we use it to communicate with our customers and how you can request to no longer receive communications from Information Strategies, Inc. This Privacy Policy applies only to information we collect through our websites.

Use of Customer Information

Two primary types of information are gathered about our customers:

Financial Information is payment information used for or gathered during the buying/registration process and includes, but is not limited to, credit card numbers, financial institutions and expiration dates. This information is not used for any purpose other than that for which it is being provided to us, and is used for processing the transaction or to facilitate future transactions.

Professional/Personal Information includes, but is not limited to, name, address, company name, company address, phone number, fax number and email address, as well as other information such as general demographic information and questions answered on survey or registration forms. For purposes of this Privacy Policy, “Personally Identifying Information” means name, address, phone number, fax number and email address. Data captured during a customer’s visit to an Information Strategies, Inc. website may also be stored in our customer database. Professional/personal information may be used to fulfill requested transactions (such as purchases or requests for newsletters or other information), maintain records and for marketing purposes and may be shared with other organizations or Information Strategies, Inc. customers for the purpose of facilitating business relationships that Information Strategies, Inc. believes may be of interest to our users.

Opting Out

If you would like to opt out of communications you are receiving from Information Strategies, Inc. or from third parties that Information Strategies, Inc. believes may be of interest to you, please click the link that appears at the bottom of every message that we send. Your opt-out request will be implemented immediately. If at any time you desire to resume receiving such communications, please click the subscription signup links that appear on each of our websites. Please note that notwithstanding your opting-out, your subsequent request for information will be deemed an affirmative request by you to withdraw your prior opt-out and by submitting any such request for information you are agreeing to receive communications from Information Strategies, Inc. and selected third parties.

Cookies

Note: as a standard policy, Information Strategies, Inc. does not use cookies.

A "cookie" is a bit of data sent by a website through the browser to the computer of the user visiting the site, and enables the site to return the results the browser expects. Information Strategies, Inc.'s websites may occasionally use cookies to ensure visits to its websites are smooth and customized for the visitor. Such cookies allow us to provide a visitor's browser with information tailored to the visitor's preferences and needs. We also use permanent or persistent cookies that remain on a visitor's computer after the visitor leaves Information Strategies' websites. However, our cookies neither reveal nor contain any Personally Identifying Information. If you do not want your browser to accept cookies, you can turn off the cookie acceptance option in the browser's settings. However, disabling the cookie support function of the browser will prevent our website from functioning properly and you may not be able to utilize fully all of the site's features and information.

Cookie information is used only by Information Strategies, Inc. and our agents and is not provided to any other organization. It is used to provide relevant information to our visitors. It is also used for website and system administration, including research and development, user analysis and business decision-making.

Security

We use industry-standard encryption technologies when transferring and receiving payment data. We have security measures in place in our physical facilities to protect against the loss, misuse or alteration of information that we have collected from or about you.

This Privacy Policy does not apply to third-party websites (including those that may advertise, or from which links may be found, on these websites) and the information contained therein. You are strongly encouraged to read the privacy policy of any third party site before providing any information on such site.

Email Abuse

It has come to our attention that email messages have recently been distributed which have been marked as having been sent from members of our staff (e.g. from "executive-editor@managingyourhr.com," "andy@managingyourhr.com," etc.). Many of these messages have in fact not been sent by our organization, and have rather been sent by other individuals in an illegal attempt to hide their identity by "spoofing" our organization's email addresses and corporate identity (see below for details).

Email misuse is a significant and growing problem, and we all suffer from its effects. We at Information Strategies hope to engage our customers and partners in a fight against the criminal misuse of email. What can we do? We hope that you'll find the following information helpful.

Prosecution of Email Abuse

The misuse of Internet email services is illegal and is punishable under federal and local laws, including the Lanham Act, the Computer Fraud and Abuse Act and the Economic Espionage Act, among others.

The courts have already recognized that such misuse causes economic harm and can adversely affect a company's reputation; judges have awarded affected companies sums in excess of the assessed damages and also the costs incurred during litigation.

What is "misuse"? The standards have been clearly laid down by the courts, and there are established legal precedents. In interstate commerce, designating goods and services in a way that is likely to cause confusion and to deceive consumers with regard to the origin, sponsorship, or approval of a company's goods or services is clearly illegal and is a form of fraud.

Information Strategies will not hesitate to bring legal action against any individual or corporation when there are grounds to believe that such individuals/companies are or have been deliberately and intentionally "spoofing," misrepresenting, impersonating, or in any way misappropriating any of Information Strategies' Internet domain names or other corporate identifications. Both criminal and civil redress will be sought; all suspected criminal misuse will be reported to the Federal Bureau of Investigation and the Federal Trade Commission.

Klez Virus

Much of the malicious email that now permeates the Internet is generated by the "Klez" virus. This takes addresses from an email client on an infected computer and sends infected mail to everyone in that client's e-address book. The "from" address is randomly set to one of these addresses to deceive recipients that they know the sender's identity and that the message may therefore be safely opened. To avoid propagating this pernicious virus and to protect your own system, virus-protection software is absolutely essential.

Contact Us

Information Strategies, Inc. encourages all who receive email that appears to be impersonating an Information Strategies entity as its sender and contains unsolicited "spam" or malicious attachments, to notify the company immediately by contacting customerservice@is-incorp.com. Be sure to identify yourself and to include the message and the header information.

Links

For more information about address spoofing and other forms of email abuse, we recommend these links:

http://www.cert.org/tech_tips/email_spoofing.html

http://www.computerbits.com/archive/2002/0600/
bridges0206.html


For information about the Klez virus and how to protect yourself against it, please visit:

http://securityresponse.symantec.com/avcenter/venc/
data/w32.klez.h@mm.html


Virus protection software:

Norton: http://www.symantec.com/

McAfee: http://www.mcafee.com/

We appreciate the attention you have given this matter and encourage you to contact us with any questions or concerns.

Information Strategies values and respects the privacy of all users of the Internet.




Home  |  Cruises  |  Airways  |  Hotels  |  Vacations  |  Destinations  |  Health  |  Wine  |  Hints

Free Subscription  |  Contact Us  |  Who We Are  |  Media Kit  |  Privacy Policy

© 2012
All material contained on this site is copyrighted by Information Strategies, Inc.,
P.O. Box 563, Palisades Park, NJ 07650, customerservice@travelforsmallbiz.com


This website is devoted to home-based, small office businesses. Created especially for the SOHO marketplace, it offers small business, home-based businesses a plethora of information, data, ideas and suggestions on improving the bottom line while reducing exposure to fraud, regulatory impositions, and neighborhood censure. This website will review technology for small businesses, tax programs for small, home-based businesses, associations for small businesses and home-based businesses, while providing new ways of gaining sales advantages for home-based businesses and opportunities for home-based businesses. It will also chronicle the available distribution services for home-based, small office businesses while looking at mailing and other available services.