We are always responsible for your security. It is not harmful to use this website on your Mobile phone,Computer or Laptop. We are responsible for not collecting anything about your personal information. We may not display your contact details to the public without your permission. So your online jurney is very safe with us.
Confidentiality and Security
· The security and confidentiality of your Personal Information is important to us and IEIL has invested significant resources to protect the safekeeping and confidentiality of your personal data. When using external service providers acting as processors, we require that they adhere to the same standards as IEIL does. Regardless of where your Personal Information is transferred or stored, we take all steps reasonably necessary to ensure that personal data is kept secure.
· We seek to ensure compliance with the requirements of the Information Technology Act, 2000 and Rules made there under to ensure the protection and preservation of your privacy. We have physical, electronic, and procedural safeguards that comply with the laws prevalent in India to protect your Personal Information. By accepting the terms of this Privacy Policy, you agree that the standards and practices being implemented by us, are reasonable and sufficient for the protection of your Personal Information.
Social media
IEIL operates channels, pages and accounts on some social media sites to inform, assist and engage with customers. IEIL monitors and records comments and posts made on these channels about itself in order to improve its products and services.
Please note that you must not communicate the following information to IEIL through such social media sites:
sensitive personal data including
(i) special categories of personal data meaning any information revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, and the processing of genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health or data concerning a natural person's sex life or sexual orientation and
(ii) other sensitive personal data such as criminal convictions and offences and national identification number ;
· Excessive, inappropriate, offensive or defamatory content.
IEIL is not responsible for any information posted on those sites other than the information posted by its employees on its behalf. IEIL is only responsible for its own use of the Personal Information received through such sites.
Online Safety
We believe our customers deserve peace of mind. www.trinayani.co.in undertakes every possible method necessary to ensure a secure environment within which members can look for a potential partner. We use an advanced fraud prevention system and routine member checks to provide the highest level of internet protection possible on a consultancy service. So now enjoy your safe online jurney.
1.Identity Theft
(A) Identity Theft Warning Signs
• Unusual activity on your credit report
• Missing bills and statements
• Emails or texts asking for sensitive information
• Calls from creditors about accounts you never opened or loans you never applied for
Thousands of men and women meet online every day and while online service has expanded the various online service universe like never before; a few bad guys fly under the radar and attempt to scam innocent people. While scams asking for money are more common in online service, it is important to be aware of other equally important fraudulent practices such as identity theft.
2.What is Identity Theft?
To put it simply, when someone steals or attempts to steal your identity it is known as identity theft. Identity thieves use the victim's personal information and details to fraudulently pose as the victim, usually for financial benefits.
3.How do thieves steal identity?
The identity thief uses the victim's identity for personal gain and this leads to identity fraud. They make use of personal information such as bank account details, social security or tax file numbers, credit card details or any other financial account information for their personal benefit. They can get hold of this information through various online and offline methods.
· Phishing – They send emails or pop-up messages, pretending to be your financial institution to get you to reveal your personal details.
· Pretending – Once they obtain your personal email address or phone number, again they pretend to be your financial institution to get a hold of your information.
· Changing Your Address – If they know your home address, they can change the address and divert your bills and bank statements to a different address.
In the offline world, some identity thieves resort to literally stealing your information.
· Stealing – They steal wallets, credit cards, mail from mail boxes, pre-approved credit offers etc. At the corporate level, they even target companies and steal personnel information from their databases.
· Dumpster Diving – They rummage through the rubbish to look for identifying information or bills they can use.
4.Staying Safe
Don't become a victim of identity fraud; take these steps to prevent it from happening to you while you're online service.
• Do not post or share any personal information and details with anyone, no matter how safe you think it might be. Bank account details, a credit card number or a social security or tax file number is often all a thief needs for fraud.
• If you are talking to someone on the phone, get to know them before you give them your cell phone number. Identity thieves have been known to use home and work phone numbers in reverse phone directories to reveal addresses etc so it’s probably best you get to know someone a little before you share your contact details with them.
• Keep a log of your chat or IM sessions wherever possible, just in case you need it in the future.
• Do not entertain any requests to cash a cashiers check as these checks are usually fake and as a victim you not only lose your money but could also reveal sensitive personal information to the scammer.
• Monitor your credit reports regularly to ensure there has been no unusual activity on your account. You can also freeze your report so credit issuers can only access your report when you give them permission to do so.
• If you receive emails, text messages or phone calls asking you for sensitive information, make sure you double check with the bank or financial institution as they will usually not ask for sensitive information over the phone.
• Use a locked mail box so your mail cannot be stolen and make sure you shred paper before you throw it in the garbage.
5.Geting help
Sensitive information in the hands of a thief can lead to several kinds of identity fraud – credit card, bank and finance, government documents (getting a driver's license in the victim's name; using social security number), getting a job pretending to be the victim, renting services etc. Obviously an imposter is bad news and if you think you are a victim of identity theft/ fraud, you must get help immediately.
· File a police report.
· Immediately notify creditors.
· Dispute unauthorized transactions and doing so will help restore your name and credit report.
· Set up a fraud alert on your credit report to prevent the thief from opening further accounts
· Close the accounts that have been tampered with
In addition, take a look at the links below for detailed information about identity theft and fraud.
6.More information
· The US Federal Trade Commission’s Identity Theft site
· The National identity theft information and help website for the UK.
· Guide for Identity Theft Victims
7.Identity theft & froud legislation
· US Info - Identity Theft and Assumption Deterrence Act 2003 -
· UK Info – Personal data protected by Data Protection 1998
Protection against fraud by Fraud Act 2006
· Canada Info – Section 403 of the Criminal Code of Canada discusses fraud. Each province and territory also has its own privacy law for use and storage of personal data.
· Australia Info – At the federal level, the Criminal Code Amendment (Theft, Fraud, Bribery & Related Offences) Act 2000 discusses fraud. Each individual state and territory also has its own privacy laws.
Getting started
Our site allows you to remain anonymous to other users until you feel ready to provide contact information to other users.
Never include your personal contact information in your profile, especially telephone numbers, email, home address or your last name.
Only provide your contact information to another user when your instincts tell you this is someone you can trust.
Set up an email account just for online Service. This makes it easy to quarantine any unwanted mail.
Keep your passwords confidential and make sure they are not easy to guess. Choose a unique password for online Service that you use nowhere else.
Avoiding Problems
Ask a lot of questions when communicating and be alert for inconsistencies or requests for money. Make notes if you are suspicious of anything.
If you are suspicious of a person or if someone asks you for money, use common sense and then report the situation to us by using the "Report Abuse" icon located on the member's profile or by using the online support request form.
We do not validate the identity of our members or the information that they submit on their profiles. Although we take steps to eliminate any suspect members, it is not possible to be 100% sure that all members will be honest and truthful in their dealings with other members. Be alert and use common sense when communicating with other members.
Never send money to anyone who you met online, but have not yet met in person.
Internet Safety
The internet is probably the best place to find information and get help for a DV victim. However, your internet activity can be monitored and it doesn’t require much expertise to do so. So if you share a computer with the abuser and are unsure about whether you are being monitored, you are probably better off accessing information on a computer the abuser does not have access to. Your other option is to call a hotline and speak to someone rather than browsing the internet for information.
Simply deleting your internet history is not enough protection. If your abuser is clever enough, deleted internet history can also be accessed. Email too can be intercepted or monitored if you do not take the necessary precautions so it is vital that you are very careful when using the internet. The Women’s Law website provides comprehensive information on internet security for DV victims. Read through it so you are aware of the steps you should take to ensure your abuser is not privy to your internet browsing information.
Restraining / Protective Orders
As a victim of DV, if you leave your abuser, many countries offer you the option of filing a restraining order so you can feel safe knowing your abuser is legally entitled to stay away from you. Breaching the order will result in him being arrested. A restraining order is also described as a protective order in some places.
While the exact provisions of the law may differ from place to place; in general, when you file for a restraining order, the court orders your abuser to stay away from you and this can even include banning them from making any contact with you.
Child Safety & Custody
One of the main concerns for a DV victim is often there is a child involved and they want to ensure the child’s safety should the victim leave the abuser. Leaving the abuser also raises the issue of child custody and who would be granted custody in the case of such a separation. This is a complicated situation and the best thing for you to do is to get in touch with an experienced lawyer who can help. If you are unable to access a lawyer, call your local DV hotline and they can guide you about what you should do.
The Family Violence Prevention Fund has a few articles you might like to read that concern children who have been exposed to domestic violence.
The Women’s Law website has some basic information on child custody and addresses some common concerns victims may have about the custody of their child.
Computer Security
Before you start online jurney, ensure your computer is 100% secure and does not put you and your information at risk. Read our Computer Security tips for more details on how to keep your details secure.
1.Secure Your Computer
• Use an anti virus program and firewall
• Update your computer
• Use secure wireless networks
• Create strong passwords
Before you go online and start looking for dates, it is absolutely essential that you ensure the computer you use is 100% safe and is not vulnerable to hackers or virus attacks. You should also take all the necessary precautions (especially if you’re on a public computer) to make sure no one else uses your online dating account. It is important to ensure no one but you has access to your online dating profile as email addresses and passwords in the hands of the wrong person could even result in identity theft. Follow some of these tips to ensure your computer is secure and less vulnerable to security threats.
2.Anti Virus and Firewall
Using a computer without an anti virus is like living in a house with no locks – it is unsafe. If your computer does not have an anti virus installed, before you start your online services experience, it would be best to invest in a reputable anti virus product. A good anti virus software will protect your computer from all sorts of security threats including but not limited to virus attacks and spyware which could otherwise cripple your computer. In addition you must also ensure your computer is protected by a firewall. Your firewall could be in the form of a hardware device or a software and works by blocking remote access to your computer. In the absence of a firewall, malicious users may attempt to break into your system while you are online.
Every computer has a unique identifying IP address which allows it to exchange information with other computers over the internet. Unfortunately it is fairly easy for hackers to identify your IP address and connect to your computer if you are not careful. If your computer is poorly protected, a smart hacker can easily access your computer and all the files you have saved on it making you an easy victim of identity theft.
3.Computer Updates
The operating system you use on your computer must be regularly updated or your computer will not be equipped to handle the latest threats. For example, if you use a Windows Operating System, the updates are a way to protect your computer from any security loopholes that may have been discovered since you installed Windows. Set your computer to check for updates automatically, ensuring you are well protected . If your computer prompts you to install any updates, go ahead because your computer needs to keep up!
4.Secure Wireless Network
Is your computer connected to the internet via a wireless network? If yes, you need to be doubly sure you are well protected. Most Internet Service Providers will provide you with a secure wireless connection and a login and password only you are aware of. However if you have set up your wireless network by yourself, you need to ensure it is 100% protected. An unprotected wireless network is an open invitation for others to not only use your internet services but also, once again gives others easy remote access to your computer and everything you have saved on it.
RESOURCES:
• PCStats’ Ten Steps To A Secure PC is a comprehensive resource if you are interested in understanding computer security issues better.
• Microsoft’s Consumer Online Safety Education website provides information on a wide range of online safety issues.
Password security
Choosing a good password is essential. An easily compromised password could result in your account being hijacked and worse still, the hacker could use your details for ID theft as well. Take note of our Password Security tips to ensure you choose a good, well thought out password for your accounts.
1.Strong Passwords
The importance of good passwords cannot be stressed enough. Secure the administrator account on your PC with a strong password and ensure that all other user accounts on the computer also have passwords. If you need more help choosing a good password, read our Password Security Tips for some useful information.
A password protected administrator account prevents potential intruders from accessing your computer Also if you do use a shared computer, a password protected user account on your computer will ensure complete privacy and ensure others cannot access your files or your online service account.
Most of these security measures are pretty basic and you do not need to be an IT genius to make these changes. However if you are unsure about the level of your computer's security go ahead and speak to someone who understands these things better. A secure computer is important, not just for online dating but for safe and secure web browsing in general.
2.Password Security
Password Quick Tips
• Passwords for each account should be unique
• Passwords should be hard to guess for hackers
• Don’t share your password with anyone
• Names and common dictionary words make bad passwords
Choosing the right password for your online service profile is very important. Sometimes a scammer will not try to scam you off money but may instead hack into your online profile and use it to scam other members. If your online service profile is hacked into, the scammer can not only use your identity on the online service site but may also use your details for identity fraud.
3.Common Password
Following is a list of the most commonly used passwords, according to Dark Reading.
• The highest percentage of passwords are a person’s first name. This could be their own first name, their spouse’s, their children’s or even a movie or a sports star’s name.
• Patterns on the keyboard are the second most popular passwords. These could be “1234”; “abcd”; “qwerty”; “asdf”; “1qaz2wsx”; “1q2w3e” etc.
• Pop culture references from TV, movies, music etc are popular passwords. “ironman”; “blink182”; “starwars”; “hannah” etc are some examples.
• “Password” or variations of the word is not such a clever password because it is fairly common. Popular variations are “passwordz”; “passw0rd”; “passwd”; “password1” and even “drowssap” (password spelt backwards).
• Referencing things that are nearby is also fairly common. “Samsung” is a popular password, probably because the make of the monitor the person is looking at. Similarly, “dell”; “packard”; “apple”; “pavilion”; “compaq” are common ones too.
• Emotional words and phrases are common with passwords with the F-word being the most popular. “iloveyou” and “ihateyou” are fairly common too.
• “Idontcare”; “whatever”; “blahblah” and “whocares” are very common passwords.
4.Choosing a Good Password
Steer clear of passwords that follow the patterns mentioned above. In addition, follow some of these tips to choose a good password.
• Do not use the same password for every website. If one site is compromised, all your other accounts will be compromised as well.
• Make sure the passwords are different for your online service account and your email account and both passwords should be equally strong.
• Do not use dictionary words as hackers will use electronic dictionaries to figure out passwords and they try every word until they get the right one.
• Create a password using a combination of alpha-numeric characters and make it something that the hacker cannot easily identify with your identity.
• Use both upper and lower case characters.
• Use the entire keyboard as patterns are much easier to figure out if you use just one section of the keyboard.
• Make your own acronym. Think of a sentence that is easy to remember, such as “My mum is 52 years old” and your password could be “MMI52Y0” or any other variation that is easy for you to remember.
• Do not use a password that is mentioned as an example of a good password on websites/books.
• Use a password that is easy to type so that even if someone is looking over your shoulder, they cannot guess your password by simply looking at your keyboard.
• If you must write down your password, make sure you write your username and password in different places.
Tip: Never give out your password to anyone. There is no reason for anyone but you to know the password to your online service account or email address. Scammers often use emotional blackmail to get their hands on your password, so don’t fall for it.
Last but not the least; the most important thing to remember about passwords is that you must change them regularly for maximum security. Find more detailed information in the Security Guide written for Red Hat Linux.
5.Getting Help
If your account has been hacked into and your details compromised, get in touch with the service company immediately. They will verify your identity and close your profile or at least make it inaccessible to the hacker. If you use the same password for any other accounts on other websites, change them immediately.
If you feel you are the victim of identity theft as a result of your password being compromised, read more here.
Resources:
• Microsoft Online Safety is a good place to check the strength of your password.
• The Pennsylvania Virtual Charter School gives detailed, step by step instructions on how to create a secure password.
• Article by Robert Graham on Dark Reading about the most commonly used passwords.
• Don’t trust yourself to choose a good password? Maybe try using a random password generator?
• There are several password management softwares available that will store all your passwords, credit card details etc in one place. But again, tread with caution.
Email Security
Set up a new email account for online jurney that will be separate from all personal and work accounts. That way you'll keep track of online dating communication and be able to easily isolate any unwanted or inappropriate content. Make sure your real name isn't included in your email address and check that any signatures are switched off for maximum Email Security.
1.Secure Email Tips
• Create a separate email ID
• Choose a strong password
• Know your security questions
• Don't include information on your profile
• Never give out your password
Email addresses are very personal and you should guard your details just the same way you would guard your home address or telephone number. Before you get started on the online service process, it is not only important to ensure the security of your computer but it is also vital that you use a safe and secure email address. Also, email addresses can be very handy for scammers so understanding email security is essential.
2.Separate Email
During the online service process, you will be interacting with a number of people and your email address will be your primary form of communication. It is a good idea to set up a brand new email address without using your real name so your identity is not easily identifiable by possible scammers on the website. This way if you ever want to stop communicating with someone online, they will not be able to harass you as your identity will remain a secret.
3.Password Security
The security of your email address is primarily dependent on the strength of your password so choose your password wisely. Read our Password Security Tips if you need help choosing a good password. Without adequate password protection, a scammer may even steal your email address and get access to other information you may have stored in your inbox. Another important tip to keep in mind is that you should probably have different passwords for your email address and your online service account. In case one of the accounts is compromised, the other account will still remain safe if it has a different password.
4.Security Questions
To ensure your inbox is well protected, most email providers like Hotmail or Yahoo! will ask you to choose one or two security questions when you set up your email address. These security questions are designed to help you reset your password if you should ever forget it. Common security questions include:
· What is your pet's name?
· What is your date of birth?
· What was the make of your first car?
· What city were you born in?
· What is your mother's maiden name?
· What are your children's nicknames?
· Who is your favorite author?
· Best childhood friend?
· Favorite teacher?
· Favorite historical person?
· Grandfather’s occupation?
· Choose your own security question...
Make yourself familiar with the security questions you attach to your email account. Obviously, like your password your security question should be something you find easy to remember but others will have a hard time guessing. While the standard security questions are fairly straightforward, if someone knows you well enough, they may be able to guess the answers to your security questions as well. If a third person is able to figure out your security questions, they can not only reset your password but can also hijack your account. Additionally, this could also result in identity theft as the hacker could potential gain access to a variety of personal information from your inbox. The best thing to do is choose your own security question which should ideally be something only you would know the answer to, therefore making it hard for a hacker to hijack your account.
Profile Information
When creating your online service profile, it is important to keep certain security concerns in mind. Always be mindful of what your security questions are and be sure never to include that information in your profile. So, if your security question asks for your pet's name, remember not to put your pet's name in your online service profile for all to see – you will only be making it easier for the hacker.
1.Creating A Safe Profile
• Use an appropriate username
• Choose a good password
• Online ID Theft
• Keep details to a minimum
• Never divulge information
While many of us may know how to create an interesting online service profile, some of us may get a little carried away and reveal more information than necessary. An online service profile should be interesting and inviting however, it should not be a way for potential fraudsters to easily get detailed information about you. When you are creating your online service profile, remember to keep your safety in mind too.
2.Use an Appropriate Username
Everyone wants an eye-catching username, but exactly whose eye are you catching? A flirty username such as "sexykitten69" might only attract the attention of people looking for short term relationships, just as "marryme" will attract those looking for long-term commitment. When choosing a username be aware of any loaded meanings it may have.
Also, it is imperative that you do not divulge your real name (especially your last name) in your profile. Giving away your name on a public forum sets you up as an easy target for scams, ID theft and other online fraud.
3.Password Protection
As always, a good password is essential for your online service account. A scammer should not be able to easily guess your password or they may even hijack your profile. Keep our Password Security Tips in mind and choose a password that is easy for you to remember yet hard for others to guess.
4.Online ID Theft
The importance of a good password cannot be stressed enough because a compromised account can not only put you at risk but can place your contacts at risk too. Very often scammers gain access to a person's online service account or even their Facebook account and take advantage of their friends by pretending to be the account holder. So a scammer could log into your account and get in touch with your friends on Facebook or even someone you've been interacting with on an online service site and scam them off money. So the scammer (pretending to be you) gets in touch with your contacts and tells them you are stuck in some sort of emergency. Your friends are unlikely to realize it's a scammer and in their attempt to help you, they will have been robbed off their money by a scammer. This sometimes happens with email accounts as well, so keep your details secure and use a strong password on all your accounts.
5.Keep Personal Details Personal
An online service profile is designed for you to attract a potential partner. However, this does not mean you need to reveal your personal details on your profile. Most online service services will probably disallow it anyway if you try to give away your contact details on your profile. But, you should not reveal other details like where you work or even what gym you go to on your profile. This information has the potential of being used against you
6.Giving Away Too Much
In addition to keeping your personal details closely guarded, you should also review your profile for any other information that might reveal too many details. For example, don't discuss your dog on your profile if your email security question is about your dog. Be sensible about the information you reveal on your profile.
Put some thought into your online service profile because it is the first impression other singles on the site will have of you. However, at all times remember to keep your personal details secure.
Keep Things Secret
Keeping your details secret is absolutely vital because fraudsters can use even a little bit of information about you to their advantage. While it is common sense not to give out your password to anyone, many of us don't think before answering other questions someone might ask us online. Be fully aware of what your security questions are and never divulge that information to anyone.
Scammers and hackers are becoming smarter and they often identify your security questions first following which they strike up a conversation with you online, gradually weaving in the security questions into a normal conversation. For example, your security question may be about the make of your first car. So a scammer might start a conversation about cars and even tell you about their first car in an attempt to get you to reveal the same information to them. Obviously this seems harmless but once you have revealed this information, your email address is immediately compromised.
Keeping your email secure is not rocket science. Just remember not to divulge your personal details to anyone, however innocent the question may seem and you will have no trouble.
Choosing A Reputable Online Service
A reputable and reliable Online service will provide you with additional safety and security. Do your research and choose a Online service that not only meets your needs but provides you with a certain amount of peace of mind as well.
1.Online Service Tips
• Confidentiality
• Database size
• Research online reputation
• Choose a special interest service
• Check for contact details
With thousands of online service sites available, spend some time researching your options to find the best online service for your safety, security and success. Carefully consider the following areas of importance:
2.Confidentiality
Be sure your personal details will not be visible or passed on to third parties. Read each online service site's privacy statement and forget any online service that does not have a declaration about how your personal information will be handled.
3.Database Size
Being part of a large member database will greatly increase your chances of meeting that one special person using online service. For example a online service with millions of members gives you a better chance of finding a date or a partner than a website with only a few hundred members.
4.Online Repute
Thanks to the internet and Google, it is easy to gain a vast amount of information about almost anything. If you are interested in a particular online service, it might be a good idea to Google it to see what other users may have to say about the services. For example, you may be interested in Chinese online service but would like a little more information before you sign up with any dating service. A quick Google search will often reveal information and reviews about the site that will help you make a decision.
5.Contact Details
An ethical and well reputed company will list its contact details on its website in case customers need to contact them. If a company provides a physical address in addition to its phone numbers, it is always a good sign.
There is no fool proof way to ensure one site is more reliable than another but following some of these tips will definitely be helpful in eliminating some of the dodgy websites.
Honesty Really is the Best Policy
When wanting to portray the best possible image of yourself it’s tempting to change a few personal details such as height and weight. However it’s important to remember that while online daters will be interested in your appearance hardly anyone is looking for the next Kate Moss or Brad Pitt. The vast majority of people use online services to find someone with similar interests and attitudes so don’t feel the need to ‘tweak’ information about your age, height, weight or occupation. Telling little white lies will only be detrimental in the long run by making you feel uncomfortable about getting to know someone or meeting them in person.
What Are You Looking For?
Be clear and confident when describing what you're looking for in a partner. The millions of people using online service services all want to meet someone but don't want to waste their time or yours. If you're looking for particular attributes such as ethnicity, religious persuasion or an interest in sports then say so! To maximize your chances of finding that special someone through online service make sure they know you're looking for them!
Other Precautions
Once you have joined a online service site, it is important to continue to keep your details secure because the search has only just started. Read our Dating Service Tips for more details on how to stay safe when dating online.
Good luck and we hope you find your partner soon!