Moon River Pearls respects the privacy rights of our web site visitors. Using the latest advances in technology and security, we do everything possible to ensure a secure shopping experience. Our parent company, CCA Services LLC, is a computer consulting firm whose job it is to protect and secure e-commerce sites like this one. To that end, we employ multi-tiered solutions, including consumer education, web monitoring technology, sharing of fraud activity and fraud-fighting data with our peers, technology to prevent criminals from making online purchases with stolen information, human monitoring of suspicious orders, and numerous internal tests including firewalls, e-mail filters, system vulnerability tests, and manual security systems to help prevent fraud. Additionally:
• We do not sell, trade, give away or in any way share your e-mail address or personal information with anyone unless required to do so by law or court order.
• Upon written request, we will remove all of your personal information from our online systems, including our Internet-connected web and database servers. Although we have taken multiple measures to ensure that your personal information is secure, we want you to feel comfortable and will make every effort to do so. We automatically remove credit card details from our systems after order transactions are complete, leaving you safe, and making our systems less of a target for the bad guys.
• We are happy to take orders over the phone. Please call our toll-free
customer service line at (800) 405-2488 to order.
What is identity theft?
Simply put, identity theft is the term used to describe the theft of personal information, such as your name, address, social security number, city of birth, etc., which criminals then use to make unauthorized purchases, often via credit card. The theft can occur many ways: via telephone when thieves pose as employees of legitimate companies, via computer through e-mail scams or hacking, or in person when a thief simply reads the numbers off your credit card, ATM card, etc.
While consumers are rightfully concerned about the safety of shopping on the Internet, a new Better Business Bureau and Javelin Strategy & Research survey shows that only 12 percent of identity thefts are linked to computer use. According to the survey, most cases occur when a wallet or checkbook is lost or stolen or personal data is recorded by a service employee. Regardless of how thieves try to steal your information, there are steps you can take to protect yourself:
• Check your credit card statement and bank accounts frequently. Balance your checkbook monthly to ensure that you can readily spot discrepancies. Report suspicious activity immediately.
• Never give out information such as your bank account numbers, social security number, or credit card number over the phone or Internet, unless you are sure the company is reliable and you have initiated the contact.
• Destroy anything that has personal information on it before throwing it away. Shred credit card applications, bank statements, insurance forms, etc.
• Purchase items from secure web sites only. Look for a key or locked padlock symbol in your browser window.
• Never respond to e-mail requests or phone calls asking for personal or financial information.
• Choose passwords that a thief could not easily figure out. Combine letters and numbers, if possible. Do not use your children’s dates of birth, pet’s name, Social Security number, etc. Do not write passwords in locations accessible to thieves.
For more information on identity theft, visit http://www.consumer.gov/idtheft/.
What is phishing?
Phishing is the term used to describe thieves’ use of phony e-mails or web sites in an attempt to trick you into divulging personal information. Once they scam you into handing over personal data, thieves use the information to make unauthorized purchases. Phishers pose as legitimate brands and sites; sophisticated phishers can make phony e-mails and web sites look surprisingly authentic, tricking even savvy consumers into divulging sensitive information.
Take the following steps to protect yourself from a phishing attack:
• Be on alert when any e-mail requests your financial or personal information. Always confirm such requests with your financial institution. Legitimate banks, e-commerce sites and other companies do not typically request personal financial information via e-mail.
• Many spoof e-mails and web sites look legitimate, however, be on alert for these common phishing practices:
o a generic greeting (“Dear Customer;” “Dear Sir”)
o a fake sender’s address
o a false sense of urgency (stating that your account is in jeopardy and you must act immediately)
o misspellings or poor grammar
o pop-up boxes
o attachments (NEVER open!)
• Do not click on e-mail links to access a company’s web site. Instead, type in the company’s URL in your browser window. Clicking on a link could direct you to a phony web site that tries to collect your personal data or install spyware on your system, which allows a hacker to monitor your actions and steal passwords and credit card numbers that you type online, or cause you to download a computer virus.
• Do not fill out forms that ask for personal financial information on unsecured web sites. To ensure that a web site is secure, meaning you are connected under the cloak of Secure Socket Layer technology, check to see if there is a padlock or key along the bottom of your browser's window. If the lock is closed or if the key is unbroken, you are dealing with a secure site. Additionally, check your browser: the URL on a secure site will begin with “https” (the “s” stands for “secure”).
• Ensure your browser is current and all applicable security patches are installed and running. In the unfortunate instance that you are the victim of identity theft or a phishing scam, report it immediately.
• Call the ID Theft Clearinghouse toll free at 877-438-4338 to report the theft.
• Contact the fraud departments of each of the credit agencies.
o Equifax, www.equifax.com
o Experian, www.edperian.com
o TransUnion, www.transunion.com
• Contact your bank and credit card companies immediately to stop access to your accounts.
• File a police report in the jurisdiction where the theft took place.
Why does Moon River Pearls need my personal information?
We use your name, e-mail address, phone number, mailing address and credit card information to process your orders. We do not store credit card data.
What is your credit card fraud policy?
In the unlikely event that you experience unauthorized use of your credit card, promptly report the fraudulent activity to your credit card company. Under the Fair Credit Billing Act, you are only liable for the first $50 of the fraudulent charges. Please check with your credit card company to verify specific terms and conditions.
Will I receive e-mail from Moon River Pearls?
We only send information about our hot deals and specials to our customers who find it useful. You can opt-out of receiving future communications when you set up your account or by updating your account information. When you participate in a contest or survey, you also have the choice of opting out at that time.
How safe is it to shop online?
Today, the Internet is actually the safest way of doing business with your credit card. We have made it safer to use your credit card on our site than it is to use it in more traditional ways, such as in retail stores or restaurants.
What is SSL and how does it protect my privacy?
We use Secure Socket Layer (SSL) technology for mutual authentication, data encryption and data integrity—all to ensure secure transactions for our customers. SSL is the industry standard security protocol to encode sensitive information, such as your credit card number. SSL creates a shared digital key, which only lets the sender and the receiver of the transmission scramble or unscramble information. To everyone else, even the servers relaying the message, the SSL transmission is indecipherable. SSL encryption can only be broken by intercepting the encrypted message, recording it, and using a computer to try every possible combination until the key is cracked. Most keys range from 40 to 1,024 digits long...as you can imagine, the number of possible combinations can be into the billions and beyond!
What about encryption?
Encryption is based on the mathematical scrambling and unscrambling of messages. The type of encryption we use assigns two keys—one public and one private. When you send us a message, you use our public key to encrypt your message. Once we receive your encrypted message, we use the private key to decode it. The same key cannot both encrypt and decrypt information. So, information encrypted using the private key can only be decrypted using the public key, and vice versa—thus ensuring the security of your information.
I’ve heard a lot about Secure Sites. What does that mean?
Before completing any transaction on a website, you should make sure it is a Secure Site. Being on a Secure Site means you are connected under the cloak of SSL security. You can tell if you are on a Secure Site if you see a padlock or key somewhere along the bottom of your browser's window. If the lock is closed or if the key is unbroken, you are dealing with a Secure Site.
What are cookies and how do they affect my privacy?