What is Phishing?
Phishing (pronounced ‘fishing’) is the name given to the illegal practice of sending emails that appear to come from a genuine company but are actually sent by a fraudster in an attempt to trick you into disclosing information about yourself. These emails usually ask you to update or verify your customer account information by clicking on a link that takes you to a bogus website where you are asked to enter for example your account number and password or other sensitive information. This information is then used for fraudulent purposes.
What is Malware?
Malware is an abbreviation for "malicious software" and is a term used to describe hostile, intrusive or annoying software that is installed on your computer without your consent and often without you realising it.
What are Trojans?
A Trojan horse or Trojan is software that you may have been tricked into loading and running on your computer. Often, Trojan software is used to display unwanted advertisements or uncontrollable pop-ups on your computer; however other Trojan software is more harmful and permits unauthorized remote access to your computer without your knowledge. Trojan software might also be used to record keystrokes that you enter on your keyboard e.g. account names and passwords and to send this over the internet to a fraudster. More detailed advice on how to protect your computer may be found at www.getsafeonline.org.
Is my data valuable?
All data is valuable but, in isolation, individual items of data are not generally valuable in their own right. The concern is that there is no way of knowing how many attacks there are globally. Criminals will obtain millions of different data items from a wide range of sources and are eventually able to run these together to assemble useable profiles for a very small number of individuals. To these criminals, this information becomes very valuable indeed and it is these individuals who are at most risk from identity theft and financial crime. Owing to the nature of such crimes, it is generally not possible to apportion blame for a crime against an individual to a specific incident or security breach.
I use my credit card / debit card to pay for my purchases. Should I be concerned?
No. You can be assured that we have robust systems in place to prevent unauthorised access. Because we comply with the Payment Card Industry’s guidelines, you are also protected no matter which method you use to place your order. Do I ever need to change the password for my online account?
It is good practice to change your password regularly. Don’t use the same password for anything else, and don’t share it with anybody.
What should I do if I get an email that looks as it should but appears suspicious or asks me for personal information?
We will never ask for your personal or financial details by e-mail. You should not respond to something claiming to be from us and asking for such details.
If I think someone has obtained my information, what should I do?
If you are contacted by someone asking for further personal details, financial details, banking details or credit card details (or asking you to verify such details) you should not respond. Always follow the good practice described here, or visit www.getsafeonline.org
How can I stop emails from you go into "spam"?
Different standards apply depending on which anti-spam software you are using. You should check your spam filter settings. How you change these settings depends on the software you are using. You should check your documentation or consult your email service provider. Please be advised that most widely-available anti-virus software contains spam filters.
Where can I go to get advice?
Please read the information on our website. Alternatively, www.getsafeonline.org is a government –funded website which is packed with practical advice on what to look out for and the steps you should take to protect yourself."
Shopping with Pi-Jama is safe.
We will make searches about you at Credit Reference Agencies who will supply us with credit information, as well as information from the Electoral Register. The agencies will record details of the search whether or not credit is granted. We may use credit-scoring methods to assess your application and to verify your identity. Credit searches and other information which is provided to us and/or the Credit Reference Agencies, about you and those with whom you are financially linked may be used by us and other companies if credit decisions are made about you or other members of your household. This information may also be used for debt tracing and the prevention of money laundering as well as the management of your account. Information held about you by the Credit Reference Agencies may already be linked to records relating to people with whom you are linked financially. For the purposes of credit searching you may be treated as financially linked and you will be assessed with reference to any ‘associated’ records.
If we enter a credit agreement with you we will also supply details of your agreement with us to the Credit Reference Agencies, as well as ongoing details of your account and how you manage it. If you do not repay on time or in full we will tell the Credit Reference Agencies who will record details of the debt. All this information will be seen by other organisations carrying out later searches.
You have the right of access to your personal records held by Credit and Fraud Prevention Agencies. We will supply their names and addresses upon request. We, the Credit Reference Agencies and Fraud Prevention Agencies may also use the records for statistical analysis about credit, insurance and fraud. We may make periodic searches of Group records,
Credit Reference and Fraud Prevention Agencies to manage your account with us, to take decisions regarding credit, including whether to make credit available or to continue or extend existing credit.
These searches will not be available to other lenders for credit assessment purposes.
We may transfer your personal information outside the European Economic Area including to countries whose laws may provide a different level of protection of personal information to the TR or USA.
We will seek to employ appropriate measures to protect your personal information where this is the case. By ordering from us you are consenting to us sharing your information with other organisations and to us or them contacting you for the marketing purposes by mail, telephone, e-mail or otherwise. If you do not wish to be contacted by us by telephone for marketing purposes, or if you do not wish to be contacted by other organisations for marketing purposes, please tell us. In addition we may share your personal information with our service providers, with law enforcement and government agencies, regulatory bodies, pursuant to court orders, and with purchasers of our business including any part of our business.
Cookies are electronic tags which can be used to recognise you and tailor the site to your preferences. We use them to enable us to analyse the performance of the site, and improve the service we offer you. We also use them to collect any information about you and your shopping habits that are relevant to the creation and maintenance of your Personal Account, or helpful to the smooth running of our website. For more information please click here
- Your credit history,
- The credit histories of any people you are financially linked to
- Your purchasing habits with us
- To verify your identity and that you are least 18 years of age (we cannot sell any goods to you if you are below 18 years of age.
We will use your information in the following ways:
When you open an account with us we will need to check your credit history and store the search on file. We will re-run checks each time you apply for, or we offer you further credit.
We may contact you with promotions we think might interest you, either by mail, telephone, SMS (text) or email.
We randomly monitor and record your calls. This helps to ensure that we provide you with the highest level of service and maintain quality standards.
Third Party Marketing
We may share your details to third parties whose offers we think might interest you, either directly or through a data co-operative. The personal information you provide may also be used for the purposes of: identity verification, credit and risk management, revenue collection, database verification and enhancement.
Data co-operatives are companies whose members contribute information about their consumers in exchange for information about other consumers that may be interested in their products.
We may also pass information about you to agents, service providers and employees to carry out services. In the course of providing such services, we may transfer your personal information outside the European Economic Area. We will employ appropriate security measures to protect your personal information where this is the case.
Initial third party consent is acquired at the point of your first order. If you want to review or amend your preferences they can be reviewed within the My Account section of the website under the Personal Details section. Expand the Contact Preferences area and you can select your third party contact preference.
In selecting to opt out of third party activity we will ensure all channels of communication, post, email, telephone and SMS(text), are opted out.
Any information we collect about customers' browsing and buying habits is used to improve the Freemans website and the products and services offered to our customers. It also assists us with the detection and prevention of fraud.
We will collect information from you when opening your account and processing your orders. We will automatically collect information such as your browser IP address to make shopping with us easier, for example, remembering your log-in details.
Information we hold about you is securely stored electronically. When you open an account with us, your details are encrypted, and remain so every time you purchase from us. Personal information is encrypted to protect against fraud.
Callers to our Customer Services will be subject to a security check.
Online customers will require a log-in and password to access their account.
Our courier service will have selected access to your details for delivery purposes only.
Please be assured that we will never contact you or send emails asking you to provide personal information or to confirm your security details online. We would strongly advise you not to respond to any emails or websites that ask you to do so. If you are asked to do so by someone claiming to represent us, it is not a legitimate request and you should not respond or provide any information to them.Make sure your computer has current anti-virus and anti-spyware software
Steps to staying safe online
Ensure you have up to date firewall software
Always install the latest security upgrades
Carry out regular scans of your computer
Change your passwords regularly
Always be careful about disclosing your personal details
Visit our website and click on the “internet security” link
Be as well informed as you can be. Please see "Online Safety Advice", below
Above all, be vigilant. Provided you take simple steps to protect yourself, internet shopping is both convenient and safe
CREDIT/DEBIT CARD SECURITY
Your security when shopping with us is our priority. Millions of transactions take place safely over the Internet, using encrypted (coded) information. All PC browsers support strict worldwide security protocol, preventing other Internet users from accessing any of your personal data held by us.
INSECURE BROWSER INFORMATION
There are known security risks for users of Windows XP operating system when browsing with Internet Explorer. (Usually versions 7 & 8)
This has been proved to be insecure and leaves the customer’s details vulnerable to interception from a third party.
Because of this, we can no longer provide access to our website for these browser versions as this would put the customers personal data at risk.
If you wish to continue to access our website you will need to use a different device (if you have one available) or a different internet browser such as Chrome.
Microsoft have provided advice on supported versions of their browsers here: