To: scion who wrote (392 ) 2/8/2004 4:35:51 PM From: scion Respond to of 419 8. What kinds of security procedures are in place to protect against the loss, misuse or alteration of your information? The Lycos Network has security measures in place to attempt to protect against the loss, misuse and alteration of your user data under our control. Lycos uses physical, electronic, and procedural safeguards to protect any personally identifiable data stored on its computers. Only authorized employees have access to the information you provide us. Any particularly sensitive information, such as a credit card number used to purchase premium services from Quote.com or Matchmaker.com, is encrypted prior to transmission. While we cannot guarantee that loss, misuse or alteration to data will not occur, we take many precautions to prevent such unfortunate occurrences. You are ultimately responsible for the security of your Lycos Network ID and password. Please take care when using and storing them. Lycos recommends that you do not divulge your password to anyone. You should log out of your browser at the end of each computer session to ensure that others cannot access your personal information and correspondence, especially if several people have access to your personal computer or you are using a computer in a public place like a library or Internet cafe. Contact Us Questions regarding this statement should be directed to: Lycos Privacy Site Coordinator Lycos, Inc. 100 5th Ave Waltham MA 02451 (781) 370-2700 (781) 370-2886 (Fax) privacy@lycos.com If you do not receive acknowledgment of your inquiry or your inquiry has not been satisfactorily addressed, you should then contact TRUSTe, who will serve as a liaison with the Lycos Network to resolve your concerns. Updates The Lycos Network will update this policy from time to time so please check back periodically. When such changes occur, you will see the word "Updated" next to the Privacy Policy link on the front page of each site on the Lycos Network. If at any point we decide to use personally identifiable information in a manner different from that stated at the time it was collected, we will prominently post such changes prior to implementing them. Last updated August 18, 2003.