JWho X Space
|||
FCC CONSUMER GUIDE TO WIRELESS CONNECTIONS AND SECURITY TIPS
https://www.fcc.gov/consumers/guides/how-protect-yourself-online
JWHO’S Privacy Policy.
Personal Data from individual's personal devices currently are not being observed at this time to be used by JWho X Space. Below is a list of best practices to help the user better police their privacy when and while using connected devices.
Contact
||| appstore@jwhox.app |||
JWhoX is a U.S. company with its headquarters at LOCATION SERVICES DISABLED “JWhoX” “we,” “us,” and “our”), do not collect mobile advertising and data services to sell to mobile application publishers (“Publishers”) and advertisers (“Advertisers”) at this time.
Registered Agent
JWho X Space
Location Services Enabled.
2520 __Venture Oaks Way
Suite 120
Sacramento, CA
95833
Changes to Our Privacy Policy
If we make material changes to this Privacy Policy that may impact you, we will prominently post notice of the change on our website for a period of at least 30 days prior to the change becoming effective. We recommend that you check the Privacy Policy frequently so that you are informed of any changes.
CCPA California Residents to request data please contact appstore@whox.land.
Thank you.
Suggestions to protect yourself online provided by the FCC.
Wireless Connections and Bluetooth Security Tips.
Source reference https://www.fcc.gov/consumers/guides/how-protect-yourself-online
Wireless Connections and Bluetooth Security Tips
Wi-Fi networks and Bluetooth connections can be vulnerable points of access for data or identity theft. Fortunately, there are many ways to decrease your chances of becoming a victim.
Encryption is the best way to keep your personal data safe. It works by scrambling the data in a message so that only the intended recipients can read it. When the address of a website you're visiting starts with "https" instead of "http," that indicates encryption is taking place between your browser and site.
The two most common types of encryption are Wired Equivalent Privacy (WEP), and Wi-Fi Protected Access (WPA). The strongest one commonly available is WPA2, so use that if you have the option. Home Wi-Fi systems and public Wi-Fi access points, or "hotspots," usually will inform you of the encryption they use.
Many Wi-Fi users choose to use public networks instead of their devices' data plans for accessing the internet remotely. But the convenience of public Wi-Fi can be risky. If you're not careful, hackers may quickly access your connection and compromise sensitive information stored on your device and in online accounts. Here are some steps you can take to minimize the risk:
Check the validity of available Wi-Fi hotspots. If more than one hotspot appears claiming to belong to an establishment that you're in, check with the staff to avoid connecting to an imposter hotspot.
Make sure all websites you exchange information with have "https" at the beginning of the web address. If so, your transmitted data will be encrypted.
Install an app add-on that forces your web browsers to use encryption when connecting to websites -- even well-known sites that may not normally encrypt their communications.
Adjust your smartphone's settings so it does not automatically connect to nearby Wi-Fi networks. This gives you more control over where and when you connect.
If you use public Wi-Fi hotspots on a regular basis, consider using a virtual private network, which will encrypt all transmissions between your device and the internet. Many companies offer VPNs to their employees for work purposes, and individuals may subscribe to VPNs on their own.
When transmitting sensitive information, using your cellphone data plan instead of Wi-Fi may be more secure.
Bluetooth Security
Bluetooth connections to your mobile devices can be used to connect to wireless headsets, transfer files, and enable hands-free calling while you drive, among other things. Most of the time, a user must allow a Bluetooth connection to occur before data is shared - a process called "pairing" - which provides a measure of data security. But just like Wi-Fi connections, Bluetooth can put your personal data at risk if you are not careful. Here are some steps you may wish to take when using Bluetooth:
Turn Bluetooth off when not in use. Keeping it active enables hackers to discover what other devices you connected to before, spoof one of those devices, and gain access to your device.
If you connect your mobile phone to a rental car, the phone's data may get shared with the car. Be sure to unpair your phone from the car and clear any personal data from the car before you return it. Take the same steps when selling a car that has Bluetooth.
Use Bluetooth in "hidden" mode rather than "discoverable" mode. This prevents other unknown devices from finding your Bluetooth connection.
Home Wireless Network Security
Home wireless networks enable computers and mobile devices to share one broadband connection to the internet without having to use up minutes on cellular data plans. But like all other wireless network technologies, home wireless networks present vulnerabilities that could be exploited by hackers. To help protect your home wireless network from unwanted users, consider the following steps:
Turn on encryption. Wireless routers often come out of the box with the encryption feature disabled, so be sure it is enabled soon after the router is installed.
Change the network's default network name, also known as its service set identifier or "SSID." When a computer with a wireless connection searches for and displays the wireless networks nearby, it lists each network that publicly broadcasts its SSID. Manufacturers usually give all of their wireless routers a default SSID, which is often the company's name. For additional security, choose a unique and hard to guess name as your SSID.
Change the network's default password. Most wireless routers come with preset passwords for administering a device's settings (this is different from the password used to access the wireless network itself). Unauthorized users may be familiar with the default passwords, so it is important to change the router device's password as soon as it is installed. Longer passwords made up of a combination of letters, numbers and symbols are more secure.
Consider using the Media Access Control, or "MAC," address filter in your wireless router. Every device that can connect to a Wi-Fi network has a unique ID called the "physical address" or "MAC" address. Wireless routers can screen the MAC addresses of all devices that connect to them, and users can set their wireless network to accept connections only from devices with MAC addresses that the router will recognize. To create another obstacle to unauthorized access, consider activating your wireless router's MAC address filter to include your devices only.
Turn off your wireless router when it will not be in use for any extended period of time.
Use anti-virus and anti-spyware software on your computer, and use similar apps on your devices that access your wireless network.
Passwords
Remembering all of your assorted passwords can be a pain. Web browsers and other programs may offer to remember passwords for you, which can be a significant timesaver. However, certain password shortcuts can leave you less safe secure. The following best practices may help keep your personal information safer:
Don't use the same password for multiple accounts, especially for the most sensitive ones, such as bank accounts, credit cards, legal or tax records and files containing medical information. Otherwise, someone with access to one of your accounts may end up with access to many others.
Don't use passwords that can be easily guessed, such as common words and birthdays of family members. Instead, use a combination of letters, numbers and symbols. The longer and stronger the password, the safer your information.
Additional suggested for User's online privacy can be found here
https://www.fcc.gov/tags/online-privacy
Apple App Store Privacy and best practices
About privacy information on the App Store and the choices you have to control your data
https://support.apple.com/en-us/HT211970
Squarespace Privacy Policy
https://www.squarespace.com/privacy/
Authorized Agents:
You may also designate an agent to make requests to exercise your rights under CCPA as described above. We will take steps both to verify the identity of the person seeking to exercise their rights as listed above, and to verify that your agent has been authorized to make a request on your behalf through providing us with a signed written authorization or a copy of a power of attorney.
Registered Agent
Who X Space
Location Services Disabled
|||
On my honor,
I will do my best …
|||
Which direction we are going.
There's no knowing where we 're rowing.
Or which way the river's flowing.
Is it raining.
Is it snowing ls a hurricane a-blowing.
Not a speck of light is showing So the danger must be growing.
Are the fires of hell a-glowing?
Is the grizzly reaper mowing?
Yes!
The danger must be growing For the rowers keep on rowing.
And they're certainly not showing.
Any signs that they are slowing!
JWhoX
UX0X0