Security

The purpose of this Security Policy is to safeguard information belonging to enjox.com within a secure environment.

We are continually working to ensure that all of our platforms and products are secure. As part of this commitment, we are active members of the Internet of Dongs (IoD), an initiative set-up with the goal of protecting the security and privacy of people using connected and remote-controllable sex toys.

We aim to take a preventative approach, with a number of initiatives under way. We believe this is the best way to protect our customers, so your products are secure and the data and information are safe.

This Policy informs enjox.com staff and other individuals entitled to use enjox.com facilities, of the principles governing the holding, use and disposal of information.

It is the goal of enjox.com that:

  • Information will be protected against unauthorised access or misuse.

  • Confidentiality of information will be secured.

  • Integrity of information will be maintained.

  • Availability of information / information systems is maintained for service delivery.

  • Business continuity planning processes will be maintained.

  • Regulatory, contractual and legal requirements will be complied with.

  • Physical, logical, environmental and communications security will be maintained.

  • Infringement of this Policy may result in disciplinary action or criminal prosecution.

  • When information is no longer of use, it is disposed of in a suitable manner.

Information relates to:

  • Electronic information systems (software, computers, and peripherals) owned by enjox.com whether deployed or accessed on or off site.
  • enjox.com computer network used either directly or indirectly.
  • Hardware, software and data owned by enjox.com.
  • Electronic recording devices (video, audio, CCTV systems).

Our Security Policy

enjox.com requires all users to exercise a duty of care in relation to the operation and use of its information systems.

Authorised users of information systems with the exception of information published for public consumption, all users of enjox.com information systems must be formally authorised by appointment as a member of staff or contractor.

Authorised users will pay due care and attention to protect enjox.com information in their personal possession. Confidential, personal or private information must not be copied or transported without consideration of:

  • Permission of the information owner
  • The risks associated with loss or falling into the wrong hands
  • How the information will be secured during transport and at its destination.

Acceptable use of information systems use of enjox.com information systems by authorised users will be lawful, honest and decent and shall have regard to the rights and sensitivities of other people.

enjox.com Information System Directors who are responsible for information systems are required to ensure that:

  • Systems are adequately protected from unauthorised access.
  • Systems are secured against theft and damage to a level that is cost-effective.
  • Adequate steps are taken to ensure the availability of the information system, commensurate with its importance (Business Continuity).
  • Electronic data can be recovered in the event of loss of the primary source. I.e. failure or loss of a computer system. It is incumbent on all system owners to backup data and to be able to restore data to a level commensurate with its importance (Disaster Recovery).
  • Data is maintained with a high degree of accuracy.
  • Systems are used for their intended purpose and that procedures are in place to rectify discovered or notified misuse.
  • Any electronic access logs are only retained for a justifiable period to ensure compliance with the data protection, investigatory powers and freedom of information acts.
  • Any third parties entrusted with enjox.com data understand their responsibilities with respect to maintaining its security.

Personal Information

Authorised users of information systems are not given rights of privacy in relation to their use of enjox.com information systems. Duly authorised officers of enjox.com may access or monitor personal data contained in any enjox.com information system (mailboxes, web access logs, file-store etc).

Individuals in breach of this policy are subject to disciplinary procedures at the instigation of the Directors with responsibility for the relevant information system, including referral to the Police where appropriate.

enjox.com will take legal action to ensure that its information systems are not used by unauthorised persons.

HOW TO REPORT A SECURITY ISSUE

If you think you have discovered a security vulnerability, please contact us a soon as possible at: support@enjox.com. In your email, please include the following:

  • A summary of the problem
  • A sequence of steps that can be used to replicate the issue

Once we receive your email our software team will investigate the scope and severity of the issue as a matter of urgency. We will keep you updated on the progress as we work to fix the bug you have submitted.

Our site uses cookies. By continuing to use our site, you agree to the use of cookies. For more information about the use of cookies on our website, please see our Cookie Policy.