Conference call security is essential. All Conferencing’s strict security protocols, plus the following tips, will help you conduct your calls with confidence.
Conference Call Privacy and Security Tips
- Use passcode entry to ensure only the participants invited are allowed to access your conference call.
- Choose entry and exit tones to notify you when a participant joins or leaves your conference call
- Conduct a roll call to find out who is on your conference call.
- Lock your conference call to ensure that no one joins after you begin.
- At the end of your call, disconnect all lines to ensure everyone leaves at the same time.
- Change your conference call passcode regularly or when you suspect misuse.
- At the beginning of your conference call, take advantage of the ability to enter a moderator billing code which tracks the subject of each call. This tool helps you monitor your usage and alerts you if your dial-in number and passcode are used without your permission.
- Limit the distribution of your passcode to prevent misuse of your account.
- Support materials used by conference call participants should be shredded before disposal to prevent intentional or accidental misuse of your proprietary information.
After your reservation is made, your conference will be assigned a unique Access code. Anyone without this code will not be admitted into your conference unless approved by the conference Moderator. If you are using the same Access code for several conferences, All Conferencing suggests changing your code periodically.
Privacy and Security Policy
Protecting your privacy is important to us. We want you to understand what information we collect and how we use it. In order to provide our customers with reliable and convenient conference call services, we use technology to manage and maintain customer information. We do not share your information with any outside organizations. We restrict the access of your information to employees, strictly for the use of providing you with quality customer service. We maintain physical, electronic, and procedural safeguards that comply with federal standards, safeguarding your nonpublic personal information. At any time, if you become an inactive customer, we will continue to adhere to the privacy policies and practices described above.
Information We May Collect
We may collect nonpublic personal information about you (credit card information, payment history) from the following sources: information we receive from you on registration or other forms, such as your name, address, and credit card information; information about your conference call transactions with us, such as your conference call history and invoice balances; and information we receive from third parties, such as consumer reporting agencies and other lenders, regarding your credit worthiness.