Sunday, May 31, 2015

System requirements for iCloud - Apple Support

System requirements for iCloud - Apple Support

System requirements for iCloud

This article provides the recommended system requirements and minimum system requirements for iCloud.

Recommended system requirements

iCloud requires an Apple ID, an active Internet connection, and up-to-date software. If you meet the recommended system requirements below, you can take advantage of the latest iCloud features and get the best overall experience. To see the minimum requirements for each feature, you can review the minimum requirements table at the bottom of this page.

iPhone, iPad, and iPod touch

  • iOS 8.3
  • iWork for iOS (Pages 2.5 or later, Numbers 2.5 or later, Keynote 2.5 or later)1


  • OS X Yosemite v10.10.3
  • iTunes 12 or later
  • Safari 8 or later, Firefox 22 or later, or Google Chrome 28 or later
  • iWork for Mac (Pages 5.5 or later, Numbers 3.5 or later, Keynote 6.5 or later)1


  • Microsoft Windows 7 or later
  • iCloud for Windows 4.1
  • iTunes 12 or later
  • Outlook 2007 or later2
  • Internet Explorer 10 or later, Firefox 22 or later, or Google Chrome 28 or later (desktop mode only)

Apple TV

  • Apple TV software 7.0 or later

Minimum system requirements by feature

To use iCloud, you need at least iOS 5 on iPhone 3GS, iPod touch (3rd generation), iPad, or iPad mini; or at least OS X Lion v10.7.5 on a Mac.

Review this table for specific requirements of each iCloud feature.

iCloud feature  Minimum requirements 
iOS  OS X  Windows   Apple TV  
Back to My Mac OS X Lion v10.7.5
Backup and Restore iOS 5
Bookmarks iOS 5
  • OS X Lion v10.7.5
  • Safari 5.1.1
  • Windows 7 or
    Windows 8
  • iCloud Control Panel 3.1
  • Internet Explorer 9 or later
  • Firefox 22
  • Google Chrome 28 in desktop mode only
Calendar, Contacts, Mail iOS 5 OS X Lion v10.7.5
  • Windows 7 or Windows 8
  • iCloud Control Panel 3.1
  • Outlook 2007 or an up-to-date web browser
Mail Drop (send attachments)
  • OS X Yosemite (for Mail app) or from an up-to-date web browser (Safari 7.2 or later to upload packages, such as iWork files)
  • An email account that supports IMAP
  • Windows 7 or Windows 8
  • from an up-to-date web browser
  • An email account that supports IMAP
Documents in the Cloud
  • iOS 5
  • iWork for iOS (Pages 1.5, Numbers 1.5, Keynote 1.5)
  • OS X Lion v10.7.5
  • iWork '09 (Pages 4.2, Numbers 2.2, Keynote 5.2)
Family Sharing iOS 8
  • OS X Yosemite
  • iTunes 12
Apple TV software 7.0
Find My Friends
  • iOS 5 
  • iOS 6 (for location-based alerts)
  • iOS 8 (for Family Sharing)
Find My iPhone
  • iOS 5 
  • iOS 6 (for Lost Mode)
  • iOS 7 (for Activation Lock)
  • OS X Lion v10.7.5
  • (Lost Mode and Activation Lock aren't available on OS X)
Find My iPhone app

iOS 8

iCloud Drive iOS 8 OS X Yosemite
iCloud Photo Sharing iOS 7
  • OS X Mavericks v10.9
  • iPhoto '11 version 9.5 or Aperture 3.5
  • Windows 7 or
    Windows 8
  • iCloud Control Panel 3.1
Apple TV software 5.3
iCloud Photo Library iOS 8.3 OS X Yosemite v10.10.3
My Photo Stream iOS 5.1 
  • OS X Lion v10.7.5
  • iPhoto '11 (9.2.2) or Aperture 3.2.3
  • Windows 7
    or Windows 8
  • iCloud Control Panel 3.1
Apple TV software 5.0
iCloud Tabs iOS 6
  • OS X Mountain Lion v10.8.2
  • Safari 6
  • Safari 5
  • Firefox 21
  • Google Chrome 27 
  • Internet Explorer 10
  • Firefox 21
  • Google Chrome 27 
iTunes in the Cloud  iOS 5 
  • iTunes 10.3.1 (for Music, Apps, Books)
  • iTunes 10.6 (for Movies)
  • iTunes 10.3.1 (for Music, Apps, Books)
  • iTunes 10.6 (for Movies)
Apple TV software 4.4
iTunes Match iOS 5.0.1

iTunes 10.5.1

iTunes 10.5.1

Apple TV software 4.4
iWork for iCloud beta
  • Safari 6.0.3
  • Google Chrome 27.0.1
  • Internet Explorer 10
  • Google Chrome 27.0.1

iOS 7.0.3

OS X Mavericks v10.9

Reading List iOS 5 Safari 5.1 —  — 
Two-step verification  iOS 7 OS X Mavericks v10.9 —  — 

Some features aren't available in all countries. Access to some services is limited to 10 devices.

  1. You can buy iWork for iOS and iWork for Mac from the App Store if they didn't come free with your iOS device or Mac. 
  2. Outlook 2010 Personal Edition isn't supported.
  3. iTunes in the Cloud availability for music, movies, and TV shows varies by country. Previous purchases may be unavailable if they are no longer in the iTunes Store, App Store, or iBooks Store. Not all previously purchased movies are available for downloading to your other devices.
  4. If you don't meet the minimum system requirements, your data is still protected by two-step verification. However, if you change your Apple ID password while you're signed in to iCloud on devices that don't meet the minimum requirements, you might see these issues.

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Risks are inherent in the use of the Internet. Contact the vendor for additional information.

Last Modified:

Sent via iPhone

Saturday, May 30, 2015

Google Terms of Service – Privacy & Terms – Google

Google Terms of Service – Privacy & Terms – Google

Google Terms of Service

Last modified: April 14, 2014 (view archived versions)

Welcome to Google!

Thanks for using our products and services ("Services"). The Services are provided by Google Inc. ("Google"), located at 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States.

By using our Services, you are agreeing to these terms. Please read them carefully.

Our Services are very diverse, so sometimes additional terms or product requirements (including age requirements) may apply. Additional terms will be available with the relevant Services, and those additional terms become part of your agreement with us if you use those Services.

Using our Services

You must follow any policies made available to you within the Services.

Don't misuse our Services. For example, don't interfere with our Services or try to access them using a method other than the interface and the instructions that we provide. You may use our Services only as permitted by law, including applicable export and re-export control laws and regulations. We may suspend or stop providing our Services to you if you do not comply with our terms or policies or if we are investigating suspected misconduct.

Using our Services does not give you ownership of any intellectual property rights in our Services or the content you access. You may not use content from our Services unless you obtain permission from its owner or are otherwise permitted by law. These terms do not grant you the right to use any branding or logos used in our Services. Don't remove, obscure, or alter any legal notices displayed in or along with our Services.

Our Services display some content that is not Google's. This content is the sole responsibility of the entity that makes it available. We may review content to determine whether it is illegal or violates our policies, and we may remove or refuse to display content that we reasonably believe violates our policies or the law. But that does not necessarily mean that we review content, so please don't assume that we do.

In connection with your use of the Services, we may send you service announcements, administrative messages, and other information. You may opt out of some of those communications.

Some of our Services are available on mobile devices. Do not use such Services in a way that distracts you and prevents you from obeying traffic or safety laws.

Your Google Account

You may need a Google Account in order to use some of our Services. You may create your own Google Account, or your Google Account may be assigned to you by an administrator, such as your employer or educational institution. If you are using a Google Account assigned to you by an administrator, different or additional terms may apply and your administrator may be able to access or disable your account.

To protect your Google Account, keep your password confidential. You are responsible for the activity that happens on or through your Google Account. Try not to reuse your Google Account password on third-party applications. If you learn of any unauthorized use of your password or Google Account, follow these instructions.

Privacy and Copyright Protection

Google's privacy policies explain how we treat your personal data and protect your privacy when you use our Services. By using our Services, you agree that Google can use such data in accordance with our privacy policies.

We respond to notices of alleged copyright infringement and terminate accounts of repeat infringers according to the process set out in the U.S. Digital Millennium Copyright Act.

We provide information to help copyright holders manage their intellectual property online. If you think somebody is violating your copyrights and want to notify us, you can find information about submitting notices and Google's policy about responding to notices in our Help Center.

Your Content in our Services

Some of our Services allow you to upload, submit, store, send or receive content. You retain ownership of any intellectual property rights that you hold in that content. In short, what belongs to you stays yours.

When you upload, submit, store, send or receive content to or through our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content. The rights you grant in this license are for the limited purpose of operating, promoting, and improving our Services, and to develop new ones. This license continues even if you stop using our Services (for example, for a business listing you have added to Google Maps). Some Services may offer you ways to access and remove content that has been provided to that Service. Also, in some of our Services, there are terms or settings that narrow the scope of our use of the content submitted in those Services. Make sure you have the necessary rights to grant us this license for any content that you submit to our Services.

Our automated systems analyze your content (including emails) to provide you personally relevant product features, such as customized search results, tailored advertising, and spam and malware detection. This analysis occurs as the content is sent, received, and when it is stored.

If you have a Google Account, we may display your Profile name, Profile photo, and actions you take on Google or on third-party applications connected to your Google Account (such as +1's, reviews you write and comments you post) in our Services, including displaying in ads and other commercial contexts. We will respect the choices you make to limit sharing or visibility settings in your Google Account. For example, you can choose your settings so your name and photo do not appear in an ad.

You can find more information about how Google uses and stores content in the privacy policy or additional terms for particular Services. If you submit feedback or suggestions about our Services, we may use your feedback or suggestions without obligation to you.

About Software in our Services

When a Service requires or includes downloadable software, this software may update automatically on your device once a new version or feature is available. Some Services may let you adjust your automatic update settings.

Google gives you a personal, worldwide, royalty-free, non-assignable and non-exclusive license to use the software provided to you by Google as part of the Services. This license is for the sole purpose of enabling you to use and enjoy the benefit of the Services as provided by Google, in the manner permitted by these terms. You may not copy, modify, distribute, sell, or lease any part of our Services or included software, nor may you reverse engineer or attempt to extract the source code of that software, unless laws prohibit those restrictions or you have our written permission.

Open source software is important to us. Some software used in our Services may be offered under an open source license that we will make available to you. There may be provisions in the open source license that expressly override some of these terms.

Modifying and Terminating our Services

We are constantly changing and improving our Services. We may add or remove functionalities or features, and we may suspend or stop a Service altogether.

You can stop using our Services at any time, although we'll be sorry to see you go. Google may also stop providing Services to you, or add or create new limits to our Services at any time.

We believe that you own your data and preserving your access to such data is important. If we discontinue a Service, where reasonably possible, we will give you reasonable advance notice and a chance to get information out of that Service.

Our Warranties and Disclaimers

We provide our Services using a commercially reasonable level of skill and care and we hope that you will enjoy using them. But there are certain things that we don't promise about our Services.



Liability for our Services




Business uses of our Services

If you are using our Services on behalf of a business, that business accepts these terms. It will hold harmless and indemnify Google and its affiliates, officers, agents, and employees from any claim, suit or action arising from or related to the use of the Services or violation of these terms, including any liability or expense arising from claims, losses, damages, suits, judgments, litigation costs and attorneys' fees.

About these Terms

We may modify these terms or any additional terms that apply to a Service to, for example, reflect changes to the law or changes to our Services. You should look at the terms regularly. We'll post notice of modifications to these terms on this page. We'll post notice of modified additional terms in the applicable Service. Changes will not apply retroactively and will become effective no sooner than fourteen days after they are posted. However, changes addressing new functions for a Service or changes made for legal reasons will be effective immediately. If you do not agree to the modified terms for a Service, you should discontinue your use of that Service.

If there is a conflict between these terms and the additional terms, the additional terms will control for that conflict.

These terms control the relationship between Google and you. They do not create any third party beneficiary rights.

If you do not comply with these terms, and we don't take action right away, this doesn't mean that we are giving up any rights that we may have (such as taking action in the future).

If it turns out that a particular term is not enforceable, this will not affect any other terms.

The laws of California, U.S.A., excluding California's conflict of laws rules, will apply to any disputes arising out of or relating to these terms or the Services. All claims arising out of or relating to these terms or the Services will be litigated exclusively in the federal or state courts of Santa Clara County, California, USA, and you and Google consent to personal jurisdiction in those courts.

For information about how to contact Google, please visit our contact page.

Sent via iPhone

MobileIron Privacy Statement | MobileIron

MobileIron Privacy Statement | MobileIron

MobileIron Privacy Statement | MobileIron

For business customer employees or consultants who have MobileIron software installed on their mobile devices

What is MobileIron software?
Mobile Iron, Inc. ("MobileIron") is a leader in enterprise mobility management. Your employer (as defined below) has purchased MobileIron software as a tool to enable it to securely manage and deliver corporate apps, documents and other corporate content on this mobile device (either a mobile phone or tablet, depending on your employer's policy).

What is this Privacy Statement?  This Privacy Statement describes how we handle information we collect about you and your device in this context. Note that your employer may have its own privacy policies with regard to your workplace communications and your mobile device and other privacy issues, and you should contact your employer if you have any questions about those privacy issues. In this Privacy Statement, we refer to the business that has purchased our products or services for deployment on your mobile device as your "employer" for convenience, although you may be a consultant or otherwise affiliated with such company.

How do I set up MobileIron software? If you have an Android device or iOS device such as an iPhone or iPad, you'll need to download the MobileIron 'Mobile@Work' app. After you've downloaded the appropriate app, follow the instructions inside the app to fully register your device with MobileIron.  In all cases, consult your employer for any instructions relevant to your organization.

How does MobileIron help me? Your employer may request you to use MobileIron in order to get mobile access to corporate resources like email. In general, MobileIron enables you to do the following from your mobile device:

  • Quickly access your corporate email, calendar, and contacts
  • Access corporate WiFi and VPN networks
  • Easily find and install work related applications
  • Check compliance with corporate security policies
  • Locate lost or stolen devices

The exact functionality of MobileIron on your device depends on the policies and configuration determined by your employer.  We encourage you to reach out to your employer for additional details about your organization's policy on company- and personally-owned devices managed by MobileIron.

What can my Employer do to my mobile device? Can my employer control my device? Many companies offer "bring your own device" (BYOD) programs allowing employees to have access to company data in return for some control over their mobile devices. While it depends on the exact policies and configuration in your organization, these are the types of things you agree to when using a MobileIron-managed device:

  • The IT administrator at your company can wipe enterprise content off of your phone, leaving your personal information untouched; you can also wipe your phone in the same manner.
  • The IT administrator at your company can locate your device; you can also locate your device.
  • The IT administrator at your company can block applications, require applications, and limit access to corporate email and internal resources.
  • The IT administrator at your company can create minimum standards, like:  
    • Encrypting your phone (to protect the data, both personal and company)
    • Requiring a minimum software version or a passcode to gain access to corporate resources
    • Not modifying your OS (commonly known as rooting or jailbreaking) and putting data at risk

Your employer may require you to run software that goes beyond the capabilities and features of MobileIron software. This software may even be distributed by MobileIron. Ultimately, the policies that are set by our software are determined by your employer. The above examples are only applicable where your employer deems them appropriate. 

What information does MobileIron collect?  We collect basic information about your device so that we may facilitate the registration of your device and the deployment, operation and maintenance of the MobileIron software for your employer.  The MobileIron software offers many protections for employees, and our goal is to minimize the collection or use of personal information. We collect and use only the types and amounts of your personal information necessary to provide functionality to your employer and for related internal purposes (user or device true-ups, troubleshooting, trend analysis and product development). We do not share this personal information with advertisers or other third parties for those parties' own purposes, unless you tell us to do so or unless we are compelled by law to make such disclosures.  Importantly, we do not collect and store your name.
The information about you or your device that we may collect, access, use, and/or store for these operational purposes consists of:

  • Mobile device identifiers, such as the IP address, mobile phone number, make and model, carrier, country, operating system version, and other technical details.  This information enables your IT administrator to send certain administrative (not personal) text messages to you and enables Apple push notification services or Google notification services to deliver messages from your IT administrator to your device.  Some of this information is also used to look up carriers or servers for administrative or registration purposes.  Our policy is to delete this information every 10 days.
  • Non-U.S. mobile phone numbers, if such numbers are used by your employer's IT administrator to send SMS text messages relating to the management of mobile devices deployed using MobileIron software. Our policy is to delete this information every 10 days.

What about my photos and personal email?  Your employer cannot use MobileIron software to do any of the following:

  • Retain copies of your photos
  • Monitor your iMessages
  • Monitor your personal email
  • Limit your access to specific access points, websites or locations
  • Track Internet usage
  • Record phone calls

For further information, we encourage you to reach out to your IT department for additional details about your employer's policy on company- and personally-owned devices managed by MobileIron.

Does MobileIron share the Information we collect?  We only share the information we collect: (i) with your employer in connection with the operation of our software, (ii) with our affiliates, resellers or other third parties that are working with MobileIron or your employer if such parties need to know the information in order to assist your employer in its enterprise mobility efforts, (iii) with providers of products and services integrated into our software or service providers that perform services on our behalf and need to know such information for the purposes described in this Privacy Statement, (iv) as required by law or in response to a law enforcement request, (v) to protect our rights, or (vi) in connection with a sale of our business. 

What are my privacy choices?  Because our software is a tool deployed by your employer, your employer manages your privacy choices in connection with our products and services, and you should contact your employer for information in this regard. If you would like to update information about your choices or preferences, please contact your employer.

How does MobileIron protect personal information? MobileIron has implemented administrative, technical and physical safeguards designed to assist in protecting the personal information we collect against accidental, unlawful or unauthorized destruction, loss, alteration, access, disclosure or use. Please note that no electronic transmission of information can be entirely secure. We cannot guarantee that the security measures we have in place to safeguard personal information will never be defeated or fail, or that those measures will always be sufficient or effective. 

What about data transfers?  We may process information about you outside of the country in which you are located, including in the United States.  If you are located in the European Economic Area or Switzerland, we comply with applicable legal requirements, providing adequate protection for the transfer of personal information to countries outside of the EEA or Switzerland. MobileIron is certified under the Safe Harbor privacy framework as set forth by the U.S. Department of Commerce, European Commission and Switzerland regarding the collection, storage, use, transfer and other processing of personal data transferred from the European Economic Area or Switzerland to the U.S. Click here to view our Safe Harbor Privacy Policy.

Third Party Products & Services.  MobileIron's products and services may integrate with or enable access to third-party tools.  If you register or install or access any third party tools, you may be required to accept privacy notices provided by those third parties.  Please review those notices carefully, as we do not control and cannot be responsible for these providers' privacy or information security practices.

How to Contact Us.  If you have any questions, comments or concerns about this Privacy Statement, please contact us by email at

Effective Date:  April 18, 2014

Sent via iPhone

Easily Share Files Between Windows 7, 8 and Mac OS X

Easily Share Files Between Windows 7, 8 and Mac OS X

Easily Share Files Between Windows 7, 8 and Mac OS X

Cross platform file sharing sounds complicated, but it doesn't have to be. Here's how to get a PC and and a Mac to share files with each other.

We showed you how to get Windows and OS X to work together, but now it's time to turn our attention specifically toward file sharing. Today we will show you exactly how to share files from one system to the other.

I'm going to assume you're running the latest version of both Windows and OS X: 8.1 and Yosemite, respectively. These instructions should generally work for earlier versions of both operating systems, and likely even for future versions, but some things might look different than what you see here.

With that warning out of the way, let's get started!

Sharing From Your Windows Computer To Your Mac

Instructing your Windows computer to share files is relatively straight-forward, but first you have to make sure you've enabled file sharing. Head to the Control Panel, then to Network and Internet, then HomeGroup and sharing options, then Advanced sharing settings. Ensure that file and printer sharing is turned on for your current network.

The hard part is done, let's get to the actual sharing!

On your Windows computer, right-click the folder you'd like to share to the network, then click Properties and open the Sharing tab.


You should see a Share… button. Click it.


Specify which users you would like to see and modify the folder in question. On a home network allowing everyone to see, and specific users to edit, is often the best policy – use your discretion.

File sharing is now set up, so let's head over to your Mac. Open the Finder and you should see the Windows computer in the sidebar under Shared.


Click it, and you'll be asked whether you want to log in. If you don't need write access, "Guest" should work. Otherwise, log in with the username and password from your Windows machine.


Once you log in, you can start browsing files. It works pretty much like you'd expect.


Congratulations: you've set up your Windows computer to share files, and opened them on your Mac. Now let's try it the other way around.

Sharing Files On Your Mac With Your Windows Computer

On your Mac, open up System Preferences, then click Sharing.


Take note of the Computer Name field at the top of the window – you'll need it later.

Click the checkbox beside "File Sharing" and file sharing is turned on. Now click the Options button.


Ensure that SMB is enabled – this is the kind of file sharing used by Windows computers. You should also enable Windows File Sharing for your account (by checking the box in the field below), if you'd like full access to your Mac's file system from Windows computers on your network.

Now head to your Windows computer and open Windows Explorer. With any luck, you should see your Mac from here.


If your Mac doesn't show up, don't panic: just type "\\" followed by your Mac's name (as seen earlier) into Explorer's address bar. In my case, this would be "\\JPot". If this doesn't work, you can also type "\\" followed by your Mac's IP (which you can find, on your Mac, in the File Sharing pane in System Preferences).

When you do manage to connect, you should see this prompt for your password:


Type the username and password you use to log in to your Mac, and you'll have access to all folders. You're in!

If you'd rather not share your entire filesystem, or wish Windows users didn't need to remember a password, you'll need to create a sharing account. Head to the Users & Groups section of System Preferences, then create a new account.


Make sure the account is marked as "Sharing Only", as seen above, and give it an easy-to-remember name. Head back to the Sharing section, and give this account access to the folders you'd like to share – you can make that access Read Only, if you'd rather people not mess with your files.

Using Third Party Software

If you'd rather not set up network-wide file sharing, there are other options. For example, a program called Dukto lets you share local files and text snippets between any two computers.

Install this program on your Mac and your Windows computer and you can quickly send files from one computer to the other. If even this seems too complicated, there are plenty of simple file sharing apps for Mac.

For some users, syncing files with BitTorrent Sync might be superior to file sharing. The program lets you sync folders between Windows and Mac computers, meaning you'll always have access to files on both machines regardless of whether you're connected to the same network.

How Do You Share Files?

With the above information you should have no problem sharing files from one kind of computer to another. Let me know how it goes in the comments below, along with any other cross-platform file sharing tips you might have.

Did it work for you?

This review may contain affiliate links, which pays us a small compensation if you do decide to make a purchase based on our recommendation. Our judgement is in no way biased, and our recommendations are always based on the merits of the items.

Sent via iPhone

Five Ways To Ensure Your Personal Data Remains Secure

Five Ways To Ensure Your Personal Data Remains Secure

Five Ways To Ensure Your Personal Data Remains Secure

Your data is you. Whether it is a collection of photographs you took, images you developed, reports you wrote, stories you thought up or music you collected or composed, it tells a story. Coupled with information that can identify you – whether it is found on the front of an envelope or divulged from the meta-data of those files you worked on – it is possible for those with nefarious intentions to find out far more about you than you'd like.

Perhaps more about you than you are even aware is public.

We've compiled these data protection tips to help you get a grip on the security and privacy of data stored on your computer.

Backing Up Your Data


Perhaps the most overlooked data protection tip is ensuring you have your data backed up. Ideally this should be to a separate device, perhaps a network drive, external or removable hard disk drive, even the cloud. But you should also ensure you know where your data is first. After all, if you don't know that you have a collection of downloads in a temporary folder, or email attachments stored in a mailbox on your HDD, you're not going to be able to back them up.

The aim of backing up is so that you have a copy of your most important data should your computer be damaged or stolen. Backups stored on external or removable media should be locked away, and ideally encrypted.

Encrypt Your Sensitive Data in Portable Files

Data encryption is becoming ever-more important, but fortunately the tools to encrypt your data are easier to come by. Desktop operating systems ship with native encryption tools, enabling you to make your most sensitive data unreadable to thieves.


In the past, we would recommend TrueCrypt for this task, but as you may know, this software is now abandoned. So how should you encrypt your data now?

The best answer is to employ your operating system's native encryption tool. For example, Windows users can use BitLocker to encrypt a volume of at least 100 MB in size. By encrypting a USB flash drive with your most vital data on, you have a portable, encrypted storage device that you can access on another Windows 7 or 8 computer that you sign into.

Mac users should follow our previous OS X guide for encrypting folders, using a USB flash device instead of an internal HDD.

Linux users, meanwhile, can use various encryption tools, native or third party, differing based on their chosen distribution. For instance, Ubuntu has the Linux Unified Key Setup tool, which enables you to encrypt your data on a USB flash device in the Disk Utility tool.

Remember to Securely Delete Sensitive Files

Deleting files you don't want removes them from the operating system, but doesn't remove them from your hard disk drive. Under standard deletion, the section of the hard disk drive the data is stored on is marked as being available, meaning that it can still be recovered until the HDD sector is overwritten.


Standard recovery tools can recover lost data in minutes. To confirm that the data is genuinely deleted, you'll need to employ a third party utility that will overwrite the storage again and again until the data can no longer be retrieved.

Native and third party tools are available for Windows users to securely delete their hard drives. For Mac OS X, Disk Utility has a secure erase feature built in. A trio of utilities are available for Linux users to delete data securely on their hard disk drives.

Sadly, SSD drives can never be securely deleted as you're likely to destroy the drive in the process. The best option is to ensure all data on an SSD is encrypted.

Delete Old Files From The Cloud

Do you use Box, Dropbox, Google Drive or OneDrive? When you sync your documents and photos to these services, they retain a copy of your data, ensuring you can easily restore your documents, images, movies, music and more.


For instance, if you wiped your Windows PC's hard disk drive but had been using OneDrive, once you sign into Windows 8 or later with the same username and password, the data will be resynced to your computer.

Data that you had thought long-deleted could end up back on your computer. If the file was something you regretted deleting, then this shouldn't be a problem; if the file is data you believed to have been intentionally deleted, on the other hand…

To ensure your data is securely deleted take a few minutes to ensure that it hasn't been unintentionally synced to your cloud storage. If it has, delete it.

Disable File & Media Sharing

Do you really need to make files and data available for sharing across your home network?

If this is a feature that you rarely take advantage of, it makes sense to disable it when you don't need it. A weak home network (wireless routers can be breached using default passwords, for instance) will soon leak information to third parties, and files stored on shared network folders will make the loss of data a bit easier for attackers.

Just as sharing between Windows and Mac OS X computers on the same network is simple, so is disabling file and media sharing. In Windows, all you need to do is open My Computer, expand Network, identify the folder that is being shared, and right-click, selecting Stop sharing in the menu. In Mac OS X, open the Sharing preference panel, and view File Sharing. Look under Shared Folders, select the directory to be unshared, and click the - button. Instructions for Linux will vary by distro, but generally can be found under "Sharing" in the settings menu of your desktop environment.

Disabling file and media sharing "disappears" your data to prying eyes, whether people who are authorized to be on your network or those that have managed to gain access either as guests or intruders.

How do you keep your data secure? What steps do you take for securing external devices or removable media? Tell us in the comments.

Image Credits: Featured image via Shutterstock, Chalk board via Shutterstock, Encrypt via Shutterstock, HDD Erase via Shutterstock, Cloud delete via Shutterstock

This review may contain affiliate links, which pays us a small compensation if you do decide to make a purchase based on our recommendation. Our judgement is in no way biased, and our recommendations are always based on the merits of the items.

Sent via iPhone

Friday, May 29, 2015

How do I get an IP address removed from a blacklist?

How do I get an IP address removed from a blacklist?

How to Remove an IP Address from a Blacklist

(Go to our Blacklist Check page to find out if your IP address is listed on an anti-spam database. This article explains why that happens and how to get off a blacklist.)

Each blacklist database has its own criteria for flagging IP addresses and compiling its own list of online offenders. Those criteria could include a variety of "listings": technical, policy, and evidence-based.

  • Technical listings occur mostly from mail-server configuration issues, such as missing or incorrect reverse DNS records, missing or incorrect banner greetings, and mail servers operating within a suspicious range of IP addresses.
  • Policy listings are based on an operator that does not wish to receive email from certain countries, or ISPs, that have a history of not honoring "unsubscribe" requests.
  • Evidence-based listings are those where the operator has received direct (or indirect) evidence that an IP address has been involved in sending unsolicited emails.

If your IP address has been blacklisted and you want to investigate, you'll need to visit the blacklist's website and do a lookup on your IP address. Most blacklist databases will provide general listing reasons, but don't list specific email addresses tied to blacklisted IP addresses.

Getting "unblacklisted."

If you're able to find out why you were blacklisted, you can try to get it reversed. (You may want to work with someone who is technically savvy to better help you.)

To start with, take time to ensure your network and mail server are configured correctly and all the details are in order for resolving the issues, as prescribed by the blacklist. For example, they may ask you to correct both forward and reverse DNS records, as well as SMTP banners. In addition, you can do the following:

  • Scan all computers on your network for viruses
  • See if there are any known and needed "patches" (updates and fixes) for your operating system
  • Configure routers more securely
  • Establish and enforce stronger passwords

Following the blacklist-removal process.

You want to be removed from any blacklists because databases often share IP addresses that have been listed. If you think you've fixed things on your end, go back to the blacklist's site and follow their instructions for the IP address removal process. Here's what you're likely to come across:

  • Self-Service Removal. There are a few blacklists with a self-service removal feature that lets you take your IP address off the list without much trouble. However, you'll want to make sure you've resolved any issues before doing this. If you don't and your IP address gets listed again, it won't be easy to get it removed that next time.
  • Time-Based Removal. Most blacklists have a built-in, automatic process that removes lower-level listings (IP addresses that are light offenders) within a week or two. But if the IP address had sent spam more than once or did a high volume, the time period will be longer.

Be nice...and see what happens.

When you're trying to get off a blacklist, you'll get farther along if you follow the rules and cooperate. If you are truly innocent of any deliberate wrongdoing (or if you made an honest mistake), let them know. The more open and direct you are with a listing database, the simpler it may be to have your IP address taken off the blacklist.

Keep this in mind:

  1. Their priority is to reduce the spam on their email platform for their customers—their goal isn't to prevent you from sending emails.
  2. Spam is a serious problem. They don't blacklist lightly. It's their way of trying to identify and prevent real problems.
  3. Blacklists are legal because they are designed to prevent fraud or other activity that disrupts normal business. We all need to accept that fact.
  4. If you made a mistake and were blacklisted, don't make the same mistake again. You likely won't be forgiven a second time.

You might be able to resolve any blacklist issues online. If not, and the blacklisting is troublesome for you, consider contacting the list by phone and try to resolve the issue that way.

Related Articles

Thursday, May 28, 2015

5 Security Concerns to Consider When Creating Your Smart Home

5 Security Concerns to Consider When Creating Your Smart Home

5 Security Concerns to Consider When Creating Your Smart Home

We live in an increasingly connected world. Our lives seem to revolve around the internet, so it perhaps shouldn't come as a surprise that we attempt to connect as many aspects of our lives to the web as possible. That is turning out to be the case with the recent surge in products designed to turn our homes into "smart homes."

The concept is simple: if we connect everything in our house to the Internet, from home appliances and lighting systems to door locks and climate controls, we'll be able to control all of them remotely, making our lives easier.

Smart homes have caught the interest of some major businesses like Google and Apple, and the smart home market is expected to reach more than $70 billion by the year 2018. But for all the possibilities smart homes introduce, many people have expressed genuine concerns over how secure these automated living spaces actually are. These are concerns you should definitely consider as you prepare to turn your home into an interconnected domain.


1. Hacking Connected Thermostats

One of the most popular items used in a smart home is a smart thermostat. The company Nest, which was recently purchased by Google, makes devices that help control the temperature of your home. A major security concern that arises from smart thermostats is the ease with which hackers can gain entry.

A recent demonstration showed one expert hacking a Nest thermostat in only 15 seconds. On the surface, you may think a hacked thermostat might not be such a big deal, but the device collects information on you and everyone living in the house. Smart thermostats like Nest know when someone is at home, what their schedules are, when they're awake and asleep, and what temperatures they prefer.


2. Who's Really Watching Your Smart TV?

Smart TVs are certainly a convenient device, but if hackers gain entry to it, you could be in for a world of trouble. Many smart TVs come with a camera. Cyber attackers who hack the device can then use that camera to spy on you and your family, even if you don't have the television on. Due to a general lack of security standards, some hackers can even lock you out of your television entirely and ask that you pay some kind of ransom just to have access to it again.

3. Compromised Security Systems

Here's one area that almost needs no explanation. Many smart home users hook up their security systems to the Internet to enable control from a smartphone app. These systems might include garage door openers, door locks, security cameras, and many others.

Hackers gaining entry to these systems can cause obvious problems. Imagine if some anonymous cyber attacker determined whether or not your front door is locked while you're away on vacation, or a hacker gained the capability to open your garage door in the middle of the night. For many smart homes, all it takes is for a hacker to infiltrate a relatively defenseless home network to gain access to these critical systems.


4. Eavesdropping on Communication Systems

Home communication systems can include anything from video conferencing devices to computers and printers. With these devices, people are able to communicate with other gadgets and other people outside of their homes. Many hackers can steal valuable information through passive attacks, or attacks that gain unauthorized access without actually changing any of the data or code.

This can include eavesdropping on telephone conversations, monitoring email messages, and observing how people are interacting with their devices.

5. Changing Lighting Systems

Hackers that gain access to a smart home's lighting systems can not only control whether a house's lights are on and off, they can also have access to a home's electricity. From there, hackers can mess with the amount of power a house is consuming, leading to an astronomical electricity bill for the homeowner. Cyber attackers may not get much out of this for themselves, but simply exerting control and playing mean-spirited pranks like this are far too common.

Smart homes are often looked at as the wave of the future, but the proliferation of the technology should always come with a word of caution. People who adopt smart home technology need to know about some of the biggest security concerns revolving around not only their appliances but the central hub for controlling these gadgets: the smartphone.

Smart home security, as well as BYOD security, need to improve as more people start creating their own web-connected homes and controlling them from their mobile devices.

Image Source: Nest via Wikimedia; LG Smart TV via Wikimedia; Backlit Keyboard via Wikimedia; Reliance Smart Client via Wikimedia/

Sent via iPhone Legal Terms of Use Conditions of Use

On This Page

Last Revised Friday, August 01, 2014.

The Audible Service Conditions of Use


Audible, Inc. and its affiliates ("Audible") are pleased to offer a service that permits users to discover, purchase, receive and play digital spoken word audio entertainment ("Audible Content") through Audible's websites, including, and its applications for mobile devices (collectively, the "Audible Service"). If you use the Audible Service, you accept these conditions of use ("Conditions of Use"). Please read them carefully. In addition to the Conditions of Use, you will also be subject to (1) the Audible Purchase Terms & Conditions , which govern any purchase you make through the Audible Service, (2) the Audible Plan Terms, which govern your enrollment in any Audible membership plan, and (3) any other policies, guidelines, terms and agreements posted on, or otherwise made available to you through, the Audible Service (collectively, the "Terms"). If these Conditions of Use contradict such Terms, the Terms will control.


Please review our Privacy Notice, which also governs your use of the Audible Service, to understand our practices.


When you use the Audible Service, or send e-mails to us, you are communicating with us electronically. You consent to receive communications from us electronically. We will communicate with you by e-mail or by posting notices on or through the Audible Service. You agree that all agreements, notices, disclosures and other communications that we provide to you electronically satisfy any legal requirement that such communications be in writing.


All content included in or made available through the Audible Service, such as text, graphics, logos, button icons, images, audio clips, digital downloads, data compilations and Audible Content, is the property of Audible or its content suppliers and protected by United States and international copyright laws. The compilation of all content accessible through the Audible Service is the exclusive property of Audible and protected by U.S. and international copyright laws.


Audible,, AudibleListener, AudibleManager, AudibleReady, Audible Studios and other graphics, logos, page headers, button icons, scripts, and service names included in or made available through the Audible Service are trademarks, registered trademarks or trade dress of Audible in the U.S. and other countries. Audible's trademarks and trade dress may not be used in connection with any product or service that is not Audible's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Audible. You may not use any Audible logo or other proprietary graphic or trademark as part of a hyperlink without express written permission from Audible. All other trademarks not owned by Audible that appear in the Audible Service are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Audible.


One or more patents owned by Audible apply to the Audible Service and to the features and services accessible via the Audible Service. Portions of the Audible Service operate under license of one or more patents. Click here to see a non-exhaustive list of applicable Audible patents and applicable licensed patents.


Subject to your compliance with these Conditions of Use and your payment of any applicable fees, Audible or its content providers grant you a limited, non-exclusive, non-transferable, non-sublicensable license to access and make personal and non-commercial use of the Audible Service. Additional license terms may be found in the Terms. This license does not include any resale or commercial use of the Audible Service or its contents; any collection and use of any product listings, descriptions, or prices; any derivative use of the Audible Service or its contents; any downloading or copying of account information for the benefit of another merchant; or any use of data mining, robots, or similar data gathering and extraction tools.

All rights not expressly granted to you in these Conditions of Use or any applicable Terms are reserved and retained by Audible or its licensors, suppliers, publishers, rightsholders, or other content providers. Neither the Audible Service nor any part of it may be reproduced, duplicated, copied, sold, resold, visited, or otherwise exploited for any commercial purpose without express written consent of Audible. You may not frame or utilize framing techniques to enclose any trademark, logo, or other proprietary information (including images, text, page layout, or form) of Audible without express written consent. You may not use any meta tags or any other "hidden text" utilizing Audible's name or trademarks without the express written consent of Audible. You are granted a limited, revocable, and nonexclusive right to create a hyperlink to the home page of so long as the link does not portray Audible, or its products or services in a false, misleading, derogatory, or otherwise offensive matter. You may not use any Audible logo or other proprietary graphic or trademark as part of the link without express written permission.

You may not misuse the Audible Service. You may use the Audible Service only as permitted by law. The licenses granted by Audible terminate if you do not comply with these Conditions of Use or any applicable Terms.


As a registered user of the Audible Service, you may receive or establish one or more passwords and accounts ("Audible Account"). If you open a new Audible Account and you have an account with using the same email address, your account information from your Amazon account will be used to establish your account at Audible and all forms of payment on file with your Amazon account will be linked to your Audible account. If you register a Kindle tablet device and do not already have an Audible Account, you will automatically be assigned an Audible Account using your Amazon credentials. If you use the Audible Service, you are responsible for maintaining the confidentiality of your Audible Account(s) and for restricting access to your computer(s) or device(s), and you agree to accept responsibility for all activities that occur under any of your Audible Accounts. Audible does sell products for children, but it sells them to adults, who can purchase with a credit card or other permitted payment method. If you are under 18, you may use the Audible Service only with the involvement of a parent or guardian. Audible reserves the right to refuse service, terminate accounts, remove or edit content, or cancel orders in its sole discretion.


We may permit visitors to post reviews, comments, photos, and other content; send messages and other communications; and submit suggestions, ideas, comments, questions, or other information. You agree that any content you contribute and any communications you send using means we provide will not be illegal, obscene, threatening, defamatory, invasive of privacy, infringing of intellectual property rights, or otherwise injurious to third parties or objectionable and does not consist of or contain software viruses, political campaigning, commercial solicitation, chain letters, mass mailings, or any form of "spam." You may not use a false e-mail address, impersonate any person or entity, or otherwise mislead as to the origin of a message or other content. We reserve the right (but not the obligation) to remove or edit such content, but we do not regularly review posted content.

If you do post content or submit any material to us, and unless we indicate otherwise, you grant us a nonexclusive, royalty-free, perpetual, irrevocable, and fully sublicensable right to use, reproduce, modify, adapt, publish, translate, create derivative works from, distribute, and display such content throughout the world in any media. You grant Audible and its sublicensees the right to use the name that you submit in connection with such content, if they choose. You represent and warrant that you own or otherwise control all of the rights to the content that you post; that the content is accurate; that use of the content you supply does not violate this policy and will not cause injury to any person or entity; and that you will indemnify Audible for all claims resulting from content you supply. We reserve the right (but not the obligation) to monitor and edit or remove any activity or content. Audible takes no responsibility and assumes no liability for any content posted by you or any third party.


Audible respects the intellectual property of others. If you believe that your work has been copied in a way that constitutes copyright infringement, please follow our Notice and Procedure for Making Claims of Copyright Infringement.


Audible attempts to be as accurate as possible. However, Audible does not warrant that product descriptions or content available through the Audible Service is accurate, complete, reliable, current, or error-free.


In addition to these Conditions of Use, the terms found here apply to any software (including any updates or upgrades to the software and any related documentation) that we make available to you from time to time for your use in connection with the Audible Service (the "Audible Software").


We may offer content from parties other than Audible and may permit parties other than Audible to provide services or sell products through the Audible Service. We may also provide links through the Audible Service to the websites of affiliated companies and certain other businesses. We are a distributor, not a publisher, of any materials we offer from third parties and are not responsible for examining or evaluating, and we do not warrant the offerings of, any of these businesses or individuals, the content we obtain from them or the content of their websites. Audible does not assume any responsibility or liability for the actions, product, and content of any third parties. You should carefully review their privacy statements and other conditions of use.


We reserve the right to remove or disable access to any Audible Content or any other materials posted to or otherwise displayed through the Audible Service, including any Audible Content that violates or otherwise allegedly infringes on the copyright or other intellectual property, proprietary, or other rights of any person, company or other entity. We will not be liable for the removal of or disabling of access to any Audible Content or materials.


Your right to use the Audible Service will automatically terminate if you violate these Conditions of Use or any other Terms. In case of such termination, we may terminate your access to the Audible Service without notice and you will not receive a full or partial refund of any fees already paid. Our failure to insist upon or enforce your strict compliance with the Conditions of Use or any other Terms will not constitute a waiver of any of our rights.


Our business may change over time and we reserve the right to modify the Audible Service. We also reserve the right to suspend or discontinue the Audible Service or your use of the Audible Service, in whole or in part, at any time with or without notice and without liability to you. In the event that we exercise such right, you may be entitled to a full or partial refund, in our sole discretion, if you are a member of an Audible Plan (as defined in the Audible Plan Terms) or with respect to any purchase you've made.






Any dispute or claim relating in any way to your use of the Audible Service will be resolved by binding arbitration, rather than in court, except that you may assert claims in small claims court if your claims qualify. The Federal Arbitration Act and federal arbitration law apply to this agreement.

There is no judge or jury in arbitration, and court review of an arbitration award is limited. However, an arbitrator can award on an individual basis the same damages and relief as a court (including injunctive and declaratory relief or statutory damages), and must follow the terms of these Conditions of Use as a court would.

To begin an arbitration proceeding, you must send a letter requesting arbitration and describing your claim to our registered agent: Corporation Service Company, 300 Deschutes Way SW, Suite 304, Tumwater, WA 98051. The arbitration will be conducted by the American Arbitration Association (AAA) under its rules, including the AAA's Supplementary Procedures for Consumer-Related Disputes. The AAA's rules are available at or by calling 1-800-778-7879. Payment of all filing, administration and arbitrator fees will be governed by the AAA's rules. We will reimburse those fees for claims totaling less than $10,000 unless the arbitrator determines the claims are frivolous. Likewise, Audible will not seek attorneys' fees and costs in arbitration unless the arbitrator determines the claims are frivolous. You may choose to have the arbitration conducted by telephone, based on written submissions, or in person in the county where you live or at another mutually agreed location.

We each agree that any dispute resolution proceedings will be conducted only on an individual basis and not in a class, consolidated or representative action. If for any reason a claim proceeds in court rather than in arbitration we each waive any right to a jury trial. We also both agree that you or we may bring suit in court to enjoin infringement or other misuse of intellectual property rights.


By using the Audible Service, you agree that the Federal Arbitration Act, applicable federal law, and the laws of the State of Washington, without regard to principles of conflict of laws, will govern these Conditions of Use and any dispute of any sort that might arise between you and Audible.


Please review our Terms. We reserve the right to make changes to the Audible Service, these Conditions of Use and any Terms at any time. Your continued use of the Audible Service following any changes will indicate your acceptance of such changes. If you do not agree to a change, you must immediately stop using the Audible Service. If any Terms or these Conditions of Use are deemed invalid, void, or for any reason unenforceable, that condition or term shall be deemed severable and shall not affect the validity and enforceability of any remaining condition or term.


Audible, Inc.
One Washington Park
Newark, NJ 07102 USA

Audible Purchase Terms and Conditions

Any user may purchase Audible Content on an "A La Carte" basis. Audible members also may purchase content using membership credits in accordance with the terms set forth in the Audible Plan Terms. By making a purchase through the Audible Service you agree to be bound by these Audible Purchase Terms and Conditions.

Purchases of Audible Content

  1. Audible Content License. When you purchase Audible Content, Audible grants you a limited, revocable, non-exclusive, non-transferable license to download or stream such Audible Content to your computer and/or other device(s) solely for your personal, non-commercial use. You agree to not otherwise copy, reproduce, distribute or use the Audible Content other than as expressly set forth herein. You will not sell, transfer, lease, modify, distribute or publicly perform the Audible Content in any manner and you will not exploit it commercially. You agree to not modify, reverse engineer, decompile or disassemble the Audible Content, or otherwise tamper with the Audible Content or create any derivative works therefrom.
  2. Pricing. With respect to all A La Carte purchases, except where noted otherwise, any list price displayed represents the full retail price listed on the Audible Content itself, as determined by Audible, or as suggested by the manufacturer or supplier, or estimated in accordance with standard industry practice; or the estimated retail value for a comparably featured item offered elsewhere. Prices are subject to change at any time in Audible's sole discretion. Audible cannot confirm the price of an item until you order. Despite our best efforts, a small number of the items in our catalog may be mispriced. If an item's correct price is higher than our stated price, we may at our discretion cancel your order.
  3. Delivery of Audible Content. All Audible Content you purchased will be delivered to your Audible Account.
  4. Risk of Loss. Once we have made Audible Content available to you, you will bear the risk of loss for completing any download of Audible Content after purchase and for any loss of Audible Content you have downloaded, including any loss due to a file corruption or a device or hard drive crash. Purchased Audible Content will generally continue to be available in your Audible Account but may become unavailable due to possible content provider licensing restrictions or other reasons, and Audible will not be liable to you if Audible Content becomes unavailable for further download. You will not receive a full or partial refund of any fees already paid in such situations. Accordingly, we encourage you to download Audible Content promptly after purchase and to make a back-up copy. If you are unable to complete a download after having reviewed our online help resources, please contact Audible customer service.
  5. Payments.You must have a valid payment instrument, such as a credit card or other permitted payment method, on file in your Audible Account in order to use the Audible Service. If you are using your Amazon account to access the Audible Service, your default payment instrument will be the default payment instrument you use for purchases from If you want to designate a different payment instrument, you must change your authorized payment instrument information online at the "My Account" section of the Audible Service.
  6. Subscriptions. Any user may purchase subscriptions to recurring content such as newspapers and magazines on a monthly basis or other recurring basis depending on the recurrence of the content ("Subscriptions"). Only credit cards are eligible for payment of Subscriptions. Do not sign up for a Subscription with a debit card. Also known as a "check" or "ATM" card, a debit card typically has the word "debit" printed on the face of the card. If you purchase a Subscription, you will be charged the full price of the Subscription at the beginning of the Subscription term. If your default payment instrument is declined for any reason, Audible may charge any credit card on file with your Amazon account. Subscriptions may be purchased on an A La Carte basis or by members with credits. With respect to any Subscriptions purchased on an A La Carte basis, if you cancel your Subscription before the initial term has expired, you may be entitled to a refund depending upon whether there is a shorter Subscription available for the relevant Audible Content. You will be obligated to pay based upon the Subscription term length closest to the number of months your Subscription was active. For example, if you signed up for a 12 month Subscription and wish to cancel after 5 months, then: (A) if a 6 month Subscription term is available, you would be charged for a 6 month Subscription and refunded the difference between the 12 month and 6 month Subscriptions, or (B) if only a 12 month term is available, you would be charged for the 12 month Subscription.


Audible sometimes allows customers to pre-order items with a future release date. If you pre-order an item using membership credits, gift cards or promotional codes, they will be consumed upon submission of the pre-order. If you pre-order an item using a credit card, it will not be charged until the item is released and available for you to download. If for whatever reason the item is not released, the order will be cancelled, the membership credits or the consumed value of gift cards and promotional codes will be returned to your account and the credit card will not be charged, as applicable.

Pre-order Price Guarantee

Audible's price for not-yet-released items sometimes changes between the time the item is listed for sale and the time it is released and available for download. Whenever you pre-order an item, the price we will charge when we make it available to you for download will be the lowest of (a) the price at the time you placed the order and (b) the price at the time and date the item is released.

Terms and Conditions:

  1. The Pre-order Price Guarantee applies to not-yet-released items available for pre-order. All pre-orders appearing on your "My Pre-orders" page will benefit from the Pre-order Price Guarantee.
  2. The Pre-order Price Guarantee does not apply to other items that have already been released and are available for purchase and download.
  3. If the price of an item you have pre-ordered is higher on the release date, Audible will fulfill the order as originally placed so you will be charged the lower order-date price.
  4. If the price of an item you have pre-ordered is lower on the release date, Audible will fulfill the order as originally placed and immediately thereafter automatically refund your credit card for the difference between the price you were charged and the lower release-date price.

Audible Plan Terms

Audible offers various membership plans ("Audible Plans") for using and paying for the Audible Service. Audible Plans are subject to the terms below and those disclosed through the Audible Service. Membership in an Audible Plan is nontransferable.

  1. AudibleListener Membership Plans. AudibleListener Membership Plans are automatically renewable on a monthly or yearly basis, depending on the plan, until terminated by you or us in accordance with these Audible Plan Terms. Audible will charge your default payment instrument the applicable membership fee on your renewal date. If your default payment method is declined for any reason, Audible may charge any payment instrument on file with your Amazon account.
    1. Gold and Platinum Membership Plans. The Gold and Platinum Membership Plans are generally the same, however, the number of Credits that Platinum Members receive is greater. The Gold and Platinum Plans are subject to the following terms:
      1. Annual or Monthly. Each of these membership plans is available either on a monthly or annual basis. Audible will charge the applicable monthly or yearly fee for such membership plan on the member's monthly or yearly renewal date, depending on which plan the member selects. Annual members will receive the entire year's credits at the start of their membership and upon any renewal. Monthly members will receive the applicable amount of credits each month.
      2. Rollover. Gold and Platinum Members are allowed to rollover a certain number of unused Credits ("AudibleListener Rollover").
        1. Monthly Memberships. The number of permissible AudibleListener Rollover Credits will be specified at the time the member starts their plan. If in any given month a monthly member has more than the permitted number of AudibleListener Rollover Credits, the additional unused credits will automatically expire.
        2. Annual Memberships. Gold annual members may rollover up to 6 unused Credits to the next year of membership and Platinum annual members may rollover up to 12 unused Credits to the next year of membership.
      3. Discounted A La Carte Content. Members with an active Gold or Platinum Membership Plan may purchase content on an A La Carte basis below the non-membership regular price.
      4. Subscriptions. All members receive one complimentary Subscription to Audible Content to be determined by Audible.
    2. AudibleListener Light Plan. The AudibleListener Light Plan is available only on an annual basis and only to Gold and Platinum Members who want to downgrade their plan type. AudibleListener Light Plan members do not receive membership credits but a Gold or Platinum Member converting to the AudibleListener Light Plan may have AudibleListener Rollover Credits that they can rollover when they downgrade. Audible will charge members who downgrade to the AudibleListener Light Plan the yearly plan fee each year on the yearly renewal date.
    3. Basic Membership Plan. The Basic Membership Plan is available only to existing Basic Members. The Basic Membership is no longer available to new or Gold and Platinum AudibleListener Members. Any changes to the Basic Membership Plan will be communicated to existing Basic Members by Audible.
  2. Committed Membership Plans. Certain members may receive a gift for joining (such as a discount on the purchase of a device) in exchange for their commitment to remain a member for the period of time specified at the time of enrollment. Members who sign up to a committed membership plan and receive the gift benefit will not be able to cancel the plan prior to the expiration of the initial term of the plan.
  3. Trial Offers. Audible may, in its sole discretion, make available free or paid trial offers for a monthly or annual Gold or Platinum Membership Plan, the terms of which will be more fully explained on the Audible Service (a "Trial Offer"). You must have a valid payment instrument, such as a credit card or other permitted payment method, on file in your Audible Account in order to initiate a Trial Offer. Audible may request a temporary authorization from the financial institution issuing your credit card or other payment instrument in order to confirm the validity of the credit card or other payment instrument to verify your eligibility to participate in any Trial Offer. Any Credits issued in connection with a Trial Offer or Audible Content purchased with such Credits are issued and provided subject to such verification and may be revoked by Audible in the event that such verification fails. Upon expiration of the trial, you will automatically be joined into the related Gold or Platinum Membership Plan and Audible will charge your default payment instrument the relevant monthly fee or annual fee, as applicable. If your default payment method is declined for any reason, Audible may charge any credit card on file with your Amazon account. YOU MUST CANCEL YOUR SUBSCRIPTION PRIOR TO THE END OF THE TRIAL OFFER TO AVOID CHARGES. Trial Offers are limited to one per household.
  4. Credits. Audible Plan members receive credits that may be used to purchase Audible Content on the Audible Service ("Credits"). Credits may only be used to purchase Audible Content. If you purchase Audible Content in excess of the number of available Credits under your Audible Plan, your default payment instrument will be billed the discounted price for the applicable Audible Content available to Audible Plan members. Credits include Membership Credits, Rollover Credits, and Complimentary Credits, as described below. Credits are nontransferable. Credits that do not rollover, expire in accordance with their terms.
    1. Membership Credits. Membership credits are Credits that Gold and Platinum Members receive on a monthly or annual basis.
    2. AudibleListener Rollover Credits. All Gold and Platinum Members are permitted a certain number of AudibleListener Rollover Credits, as described above.
    3. Complimentary Credits. Complimentary Credits are Credits that Audible gives Audible Plan members and non-members through goodwill, member anniversaries, no-risk listen opportunities, or in other situations, in each case, as determined by Audible in its sole discretion. Complimentary Credits are credited to a member's Audible Account. Complimentary Credits expire in accordance with their terms. You must have an Audible Account in order to receive Complimentary Credits.
  5. Audible Plan Prices. Prices of Audible Plans are subject to change at any time. Prices of committed membership plans are not subject to change during the initial commitment period.
  6. Upgrading or Downgrading a Plan. You may upgrade your Audible Plan on the Audible Service. You may also, subject to any minimum term commitment that may apply, downgrade your Audible Plan online or by contacting Audible customer service. Such Audible Account changes will be effective as of the date of your request and your membership will become subject to the new plan you selected. Audible Plans may be upgraded or downgraded as follows:
    1. Gold and Platinum Membership Plans.
      1. Upgrades. Gold Members can upgrade to a Platinum Membership Plan. Any available Credits, including any AudibleListener Rollover Credits, that a Gold Member has accumulated will be transferred to the new upgraded plan in accordance with the rules for the new membership plan. Upon any upgrade, Audible will charge your default payment instrument the pro-rated additional fee for the Platinum Membership Plan. If your default payment instrument is declined for any reason, Audible may charge any credit card on file with your Amazon account. Platinum Members cannot upgrade to another Audible Plan.
      2. Downgrades. Gold and Platinum Members can downgrade to the AudibleListener Light Plan and Platinum Members can downgrade to a Gold Membership Plan or AudibleListener Light Plan. Any available Credits, including any AudibleListener Rollover Credits, will be transferred to the new downgraded membership plan, in accordance with the rules for such new membership plan. Any complimentary Subscription that you receive as part your Gold or Platinum Membership Plan will expire upon any downgrade to the AudibleListener Light Plan.
    2. Committed Membership Plans. If you joined a Committed Membership Plan, you may only upgrade or downgrade to another Audible Plan once the term for your current Committed Membership Plan expires. After the expiration of the Commitment Period, members will automatically become a regular Gold Member or Platinum Member, depending on the plan they chose, and may upgrade or downgrade their plan, as set forth in these Audible Plan Terms.
    3. AudibleListener Light Plan. Gold and Platinum Members who have downgraded to the AudibleListener Light Plan can upgrade again to either a Gold Membership Plan or a Platinum Membership Plan at any time. Any available Credits will be transferred to the new membership plan and may become AudibleListener Rollover Credits, subject to the rules for the new membership plan. AudibleListener Light Plan Members cannot downgrade to another Audible Plan.
  7. Cancellation of Audible Plans. Except for members belonging to committed membership plans, you may cancel your Audible Plan online or by contacting Audible customer service. Upon cancellation of any membership, all available Credits, other than Gift Credits or Complimentary Credits, will expire, and all complimentary Subscriptions will expire. Members will not receive a full or partial refund of any monthly or annual fee already paid.
  8. Audible's 'Great Listen Guarantee' is an exclusive benefit available to AudibleListener plan members in good standing. A member in good standing who is not fully satisfied with his or her Audible audiobook may exchange that specific title for a different title within 365 days of the original date of purchase. Titles purchased with credits may be refunded with credits. Titles purchased with money will be refunded with money. Titles purchased using a combination of money and a coupon or promotional code will be refunded with money and a new coupon or promotional code. Audible reserves the right in its sole discretion to limit the number of exchanges and refunds allowed by each member, including, but not limited to, in cases where Audible suspects abuse of the spirit of the program. Audible may change these terms and conditions or may cancel the program with respect to any or all participants at any time. Void where prohibited.

Notice And Procedure For Making Claims Of Copyright Infringement

If you believe that your work has been copied in a way that constitutes copyright infringement, please provide Audible's copyright agent the written information specified below. Please note that this procedure is exclusively for notifying Audible that your copyrighted material has been infringed.

  1. A description of the copyrighted work that you claim has been infringed upon
  2. A description of where the material that you claim is infringing is located on the Audible Service;
  3. Your address, telephone number and e-mail address;
  4. A statement by you that you have a good-faith belief that the disputed use is not authorized by the copyright owner, its agent, or the law;
  5. A statement by you, made under penalty of perjury, that the above information in your notice is accurate and that you are the copyright owner or authorized to act on the copyright owner's behalf; and
  6. An electronic or physical signature of the person authorized to act on behalf of the owner of the copyright interest.

Audible's Copyright Agent for notice of claims of copyright infringement on the Audible Service can be reached as follows:

Copyright Agent
Audible, Inc. Legal Department
One Washington Park
Newark, NJ 07102 USA
phone: (973) 820-0686



  1. Use of the Audible Software. You may use Audible Software solely for the purposes of enabling you to use and enjoy the Audible Service as provided by Audible, and as permitted by the Conditions of Use, these Additional Software Terms and any applicable Terms. You may not incorporate any portion of the Audible Software into your own programs or compile any portion of it in combination with your own programs, transfer it for use with another service, or sell, rent, lease, lend, loan, distribute or sub-license the Audible Software or otherwise assign any rights to the Audible Software in whole or in part. You may not use the Audible Software for any illegal purpose. We may cease providing any Audible Software and we may terminate your right to use any Audible Software at any time. Your rights to use the Audible Software will automatically terminate without notice from us if you fail to comply with any of these Additional Software Terms, the Conditions of Use or any applicable Terms. Additional third party terms contained within or distributed with certain Audible Software that are specifically identified in related documentation may apply to that Audible Software and will govern the use of such software in the event of a conflict with the Conditions of Use or these Additional Software Terms. All software used in the Audible Service is the property of Audible or its software suppliers and protected by United States and international copyright laws.
  2. Use of Third Party Services. When you use the Audible Software, you may also be using the services of one or more third parties, such as a wireless carrier or a mobile platform provider. Your use of such third party services may be subject to the separate policies, terms of use, and fees of such third parties.
  3. No Reverse Engineering. You may not, and you will not encourage, assist or authorize any other person to modify, reverse engineer, decompile or disassemble, or otherwise tamper with, the Audible Software, whether in whole or in part, or create any derivative works from or of the Audible Software.
  4. Updates. In order to keep the Audible Software up-to-date, we may offer automatic or manual updates at any time and without notice to you.
  5. Export Regulations; Government End Users. You must comply with all export and re-export restrictions and regulations of the Department of Commerce and other United States agencies and authorities that may apply to the Audible Software. If you are a U.S. Government end user, we are licensing the Audible Software to you as a "Commercial Item" as that term is defined in the U.S. Code of Federal Regulations (see 48 C.F.R. § 2.101), and the rights we grant you to the Audible Software are the same as the rights we grant to all others under the Conditions of Use and these Additional Software Terms.

Sent via iPhone