.
tEC Fair Play Matching, by ePrio
Remember these conventions for your convenience
PC configuration Check
ePrio's maintenance Schedule Check
Cut and Paste for Dummies Check
How to start tEC next time Check
Do not use Browser Back Button within tEC Check
Just in time Help Check
tEC Time Out Check
By invitation only from another tEC user
Please have ready the registration key and password
provided on your personal invitation.
and click on the Start button:
you will be asked to agree to comply with the ePrio Inc. software license.
Interact with desirable correspondents in total privacy
thanks to the
Match & Mail engine of
- Spamless, secure exchanges - Precise, mutual matches - Hands off confidentiality -
- protected under US Patents Number 6,092,197 and 7,945,954 and US Patent Application 2009/0076914 -
Back






.



Check your PC configuration and ePrio's maintenance Schedule



Your browser must be either Explorer, version 5.5 or above, or Firefox, version 1.5. or above
tEC has been tested under Windows only. Behavior under Unix or Mac OS X is unknown.

Configurations not supported at this time: Netscape browsers

If your browser has not enabled the Java Virtual Machine of Sun Micro Systems,
you will be asked to enable it or download one from Sun Micro Systems.

Some browsers, e.g. Explorer V7, require you to edit security options before downloading tEC.

click here for more detailed information.

ePrio has set aside the following times for routine maintenance:
  • Every week: on Fridays, from 5 to 6 pm Eastern Standard Time
  • Every month: the first of each month, from 6 am to 6 pm Eastern Standard Time
During these periods, it is strongly recommended that you abstain from downloading or using tEC



top














.


Master Cut and Paste

To start executing tECmail or Fair Play on your PC, you will need to do a cut and paste.
If you are not familiar with this, here is an example:
Source: - Target

-1- Move the mouse over the source field
press on the left button and sweep the field from left to right (it will be highlighted)
release the left button

-2- Position the mouse over the field thus selected and click on the right button.
Move the mouse on the command 'Copy' and click on the left button.

-3- Now move the mouse over the target field,
and redo steps 1 and 2, using the command 'Paste' instead.
The target should now reflect the value of the source.

If you have any difficulty, you can always:
type in the content of the source field by hand into the target field,
or ask someone who is more familiar with computers


top














.





Find out how to come back to tEC after leaving it



make tEC into your favorite:

when you see the white on red tEC logo (on the local launch page)
click on the cell at the bottom right.


ordinary users can also

use Explorer to open page C:\eprivacy\tec\tec.html

or go back to the invitation URL and re-Start
then, upon request, choose not to change the tEC version already installed on your PC




top














.






Do not use the Back button of your browser




Abstain from using the Back button of your browser.

Instead, use such buttons as made available by tEC:
"Exit", "Close", "Withhold", "Review"...

To understand why, here is an example:

you have authorized tEC to send some confidential data to a known third party,
going back does not make sense: the data is already transmitted.


top














.






To get help, allow local pop-ups and click the mouse over the "?" buttons






The "?" Button provides a short pop-up explanation on the button immediately to its left
or on the column of buttons immediately below.

If you block pop-ups, you must allow them from your own machine, as tEC runs on it.




top














.






To get help, click the mouse over the "?" buttons






The "?" Button provides a short explanation on the button immediately to its left
or on the column of buttons immediately below.




top














.






Know that, let idle too long, your personal file will close automatically




This feature will protect you in case you take a coffeee break
while leaving your registration file open by mistake

If this feature is triggered as you think over your next action
we ask for your understanding

In all cases, your data will be saved.


top














.
(***) Legal Notices
The tEC platform client is FREE FOR COMMERCIAL AND NON-COMMERCIAL USE and can be freely redistributed as long as the following conditions are adhered to.
- No duplication or redistribution is made except through the download of a so-called trusted applet bearing the developer's certificate of ePrio Inc.
- No modification is made to such trusted applet package without the prior and explicit consent of ePrio Inc.

THIS SOFTWARE and ANY SERVICE BASED ON ITS USE ARE PROVIDED BY ePrio Inc ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ePrio Inc BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE and ANY SERVICE BASED ON ITS USE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

tEC includes a binary version of Cryptix-Java V2.2 covered by the following license:
Copyright © 1995, 1996, 1997 Systemics Ltd (http://www.systemics.com/) on behalf of the Cryptix Development Team (http://www.systemics.com/docs/cryptix/). All rights reserved.
This library and applications are FREE FOR COMMERCIAL AND NON-COMMERCIAL USE as long as the following conditions are adhered to.
Copyright remains with Systemics Ltd, and as such any Copyright notices in the code are not to be removed. If this code is used in a product, the Cryptix Development Team should be given attribution as the author of the parts used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1.Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2.Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3.All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the Cryptix Development Team (http://www.systemics.com/docs/cryptix/)

THIS SOFTWARE IS PROVIDED BY SYSTEMICS LTD ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.





top