SlideShare a Scribd company logo
1 of 3
Download to read offline
sales@ideascale.com +1 (206) 395-451 

© 2012 IdeaScale
Security and Support| Page 2

Security Matters
IdeaScale has been an SaaS (Software as a Service) based company since 2003. With that experience, comes
years of expertise keeping Fortune 500 data safe and secure. We employ a variety of security techniques
that any enterprise IT department has come to expect.
• SAS 70 Type II Servers: Your community will be as secure as possible on dedicated servers housed
at one of the most trusted data centers in the world. Our enterprise servers have undergone
extensive security reviews and stringent audits to earn the SAS 70 type II stamp of approval.
• SSL Security: All IdeaScale communities support full SSl encryption. Also, our email servers are
configured with tlS to support encryption between mail servers. This minimizes any chances of packet
inspection between servers.
• Single Sign-On: Single Sign-on (SSO) allows users to access the IdeaScale community with the
credentials of an existing company Intranet. Your choice of SAML or cookie based SSO can be used
with popular authentication systems such as Active directory (AD) or IDAP.
• Blacklist: IdeaScale synchronizes with popular IP
blacklists to completely lock out access to IP addresses
that are known to be fraudulent.

About IdeaScale

•Firewall: As part of the SAS 70 Type II certification,
IdeaScale’s firewall software is scanned on a monthly
basis by an approved third-party auditing firm.

IdeaScale has developed an idea
crowdsourcing technology that empowers
communities to drive innovation.

Support
IdeaScale offers dedicated support to our enterprise
customers. If you can’t find the solution to your problem
online, our support team spans the globe to make sure that
there is always someone there to answer your question.
• Up-time guarantee: enterprise customers are
guaranteed 99.99% uptime.
•Email: 24x7 email support.
•System Monitoring: Full 24x7 system monitoring of
all servers.

The software allows organizations to
involve people that matter to them by
collecting their ideas and giving them a
platform to vote. The most important ideas
bubble to the top.
More and more software companies are
using crowdsourcing coupled with social
media technologies to greatly increase the
quality of feedback for their organization.
In addition to being an industry leader in
idea management software, IdeaScale leads
its competitors in the security of its
communities, its full support offerings, and
its protections from community abuse.

•Knowledge Base: unlimited access to online support. Over 500 help articles featuring screenshots
and videos at http://support.ideascale.com.
sales@ideascale.com +1 (206) 395-451 

© 2012 IdeaScale
Security and Support | Page 3

• Community: Feedback and suggestions can be submitted to IdeaScale’s own IdeaScale at
http://ideas.ideascale.com

Eliminating community Abuse
Community abuse like ballot box stuffing and SPAMing can be very detrimental to the success of your
feedback initiative. That’s why IdeaScale provides a number of methods to prevent nefarious individuals
and spambots from exploiting the community.
• Double Opt-in Verification and Captcha - IdeaScale offers the
ability to require recaptcha verification upon user registration. This
simple technique helps to prevent automated scripts from creating
fake accounts.
• Email-Based Access Restrictions - A very simply and elegant way to
limit user registrations to your own organization can be accomplished
via email based access restrictions. Basically, you can configure your
IdeaScale community to only allow registration if the user signs up
with the email address domain for your organization (ex:
@xyzcompany.com).
• IP-Based Access Restrictions - Similar to email based access
restrictions, access to your IdeaScale community can be restricted to
only a specific IP address range.
• Community Flagging - IdeaScale leverages the power of the crowd
to help moderate your community. Any IdeaScale community member
can flag an idea or comment for review by your moderators.

“One of the best things about the
IdeaScale solution is that it saves
the team both time and debate on
identifying new features for each
upcoming release. We know
what’s important to include as
well as why. It is a place for people
to constantly add and suggest new
feedback and we’ve found that it’s
a great way to communicate with
others about why we implement
those changes.”
Shane Lovellette,
Product Manager,
TechSmith

• Profanity Filter - Ideascale can be configured to prevent community members from submitting text
with specific words. The system checks against the seven most common curse words and any
additional words added by the community moderator. Comments or ideas in violation are placed in a
moderation queue for censoring or deletion.
• Fraudulent Activity Detection - There are many fraud detection features under the hood within
IdeaScale that are constantly working to protect your community. IdeaScale employs a host of
techniques to detect scripts/bots and prevents them from creating accounts, applying fraudulent
votes, or submitting spam or phishing posts to your community.
• Domain Restrictions - Similar to email-based access restrictions, IdeaScale gives you the option to
block a list of domains from registration. This is most commonly used to restrict registration from
users using free accounts.
If you have a concern regarding community abuse that you think may not be covered by the features above, let us
know. We are committed to providing you and your community members the best experience possible.
sales@ideascale.com +1 (206) 395-451 

© 2012 IdeaScale

More Related Content

More from IdeaScale

Case Study: University of Vermont
Case Study: University of VermontCase Study: University of Vermont
Case Study: University of VermontIdeaScale
 
Case Study: Ottawa Public Library
Case Study: Ottawa Public LibraryCase Study: Ottawa Public Library
Case Study: Ottawa Public LibraryIdeaScale
 
Case Study: OpenMaps
Case Study: OpenMapsCase Study: OpenMaps
Case Study: OpenMapsIdeaScale
 
Case Study: NIIT Tech
Case Study: NIIT TechCase Study: NIIT Tech
Case Study: NIIT TechIdeaScale
 
Case Study: Making All Voices Count
Case Study: Making All Voices CountCase Study: Making All Voices Count
Case Study: Making All Voices CountIdeaScale
 
Case Study: Environmental Protection Agency
Case Study: Environmental Protection AgencyCase Study: Environmental Protection Agency
Case Study: Environmental Protection AgencyIdeaScale
 
Case Study: City of Ottawa
Case Study: City of OttawaCase Study: City of Ottawa
Case Study: City of OttawaIdeaScale
 
Case Study: City of Huntsville
Case Study: City of HuntsvilleCase Study: City of Huntsville
Case Study: City of HuntsvilleIdeaScale
 
Case Study: The Cheesecake Factory
Case Study: The Cheesecake FactoryCase Study: The Cheesecake Factory
Case Study: The Cheesecake FactoryIdeaScale
 
Presentation: Successful Citizen Engagement
Presentation: Successful Citizen EngagementPresentation: Successful Citizen Engagement
Presentation: Successful Citizen EngagementIdeaScale
 
Presentation: Harnessing the Collective Wisdom of the Crowd
Presentation: Harnessing the Collective Wisdom of the CrowdPresentation: Harnessing the Collective Wisdom of the Crowd
Presentation: Harnessing the Collective Wisdom of the CrowdIdeaScale
 
Presentation: IT Innovation Crisis - Getting to the Culture of Yes
Presentation: IT Innovation Crisis - Getting to the Culture of YesPresentation: IT Innovation Crisis - Getting to the Culture of Yes
Presentation: IT Innovation Crisis - Getting to the Culture of YesIdeaScale
 
Infographic: IdeaScale Innovation Methodology
Infographic: IdeaScale Innovation MethodologyInfographic: IdeaScale Innovation Methodology
Infographic: IdeaScale Innovation MethodologyIdeaScale
 
Case Study: NASA Mars Forum
Case Study: NASA Mars ForumCase Study: NASA Mars Forum
Case Study: NASA Mars ForumIdeaScale
 
Case Study: Georgetown University
Case Study: Georgetown UniversityCase Study: Georgetown University
Case Study: Georgetown UniversityIdeaScale
 
Case Study: Cerebral Palsy Alliance
Case Study: Cerebral Palsy AllianceCase Study: Cerebral Palsy Alliance
Case Study: Cerebral Palsy AllianceIdeaScale
 
Presentation: Crowdopolis
Presentation: Crowdopolis Presentation: Crowdopolis
Presentation: Crowdopolis IdeaScale
 

More from IdeaScale (17)

Case Study: University of Vermont
Case Study: University of VermontCase Study: University of Vermont
Case Study: University of Vermont
 
Case Study: Ottawa Public Library
Case Study: Ottawa Public LibraryCase Study: Ottawa Public Library
Case Study: Ottawa Public Library
 
Case Study: OpenMaps
Case Study: OpenMapsCase Study: OpenMaps
Case Study: OpenMaps
 
Case Study: NIIT Tech
Case Study: NIIT TechCase Study: NIIT Tech
Case Study: NIIT Tech
 
Case Study: Making All Voices Count
Case Study: Making All Voices CountCase Study: Making All Voices Count
Case Study: Making All Voices Count
 
Case Study: Environmental Protection Agency
Case Study: Environmental Protection AgencyCase Study: Environmental Protection Agency
Case Study: Environmental Protection Agency
 
Case Study: City of Ottawa
Case Study: City of OttawaCase Study: City of Ottawa
Case Study: City of Ottawa
 
Case Study: City of Huntsville
Case Study: City of HuntsvilleCase Study: City of Huntsville
Case Study: City of Huntsville
 
Case Study: The Cheesecake Factory
Case Study: The Cheesecake FactoryCase Study: The Cheesecake Factory
Case Study: The Cheesecake Factory
 
Presentation: Successful Citizen Engagement
Presentation: Successful Citizen EngagementPresentation: Successful Citizen Engagement
Presentation: Successful Citizen Engagement
 
Presentation: Harnessing the Collective Wisdom of the Crowd
Presentation: Harnessing the Collective Wisdom of the CrowdPresentation: Harnessing the Collective Wisdom of the Crowd
Presentation: Harnessing the Collective Wisdom of the Crowd
 
Presentation: IT Innovation Crisis - Getting to the Culture of Yes
Presentation: IT Innovation Crisis - Getting to the Culture of YesPresentation: IT Innovation Crisis - Getting to the Culture of Yes
Presentation: IT Innovation Crisis - Getting to the Culture of Yes
 
Infographic: IdeaScale Innovation Methodology
Infographic: IdeaScale Innovation MethodologyInfographic: IdeaScale Innovation Methodology
Infographic: IdeaScale Innovation Methodology
 
Case Study: NASA Mars Forum
Case Study: NASA Mars ForumCase Study: NASA Mars Forum
Case Study: NASA Mars Forum
 
Case Study: Georgetown University
Case Study: Georgetown UniversityCase Study: Georgetown University
Case Study: Georgetown University
 
Case Study: Cerebral Palsy Alliance
Case Study: Cerebral Palsy AllianceCase Study: Cerebral Palsy Alliance
Case Study: Cerebral Palsy Alliance
 
Presentation: Crowdopolis
Presentation: Crowdopolis Presentation: Crowdopolis
Presentation: Crowdopolis
 

Recently uploaded

Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 

Recently uploaded (20)

Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 

White Paper: Ideascale Security and Support

  • 1. sales@ideascale.com +1 (206) 395-451 © 2012 IdeaScale
  • 2. Security and Support| Page 2 Security Matters IdeaScale has been an SaaS (Software as a Service) based company since 2003. With that experience, comes years of expertise keeping Fortune 500 data safe and secure. We employ a variety of security techniques that any enterprise IT department has come to expect. • SAS 70 Type II Servers: Your community will be as secure as possible on dedicated servers housed at one of the most trusted data centers in the world. Our enterprise servers have undergone extensive security reviews and stringent audits to earn the SAS 70 type II stamp of approval. • SSL Security: All IdeaScale communities support full SSl encryption. Also, our email servers are configured with tlS to support encryption between mail servers. This minimizes any chances of packet inspection between servers. • Single Sign-On: Single Sign-on (SSO) allows users to access the IdeaScale community with the credentials of an existing company Intranet. Your choice of SAML or cookie based SSO can be used with popular authentication systems such as Active directory (AD) or IDAP. • Blacklist: IdeaScale synchronizes with popular IP blacklists to completely lock out access to IP addresses that are known to be fraudulent. About IdeaScale •Firewall: As part of the SAS 70 Type II certification, IdeaScale’s firewall software is scanned on a monthly basis by an approved third-party auditing firm. IdeaScale has developed an idea crowdsourcing technology that empowers communities to drive innovation. Support IdeaScale offers dedicated support to our enterprise customers. If you can’t find the solution to your problem online, our support team spans the globe to make sure that there is always someone there to answer your question. • Up-time guarantee: enterprise customers are guaranteed 99.99% uptime. •Email: 24x7 email support. •System Monitoring: Full 24x7 system monitoring of all servers. The software allows organizations to involve people that matter to them by collecting their ideas and giving them a platform to vote. The most important ideas bubble to the top. More and more software companies are using crowdsourcing coupled with social media technologies to greatly increase the quality of feedback for their organization. In addition to being an industry leader in idea management software, IdeaScale leads its competitors in the security of its communities, its full support offerings, and its protections from community abuse. •Knowledge Base: unlimited access to online support. Over 500 help articles featuring screenshots and videos at http://support.ideascale.com. sales@ideascale.com +1 (206) 395-451 © 2012 IdeaScale
  • 3. Security and Support | Page 3 • Community: Feedback and suggestions can be submitted to IdeaScale’s own IdeaScale at http://ideas.ideascale.com Eliminating community Abuse Community abuse like ballot box stuffing and SPAMing can be very detrimental to the success of your feedback initiative. That’s why IdeaScale provides a number of methods to prevent nefarious individuals and spambots from exploiting the community. • Double Opt-in Verification and Captcha - IdeaScale offers the ability to require recaptcha verification upon user registration. This simple technique helps to prevent automated scripts from creating fake accounts. • Email-Based Access Restrictions - A very simply and elegant way to limit user registrations to your own organization can be accomplished via email based access restrictions. Basically, you can configure your IdeaScale community to only allow registration if the user signs up with the email address domain for your organization (ex: @xyzcompany.com). • IP-Based Access Restrictions - Similar to email based access restrictions, access to your IdeaScale community can be restricted to only a specific IP address range. • Community Flagging - IdeaScale leverages the power of the crowd to help moderate your community. Any IdeaScale community member can flag an idea or comment for review by your moderators. “One of the best things about the IdeaScale solution is that it saves the team both time and debate on identifying new features for each upcoming release. We know what’s important to include as well as why. It is a place for people to constantly add and suggest new feedback and we’ve found that it’s a great way to communicate with others about why we implement those changes.” Shane Lovellette, Product Manager, TechSmith • Profanity Filter - Ideascale can be configured to prevent community members from submitting text with specific words. The system checks against the seven most common curse words and any additional words added by the community moderator. Comments or ideas in violation are placed in a moderation queue for censoring or deletion. • Fraudulent Activity Detection - There are many fraud detection features under the hood within IdeaScale that are constantly working to protect your community. IdeaScale employs a host of techniques to detect scripts/bots and prevents them from creating accounts, applying fraudulent votes, or submitting spam or phishing posts to your community. • Domain Restrictions - Similar to email-based access restrictions, IdeaScale gives you the option to block a list of domains from registration. This is most commonly used to restrict registration from users using free accounts. If you have a concern regarding community abuse that you think may not be covered by the features above, let us know. We are committed to providing you and your community members the best experience possible. sales@ideascale.com +1 (206) 395-451 © 2012 IdeaScale