Protecting Personal Information
Along with the benefits of doing business on the World Wide Web,
we need to be aware of its negative side. One of the fastest
growing crimes in America is identity theft and it can result
from theft of personal information over the Internet.
Identity theft occurs when your personal information such as bank and credit card account numbers; social security number; income; name, address, e-mail address and phone numbers, is used or transferred by someone else, without your knowledge, and used unlawfully. Identity theft is a serious and costly business, damaging your credit rating, disrupting your peace of mind, and costing you money. While you can't completely prevent identity theft, you can help minimize your risk and learn how to protect yourself and your customers.
Seven ways criminals can obtain your personal information
In Business
As a business owner, you collect and store customers', clients', and employees' personal information. It is your moral and legal responsibility to protect this information. Lawsuits, lost productivity, loss of intellectual property and network threats can be the result of compromised data.
Identity theft occurs when your personal information such as bank and credit card account numbers; social security number; income; name, address, e-mail address and phone numbers, is used or transferred by someone else, without your knowledge, and used unlawfully. Identity theft is a serious and costly business, damaging your credit rating, disrupting your peace of mind, and costing you money. While you can't completely prevent identity theft, you can help minimize your risk and learn how to protect yourself and your customers.
Seven ways criminals can obtain your personal information
-
Stealing
wallets or purses
-
Stealing
mail,
including completing a "change-of-address form" to divert
your mail.
-
Rummaging
through trash
-
Posing as
persons
having legitimate reasons to obtain your personal
information.
-
Using
personal information you have shared
on the Internet.
-
“Phishing”-
Sending fraudulent e-mails asking for personal information
-
Stealing paper or electronic personal information files
-
Monitor your
bank and credit accounts
for suspicious activity. One advantage of online accounts
is your ability to check them at any time from your
computer. Some companies allow you to sign up for e-mail
account-activity alerts that provide updates about your
balance, bill payments or any irregular account activity.
-
If you use a
computer
that is used by another person, empty the computer browser
caches and history after entering personal information so it
is erased. Install all updates and security patches as soon
as they’re available.
-
Never reveal
your social security number
or critical information over the Internet or telephone
unless you initiated the contact or know the person. Before
revealing any personal information, determine how it will be
used and secured, and if it will be shared with others.
- Be aware of
e-mail scams.
Many spoof e-mails look very real and can be difficult to
identify. Identity thieves may use false offers or tell you
there is a problem with a bank or credit account to trick
you into giving away your information. If you suspect a
problem, type the full name of the Web site into your
browser window to access the site. Never click on a link
embedded in an e-mail. Warning signs that an e-mail is fake
include a generic greeting, a false sense of urgency, and
links that don't include "https://www.theaccount.com"
immediately before the first "/". Look for a secure lock
icon at the bottom of the browser window.
The new Internet Explorer browsers have a tool that checks Web addresses against lists of suspected phishing Web sites. Other free tools available for download include the Cloudmark SafetyBar, which identifies known spoof emails in Outlook and Outlook Express and the eBay Toolbar with Account Guard which warns you when you're on a potentially fraudulent Web site.
-
Keep your
social security card in a secure location,
not in your wallet or purse.
-
Deposit
outgoing mail in the post office
or post office collection boxes, not an unsecured mailbox.
When you go on vacation, request that the post office hold
your mail.
- Shred all documents containing your personal information.
- Order and review copies of your credit reports once a year from the three major credit bureaus, Equifax http://www.equifax.com/, Experian http://www.experian.com/, and TransUnion http://www.transunion.com/ Under the FACT Act amendments to the Fair Credit Reporting Act, you are entitled to one free Personal Credit Report in a 12 month period. These Web sites also contain more information about avoiding identity theft and offer subscriptions to monitor your credit.
- If your account has been compromised, close it; contact the company and your local law enforcement agency. Contact the three major credit bureaus and place a fraud alert on your account. Write your creditors informing them of the problem using registered mail. Keep paper records of everything.
In Business
As a business owner, you collect and store customers', clients', and employees' personal information. It is your moral and legal responsibility to protect this information. Lawsuits, lost productivity, loss of intellectual property and network threats can be the result of compromised data.
-
Be sure your
computers are physically safe
from burglary. Be sure they are password protected. Use
critical protections like anti-virus software, spyware
protection, and a firewall program to help protect them from
online threats. Encrypt wireless connections to protect
wireless networks. Always-on broadband connections to the
Internet make these core protections more vital.
- If you take
orders online,
make sure your Web site payment gateway is located on a
secure server and credit card numbers or personal
information are only sent in encrypted form. Use digital
certificates and secure passwords.
- Keep hard copies of confidential paperwork in locked filing cabinets.
- Perform background checks on all employees before hiring.
- Be aware of what is happening in your business. Frequently monitor billing statements, credit card, and bank accounts for anything unusual. Reconcile bank statements immediately and investigate suspicious transactions or deposits.