Verified Document

Protecting Yourself Online Research Paper

Related Topics:

Identity Theft: Understanding of the Concept of Protecting Personal Information The recent scandal involving stolen credit card and personal information from Target consumers over the Thanksgiving 'black Friday' shopping holiday weekend dramatically highlighted the risks of even using a simple credit card. Identity theft -- whether of credit card numbers, social security numbers, or other vital private information -- is a constant, very real worry for many consumers. Depending on the nature and type of the identity theft, a variety of remedies are available although there is no single, surefire solution that will always protect one's identity online or at brick and mortar stores. Thanks to the ubiquity of technology, identity theft is far easier and more common than it was in previous generations.

If you suspect that your credit-related information has been stolen, the first step is to place a fraud alert with one of the three major credit companies (Equifax, Experian, or Transunion). "An initial fraud alert can make it harder for an identity thief to open more accounts in your name. When you have an alert...

Parts of this document are hidden

View Full Document
svg-one

It is also wise to request a credit report from one of these three major companies to screen for any errors. If there is concrete evidence that a theft has occurred, more serious measures may need to be taken, including submitting an identity theft affidavit to the FTC which will enable you to report the theft to the police. It is also possible to obtain credit monitoring, during which you will be notified of any suspicious activity on your account (Create an identity theft alert, 2014, FTC).
Although it is difficult to completely secure your credit card information at all times (other than paying cash at all retail establishments and refusing to shop online), there are also other steps you can take to radically reduce the chances your identity may be stolen. "Never submit a credit card number or other highly sensitive personal information without first making sure your connection is secure (encrypted). In Netscape, look for a closed lock (Windows) or unbroken key (Mac)…

Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now