Verified Document

Protecting Yourself Online Research Paper

Related Topics:

Identity Theft: Understanding of the Concept of Protecting Personal Information The recent scandal involving stolen credit card and personal information from Target consumers over the Thanksgiving 'black Friday' shopping holiday weekend dramatically highlighted the risks of even using a simple credit card. Identity theft -- whether of credit card numbers, social security numbers, or other vital private information -- is a constant, very real worry for many consumers. Depending on the nature and type of the identity theft, a variety of remedies are available although there is no single, surefire solution that will always protect one's identity online or at brick and mortar stores. Thanks to the ubiquity of technology, identity theft is far easier and more common than it was in previous generations.

If you suspect that your credit-related information has been stolen, the first step is to place a fraud alert with one of the three major credit companies (Equifax, Experian, or Transunion). "An initial fraud alert can make it harder for an identity thief to open more accounts in your name. When you have an alert...

It is also wise to request a credit report from one of these three major companies to screen for any errors. If there is concrete evidence that a theft has occurred, more serious measures may need to be taken, including submitting an identity theft affidavit to the FTC which will enable you to report the theft to the police. It is also possible to obtain credit monitoring, during which you will be notified of any suspicious activity on your account (Create an identity theft alert, 2014, FTC).
Although it is difficult to completely secure your credit card information at all times (other than paying cash at all retail establishments and refusing to shop online), there are also other steps you can take to radically reduce the chances your identity may be stolen. "Never submit a credit card number or other highly sensitive personal information without first making sure your connection is secure (encrypted). In Netscape, look for a closed lock (Windows) or unbroken key (Mac)…

Cite this Document:
Copy Bibliography Citation

Related Documents

Online Security
Words: 565 Length: 2 Document Type: Research Paper

Online Shopping Can Be Safe There are definitely risks associated with online shopping. There have been many cases of hackers gaining access to shoppers' personal information. One case that just happened recently and has flooded the airwaves was Target who was hacked on December 18th, 2013. The company had over seventy million people with their names, home addresses, email addresses and phone numbers stolen and an additional forty million debit card

Online Bullying What Is Bullying
Words: 2204 Length: 8 Document Type: Term Paper

Online bullying and online harassment typically happens through chat rooms, text messages, and emails, and it generally happens when teens aren't in school, the studies show. The findings appear in a special edition of the Journal of Adolescent Health. Internet Harassment: What to Do? Focus on safe use of new technology, not banning the technology. Today's kids and teens are major media users, but they need grown-up guidance about safe media use, note the

Combat Online Sexual Predators Online
Words: 1882 Length: 7 Document Type: Research Paper

Internet predators seem to have a penchant for engaging adolescents in areas that are able to be monitored for content. The law enforcement via federal grants can track and collect information on a particular IP address to determine precisely what the intent is on that individual and use that as a means to limit his internet activity. A special program can be installed onto the computer of the solicitor

Economic Impact of Online Identity
Words: 5767 Length: 20 Document Type: Thesis

The onus of who is responsible, the consumer, the private institutions, or even the government will come into question. A brief revue of the history of the credit card is also in order since the use of "plastic" money has certainly contributed to the identity theft crisis. Past and current legislation will be analyzed regarding this new crime in both its cyber and analog presentations. Lastly, an opinion and

How Not to Conduct Yourself in Medical School
Words: 580 Length: 2 Document Type: Case Study

Law in Higher Education Case Name: Charleston v. Board of Trustees of University of Illinois at Chicago 741 F.3d 769 (C.A.7, Ill.2013) R-Z. Procedural History: Charleston brought his 1983 action to the United States District Court for the Northern District of Illinois, Eastern Division; the case was argued on November 6, 2013 Law in Higher Education Gerald Charleston, a former medical student at University of Illinois College of Medicine, claimed that his dismissal for

Role of the DHS in Protecting the US
Words: 956 Length: 3 Document Type: Essay

TERRORISM COUNTER-TERRORISM AND THE DEPARTMENT OF HOMELAND SECURITY Counter-terrorism is popular as antiterrorism and incorporates techniques, practices, strategies, and tactics that militaries, governments, corporations and police departments adopt in attacking terrorist threats and acts either real or imputed. Both governments and insurgents use terror tactics. It is clear that some insurgents do not terror as tactics while others opt not to apply as other tactics have better outcomes for their particular contexts.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now