Download - PRIVACY IN COMPUTING
PRIVACY IN PRIVACY IN COMPUTINGCOMPUTING
BY: BY: Engin and Will Engin and Will
WHY IS PRIVACY IMPORTANT?WHY IS PRIVACY IMPORTANT?
They can use your computer to attack others They can use your computer to attack others (money, revenge)(money, revenge)
Xxx-rated sites make your modem call some Xxx-rated sites make your modem call some places that will cost youplaces that will cost you
They can steal your job related information from They can steal your job related information from your computer (industrial espionage)your computer (industrial espionage)
They can steal your information, use your They can steal your information, use your money, use your good name (identity theft), in money, use your good name (identity theft), in some cases that can be used just to terrorize some cases that can be used just to terrorize you you
IDENTITY THEFTIDENTITY THEFT
It is so hard to keep a good credit It is so hard to keep a good credit lineline
What happens if some criminal or What happens if some criminal or psycho steals your information by psycho steals your information by stealing or hacking into your stealing or hacking into your computer?computer?
TYPES OF ID THEFTTYPES OF ID THEFT
Estimated 10 million people in US found out that Estimated 10 million people in US found out that they were victims of ID Fraud in previous year.they were victims of ID Fraud in previous year.
Financial FraudFinancial Fraud Criminal ActivitiesCriminal Activities
Computer and Cyber CrimesComputer and Cyber Crimes Organized CrimesOrganized Crimes Drug TraffickingDrug Trafficking Alien SmugglingAlien Smuggling Money LaunderingMoney Laundering
STEALING IDENTITYSTEALING IDENTITY
Credit Card FraudCredit Card Fraud Paying at a restaurant or a marketPaying at a restaurant or a market On the phoneOn the phone Via internetVia internet
When you throw away a paper, look at;
•Your full name
•Complete address
•SSN, date of birth
•Complete bank account number
•Employer’s name and address
•Rate of pay
ACCESSING YOUR PERSONAL ACCESSING YOUR PERSONAL INFORMATIONINFORMATION
Dumpster divingDumpster diving Sales clerks, waitresses (memorizing or Sales clerks, waitresses (memorizing or
copying)copying) Mailbox (financial statements, bills)Mailbox (financial statements, bills) Employer’s file (secretly or with inside help)Employer’s file (secretly or with inside help) Hospital recordsHospital records Purchased online databasesPurchased online databases Collected from “clone” web sitesCollected from “clone” web sites Stolen through hacking computers (personal, Stolen through hacking computers (personal,
work or any merchants PCs)work or any merchants PCs)
PROTECTIONPROTECTION Don’t give away your SSNDon’t give away your SSN Destroy any unwanted credit card offersDestroy any unwanted credit card offers Don’t put any information on your check other than Don’t put any information on your check other than
your name and your addressyour name and your address Shred any sensitive documentShred any sensitive document Don’t carry SSN card, passport, or birth certificateDon’t carry SSN card, passport, or birth certificate Review your credit report at least once every yearReview your credit report at least once every year Never give away important personal information on Never give away important personal information on
the phone unless it’s really necessarythe phone unless it’s really necessary
Identity Theft Insurance ?Identity Theft Insurance ?
INTERNET INTERNET TRANSACTIONSTRANSACTIONS
Use the latest internet browserUse the latest internet browser Look for digital certificatesLook for digital certificates Read the privacy policiesRead the privacy policies Only use one credit cardOnly use one credit card Never give personal information unless you know Never give personal information unless you know
for sure why they need itfor sure why they need it Keep records for internet transactionsKeep records for internet transactions After you made a purchase, check your emailsAfter you made a purchase, check your emails
IF IT HAPPENS TO YOUIF IT HAPPENS TO YOU
Immediately contact your credit card issuersImmediately contact your credit card issuers Close any account that thief has openedClose any account that thief has opened Call the fraud units of the three credit reporting Call the fraud units of the three credit reporting
bureausbureaus If SSN used, notify Social Security If SSN used, notify Social Security
Administrator’s Office of Inspector GeneralAdministrator’s Office of Inspector General
Who to contactWho to contact The Credit Bureaus The Credit Bureaus EquifaxEquifax Credit Information Credit Information
Services - Consumer Fraud Div.Services - Consumer Fraud Div.P.O. Box 105496P.O. Box 105496Atlanta, Georgia 30348-5496Atlanta, Georgia 30348-5496Tel: (800) 997-2493Tel: (800) 997-2493www.equifax.com www.equifax.com
ExperianExperianP.O. Box 2104P.O. Box 2104Allen, Texas 75013-2104Allen, Texas 75013-2104Tel: (888) EXPERIAN (397-3742)Tel: (888) EXPERIAN (397-3742)www.experian.com www.experian.com
TransUnionTransUnion Fraud Victim Assistance Dept. Fraud Victim Assistance Dept.P.O. Box 390P.O. Box 390Springfield, PA 19064-0390Springfield, PA 19064-0390Tel: (800) 680-7289Tel: (800) 680-7289www.transunion.com www.transunion.com
ReferencesReferences
http://computer.howstuffworks.com/ihttp://computer.howstuffworks.com/identity-theft.htmdentity-theft.htm
http://www.microsoft.com/mscorp/twhttp://www.microsoft.com/mscorp/twc/privacy/default.mspxc/privacy/default.mspx