Privacy guidelines: What you can do to protect your privacy and personal information
Student contributions - individual suggestions, links to sites with information
- I need to be aware of the websites that I visit.
- I also need to take extra precautions especially when shopping over the internet. Now, before ordering I research the company and check it's reviews and ratings before I order. If there are a significant number of negative ratings, I will avoid the company.
- I will also be extra careful when opening emails to see whether or not they are actually from the business. I can do this by reading the email carefully and checking the email address that it was sent from. Some of the scam emails may contain basic grammar or spelling errors. These errors, a legitimate business would never let happen because they have people paid to edit the messages for spelling and grammatical mistakes.
- With online banking, I find that I like to change my password every once in a while to increase security.
- Another precaution is to clear my browsers cache after every session.
- Privacy Issues - This article makes several good points on privacy, especially with regards to technology. I think the most important sections are the access rights and passwords sections: there are a lot of great tips on how to create complicated passwords that protect your information from hackers who simply like to guess at them, as well as authorizing different users to different areas of your computer.
- laptop section of the physical procedures: use a notebook cable lock, such as ones provided by Kensington, to lock your computer to your desk or table when you decide to leave the area.
- Firewalls - Microsoft Windows has a built in firewall called "Windows Firewall", but that has been known to be weak; using a third party firewall (Norton, etc) increases security substantially. However sometimes this occurs at the expense of computer speed.
Identity theft - steps to take if your identity is stolen
- Implication of Theft - Theft is one of the most devastated events that can happen to anyone regardless of where they are. Basically detailing how data is stored on our PDAs/cell phones and PCs(desktops and laptops) and how we need to be careful about the type of information we store on these devices.
- Identity Theft - This is a page that explains the definition about identity theft and why it is important nowadays. Lots of us may hear about it, but they do not know how it happens. Many victims even didn’t know what happened, and they usually did not know that they became victims already. So this website informs us some important details about identity theft.