You can teach a screen saver new tricks.
If you’re concerned about others accessing your computer files when you’re not around, but don’t have time to keep turning the computer on and off, you can password protect your PC screen saver so that only you can deactivate it. To do so, go to the Control Panel (click Start, then select Settings, Control Panel) and double-click on Display. Select the Screen Saver tab and check the Password Protect box.
You can find out a lot by reading privacy policies.
Many stores now offer club discount cards that provide price discounts on certain items. Some also allow you to build up points similar to frequent flyer programs. In exchange for these and other benefits, you will be asked to share some personal information. So be sure to read the membership agreement fully, or speak to a member of the store’s customer service team if you have questions about their privacy policies.
It’s too easy to throw away your identity with the trash.
All it takes is a social security number for a thief to obtain credit cards, loans and other lines of credit in your name. And it’s not so tough to find. Protect yourself from identity theft by shredding credit card receipts, bills, pre-approved credit card applications and other sensitive documents before throwing them in the garbage.
You can get more out of your mail by reading it.
Getting more mail lately? A new law requires financial institutions to clearly communicate their privacy policies to their customers. This means your banks, credit card companies and other financial institutions are sending you their policies on privacy and information sharing. PLEASE READ THEM! Most will allow you to opt-out of their information sharing programs if you so choose.
You can give identity thieves the slip by holding on to your receipts.
Many merchants are taking extra precautions to protect their customers from having credit card information stolen from discarded sales receipts. They do this through a process call truncating –replacing the last several digits with asterisks (e.g., 1234 5678 9101 ****). However, not all merchants choose to truncate the number, so when you pay with a credit card, make sure you either keep your sales slip or properly destroy it.
Identity theft is as close as your mailbox, so pay a visit to the Post Office instead.
Each payment envelope you send from your mailbox, inbox or outbox is a sitting duck for an identity thief. We often forget how much sensitive information is contained in just one statement stub, whether it is your electricity, water or credit card bill. Don’t let it sit there for the taking. By dropping your mail in a USPS collection box, you can dramatically reduce your risk of identity theft.
You can increase your security by making it a monthly ritual.
Each month you receive a credit card statement with a list of charges. Each month you should carefully check each statement for charges you didn't make. Call your credit card company immediately to report any suspicious charges. For those who infrequently pay with credit, this may be the first sign that your credit card has been stolen.
Fido is a good name for a dog, but a bad password for you.
Hackers know common names people use. Always use a combination of numbers and words you can’t find in the dictionary. It's also a good idea to change your password on a regular basis and avoid storing it near your computer.
There's a reducing plan -- for your mailbox.
If you want to receive only certain catalogs, contact the organizations sending you the ones you don't want and ask to be taken off their mailing lists. Alternatively, you can remove your name from most national mailing lists by contacting the Direct Marketing Association at: http://www.dmaconsumers.org/offmailinglist.html#how" and click on Preference Services. If you're not online, you can also call the DMA at 212.790.1488. They will put you in a "delete" file that is sent to subscribing organizations several times a year.
You can give your Social Security number more security by not writing it on the back of a check.
Don't give it over the phone, either. Where possible, try not to use your SSN as your sole identification number. Make it difficult for thieves to steal it by crossing out the parts that contain your SSN or other identifying information when discarding pay stubs, credit card receipts and other such documents.
Chat rooms are for chatting, not for dating.
When possible, avoid using your actual name or primary e-mail account and instead use a second alternate online account or screen name as an "alias" when taking part in online discussions.
To read is to protect yourself.
There's no place like home for your sensitive information.
Increasing numbers of employers are monitoring employees' e-mail and Web usage in the workplace. To ensure the privacy of any sensitive information, keep it at home. And if you must discuss sensitive issues by e-mail, develop the habit of double-checking the header to make sure your message is going only to the intended recipient and not to a wider "reply to all" distribution list.
Strangers can be strange until you get to know them.
You can keep your information private - even in public.
Ever use public computers, such as in the library or cafe? Or do you share your computer with others? As you browse, your cache stores Web sites you have visited so that your browser can store them locally instead of going to the Web site. This helps to speed up your browsing on a private computer, but can also allow your habits to be tracked on a public one. To prevent this from happening, go to the "Preferences" folder in your browser and click on "Empty Cache." Also, be sure to close the browser before leaving.
***** is a good name when shopping on the Internet.
When giving your credit card information online, be sure to ask whether they use encryption to scramble your data against third-party viewing and how they safeguard your stored data from online hackers. One of the easiest ways to ensure that you have a secure, encrypted connection while doing business online is to check whether the URL (Web address) begins with "https://" rather than simply "http://" before you transmit credit card information. To be certain, you may wish to install encryption software on your own computer to protect your e-mail and files from others who may disregard your personal privacy.
Just because someone offers you a cookie doesn't mean you have to take it.
Browser users often have the option to be notified before accepting a cookie and to accept only cookies that connect with the originating server hosting the Web site that placed the cookie - rather than third-party servers for advertisers, for example. Reputable sites should clearly inform you how they plan to use the cookies deposited on your browser. Various types of software and services are available to help you manage cookies, including those that serve as a proxy or shield between you and the sites you visit. You can opt-out from online advertising cookies by visiting the Web site: http://www.networkadvertising.org/optout_nonppii.asp
You can choose your callers instead of them choosing you.
If you'd like to be on the "don't call" list, send your name, address and phone number to the Telephone Preference Service, c/o Direct Marketing Association, P.O. Box 9014, Farmingdale, NY 11735-9014. Major nationwide telemarketers participate in this service. Your local phone company may also offer some "custom calling services" like Caller ID and Call Block which can be used to limit unsolicited calls.
Records are for remembering more than just memories.
Most e-commerce sites present you with a summary of your transaction before you click a send or buy button. Print this out or save it as a file to refer to later if necessary.
Most credit cards companies give you credit when something goes wrong.
If someone steals or uses your credit card number, most credit card companies cover fraudulent charges or limit your liability resulting from unauthorized use of your card. Keep the phone numbers of the credit card companies you deal with in a safe place so you can contact them immediately if something goes wrong.
You can stop the e-mail before it becomes mail. Getting mail is fun.
But if you'd like to cut down on the amount of unsolicited commercial e-mail, you can contact the e-Mail Preference Service (e-MPS) offered by the Direct Marketing Association. You can register with the service by logging on to: http://www.e-mps.org. All DMA members who wish to send unsolicited commercial e-mail must purge their e-mail prospecting lists of the individuals who have registered their e-mail address with e-MPS. The service is also available to non-DMA members.
‡ It is important that you take steps to protect your information on your personal computer. The check-out cart of this website is a protected environment which meets the highest Internet security standards. While we take strong measures to ensure the security of the financial transactions and the confidentiality of your information, it is extremely important that you also take precautions to ensure that your information remains safe and secure. We advise customers to read about these topics and follow the recommended safe computing practices:
Protect Your Privacy - You play an important role in protecting your privacy by understanding the importance of keeping your personal information confidential and by following recommended practices when online.
1. Protect Your Privacy:
· Protect your Yahoo! Password and Security key (If you have a Yahoo! account and/or are using Yahoo! wallet). Do not divulge your password to anyone. If you suspect your password has been compromised, please change your password and security key immediately.
· Use a password that is difficult to guess by using a combination of letters and numbers. In fact, if you're still using a numeric password, please change it now!
· Do not respond to emails that request sensitive personal information. Know that we will never send you unsolicited emails asking for your passwords, account numbers, etc. Report any suspicious requests to the company being breached.
· Never send confidential information (such as account numbers of any type like credit card numbers, passwords, etc.) via email.
· Avoid using software that records your passwords so that you don't need to enter them the next time you access a website from the same computer. This type of software could give other users of your computer access to your accounts.
· Avoid using the Internet in public places (such as Internet cafes, libraries, etc.) to access your accounts. These have been known to have software that records your personal information, which can be used fraudulently.
· Always type in the website address or use your bookmarks to access our website: www.cell-phone-accessories.com
· Do not leave your computer unattended while still on.
· Always close the browser window after placing an order and start a new one for other online activities.
· Clear your browser’s cache after each computer session (Click Start, then select Disk Clean-Up). Each time you access the Internet, your browser automatically saves a copy of the web pages you've visited. Diligently clearing your browser’s cache after each session is an important step in safeguarding your personal information.
· Review your account statements promptly and report any discrepancies immediately. Contact numbers can be found on your statements.
· Report lost or stolen credit cards immediately to respective credit card banks.
2. Use Anti-Virus Software:
Whenever you use your personal computer and the Internet, there is a potential risk of contracting a computer virus or the possibility of infiltration by intrusion software commonly known as "Trojan Horses". Computer viruses can modify programs, delete files and erase the contents of hard drives. "Trojan Horses" can have similar effects and may be able to capture keystrokes, including passwords or other secret information.
The potential consequences of any of these threats could include damage to your personal computer, compromise of your secret information and the inability to use your computer.
For these reasons, we advise our customers to follow these practices:
· Install and frequently update a proven anti-virus product, such as Norton AntiVirus‡ or McAfee VirusScan‡
· Only accept or download software from a source that you believe to be trusted.
· Never accept files or attachments when accessing websites, newsgroups and chat rooms unless you are very sure of their authenticity.
3. Protect Your Internet Connection:
There are additional vulnerabilities associated with having a computer directly connected to the Internet for an extended period of time. This applies to all users but it is extremely important for users with cable modem or digital subscriber line (DSL) Internet access. These methods of connection do not require 'dialing' into the Internet and thus are sometimes described as 'always on' connections. Unfortunately, as long as the computer remains 'on' and connected to the Internet, malicious parties have a continuous window of opportunity for attacks on the user's personal computer.
If you use a cable modem or DSL connection for Internet access, you can limit this security risk by disconnecting from the Internet when your session is complete, or by turning off the cable or DSL modem. However, if you want to continue to take advantage of the 'always on' feature of cable and DSL connections or if you run extended dial-up sessions on the Internet, we recommend the following security measures be taken:
· Disable File Sharing on Your Personal Computer
File sharing is a feature of Windows‡ that allows other computers to access your personal computer, even from across the Internet. Microsoft‡ has provided instructions on how to disable file sharing in Windows Help (Click Start, Help, then choose the 'Index' tab and type "file sharing, disabling").
Our recommendation is to disable file sharing. However, if you choose to retain this option for your particular environment, exercise due care and apply appropriate security measures.
· Install a Personal Firewall
Install and frequently update a proven personal firewall product, such as Zone Alarm‡ or Black Ice‡ , that can be configured to prevent unauthorized access to your personal computer and keep it up to date.
4. Use Supported Browsers:
Encryption is the process of protecting information as it moves from one computer to another so that it is unreadable to everyone except the receiver. The stronger the level of encryption used by your web browser, the more difficult it is for unauthorized parties to break the encryption and decipher the message in transit.
Our website is fully tested before supporting new browser versions. When accessing our secure shopping cart, you are required to use one our recommended latest updated browsers with 128-bit encryption such as Internet Explorer or Netscape.
*************** KEEP YOUR INFORMATION SAFE ****************
1. KNOW WHAT YOU'RE DOWNLOADING. Many Trojan horses are downloaded through an
executable file (a file with an ".exe" extension). If you don't know whom it's
from or what exactly it is, don't download it! It could infect your computer as
soon as you run it.
2. INSTALL ANTI-VIRUS SOFTWARE AND KEEP IT UPDATED. Viruses and Trojan horses
are serious threats to computer security. Some Trojan horses actually allow
hackers to take over your computer - and find your personal information.
3. INSTALL A FIREWALL AND KEEP IT UPDATED. Firewall software will help keep
your computer and the information stored on it safe. When your computer is
connected to the Internet, people, with the right program, can see into your
computer and gain access to your SSN, credit card numbers and bank account
information. Just as you don't leave your house unlocked with a sign that says
"Come on in and help yourself," you shouldn't leave your computer unlocked
4. BACKUP YOUR SYSTEM. Backup your system regularly in case you do fall victim
to a virus or Trojan horse. This will allow you to fully restore your system
quickly and prevent you from losing your information.
5. TURN OFF YOUR COMPUTER WHEN YOU'RE NOT USING IT. If you are not connected to
the Internet, you cannot be hacked or attacked.
6. USE COMMON SENSE. If you don't know whom a file is from, don't open it.
Consider storing your very personal information (passwords, tax records, bank
information, etc.) on a CD and use the CD only when you need the information.