Free Essay

Protective Identity Theft Measures

In: English and Literature

Submitted By matty1178
Words 3176
Pages 13
Easy Measures for Increasing Identity Theft Protection
Imagine getting ready to purchase a home. Your family has outgrown the house you are currently living in, and a bigger home would be a perfect fit for your family. Since you have owned your home for many years and made your payments on time (along with your other bills), you feel applying for a home loan will be easy. With banks offering lower interest rates and trying to obtain business from customers, now is the time (you feel) to apply for a home loan. You walk into the bank and meet with the local loan officer. After explaining your financial and work situation, the loan officer provides an interest rate and term on a home loan. You find the home loan favorable and wish to proceed with the home loan. The loan officer is happy to proceed and explains that a credit report will need to be pulled. You agree to have your credit report pulled, as you feel your credit score is in good shape. The loan officer pulls your credit report and you see a look of concern come across his face. The loan officer prints your credit report and proceeds to tell you that due to your high debt, failure to make payments, and low credit score; the bank cannot offer you a loan. You now have this look of horror on your face as you do not know how you have late payments, your debt is high, and your credit score is low. You ask to see your credit report. When you review the credit report, you realize these unpaid, high-balance transactions are not yours. You have become a victim of identity theft. The loan officer gives you some advice on how to handle the identity theft, and some written information on how to proceed with the identity theft. Upon your own investigation, you realize you are now a statistic. You are now part of a group that has had their identity stolen. You also realize the long and uphill battle you are going to have to repair your credit. Your dreams of a bigger house are put on hold, if not completely destroyed. Stories like these are unfortunately common. The days of wondering how identity theft could happen are changing to wondering if and when identity theft will occur for victims. In 2010, 8.6 million (7%) of US households had a member of the family who experienced identity theft (Wahl 2013). From e mails stating you have a long lost relative that has passed away and is leaving you a bunch of money, e mails offering work from home opportunities, credit card skimmers, to even people digging through trash; identity thieves have a number of ways to obtain personal information. Identity theft does not contain finger prints (per say). Your personal and financial information do not carry any parts that fully say, “This is yours and only used by you.” Your social security number, your bank account numbers, and your address can be used online to apply for a credit card. The system obtaining the personal information requires the information, but the system obtaining the information has no clue if you or an identity thief is entering your personal information. While this outlook may seem bleak, there are methods individuals can take to protect themselves from identity theft. Identity theft continues to affect millions of people each year, with more and more people falling victim to the fraudulent practices of identity thieves. However, there are everyday practices we can incorporate to protect ourselves from identity theft. Most of the protection measures are free or very low cost. By taking daily additional steps, watching where and when you give your personal and financial information, and becoming identity smart will help you protect you from identity theft. While identity theft does not appear to be going away anytime soon; by using the methods described below, you can increase your protection against identity theft.

Section I: Take Daily Steps to Protect Your Identity By taking additional daily steps, you can increase your identity theft protection. The nice part about these daily practices is that the practices are free. The main problem with having our personal and financial information stolen is that the fraudulent activity occurs when we lower our guard. By making these daily practices a routine, the practices change from being a burden to a part of daily life. The practices consist of checking financial accounts daily, do not open e mails or click links from unknown sources, be cautious of phone or letter solicitations, and be cautious of what you throw away. By checking financial accounts daily, it is very easy to monitor credits and debits to accounts. Many financial companies will show transactions as “pending” for a three day period prior to posting the transaction. By checking financial account information daily, you can quickly see if a transaction pending on your account is an item you purchased. If an item appears on your account that is not a purchase you made, it is easier to dispute the transaction with your financial institution during the pending phase. With checking financial accounts daily, you can quickly and easily keep track of your credits and debits. Except for holiday times, most customers do not make a bunch of transactions to personal accounts in a single day. With the easier opportunity to track debits and credits, a user can quickly spot a suspicious transaction. While checking financial accounts daily is a great first step, there are other practices that need to be incorporated as well. Do not open e mails or links from individuals you do not know, or give personal information to telephone solicitors. Burgess shows us the most common form of identity theft is through e mail solicitation and phone scams (Huffington Post 10/13). We have all seen the e-mails stating that we have a long lost relative who is stranded, we have a long lost relative that has passed away and we have inherited a bunch of money, or someone wants to make a donation to a charity you belong to. You have never heard of any of these people, or are aware of any of these situations. All of these e mails or links require you to enter your personal and financial information to receive the funds. The easiest way to deal with these e mails and situations is to place these items in your Junk E mail box and permanently delete the items. Do not give these criminals any information or pay the criminals any attention. Finally, be careful on what you throw away. Just throwing away personal and financial information into the trash simply invites identity theft. Identity thieves will dig through your garbage trying to find account and personal information in order to fraudulently gain financial means. The FTC states we should shred all personal and financial information we are discarding (Federal Trade Commission Consumer Information on Identity Theft). These items include credit card offers that come in the mail as well. The credit card offers, mixed with an item of personal information, can allow an identity thief to open a credit card in your name. Even worse, the new credit card is fraudulently opened without your knowledge. By taking a couple of extra minutes each day in being cautious in what you throw away, you can reduce the risk of having your identity stolen. Identity thieves will dig through your trash for personal information.

Section II: How to implement the Easy Identity Theft Protection Measures Describing the measures of how individuals can protect themselves against identity theft does not do any good without presenting how to implement the measures. By understanding how to use the identity theft protection measures, people can increase their identity and personal information. Parts of creating effective habits are to imply proper practices. The old adage of practice makes perfect goes a long way. A way to understand and develop proper practices is to find memory techniques that are easy to remember.
Wahl describes the SCAM method in his article (Wahl 2013 Pg. 23). The great idea behind using the acronym SCAM is that scam is a word most people already know. Most people associate the word scam in a bad way; however, the word scam is imbedded in most people’s memory. Wahl takes the word SCAM and creates an ACRONYM that others can use to remember identity theft protection techniques. The S in SCAM stands for: Be Stingy about giving your financial information to others unless you have a reason to trust them. This also goes for being stingy about where you give your personal information. The C stands for: Check your financial information regularly, and look for what should be there. The A stands for: Ask periodically for a copy of your credit report. Finally the M stands for: Maintain careful records of your banking and financial accounts.
One of the best practices is to always be cautious on where, when, and how you give your personal information. How many times have we been in the checkout line of a store and the clerk asks us if we would like to open a charge card? When you decide to open one of these charge accounts, do not open the account in the store. You are asked to give your personal information in front of strangers that you have never met before. You do not have any idea or clue if the person behind you is an identity thief or not. You are typing, speaking, and sharing your personal information in a non-private atmosphere. If you are interested in applying for a department store charge card, ask for the application and mail in the information or apply online in the privacy of your own home.
Another best practice is to not open the spam e mails offering work from home opportunities, stating you are a long lost relative that has been left a large sum of money, or someone is stranded in another county and needs funds to get home. Most of the time these e mails will be directly sent to your Junk e mail box. However, sometimes these e mails do get through to your regular inbox. All of these e mails ask for your personal and financial information upfront. The biggest thing to keep in mind is that you do not know who sent you the e mails, or who is asking for your personal and financial information. This falls back to Wahl’s “Be Stingy on whom you give your personal information to” (Wahl 2013 Pg. 23). If you do not know the company of person requesting your personal or financial information, then do not give your personal information out to those individuals.
Finally, maintain careful records of your personal and financial information. First, request copies of your credit report on a regular basis. While this does cost a few dollars, a periodic view of your credit report is extremely beneficial to check your open and revolving credit accounts. You should only obtain your credit report from trustworthy companies. Experian and Transunion are two trustworthy companies that can provide your credit report almost instantly (FTC Consumer Website). Next, you should check your accounts on a regular basis. By viewing your financial accounts online or by calling the customer service numbers a few times a week, you can check your account activity on a regular basis. It is much easier to verify and dispute transactions when the charges are pending.
The nice thing about these measures is that they are easy to incorporate, easy to become habitual, and fairly inexpensive. The biggest part of these practices is to make them a habit and a routine. Proper and regular use of these practices will help protect your personal and financial information. A benefit on the behalf of customers is the protection measures set forth by financial institutions. Many financial institutions have identity theft protections measures that stem from strong firewalls to stop penetration of identity thieves and triggers that will alert company employees when charges on customer accounts appear that are out of the ordinary. Some people feel these protection measure are enough to protect consumers personal and financial information.
Section III: Protection Measures by Financial Companies are Enough (Opposing View) Identity theft has become such an issue that financial institutions, banks, and other companies that house personal and financial information are required to have protection measures and insurances to protect customer’s information. If personal information is lost or stolen, the financial institutions will refund the charges and work with the customers to restore personal and financial information to the customer’s original form. Some companies offer identity theft protection or insurance for its products and services. These identity protection services and insurances sometimes are free, but usually cost a nominal fee for use. However, consumers feel the protection measures are worth the cost because the consumers do not need to worry about their personal or financial information. Companies such as LifeLock,, and Identity Guard are such companies that offer identity, personal, and credit protection services for a fee

Saitlin (Chicago Tribune Review 2013) states that identity theft is not going anywhere. Identity theft will always be an issue. However, the key is to stay ahead of the identity thieves and scams. The best method to stay ahead of identity thieves and scams is to leave it to the professionals. The services and protections offered (even if they cost money) guarantee the replacement of the funds and transactions on your credit if identity theft occurs. This mentality seems pretty easy and simple. Leave the issue to the professionals and don’t sweat the issue of identity theft. If identity theft does not occur to your information while utilizing these protection methods, then the mentality of leaving everything to the professionals will work.
Christopher Burgess states “Identity theft is here and identity theft is here to stay” (Huffington Post Oct 2013). Burgess continues to describe in his article that there is an ongoing battle with identity thieves and companies. Companies will come out with new protection measures and identity thieves will work to infiltrate those systems. The same goes for identity thieves creating new measures to obtain personal and financial information fraudulently and companies working to create new protection measures. With the ongoing battles, it is almost impossible for consumers to protect their identity on their own. Sometimes, the best option is to go with professional identity theft services. However, what happens if or when identity theft does happen? The professional services do not and cannot replace or repair the lasting effects of identity theft.
Section IV: The Lasting Effects of Identity Theft Having your personal and financial information fraudulently obtained and used has more effects than just the loss of funds. Identity theft can cause lasting effects that will stick around longer than the time it takes to replace your lost funds and repair your credit. People who have their identity stolen often feel vulnerable, taken advantage of, angry, and invaded. These feelings can often cause depression and other issues down the road. John Blake describes the behind the scene tolls of identity theft (CNN Dec. 2009). Blake states how many victims of identity theft develop depression, trust issues, and vulnerability issues. The thoughts of how this could happen, why it happened, and how to move forward can drive victims of identity theft nuts. The issue is, while the identity thief only took seconds or minutes to steal your information; the effects of depression can last years. The effects of depression can also lead to physical issues. Depression can cause sleeping, eating, and other physical issues. These issues can cause lasting damage to your body. Depression causes people to stop enjoying the little things in life. Depression also affects those close to the person suffering from depression. Constant worrying and concern take its toll on the loved ones surrounding a person suffering depression.

With the lasting and hidden effects of identity theft causing many more severe problems for victims, wouldn’t you want to take extra measures to try to protect your personal and financial information? With taking the SCAM method and other small practices, you can increase your protection from identity thieves. The protection methods are worth the time. The relatively inexpensive methods are worth the effort to prevent the initial identity theft and the lasting effects of identity theft.
Section V: Conclusion Identity theft continues to affect millions of people each year, with more and more people falling victim to the fraudulent practices of identity thieves. However, there are everyday practices we can incorporate to protect ourselves from identity theft. Identity thieves lurk almost anywhere. Identity thieves can be lurking in stores, gas stations, banks, and online. Identity thieves really do not take on a defined form. Almost daily we can find new articles about identity theft. Some of the articles are good and describe new protection services and methods. However, most of the time the articles are bad and describe how people have lost their savings, retirement, homes, and credit. The question of when identity theft will end has pretty much eluded us. The question now revolves around if we can prevent identity theft. The answer is: we can take extra measures to protect ourselves from identity theft. The biggest protection measure is being mindful of when and where you give your personal and financial information. Sitting in an office, applying for a loan with a certified loan officer of a bank, with the door closed; is probably a safe place to give your personal information. Applying for a store charge card at the register, in front of a bunch of strangers, is not the best place to give your personal and financial information. Being always fearful and essentially “living in a shell” is not a safe protection method. You should still enjoy life and all that life has to offer. The key is to just be mindful of your delivery methods to your personal and financial information. Being cautious is the best policy to follow to still enjoy life and protect your identity. By turning these practices into habits, you can feel safer in applying for credit, purchasing items, and getting the most out of your credit and finances.
Blake, John (12/2009) The Hidden Cost of Identity Theft. Retrieved from:
Burgess, Christopher (10/2013) Identity Theft: ID Theft is Here Today, Here to Stay. Retrieved from
Federal Trade Commission Consumer Information on Identity Theft. Retrieved from:
Saitlin, Sheldon (11/2013) Fear of Identity Theft. Retrieved from theft-social-security-numbers-credit-card
Wahl (2013). Look Out for Identity Scams. Phi Kappa Phi Forum, Business Economics, (Fall 2013 PG 23.)

Similar Documents

Free Essay

Case Study on Firewalls

...Casonya Hunter – Case Study #1 (SECR 5080) In today’s world, identity and technological theft is at a new high. Companies such as Wells Fargo are considered to be a target for such intrusions. In addition to protecting information, firewalls were created to stop intrusions. Though with all of these risk of information getting stolen or possibly corrupted, Wells Fargo does not use firewalls in its card data security system. The company does have other preventive technology, why not a firewall? ( Firewalls are a system that limits access between networks to prevent intrusions. Unfortunately, this does not signal if any attacks are taken from the inside of a network. It is clear to say that this particular form of security stops the action before it takes place. As an example, someone tries to retrieve into another person’s Wells Fargo banking information through the use of obtaining it from they’re credit card. A firewall will detect the attempted breach and will block the system immediately from taking further action. If that is the case, why does the company Wells Fargo have a firewall system set up for this particular system? ( Wells Fargo use an organization called Payment Card Industry Data Security Standard (PCI DSS) to protect account holders information ( The PCI DSS is a multifaceted security standard that includes requirements for security management,......

Words: 543 - Pages: 3

Free Essay

The Need for Information Security, Technical Innovation and Clinical Change

...The Need for Information Security, Technical Innovation and Clinical Change.                1               The Need for Information Security, Technical Innovation and Clinical Change      ISM 3011– Information Systems Management     Abstract               The Tri-County Life Care of the Treasure Coast (TLC) is a non-profit organization providing in-home health-care services throughout Florida's Indian River, Brevard, and northern St. Lucie Counties. TLC has been serving this community for over thirty years, but what truly makes us unique is our tradition of providing comprehensive health-care—whenever and wherever our patients need it. Tri-County Life Care, Inc. offers the highest quality and most reliable in home wellness care in the convenience and comfort of client home. (TLC) have been providing superior service to there clients and have help them in achieving their goals. Whatever your needs are, TLC home health team will design a plan that is specific to you and your situation. Whenever your health needs can be met at home, TLC staff is on-call 24 hours a day, 7 days a week. Owners and officers representing TLC are Chief Executive Officer - Eric Maar, Chief Financial Officer - Satchell Peterkin, Chief Technology Officer - Raquel Queen, and Chief Information Officer - Kerry Cosner. These individuals are committed to providing the clinical staff with the most technologically advanced tools available to effect patient care in the most advantageous way......

Words: 2351 - Pages: 10

Free Essay

Risk Paper

...audiences, media awareness, and post crisis planning and evaluation. There are also two documents, one document will address the press and one document will address the public. Customers expect their information to be safe and secure once it enters PSTW’s databases, and PSTW is dedicated to keeping it that way. With identity theft on the rise, people are very cautious with who they give their information to. Sony’s PlayStation Network was recently hacked which lead to the leak of millions of customers’ personal account information, credit card numbers, etc. Companies now have to increase their security to make sure the same thing does not happen to them. Potential Crises There are a number of potential technological crises that can occur. The first potential crisis is a hacker that hacks into the databases that store personal information of PSTW’s customers. This information includes full names and addresses, social security numbers, etc. This is all information that would allow identity theft to occur. Not only can the information be hacked, but the hacker can also release the information to the public. This would greatly increase the potential for identity theft to occur, since the public has the information. If these crises occurred, customers would no longer trust PSTW with their information and would do business with other companies. In turn, this would lead to a financial crisis within PSTW. PSTW has not previously faced any crises but must prepare for the......

Words: 2932 - Pages: 12

Free Essay


...else's password or as complex as writing a custom program to break another computer's security software. Hackers are the reason software manufacturers release periodic "security updates" to their programs. While it is unlikely that the average person will get "hacked," some large businesses and organizations receive multiple hacking attempts a day. In this instance the organization falls under health care, with digital medical records becoming more and more common this allow massive amounts of personal data to become vulnerable to hackers. This paper will cover not only hackers but the motivations of the hackers and ways to help defend and prevent. Medical records have become similar to finding gold during the California gold rush for identity thieves. This is exactly why healthcare provider’s cyber-attacks have become more and more frequent. These data breaches exposes millions of records that are used by cyber criminals for illegal activities. But why is the data in health care so important? A data Breach in the healthcare industry causes major threat of financial issues for the organization attacked but also an instant inconvenience for those who choose to entrust the organization with personal information that was breached. A particular health care...

Words: 1448 - Pages: 6

Premium Essay

Ethical Use of Information Technoloby in Modern Society

...The problem to be investigated is the ethical use of information technology in a modern society. “Information technology basically refers to the employment of computer hardware and software applications to manage data” (K Alliance). Historically, information technology had limited applications and its impact on society was also limited. Information technology has come a long way since Jean Hoerni first developed the planar transistor whereby microscopic circuit boards could be laid out on the silicon surface, thus allowing the compacting of these circuits onto integrated circuits (“Darby consulting”). Today, however, information technology is a part of nearly every business and personal activity (Brooks, 2010). Because information technology is so widely used, the opportunity for individuals to engage in information technology in an unethical manner is abundant. This is why it is essential for education systems and businesses to address the ethical concerns of information technology usage. It is imperative that education systems and businesses develop a practical code of ethics to prevent ethical dilemmas and infractions, or at least try to mitigate them. Information technology has caused widespread society ethical changes. To previous generations, information technology was reserved for very specific industries. There was a selective segregation who worked with information technology and what pieces of information were impacted by information technology (Brooks, 2010). With...

Words: 1620 - Pages: 7

Premium Essay

Ais Attacks

...system networks by manipulating those vulnerabilities. Attackers accomplish this by exploiting operating systems at the root level (Balga, Iftode, & Chen, 2008). Although there are protective measures available, businesses, particularly small businesses, are the most susceptible to these attacks. The following paragraphs will provide an argument based on why businesses are liable for loss when attackers attack their AIS. AIS The assembly of firmware, hardware, and software makes up the automated information system or AIS. It is here where computers store information, such as computations and communications. Businesses and governmental agencies benefit from the use of an AIS. The benefits are time and cost efficient; however, the greater the benefit the greater the risk of attacks. Businesses are losing billions of dollars annually because of these attacks especially when there is no preventive measures in place (Balga, Iftode, & Chen, 2008). Without preventive measures, attackers forge Internet Protocol (IP) Addresses, which causes the victims of the attack to attack other victims. The source of the attack remains unidentifiable. Another type of attack is through user accounts. Networks use authentication information, such as user ID and passwords as a security measure; however, if an attacker learns the authentication material of his or her victim, the attacker can enter a network under false pretenses or as an innocent person to perpetuate a......

Words: 773 - Pages: 4

Premium Essay

Ifsm B-1

...and include a number of different illegal activities to include: identity theft, phishing, cyber-stalking, and the use of malware. Criminal activities are of course, unethical, and cyber-crimes are no exception. It is a problem plaguing our society, and people have to be diligent to avoid being attacked and exploited. “It seems that everything relies on computers and the internet now — communication, entertainment, transportation (car engine systems, airplane navigation), shopping, and medicine (equipment, medical records). How much of your daily life relies on computers? How much of your personal information is stored either on your own computer or on someone else's system? Cyber security involves protecting that information by preventing, detecting, and responding to attacks” (US CERT, 2013). Today, we’ll look at an ethical approach (Reynolds' Seven-Step Ethical Decision-Making Approach) to develop protective measures that could help in mitigating cyber-crimes Ethically, cyber-crimes really boil down to what’s right and wrong. Deontological theories focus on the right action, doing the right thing, no matter the consequences. All humans on this planet have a deontological duty to do what’s right for fellow man; and committing crimes over the internet is clearly wrong. It is a basic duty of existence to treat others how you would want to be treated, and I’m sure that no one wants their identity stolen. I’m sure that the cyber-actors committing these......

Words: 1300 - Pages: 6

Premium Essay

Government Contract Law

...advanced products and services. Upon its creation, it has been vital to uphold an unwavering moral code, and has continued to make sure this is throughout its entire company. Even though the company is in its beginning stages, the level of professionalism and security presented by its employees radiates well past its 4 years of experience with data services. RP provides servers and storage for small businesses and government contracts for the purpose of processing any type of request and for housing important data. The importance of a secure server is still highly important when it comes to small businesses, and even more important in government relations. The security around the servers, designed for the server is just as an important protective barrier, especially in the time of mobile access in nearly every...

Words: 1972 - Pages: 8

Premium Essay

Accounting Information System Report

........2 COMPUTER SECURITY MEASURES 3 WOULD THE REMOVAL OF COMPUTER SECURITY MASURES REDUCE THE INCIDENCE OF COMPUTER FRAUD? 5 CONCLUSION AND RECOMMENDATIO 6 REFERENCES 8 EXECUTIVE SUMMARY The aim of this report is to discuss the various methods of reducing computer fraud and to find out whether the computer security measures is necessary. In the main body of this report discuss about whether the software licensing is antisocial or not, the development of computer security measures, ethic teaching for the computer users and the effect of reduce computer security measures. The reports finds that software licensing protect the effort of the licensor and provide the financial support for them to develop new product and Computer security measures are effective way to reduce the computer fraud also is necessary. Without computer security measures the computer fraud will increased and the effect of using ethical teaching to reduce computer fraud is limited. The report conclude that reducing computer fraud not only depends on students self-moral cultivation but also require for protection from computer security measures. In addition, it is recommended that in order to reducing computer fraud teaching students ethical behavior is necessary and computer should install protection system in case of computer fraud happen. INTRODUCTION The purpose of this report is to find out that in order to reduce the computer fraud by improve computer security measures it will create a side......

Words: 2025 - Pages: 9

Premium Essay

I Am an Online Writer

...Effects of Cybercrime Name: Course: Course code: Tutor: Date: Effects of Cybercrime Introduction According to Brenner, Cybercrime, commonly known as e-crime/computer crime, is a criminal act whereby computer or computer networks serves as a target, location, means or as the source of the activity. Its scope covers all the criminal activities revolving around the computer. Such malicious activities include identity theft, web site defacement, financial fraud, and cyber bullying. In an organization, computer crimes involve hacking customer databases as well as stealing of intellectual property. Usually, computer users think that they can protect themselves, their personal computers and their accounts by using antivirus software or anti-spyware, but this is not always the case. E-crimes are very sophisticated and target consumers, public and private institutions (Wall). Computer crimes range from outside parties hacking the computer networks and phish in malicious programs that give users a deceitful sense of security, instigating them to disclose vital information. Some of the effects of cybercrimes are: Loss of intellectual property The greatest effect of cybercrime is the loss of intellectual property as well as confidential information of the business. However, it is not easy to determine the exactly the extent of the losses. Partially, cybercrime is not a zero-game because the stolen information is not fully gone. Infiltrators steal only the company plans including the......

Words: 1354 - Pages: 6

Premium Essay

Strategic Plan

...motorcycle parts and apparel store created by my good friend Mr. Brockton Gardner. Mr. Gardner is a motorcycle enthusiast, and is in tune with the motorcycle industry with a great number of people who are also enthusiasts that he’s networked with; qualities that can spell success for his website as soon as it goes live. There are many factors to consider before going live with one of those factors being security. My project proposal is a security plan that will protect Mr. Gardner, and his website, from the variety of Internet and physical security threats. This security plan is not a complete overhaul of current systems and methods used, but a plan to harden current security measures. An environmental scan conducted on the website, and Mr. Gardner, has shown that although security measures are being taken there can be some improvements to further protect his investment, and reduce the chances of a malicious attack. Internet threats aren’t the only concerns. Physical security must be considered because mobile devices, to include laptops, are lost and stolen on a daily basis. Most mobile devices carry considerable amounts of sensitive or private information giving all the more reason to protect these items. Although the site will be hosted on servers, which provide their own forms of security, there are still areas outside those servers that need to be protected. This proposal will attempt to address all areas of concern to ensure Mr. Gardner, and his......

Words: 2765 - Pages: 12

Premium Essay

Privacy and the Internet

...------------------------------------------------- Privacy and the impact of the internet Assignment #4 June 20, 2014 June 20, 2014 Privacy Rights Federally and provincially there are laws set out to protect our rights as individuals. Privacy is a right not a privilege. Privacy and Governments in Canada The 1983 federal Privacy Act puts limits and obligations on over 150 federal government departments and agencies on the collection, use and disclosure of personal information. It also gives Canadians the right to find out what personal information the federal government has about them by making a formal request under the Privacy Act. The Office of the Privacy Commissioner of Canada has the authority to investigate complaints. The governments of all provinces and territories in Canada also have privacy offices and laws governing the collection, use and disclosure of personal information. The legislation varies from province to province, but the general right to access and correct personal information exists in all, and each has a commissioner or ombudsman who is authorized to handle complaints. In Ontario we have the Freedom of Information and Protection of Privacy Act (FIPPA) Governed and enforces by the Information and Privacy Commissioner Ontario, Canada. The Freedom of Information and Protection of Privacy Act (FIPPA) and the Municipal Freedom of Information and Protection of Privacy Act (MFIPPA) protect the privacy of individuals with respect to their......

Words: 2284 - Pages: 10

Premium Essay

Information Security

...Principles of Information Security, Fourth Edition Chapter 3 Legal, Ethical, and Professional Issues in Information Security Learning Objectives • Upon completion of this material, you should be able to: – Describe the functions of and relationships among laws, regulations, and professional organizations in information security – Differentiate between laws and ethics – Identify major national laws that affect the practice of information security – Explain the role of culture as it applies to ethics in information security Principles of Information Security, 4th Edition 2 Introduction • You must understand scope of an organization’s legal and ethical responsibilities • To minimize liabilities/reduce risks, the information security practitioner must: – Understand current legal environment – Stay current with laws and regulations – Watch for new issues that emerge Principles of Information Security, 4th Edition 3 Law and Ethics in Information Security • Laws: rules that mandate or prohibit certain societal behavior • Ethics: define socially acceptable behavior • Cultural mores: fixed moral attitudes or customs of a particular group; ethics based on these • Laws carry sanctions of a governing authority; ethics do not Principles of Information Security, 4th Edition 4 Organizational Liability and the Need for Counsel • Liability: legal obligation of an entity extending beyond criminal or contract law; includes legal obligation to make restitution...

Words: 2389 - Pages: 10

Premium Essay


...people’s daily life, because it can be used to communicate and do business with others. For example, “in 1996, Internet shopping revenues for U.S. users, excluding cars and real estate, were estimated by Jupiter Communications, an e-commerce consulting firm in New York, at approximately $707 million but are expected to reach nearly $37.5 billion by 2002” (Achs, 1998). However, a lot of problems of the privacy of personal information have caused people's concern and make them less confident about the Internet. The first potential problem that causes people’s concern is cyber-thief, because it is one of the most convenient method to obtain personal data of others on the Internet— a virtual world where there are no borders. “Online identity theft through the use of computers does not necessarily have real space analogs as exemplified by techniques of IP spoofing and page jacking” (Katyal, 2001) and a lot of people’s online credit information can be visited by cyber-thieves (Salkever 2002). Therefore, it is a big threat to the...

Words: 1537 - Pages: 7

Premium Essay

Cyber Security Act

...cyber space – Key policy considerations 2.0 Cyber space – Nature of threat 2.1 Threat landscape 2.2 International cooperation 2.3 Securing cyber space – Scope of action 2.3.1 Cyber security and cyber defense 2.3.2 Cyber intelligence and cyber defense 2.4 Priorities for action 2.5 Partnership and collaborative efforts 3.0 Enabling processes 3.1 Security threat and vulnerability management 3.2 Security threat early warning and response 3.3 Security best practices - compliance and assurance 3.4 Security crisis management plan for countering cyber attacks and cyber terrorism 3.5 Security legal framework and law enforcement 3.6 Security information sharing and cooperation 4.0 Enabling technologies – Deployment and R&D 4.1 Deployment of technical measures 4.2 Security research and development 5.0 Enabling people 5.1 Security education and awareness 5.2 Security skills training and certification 5.3 Security training infrastructure 6.0 Responsible actions by user...

Words: 7888 - Pages: 32