Tuesday, May 09, 2006

Keeping Private Information Private

By: Norm McAlister

Identity theft, a vicious crime based on impersonating someone else, is becoming more and more prevalent. Recently, there has been a run of news items on this topic in the national media almost daily. One of the most disturbing aspects is that often these crimes are inside jobs occurring at banks, mortgage companies, and similar places where sensitive personal information is housed. In these instances, where the crimes are large scale and well organized, there is not much the individual can do to prevent them.

During March and April 2005, numerous significant examples of large scale identity theft occurred. With help from a few corrupt insiders, several major banks and credit card companies were targeted, involving the compromise of personal information of millions of Americans.

However, there are various things you can do to handle those factors within your control. These include being aware of how your private information is used, who has access to it, and how it is handled. This involves shredding papers before disposing, keeping information secured or locked and away from those who do not need it.

Just because someone asks for information does not mean you are obliged to provide it. Find out if -- and why -- something is required before responding. You can also remove yourself from unwanted mailing lists, where your name and address is circulated.

When you understand why and how these crimes occur, it is easier to eliminate the opportunity. Simply becoming more aware of daily activities involving your information (i.e., using credit cards, putting out the trash, visiting web sites, etc.) should increase your caution. The more careful you are, the less opportunity for the thieves, and this is certainly a crime of opportunity.

By taking a few simple precautions, you may save yourself considerable suffering and grief. Identity theft is a violation of the worst sort, and the consequences are serious and lasting. Repairing your credit and getting your identity back can be done, but it is a lengthy expensive and tedious process.


About the Author:

Norm McAlister is a writer and consultant with a background in security. For additional informationabout what you can do to protect yourself and those you love, go to http://www.SafeguardYourInfo.com.




































































































nitoring software mnitoring software moitoring software montoring software monioring software monitring software monitoing software monitorng software monitorig software monitorin software monitoring oftware monitoring sftware monitoring sotware monitoring sofware monitoring softare monitoring softwre monitoring softwae monitoring softwar mmonitoring software moonitoring software monnitoring software moniitoring software monittoring software monitooring software monitorring software monitoriing software monitorinng software monitoringg software monitoring ssoftware monitoring sooftware monitoring sofftware monitoring softtware monitoring softwware monitoring softwaare monitoring softwarre monitoring softwaree omnitoring software mnoitoring software mointoring software montioring software moniotring software monitroing software monitoirng software monitornig software monitorign software monitorin gsoftware monitoring osftware monitoring sfotware monitoring sotfware monitoring sofwtare monitoring softawre monitoring softwrae monitoring softwaer monitoringsoftware nonitoring software jonitoring software konitoring software minitoring software m9nitoring software m0nitoring software mpnitoring software mlnitoring software mknitoring software mobitoring software mohitoring software mojitoring software momitoring software monutoring software mon8toring software mon9toring software monotoring software monltoring software monktoring software monjtoring software moniroring software moni5oring software moni6oring software moniyoring software monihoring software monigoring software moniforing software monitiring software monit9ring software monit0ring software monitpring software monitlring software monitkring software monitoeing software monito4ing software monito5ing software monitoting software monitoging software monitofing software monitoding software monitorung software monitor8ng software monitor9ng software monitorong software monitorlng software monitorkng software monitorjng software monitoribg software monitorihg software monitorijg software monitorimg software monitorinf software monitorint software monitoriny software monitorinh software monitorinb software monitorinv software monitoring aoftware monitoring woftware monitoring eoftware monitoring doftware monitoring xoftware monitoring zoftware monitoring siftware monitoring s9ftware monitoring s0ftware monitoring spftware monitoring slftware monitoring skftware monitoring sodtware monitoring sortware monitoring sottware monitoring sogtware monitoring sovtware monitoring soctware monitoring sofrware monitoring sof5ware monitoring sof6ware monitoring sofyware monitoring sofhware monitoring sofgware monitoring soffware monitoring softqare monitoring soft2are monitoring soft3are monitoring softeare monitoring softdare monitoring softsare monitoring softaare monitoring softwqre monitoring softwwre monitoring softwsre monitoring softwxre monitoring softwzre monitoring softwaee monitoring softwa4e monitoring softwa5e monitoring softwate monitoring softwage monitoring softwafe monitoring softwade monitoring softwarw monitoring softwar3 monitoring softwar4 monitoring softwarr monitoring softwarf monitoring softward monitoring softwars