How to Prevent Identity Theft
There are several things that may be carried out to prevent identity theft and some of these are the following: First, people should be very careful with their card account numbers and bank account numbers (Protect.. n. p. ). It is important that when they plan to keep a copy of the aforementioned, they should keep it in a place which is really safe (Protect.. n. p. ). They should never keep it on their personal computers or any computer for that matter especially if that particular computer is being utilized to surf the Web or connect to the Internet (Protect.. n. p. ).
Second, if he or she can make his or her number an unlisted one then that would be better and safer or if he or she would like to save it, it would be best to use initials only (Protect.. n. p. ). Third, people should write to the State and Federal Legislators and request for protection of privacy (Protect.. n. p. ). They should tell them that a law considering that identity theft is a crime in their State should be passed immediately (Protect.. n. p. ).
If he or she is being requested for his or her social security number, he or she should instead provide another number and he or she should provide an explanation for doing so (Protect.. n. p. ). He or she should tell the people asking for social security number that they do not need such to be identified (Protect.. n. p. ). He or she should also add that in case government agencies would really like to have it, he or she should ask that a written request along with a privacy notice be sent to him or her (Protect.. n. p. ).
Fourteenth, he or she should never provide any personal information through telephone especially if the person who called is not an acquaintance, friend, relative, etc (Protect.. n. p. ). In addition to that, if he or she receives a call from a person claiming to be his or her credit grantor, he or she should request to hang up the phone and that he or she will be the one to call the number which the credit grantor provided in the past to make sure that the caller is really the credit grantor and not just somebody who is interested with his or her personal details (Protect.. n. p. ).
Fifteenth, he or she should, as much as possible, remember pertinent personal information like social security number, etc instead of taking them on a piece of paper and taking a risk that somebody will see it (Protect.. n. p. ). Sixteenth, he or she should not be moving around along with too many credit cards, birth certificate, social security card, passports etcetera especially if it is not required to bring it (Protect.. n. p. ). He or should not bring along too many unneeded identifiers because it is simply too risky (Protect.. n. p. ).
Seventeenth, he or she should always inquire what financial establishments, hospitals, etc do with those personal information that they ask for (Protect.. n. p. ). Request that it be shredded after use and protect the private information shared to them always eventually explaining to them why such is necessary (Protect.. n. p. ). Eighteenth, if possible, he or she should acquire a “post office box or a locked mailbox” (Protect.. n. p. ). Nineteenth, the utilization of mother’s maiden name as a password is typically carried out by people (Protect.. n. p. ).
Since, such is easily traced, it is much better if he or she invents another word to be utilized as a password to protect his or her accounts (Protect.. n. p. ). Twentieth, he or should always remember that “open credit is the primary target of robbers and thieves” and so if he or she was not able to utilize the credit card in six months, he or she might as well have it cancelled (Protect.. n. p. ). Twenty-second, in cases where the credit cards are already expired and he or she already ordered for replacement or new ones via mail, he or she ought to closely monitor that the card be delivered within the correct time frame (Protect.. n. p. ).
He or she should be alarmed if the replacement has not arrived at the scheduled time, what he or she should do is to contact the credit grantor and confirm if the replacement for the card has been sent to his or her address indeed (Protect.. n. p. ). Also ask if somebody filed for a change of address since some robbers do this, they request such changes so that the victim will not immediately find out that somebody else used his or her personal details, as well as, his or her credit card because of course billing statements will no longer be sent to the address of the real owner of card (Protect.. n. p. ).
Twenty-third, since it is not all difficult to “alter the name of the recipient on the check with an acid wash”, he or she should avoid placing checks in the mail coming from the mailbox assigned at home, instead, he or she should place it at a U. S. Mailbox or directly send it at the U. S. Post Office to avoid mail theft which may eventually result to identity theft (Protect.. n. p. ). Twenty-fourth, he or she should have his or her checks delivered to his or her bank instead of his or her home address (Protect.. n. p. ).
Twenty-fifth, he or she should also be extremely careful with the utilization of ATM cards since when pin numbers are already gotten by hackers, they could always hack for other personal information as well (Protect.. n. p. ). Twenty-sixth, he or she should cut or shred any document that contain personal information like pre-approved credit card applications, financial information, bank statements, credit card receipts etc. that may be utilized be someone to become him or her (Protect.. n. p. ). He or she should not just throw anything away, it should always be shredded and unreadable (Protect.. n. p. ).
Twenty-seventh, he or she should not send reply to a request to confirm about an account, password, etc since companies that are legitimate do not ask for personal and private information over the phone, electronic mail, or even regular mail (Protect.. n. p. ). Twenty-eighth, he or she should find out if his or her State law “requires the bank and other financial services companies to obtain your permission before sharing personal information with outside companies” (Protect.. n. p. ). He or she should also know of the “right to limit sharing of personal information with the affiliates of the companies” (Protect.. n. p. ).
In addition to that, he or she should look for signs that his or her personal information will not leak out or given away or hacked by anyone (Protect.. n. p. ). The signs include the following: 1) https located at the address bar; and 2) padlock symbol which may be found at the end of the browser window (Protect.. n. p. ).
Protect Yourself From Identity Theft. n. d. n. a. 30 July 2007Sample Essay of RushEssay.com