Showing posts with label Protecting Personal Information. Show all posts
Showing posts with label Protecting Personal Information. Show all posts

Monday, December 1, 2014

Is Facebook Messenger Worth the Download?



If you use Facebook, you started getting messages telling you that a new app, Messenger, was about to be launched.  For weeks these messages would appear and for weeks I would ignore them.  Why would I need another app?  I get my private messages from Facebook, so what’s the big deal?  Well, the “big deal” came when Messenger was the only way I could access my private messages on my phone.  I clicked on the “download app” box and saw all the information it wanted and I decided that there was no way I would be downloading this.  That lasted about three weeks.  It turned out that it wasn’t as easy to just get to a computer every time I needed to read a message, so, I put on my big girl panties and hit “download”.

When I really gave it some thought, I realized that the only reason I didn’t want the Messenger app was because I felt it was asking for too much information.  Apparently, I wasn’t the only one who felt this way.  Seeing that Messenger wants to access your phone, your phone’s camera and see your geo-location, it all seemed a bit much….at first.  But, I had to face facts:  Messenger wasn’t asking for any more information than other apps that I have.  And, giving it even more thought, I understand why it needs the information it’s asking for.  Of course it wants to access your phone because that is how you are going to be getting your message.  It needs access to your camera because that is how you will be sending pictures through the app.  Geo-location?  Of course!  Without it, how will it know which of your friends is near you and available for messaging?

I then realized that I was just making excuses not to download Messenger and it was becoming an inconvenience to me.  Besides, I have quite a few apps already that need the same information that Messenger needs.  GasBuddy uses geo-location to tell me which gas stations are close to where I am and needs access to the phone’s camera so that users can post pictures of the gas stations and the price boards.  The Dunkin Donuts and Starbucks apps use my geo-location so that I can get a current list of nearby stores where I could get my caffeine fix.  They also need access to my phone to keep track of my purchases and send me coupons whenever I reach my “bonus point” goal.  Then, there’s Swarm (which used to be FourSquare).  I can check in anywhere I visit and with geo-location, it will tell me if any of my friends are at the same mall I’m at.  It will also give me a list of my “favorite” spots so check-ins are a breeze.  Candy Crush, Words with Friends, Scramble with Friends, and any other games you have on your phone all need access to your phone and geo-location.  So, if I don’t mind giving these apps access, why do I mind giving access to Messenger when this would actually be the app I would use the most?

Facebook already knows all about me, and since Messenger is a Facebook app, what would be the difference if I allowed this to have my information?  After all, it’s not asking for my Social Security number or banking information.  It started to make less sense to NOT download Messenger, so, I caved.

Monday, February 3, 2014

Losing Privacy While Seeking Employment



As we all know, the rate of unemployment all over the US is staggering.  Many of these unemployed people are without jobs through no fault of their own.  Many companies are closing their doors, and with so many people out of work and looking for jobs, this gives employers a chance to try new methods of weeding out “undesirable” candidates.  One of the methods now being used is to ask each candidate to agree to a credit check at the time an application is submitted. 
 
What does a credit check have to do with one’s ability to work?  Well, according to employers, if someone has bad credit, they are considered a high risk for corporate theft.  So, if you have bad credit, you will not be getting an interview.  By using this theory, instead of creating a time frame for 20 interviews, that number can be lowered to 5 or less with the click of a button.

True, prospective employees aren’t forced to submit to this credit check, however, if you don’t agree, your application will not be considered.  The employers hold all the cards on this. 
 
There are a few flaws with this method of choosing potential employees:

1.  Each time a credit check is run, it lowers your credit score.  Credit reporting services don’t see this as an employment check; they just see it as you looking to get approval to raise your credit limit or to add yet another credit account.

2.  If you file applications with several companies, all of which are receiving your credit report.  This means that an unknown number of strangers are privy to not only your credit score, but also know each bank and amount you have credit with.
 
3.  You will not be given a chance to explain your low credit score.  Employers don’t care WHY the credit score is low; they just care that it IS low.

4.  Employers don’t take into consideration that you haven’t paid your bills because you’ve been unemployed.  They see the low credit score and automatically assume that you will steal from the company.  It doesn’t seem to cross anyone’s mind that you want a job not to steal, but to earn money to pay your bills in order to raise your credit score.

Tuesday, December 10, 2013

Personal Information Sold at Goodwill



Have you ever donated old clothes, books, furniture or other items to a Salvation Army or Goodwill store?  Well, one donator to Goodwill in central Indiana donated a bit more than he intended.  If his donations were checked before being put up for sale, this may not be an issue.  Unfortunately, a box containing 39 pounds of one family’s personal information was sold to a woman for $27.69.

Emily Watson opened a box that she bought from a Goodwill outlet store in the Indianapolis area and found someone else’s sensitive records.  If items can’t be sold at the retail stores for any reason, they are put in bins and sent to Goodwill outlet stores.  These are closed boxes sold by the pound to anyone who wants to take a chance that there is something valuable inside.  Ms. Watson bought one such box and when she opened it found personal information all belonging to one family.  The box contained Social Security cards, tax returns, pay stubs, banking information, dental and other medical records, divorce papers and insurance documents.  There were also family photos and addresses of family members.

This had happened to Ms. Watson before.  At another time, she purchased a box containing personal information, so she opened the box in the store before buying it.  When she saw what it contained, she pulled out all the items to show a store employee, who referred her to the manager.  When the manager looked through the paperwork, she said, “It doesn’t look harmful to me.  It’s OK.”  Ms. Watson then made the purchase because she was afraid that it would get into the hands of someone not as honest as she.  She was afraid for the people the information belonged to. 

After purchasing the box, Ms. Watson tipped off WTHR Channel 13 as to her find.  WTHR 13 Investigates then opened an investigation as to the allegations made of Goodwill selling personal information.  The station sent undercover “shoppers” to three Indianapolis area Goodwill outlets and found that at every outlet location they visited, they were able to purchase someone’s personal information.  This didn’t just happen once; out of 28 visits in 2 months, personal information was purchased 24 times.   WTHR employees were able to purchase valid debit and credit cards, leases, automobile titles, medical histories, immigration papers, bills, employee drug test results, college transcripts, IRA and 401K statements and all other kinds of legal documents containing personal information. 
 
The personal information donated to Goodwill, then sold by them, contained thousands of pages, filling three boxes.  Some Social Security numbers found belonged to police officers stationed at the Indianapolis Metro Police Department.  When WTHR spoke with Sgt. Eric Eads, who is an identity theft expert in the department, he said, “Let me put it to you this way:  this is a police nightmare here.  If someone got ahold of this stuff.  It’s just shocking the amount of Social Security numbers and tax records you found.”

Another person whose tax records were found by WTHR employees is Elesabeth Leclercq.   She is quoted as saying, “It’s terrible.  I don’t even know what to say.  I’m still stunned and in a state of shock.”  Julie and Brett Snyder also found out that their information had been sold along with information on their children.  Mrs. Snyder said, “This isn’t anything we would throw away.  I mean, we wouldn’t have just handed this over to Goodwill.  It’s shocking.  We are completely shocked.”

The person whose information started it all when Emily Watson purchased it is named Rose.  She refused to give her last name, but she did give a statement.  “It’s pretty devastating and I’ve had nightmares about it” she said. 

Tuesday, December 3, 2013

Make Sure Your Password is Secure



Just about every day, there’s an article in the newspaper or a story on the news that talks about cyber-crime, usually in the form of identity theft.  Most Internet users feel that they are safe because they are “cautious”; they never download from strange websites, nor do they open an e-mail unless they know who sent it.  The problem is that these “cautious” people forget one of the most important aspects to keeping their privacy safe:  the password.  Maybe laziness or forgetfulness is the reasoning, but in this World Wide Web full of hackers, many thousands of people are still using the same password for everything they do online.  Some may argue that each password is “different”; however, having variations of the password “ABCD1234” doesn’t count as being different.   If you or someone you know is guilty of this way of thinking, you should really read on.
  
One of the first lines of our privacy defense is the password.  Whenever you sign up to become a member of a website, you need to enter a log-in name and a password.  Most sites will not accept passwords shorter than 8 characters and many require them to be alpha-numeric and case sensitive.  If you choose the password “platypus1”, you will not be granted access into that site if you mistakenly type in “Platypus1” on your next visit.  The password must be an exact match.  So, if you are a registered user on 10 different sites, you need 10 unique passwords.  “Platypus1”, “Platypus2”, “Platypus3”, etc. just won’t cut it. 

In order to try to make each password unique, many people will use different names combined with birthdates.  It’s not uncommon for a man to have “Pamela823” (his wife and her birth date, August 23) for one site, then choose “Henry312” (his son and his birth date, March 12) for another site.  A problem could arise, however, if that man signs on to Facebook using a public hotspot and is hacked.   Once the hacker knows the Facebook password, he could look to see the names and birthdates of the spouse and children.  So, if the Facebook password is “Pamela823”, this hacker will try that same password for an email account.  If that doesn’t work, he’ll look to see the son’s name and try “Henry312”.  Hackers are very good at what they do, so before you know it, this cyber-crook is going through your bank account.

There is a corporation in Virginia called Siber Systems, Inc., that realized how difficult it is for many people to come up with unique passwords.  With this in mind, in 1999 they developed RoboForm, their first product with consumers in mind.  It now has worldwide users numbering in the millions.  Demand was so great that RoboForm is now available in 30 languages.

RoboForm takes your information and each time you register for a site, it comes up with a unique username and password.  You don’t have to do a thing.  The only password you need to remember is the master password from when you first used it.  So, you log on to your computer, enter your master password into RoboForm and RoboForm goes to work for you after that.  It not only generates unique passwords, it remembers them for you.  Another plus is that each password is encrypted, making it almost impossible to be hacked.

Due to the success of the original RoboForm, in 2004, Siber Systems expanded its product line with RoboForm2Go.  This portable version of RoboForm is on a USB flash drive that you plug into your computer.  No matter where you travel, you will have RoboForm2Go with you.  Not only that, it will work in your native language.

RoboForm is the perfect solution for creating unique passwords and then remembering what they are for each site that you visit.  It is a great tool for keeping you safe when you surf the Net.

To add even more protection to your Internet surfing, you should use a proxy server from a reputable company.  Please take the time to visit Privacy Partners and take advantage of the FREE trial offer.  You will be glad you did once you see how safe you feel knowing that you can surf the Internet from anywhere knowing that every time you connect, your information is encrypted.

Monday, August 5, 2013

Who is Following You When You Shop?



By now, we all know that when we shop over the Internet, we’re being tracked.  But, did you know that when you shop in the stores, you’re also being tracked?  Each time we enter a store, whether it’s a department store or a grocery store, we see security cameras positioned in just about every aisle.  These cameras, however, are not doing the tracking.  Customers are being tracked through their cell phones. 

According to the New York Times, last fall, Nordstrom began using Wi-Fi signals from customers’ cell phones to track their movements (Attention Shoppers:  Stores are Tracking Your Cell).  A sign was posted advising customers of the tracking and many shoppers were not happy about it.  Tara Darrow, a Nordstrom spokesperson said, “We did hear some complaints” and because of this, the tracking was stopped in May 2013.  Other stores testing this type of tracking include Family Dollar, Cabela’s and Mothercare. 
 
This tracking can tell a lot about a customer.  The cell phone signals used with the security cameras will tell the retailer exactly who is shopping.  They know how long each shopper spends in any aisle, how long they look at something before they actually purchase it and even the gender of the shopper.  Somehow, many shoppers find this tracking much more invasive than being tracked on-line with cookies.  They consider this more of an invasion of privacy because with on-line tracking, you are still fairly anonymous in the sense that cookies can’t see you.

Tuesday, July 16, 2013

Gun Owners have the Right to Privacy, Too



Using the Freedom of Information Act, the Journal News, the leading newspaper in Westchester County, NY, requested the records for pistol permits issued in the state.  The information they received showed that there were about 44,000 registered gun owners in Putnam, Rockland and Westchester counties.  Once the information was obtained, the newspaper published the names and addresses of every one of them.  As if this weren’t enough of an invasion of privacy, along with the list was an image using Google Maps, that had each gun owner’s address pinpointed.  

New York State Senator Greg Ball was extremely frustrated and angry over this publication.  He stated, “It’s just absolutely ridiculous that the Journal News would do that and they’ve done a lot of boneheaded things in the past.”   He went on to say that he thought the act of publishing this list would give criminals a “map” to go door to door trying to get those weapons. 

Senator Ball is planning on reintroducing legislation that would make the publication of this kind of information illegal.  He said, “This isn’t only about the second amendment, this is about privacy and it’s actually boneheaded for this editorial board to take law abiding firearm owners and treat them no less than a level 3 sexual predator.”

A television news crew was sent to one of the neighborhoods that had a large amount of “red dots”.  When they knocked on doors, many people either did not answer or refused to speak, but some did express surprise and concern that there were so many guns in their neighborhood.

Tuesday, May 28, 2013

What is the Solution to Being Banned from a Website?



Being banned from a website is a problem that many Internet users are faced with.  It can happen if you post too much or post inappropriate content.  It may not even be something you did.  It could be that for whatever reason, the Webmaster just doesn’t like what you are posting.   If you agree with the ban or not, the decision has been made.  So, is there a solution?

You would think that deleting your cookies and creating a new username and password will by-pass that ban, but that isn’t the case.  You see, when you are banned from a website, not only are your username and password banned, but your IP Address is banned as well.  Don’t panic; the situation isn’t hopeless.

Changing your IP Address can be done in a few ways:  1) Go to your local public hotspot whenever you want to go onto the banned site (but that isn’t convenient at all); 2) switch Internet Service Providers (but that would cost too much, especially if you are locked into a contract with your old ISP); or 3) you can find a proxy service that has multiple servers for you to choose from.

Changing your IP Address by using a proxy service is the easiest and most convenient way to do this.  It can be done at any time right from home.  You would need to delete your cookies then pick which proxy server you want to sign on with.  Go to the website, create your new username and password and you will be good to go.  Since the IP Address is that of the proxy, you will no longer be banned.  Just be careful not to get banned again.  True, you would have many proxy servers to choose from, but remember that if you get banned from the website using the proxy, any other members of that service will also be banned from that website if they happen to use your banned IP Address.  Just read and understand the rules of the website and this shouldn’t be a problem.

Getting on banned websites isn’t the only advantage to using a proxy server.  When you use a reputable service, your line of communication is always encrypted no matter where you are; at a public hotspot or at home using your wireless router.  The encryption will keep you safe from hackers because none of your information will be readable to them.  Make sure you use a reputable service because sometimes those free proxies are owned and run by some shady characters that monitor the lines and sell your information.  You won’t have that worry with a reputable service because the lines will be encrypted and unmonitored.  

My information and privacy is important to me, so I use Private Proxy.  No matter where I go, my information is safe.  Try it for yourself by going to the Home page and use the link for the Risk Free Trial.  You could be surfing the Internet safely within minutes.

Wednesday, May 8, 2013

Are Our Privacy Rules Changing?



Do you realize how much information is gathered from your smartphone?  This is something most people use every day, but not just to make calls.  It is also used to surf the Internet, send e-mails and update social networking.  Many people even use their smartphones as a GPS.  Because of its many functions, your smartphone holds information on your location, your e-mail contacts and your favorite Internet sites.   In other words, your smartphone is yet another way you can be tracked on-line. 

It seems like every month new apps are being developed for smartphones and tablets.  In fact, the smartphone is probably used less to make calls than to surf the Internet.  You can use Google Maps to find any location in the world, you can keep up with your office e-mail and you can even use GasBuddy to find the least expensive gas in the area.  When you’re ready for a break, you can play your favorite on-line games!  All this can be done with one device.  You can be traveling, yet you’ll never be far from your office or home.  You can even access sites that can help you out with a solution if you don’t know how to handle your two-year-old’s tantrums or medical sites that can tell you what that strange rash on your leg is.

Yes, these apps are a fantastic convenience, but they also leave us open for tracking.  Many people find that the convenience far out-weighs the risk of being tracked.  After all, isn’t it better to have access to all of these great sites if it means all you have to do is enter your zip code and your birth date?  There are thousands of people in that zip code with the same birth date, so what could be the harm?  Well, thousands of people aren’t using YOUR smartphone!

With this information, you are opening yourself up to being tracked by advertisers.  This can happen because many sites share the gathered information with others. They know your location from your GPS, so with your zip code, birth date and the knowledge of what sites you visit on-line added in with your e-mail address, you are going to get a whole lot of targeted advertisements in your inbox.  You could also be given suggestions for even more apps to either purchase or download for free.

These app developers claim that in order to get the full benefits, some personal information is needed.  Congress has discussed the issue of these apps as a privacy risk.  It has also been discussed that consumers should be allowed to opt out of being tracked, but so far, not much has been done to remedy this.

Wednesday, March 20, 2013

Instagram Claims Right to Sell Photos



Early in 2012, Facebook approached the founders of Instagram with a $1 billion deal to buy the fledgling Internet photo company.  In September 2012, the deal was finalized for reportedly $750 million.  Good news for Instagram, but bad news for anyone who posted one or more of the 5 billion photos.  Why?  Because now, with Facebook owning Instagram they have the right to sell any of these photos.

The policy to sell user photos was supposed to take effect on January 16, 2013, which was 3 months after Facebook’s purchase.  According to this new policy, Facebook is claiming their right to sell Instagram photos without notifying or paying the original poster.  The only way to avoid this happening to you is if you deleted your Instagram account before the January 16th deadline.  News of this caused an uproar among users.   

But how will this new Instagram policy affect users’ privacy?  If you have an account that hasn’t been deleted prior to the January 16, 2013 deadline, any of your photos could be sold to advertisers.  In other words, that picture of you in your bikini while you were on Spring break, holding up a bottle of Coors Light, could be sold to Coors and used in one of their advertisements.  Imagine your surprise when you see this picture on a billboard!  Instagram will be making money for Facebook from Coors, Coors will be making money from the advertisement and you will be making nothing at all for your part in all of this.

Kurt Opsahl, Senior Staff Attorney with the Electronic Frontier Foundation says of this new policy, “It’s asking people to agree to unspecified future commercial use of their photos.  That makes it challenging for someone to give informed consent to that deal.”

Because there is nothing specified, this leaves an endless list of possibilities for exploitation of user photos.  Travel agencies, airlines and resorts can all use your photos in magazine ads, brochures, Internet advertising, television advertising, etc.  All they have to do is pay the fee to Facebook and your Instagram photo is now theirs to use as they see fit.  There is no limit to what types of photos will be sold.  This means that if you post a picture of your children playing in the sands of a tropical island, your children could be the subject of an advertisement.  

Wednesday, October 10, 2012

Can Your GPS Lead a Stranger to Your Door?



Nowadays, almost everyone has a GPS.  As you drive down the highways and back roads, just about every car you see has one attached to the windshield.  Some newer models of cars come with the GPS as either a standard feature or an option.  A GPS doesn’t only tell you how to get where you’re going; it also tells you when you should be arriving.   If one of the roads you need is closed, or if traffic is unusually heavy, the GPS will tell you which detour to take.  For these reasons, I’m addicted to my GPS, just like millions of other people.

Yes, the GPS is a huge part of our lives, but do we ever think about how we can be risking our safety by using it?  Think of all the information about you that a criminal can get just by looking through your GPS’s “Favorite Places”.   Below is a scenario that is played over and over all over the country:

You just got a promotion at your job.  Along with this came a very large raise, so, to celebrate, you and your husband go out for a night on the town.  Your first stop is that new nightclub that opened a few weeks ago because a band that you both love is playing there.   You know the address, but aren’t sure how to get there, so you program it into your GPS.  You get to the club and hand your car over to the valet so you don’t have to walk unfamiliar streets to find it later.  If you have an in-dash GPS, it’s all but forgotten, but if you have a portable GPS, you stash it in the glove box so it’s out of sight.

Maybe your husband comments about the band and how long it’s been since you’ve both been to one of their concerts.  You tell him that you can’t wait and will savor every minute until the club closes and you are forced to leave.  During this conversation, the valet has heard every word.  He also noticed where you put your portable GPS, or that you didn’t turn off your in-dash GPS.  Who is this person that you just handed your car to?  Does he have a criminal background?  Well, whoever this person is, he now knows your plans for the entire evening.

The valet is doing a quick scan of your keys as you are walking into the club.  He notices that you are like thousands of others who keep their house keys on the same key ring as your car key.  He then takes your car and parks it.  He reaches for your GPS and scans your list of “Favorite Places”.  He hits the jackpot when he sees an entry listed as “Home”.

Sunday, July 29, 2012

Today’s Tech-Savvy Youth

Children today are becoming more and more tech savvy.  Everywhere you go, you see toddlers holding toy cell phones, or “working” on toy computers that are loaded with learning games.  Parents bring portable DVD players on car trips or to restaurants in order to keep the kids entertained.   These devices, marketed for young children, are seen more and more.  It seems that technology is taking over not only our lives, but the lives of our kids.

Classes on basic computer operations are being held in pre-schools.   When children reach elementary school age, they should not only know how to operate a computer, but they should also know how to access the Internet and conduct web searches.  The rising cost of textbooks has made it impossible for schools to purchase a book for every class for each child.   Now, to save costs, they are having the students download e-textbooks from the schools’ websites.   Each school’s website also doubles as an on-line community where students can “speak” to each other.   Teachers volunteer to tutor after hours on the website, so if students are having difficulties with a homework assignment or a particular subject in general, they can get help. 

At the beginning of the new school year, or at the end of the old school year, the schools will send memos to the parents on which computers or laptops to purchase.   This is to insure that the students have the equipment that meets the system requirements for downloads, etc.  The schools will also advise the parents of where these computers can be purchased at the best possible price.  Some may even offer coupons for a limited time.