Start reading privacy policies. Get in the habit of reading a Web site’s privacy policy. A link to the privacy policy is usually found at the bottom of the home page. This policy should alerts to how information is shared and sold. Additionally, the policy outlines what rights one possess. If a company violates its own privacy policy one can file a complaint to the FTC (Federal Trade Commission).
Secure Your Computer
Install anti-virus, anti-spyware and personal
firewall software. Regularly install updates to these software solutions.
➢ Regularly install security updates to the
desktop operating system and
Internet browser software.
➢ Install and activate a pop-up “blocker.”
➢ For extra protection, consider
disconnecting PC from the network when not in use.
➢ Destroy all sensitive data on hard drive
prior to selling, donating or discarding an old computer.
Start reading privacy policies. Get in the
habit of reading a Web site’s privacy policy. A link to the privacy policy is
usually found at the bottom of the home page. This policy should alerts to how
information is shared and sold. Additionally, the policy outlines what rights
one possess. If a company violates its own privacy policy one can file a
complaint to the FTC (Federal Trade Commission).
Encryption as a Security Measure
Encryption is a method of scrambling an e-mail
message or file so that it is gibberish to anyone who does not know how to
unscramble it. The privacy advantage of encryption is that anything encrypted
is virtually inaccessible to anyone other than the designated recipient.
Thus, private information may be encrypted and
then transmitted, stored, or distributed without fear that it will be read by
others. Strong encryption programs such as PGP (Pretty Good Privacy) are
available online.
What are privacy policies and Web seals?
The Federal Trade Commission urges commercial
Web site operators to spell out their information-collection practices in
privacy policies posted on their Web sites. Most commercial Web sites now post
policies about their information- collection practices.
Look for a privacy “seal of approval,” such as
Trustee, on the first page of the Web site. Trustee participants agree to post
their privacy policies and submit to audits of their privacy practices in order
to display the logo.
Other seals of approval are offered by the
Council of Better Business Bureaus
(BBB) www.bbbonline.org, and VeriSign www.verisign.com.
How to make sure to have a
Good Password?
Create passwords with nonsensical combinations
of upper and lower case letters, numbers and symbols, for example tY8%uX. Do
not use the same or variations of the same password for different applications.
One way to create a password that is easier to
remember is to use the first or last letters in a favorite line of poetry.
Intermingle these letters with numbers and punctuation marks. “Mary had a
little lamb” becomes m*ha2ll. Or create a story that gives the clues which
helps to remember the password.
Microsoft recommends that virtually
“uncrackable” passwords have at least 14 characters and use upper and lower
case letters plus numbers and symbols. Change password often. Don’t let others
watch log in. Don’t print password on a post-it note and attach it to your
video monitor. If it is a must to write down or record password, take steps to
secure or disguise the information.
There are services and software packages that
will help one to keep track of their passwords. Most are free and are worth
considering. These programs are availabe at www. download.com.
Password Assistant 2.0
Password Manager Plus
RoboForm
Demands for such services are strong and
innovations are likely to continue.
Anonymizer is available at www.anonymizer.com.