Spyware runs automatically without the user's knowledge and transmits vital information. Spyware can also record your keystrokes and one might end up revealing all usernames, passwords and other details to identity thieves. (Atlantic Publishing, 2008); (Schwabach, 2005)
Identity thieves have also found novel ways to steal and use identities. For instance, cyber criminals recently hacked Facebook, a popular social networking site, and changed a user's page asking people to help him. Even though the matter was resolved with the help of Facebook; the fact remains that identity theft can have far-reaching and diverse consequences. (Caroll, 2009) the damage caused by identity theft can take years to be rectified. The consequences of the fraudulent practices initiated by the identity thief can continue to reach the victim and credit companies long after the thief has been apprehended and the abuse of the victim's identity stopped. Therefore, consumers must take utmost precautions to protect their identities at all costs. (Schwabach, 2005)
An identity theft can dog a person for the rest of his life and reclaiming one's life can be an uphill task. As they say, "prevention is better than cure." Prevention of identity theft just requires a few extra precautions while dealing with one's personal data and belongings. In most cases, it is the irresponsibility of victims that results in their identities being stolen. (Atlantic Publishing, 2008)
With identity theft becoming one of the fastest growing crimes in the U.S., here are a list of preventive steps that consumers can take to protect themselves:
(i) Check credit reports: one must make it a habit to request for a copy of credit report annually. The credit report gives information whether somebody else has misused your credit account or changed your billing address. (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)
(ii) Secure your password and PINs: Password and PINs are extremely important and utmost precaution should be taken that no one has access to them. Writing them down or putting those in a hidden file are very dangerous habits. Passwords should be chosen in a way that is difficult for people to guess them. Having spouse's or child's name as a password, or using your birth date can be extremely foolish as these are the first things that an identity thief may try. It is better to have a random combination of alphabets and numbers which can be remembered but hard to guess. While using passwords or PINs, it is better to make sure nobody is looking over your shoulder. Identity thieves often observe their victims over a long time noting keystrokes, etc. It is a good habit to change your passwords periodically and not to use the same password everywhere. (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)
(iii) Protect credit cards: one should make it a habit to sign new cards immediately upon receipt and treat them as one would treat cash because that is what they actually are. One should not write down the PIN on the card itself. Carry only those cards that are likely to be used. After making a purchase, one should always check that the card is actually yours. (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)
(iv) Protect mail: In case one is going out of town, it would be a good idea to notify the post office to hold the mail till one comes back. It is better not to choose pre-approved credit offers. One should not be so daft as to write down one's social security number or credit card number on the outer part of an envelope or on a postcard. In case the home mailbox remains unattended, it would be a good idea to use collection boxes for outgoing mail. Moreover, it is better to collect mail immediately upon arrival rather than wait for unscrupulous...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now