Friday, July 31, 2009

Precautions to Pevent Identity Fraud and Theft

These are Some Precautions You should take to Escape From Identity Fraud and Theft

1. Safeguard your information and monitor your credit reports often.

2. If you are selling an item and someone will only pay by check, it is probably a scam. The check will appear to "clear" in a short time, but it may take a few weeks for the bank to find out the check is actually fake.

3.Do not accept pre-printed shipping labels from people attempting to purchase goods from you. They may be using a fraudulent shipping account like the one opened in my name. Shippers can re-route packages in mid-stream and the goods get sent anywhere they choose. The person you think you are selling the item to has likely had their identity stolen.

4. Avoid job postings where it appears you will be working for someone overseas that you have never met, such as selling items on ebay or paying US "customers."

Thursday, July 30, 2009

Cyber Spying

Cyber spying is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using illegal exploitation methods on internet, networks or individual computers through the use of cracking techniques and malicious software including Trojan horses and spyware. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.

Domain Sniping

Domain sniping is the practice of an individual registering a domain name whose registration has lapsed in the immediate moments after expiry. This practice has largely been rendered moot through ICANN's addition of the Redemption Grace Period (RGP), which allows registrants 30 days to reclaim their domain name. By law there are no perpetual rights to domain names after payment of registration fees lapses, aside from trademark rights granted by common law or statute.

Tuesday, July 28, 2009

Internet Privacy

The ability to control what information one reveals about oneself over the Internet, and who can access that information, has become a growing concern. These concerns include whether email can be stored or read by third parties without consent, or whether third parties can track the web sites someone has visited. Another concern is whether web sites which are visited collect, store, and possibly share personally identifiable information about users.
The advent of various search engines and the use of data mining created a capability for data about individuals to be collected and combined from a wide variety of sources very easily.

The Data Protection Act 1998 (DPA) : UK

The Data Protection Act 1998 (DPA) is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the protection of personal data in the UK. Although the Act does not mention privacy, in practice it provides a way in which individuals can control information about themselves. Most of the Act does not apply to domestic use, for example keeping a personal address book. Anyone holding personal data for other purposes is legally obliged to comply with this Act, subject to some exemptions. The Act defines eight data protection principles.

The E-Government Act of 2002:USA

The E-Government Act of 2002 (Pub.L. 107-347, 116 Stat. 2899, 44 U.S.C. § 101, H.R. 2458/S. 803), is a United States statute enacted on December 17, 2002, with an effective date for most provisions of April 17, 2003. Its stated purpose is to improve the management and promotion of electronic government services and processes by establishing a Federal Chief Information Officer within the Office of Management and Budget, and by establishing a framework of measures that require using Internet-based information technology to improve citizen access to government information and services, and for other purposes.

Digital Evidence

Digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial.
The use of digital evidence has increased in the past few decades as courts have allowed the use of e-mails, digital photographs, ATM transaction logs, word processing documents, instant message histories, files saved from accounting programs, spreadsheets, internet browser histories, databases, the contents of computer memory, computer backups, computer printouts, Global Positioning System tracks, logs from a hotel’s electronic door locks, and digital video or audio files.