13.07.2015 Views

Being an informed consumer – who is allowed to handle my ...

Being an informed consumer – who is allowed to handle my ...

Being an informed consumer – who is allowed to handle my ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

www.ip-rs.siWEB SHOPPINGWhen you v<strong>is</strong>it web sites on the Internet, <strong>an</strong>d in particular if you are engagedin web shopping you need <strong>to</strong> consider security <strong>is</strong>sues. You need <strong>to</strong> check <strong>who</strong>you are dealing with, if the web site c<strong>an</strong> be trusted, <strong>an</strong>d <strong>who</strong> are actually thesuppliers of goods or services at the other end.Q: How do I know if the web site <strong>is</strong> secure <strong>an</strong>d <strong>who</strong> c<strong>an</strong> I trust?In fact you c<strong>an</strong> never be 100% sure if the web site <strong>is</strong> secure. There are someindica<strong>to</strong>rs which show the relative security of the web site. Before you giveyour personal data away, look for <strong>to</strong> see if the web address on the page beginswith “https:” instead of “http”. Look for the picture of a closed padlock in yourbrowser window. It indicates that the security <strong>is</strong> operative :site the user <strong>is</strong> directed <strong>to</strong> the fake (ph<strong>is</strong>hing) one, from where the ph<strong>is</strong>hers c<strong>an</strong>easily harvest your personal data.How do I detect <strong>an</strong>d prevent ph<strong>is</strong>hing?1. Detect fraudulent e-mail:If the e-mail message <strong>is</strong> threatening (e.g. your data will belost, your account will be erased, etc.) if you do not followtheir instructions (e.g. “...If you don’t respond <strong>an</strong>d give us youruser name within x days we are going <strong>to</strong> consider your accountinactive or d<strong>is</strong>posed of <strong>an</strong>d your account will be closed.”...”).2. Check the source of your e-mail messages:b<strong>an</strong>ks will never contact you via e-mail, <strong>an</strong>d in particular will notrequire your personal data in th<strong>is</strong> way.3. Don’t click on links in e-mail which looks like <strong>an</strong> authentic link <strong>to</strong> your b<strong>an</strong>k. Ratheruse your bookmarks or shortcuts.4. Check if you are on the right URL (https:\\... )5. Regularly check your b<strong>an</strong>k account statements.6. Make sure your computer system <strong>is</strong> protected <strong>an</strong>d you have the latest versionsof the browser installed.There are m<strong>an</strong>y fraudulent suppliers of goods on the web <strong>an</strong>d they may looktrustworthy at first sight. They are becoming more <strong>an</strong>d more ingenious <strong>an</strong>dpretend <strong>to</strong> be a well known comp<strong>an</strong>y. Thus it may soon happen that by orderinggoods you are going <strong>to</strong> give your personal data <strong>to</strong> a fake comp<strong>an</strong>y. Cheaters arevery smart <strong>an</strong>d they c<strong>an</strong> abuse your data in m<strong>an</strong>y different ways. Th<strong>is</strong> phenomenonhas become known as ph<strong>is</strong>hing, which <strong>is</strong> a method of acquiring sensitiveinformation by masquerading as a trustworthy entity. Ph<strong>is</strong>hing <strong>is</strong> carried outby e-mail where the user receives a fake message which looks almost identical<strong>to</strong> the legitimate one (e.g. your b<strong>an</strong>k) <strong>an</strong>d <strong>is</strong> seemingly authentic: name of thecomp<strong>an</strong>y, graphic design, layout, seemingly real names of employees <strong>an</strong>d units,even the URL c<strong>an</strong> appear <strong>to</strong> be genuine.The message directs the user <strong>to</strong> v<strong>is</strong>it their web site <strong>to</strong> enter personal details becauseof security or <strong>to</strong> renew the b<strong>an</strong>k account for example. A link <strong>to</strong> the website <strong>is</strong> given in the message, however instead of leading <strong>to</strong> the authentic web9You are strongly adv<strong>is</strong>ed <strong>to</strong> be extremely careful when dealing with the providersof goods <strong>an</strong>d services over the net. According <strong>to</strong> Europe<strong>an</strong> leg<strong>is</strong>lation, thesuppliers of goods <strong>an</strong>d services online need <strong>to</strong> provide easy, direct <strong>an</strong>d perm<strong>an</strong>entaccess <strong>to</strong> the information such as:• name <strong>an</strong>d contact information (geographic address, e-mail),• trade reg<strong>is</strong>ter (in Slovenia th<strong>is</strong> <strong>is</strong> Business reg<strong>is</strong>ter), in which the comp<strong>an</strong>y <strong>is</strong>reg<strong>is</strong>tered, <strong>an</strong>d identification code from th<strong>is</strong> reg<strong>is</strong>ter,• information about the competent superv<strong>is</strong>ory body if the activities of thecomp<strong>an</strong>y are subject <strong>to</strong> <strong>an</strong> author<strong>is</strong>ation scheme,• identification number of the service provider engaged in activities that aresubject <strong>to</strong> VAT.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!