21.02.2018 Views

Your Right To Privacy - Minimize Your Digital Footprint - Legal Series

Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your privacy can be violated. Two veteran journalists, authorities on how information is handled in the digital age, have written a definitive guide to minimize your digital footprint, protect your vital information and prevent it from being misused. Jim Bronskill and David McKie argue there are steps each of us can take to keep our important data out of reach while still participating fully in new technologies. They identify the pitfalls we can make and the small moves that will help us avoid them. Their book makes an important contribution in enforcing our right to privacy at a time when governments, special interests and others are trying to watch everything we do. 'Your Right To Privacy' outlines in detail how to keep your information as safe as possible in an age of hacking, sharing and surveillance. This is the definitive guide on how to minimize your digital footprint and protect your privacy in the digital age.

Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your privacy can be violated. Two veteran journalists, authorities on how information is handled in the digital age, have written a definitive guide to minimize your digital footprint, protect your vital information and prevent it from being misused.

Jim Bronskill and David McKie argue there are steps each of us can take to keep our important data out of reach while still participating fully in new technologies. They identify the pitfalls we can make and the small moves that will help us avoid them. Their book makes an important contribution in enforcing our right to privacy at a time when governments, special interests and others are trying to watch everything we do.

'Your Right To Privacy' outlines in detail how to keep your information as safe as possible in an age of hacking, sharing and surveillance. This is the definitive guide on how to minimize your digital footprint and protect your privacy in the digital age.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Thieves attempting to steal personas are busier than ever. Identity theft is on<br />

the rise, and the numbers tell the story. The Canadian Anti-Fraud Centre<br />

received 8,465 ID theft complaints from January 1, 2015, to November 30,<br />

2015. Even without the month of December, this represents a 20 percent<br />

increase compared to the previous year. [5]<br />

The picture is the same in the United States. In 2014, there were 332,646<br />

reported instances of identity theft compared to 290,099 the previous year, an<br />

increase of about 15 percent. [6]<br />

The Federal Trade Commission also sounded the alarm about “impostor”<br />

scams, a category that witnessed the sharpest increase during the same 2013–<br />

to–2014 time period. These are scams where the crook pretends to be a<br />

legitimate authority such as an Internal Revenue Service official during tax<br />

season, or a lottery executive making false promises. The commission has<br />

vowed to “shut these scammers down.” [7]<br />

Identity fraud is the deceptive use of another person’s identity information<br />

(e.g., to misuse a debit card or credit card). It doesn’t matter whether the<br />

individual is dead or alive.<br />

What do the crooks want? Their wish list includes the following<br />

information:<br />

• Full name (first, middle, and last names).<br />

• Date of birth (day, month, and year).<br />

• Social Security Number or Social Insurance Number.<br />

• Complete home address (unit number, building/house number,<br />

street/avenue, and zip or postal code).<br />

• Mother’s maiden name.<br />

• Usernames and passwords for online services.<br />

• Driver’s license number.<br />

• Personal identification numbers (PINs).<br />

• Credit card information (number, expiry date, and the three digits printed<br />

on the signature panel).<br />

• Bank account numbers.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!