SlideShare una empresa de Scribd logo
1 de 12
PERSONAL
INFORMATIO
N
WHAT IS PERSONAL
     INFORMATION?


•Any factual or subjective information, whether
recorded or not, about an identifiable
individual.
• Information that can be used to uniquely
identify, contact, or locate a single person or
can be used with other sources to uniquely
identify a single individual.
EXAMPLE OF PERSONAL INFORMATION
     Personal Descriptors     Name, age, place of birth,
                              date of birth, gender, weight,
                              height, eye color, hair color,
                              fingerprint.
     Identification Numbers   Health IDs, Social Insurance
                              Numbers (SIN), Social
                              Security Numbers (SSN),
                              PIN numbers, debit and
                              credit card numbers.
     Ethnicity                Race, colour, national or
                              ethnic origin.
     Health                   Physical or mental
                              disabilities, family or
                              individual health history,
                              health records, blood type,
                              DNA code, prescriptions.
EXAMPLE OF PERSONAL INFORMATION
         Financial   Income, loan records,
                     transactions, purchases and
                     spending habits.
        Employment   Employee files, employment
                     history, evaluations,
                     reference interviews,
                     disciplinary actions.
           Life      Character, general
                     reputation, personal
                     characteristics, social status,
                     marital status, religion,
                     political affiliations and
                     beliefs, opinions, comments,
                     intentions.
         Education   Education history.
How to Prevent Identity Theft
• Beware of Employment Schemes.
Employment schemes have increased to the point that it's
  hard, now, to know what's safe and what's not when
  people looking for employment online. Scams can be
  targeted at anyone looking for a job, and some of them
  are pretty sneaky.
• Monitor Credit Regularly.
The fastest way to find out if your identity has been stolen
  is to check the credit report. Often, identity thieves will hit
  people in pocketbook first, and sometimes their
  fraudulent activity will alert people that there's a problem.
Cont’
• Guard Your Bank and Credit Accounts.
Learn how to protect your vulnerable points bank and
  credit accounts of your identity to reduce your threat of
  being victimized by identity thieves.
• Protect Your Virtual Identity.
The Internet is increasing your risk for identity theft
  dramatically. If people don't keep their virtual identity
  safe online, then it's almost guaranteed they will becom
  the victim of identity theft.
Cont’
• Take care when creating passwords.
Don’t use something like birth date, last name, and
  possible for someone to guess. Have a few different
  passwords for different sites, and change them regularly.
• Only keep the essentials in your wallet or purse.
 One of the biggest mistakes people make is carrying more
  sensitive information than need in their wallet or purse
  than needed.
WHY PERSONAL INFORMATION IS
            IMPORTANT?
•   Our personal information is valuable, people should treat it as their would
    any other valuable item. With crimes such as identity theft, it is even more
    important to safeguard our personal information. Criminals can use our
    personal details to open bank accounts, apply for credit cards and get state
    benefits in our name.

•    If personal information is incorrect, inadequate or out of date, it could lead
    to people being unfairly refused jobs, housing, benefits, credit or a place at
    college.

•   Always think carefully before supplying personal information. Always ask
    why an organization is requesting it, as you may not need to supply it.
HOW TO MANAGE PERSONAL
         INFORMATION?
• Store documents carrying any personal details in a safe
  place.
• Shed or destroy all documents containing any personal
  details before throwing them away.
• Check your bank and credit card statements carefully for
  unfamiliar transactions.
• Be careful when using public computers to access your
  personal information. Remove personal details on
  screen and uncheck the ‘remember password’ box.
HOW TO MANAGE PERSONAL
         INFORMATION?
• Check your credit file regularly for any suspicious
  applications.
• Always think about who you are giving information to and
  why they would need it. Don’t be afraid to ask.
• Protect your home computer with anti-virus, firewall and
  anti-spam software before going online.
• When you move house, redirect all your mail and inform
  your bank, utilities companies and other organizations of
  your new address.
How to Correct Your Personal
          Information
• If your personal data is inaccurate, you should write to
  the organization to tell them what you believe is wrong
  with your information and what should be done to correct
  it.
• There is no particular form of words that you need to
  use, provided that you make clear the following:
who you are and what personal information is wrong, and
      what should be done to correct it.
• If you are sending a letter, you should consider sending
  it by recorded delivery. You can also email your letter if
  the organization can identify you and the personal
  information you are referring to from your email.
THANK YOU 

Más contenido relacionado

Destacado

บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์Nattipong Siangyen
 
Journey of Transformation - Retail Imaging Show 2012
Journey of Transformation - Retail Imaging Show 2012Journey of Transformation - Retail Imaging Show 2012
Journey of Transformation - Retail Imaging Show 2012Island Photo Solutions Ltd
 
Final media evaluation
Final media evaluation Final media evaluation
Final media evaluation Jack Street
 
Media evaluation
Media evaluationMedia evaluation
Media evaluationJack Street
 
01 ข้อมูลและสารสนเทศ
01 ข้อมูลและสารสนเทศ01 ข้อมูลและสารสนเทศ
01 ข้อมูลและสารสนเทศNattipong Siangyen
 
บทที่ 5 การจัดการข้อความ
บทที่ 5 การจัดการข้อความบทที่ 5 การจัดการข้อความ
บทที่ 5 การจัดการข้อความNattipong Siangyen
 

Destacado (8)

uso de internet
uso de internetuso de internet
uso de internet
 
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
 
Journey of Transformation - Retail Imaging Show 2012
Journey of Transformation - Retail Imaging Show 2012Journey of Transformation - Retail Imaging Show 2012
Journey of Transformation - Retail Imaging Show 2012
 
บรู
บรูบรู
บรู
 
Final media evaluation
Final media evaluation Final media evaluation
Final media evaluation
 
Media evaluation
Media evaluationMedia evaluation
Media evaluation
 
01 ข้อมูลและสารสนเทศ
01 ข้อมูลและสารสนเทศ01 ข้อมูลและสารสนเทศ
01 ข้อมูลและสารสนเทศ
 
บทที่ 5 การจัดการข้อความ
บทที่ 5 การจัดการข้อความบทที่ 5 การจัดการข้อความ
บทที่ 5 การจัดการข้อความ
 

Similar a Ict personal info

Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftThe Identity Advocate
 
Tips For Caring For Your Parents
Tips For Caring For Your ParentsTips For Caring For Your Parents
Tips For Caring For Your Parentschriskwinn
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theftIsaac Feliciano
 

Similar a Ict personal info (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Tips For Caring For Your Parents
Tips For Caring For Your ParentsTips For Caring For Your Parents
Tips For Caring For Your Parents
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theft
 

Último

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Último (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Ict personal info

  • 2. WHAT IS PERSONAL INFORMATION? •Any factual or subjective information, whether recorded or not, about an identifiable individual. • Information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual.
  • 3. EXAMPLE OF PERSONAL INFORMATION Personal Descriptors Name, age, place of birth, date of birth, gender, weight, height, eye color, hair color, fingerprint. Identification Numbers Health IDs, Social Insurance Numbers (SIN), Social Security Numbers (SSN), PIN numbers, debit and credit card numbers. Ethnicity Race, colour, national or ethnic origin. Health Physical or mental disabilities, family or individual health history, health records, blood type, DNA code, prescriptions.
  • 4. EXAMPLE OF PERSONAL INFORMATION Financial Income, loan records, transactions, purchases and spending habits. Employment Employee files, employment history, evaluations, reference interviews, disciplinary actions. Life Character, general reputation, personal characteristics, social status, marital status, religion, political affiliations and beliefs, opinions, comments, intentions. Education Education history.
  • 5. How to Prevent Identity Theft • Beware of Employment Schemes. Employment schemes have increased to the point that it's hard, now, to know what's safe and what's not when people looking for employment online. Scams can be targeted at anyone looking for a job, and some of them are pretty sneaky. • Monitor Credit Regularly. The fastest way to find out if your identity has been stolen is to check the credit report. Often, identity thieves will hit people in pocketbook first, and sometimes their fraudulent activity will alert people that there's a problem.
  • 6. Cont’ • Guard Your Bank and Credit Accounts. Learn how to protect your vulnerable points bank and credit accounts of your identity to reduce your threat of being victimized by identity thieves. • Protect Your Virtual Identity. The Internet is increasing your risk for identity theft dramatically. If people don't keep their virtual identity safe online, then it's almost guaranteed they will becom the victim of identity theft.
  • 7. Cont’ • Take care when creating passwords. Don’t use something like birth date, last name, and possible for someone to guess. Have a few different passwords for different sites, and change them regularly. • Only keep the essentials in your wallet or purse. One of the biggest mistakes people make is carrying more sensitive information than need in their wallet or purse than needed.
  • 8. WHY PERSONAL INFORMATION IS IMPORTANT? • Our personal information is valuable, people should treat it as their would any other valuable item. With crimes such as identity theft, it is even more important to safeguard our personal information. Criminals can use our personal details to open bank accounts, apply for credit cards and get state benefits in our name. • If personal information is incorrect, inadequate or out of date, it could lead to people being unfairly refused jobs, housing, benefits, credit or a place at college. • Always think carefully before supplying personal information. Always ask why an organization is requesting it, as you may not need to supply it.
  • 9. HOW TO MANAGE PERSONAL INFORMATION? • Store documents carrying any personal details in a safe place. • Shed or destroy all documents containing any personal details before throwing them away. • Check your bank and credit card statements carefully for unfamiliar transactions. • Be careful when using public computers to access your personal information. Remove personal details on screen and uncheck the ‘remember password’ box.
  • 10. HOW TO MANAGE PERSONAL INFORMATION? • Check your credit file regularly for any suspicious applications. • Always think about who you are giving information to and why they would need it. Don’t be afraid to ask. • Protect your home computer with anti-virus, firewall and anti-spam software before going online. • When you move house, redirect all your mail and inform your bank, utilities companies and other organizations of your new address.
  • 11. How to Correct Your Personal Information • If your personal data is inaccurate, you should write to the organization to tell them what you believe is wrong with your information and what should be done to correct it. • There is no particular form of words that you need to use, provided that you make clear the following: who you are and what personal information is wrong, and what should be done to correct it. • If you are sending a letter, you should consider sending it by recorded delivery. You can also email your letter if the organization can identify you and the personal information you are referring to from your email.