SlideShare una empresa de Scribd logo
1 de 12
PERSONAL
INFORMATIO
N
WHAT IS PERSONAL
     INFORMATION?


•Any factual or subjective information, whether
recorded or not, about an identifiable
individual.
• Information that can be used to uniquely
identify, contact, or locate a single person or
can be used with other sources to uniquely
identify a single individual.
EXAMPLE OF PERSONAL INFORMATION
     Personal Descriptors     Name, age, place of birth,
                              date of birth, gender, weight,
                              height, eye color, hair color,
                              fingerprint.
     Identification Numbers   Health IDs, Social Insurance
                              Numbers (SIN), Social
                              Security Numbers (SSN),
                              PIN numbers, debit and
                              credit card numbers.
     Ethnicity                Race, colour, national or
                              ethnic origin.
     Health                   Physical or mental
                              disabilities, family or
                              individual health history,
                              health records, blood type,
                              DNA code, prescriptions.
EXAMPLE OF PERSONAL INFORMATION
         Financial   Income, loan records,
                     transactions, purchases and
                     spending habits.
        Employment   Employee files, employment
                     history, evaluations,
                     reference interviews,
                     disciplinary actions.
           Life      Character, general
                     reputation, personal
                     characteristics, social status,
                     marital status, religion,
                     political affiliations and
                     beliefs, opinions, comments,
                     intentions.
         Education   Education history.
How to Prevent Identity Theft
• Beware of Employment Schemes.
Employment schemes have increased to the point that it's
  hard, now, to know what's safe and what's not when
  people looking for employment online. Scams can be
  targeted at anyone looking for a job, and some of them
  are pretty sneaky.
• Monitor Credit Regularly.
The fastest way to find out if your identity has been stolen
  is to check the credit report. Often, identity thieves will hit
  people in pocketbook first, and sometimes their
  fraudulent activity will alert people that there's a problem.
Cont’
• Guard Your Bank and Credit Accounts.
Learn how to protect your vulnerable points bank and
  credit accounts of your identity to reduce your threat of
  being victimized by identity thieves.
• Protect Your Virtual Identity.
The Internet is increasing your risk for identity theft
  dramatically. If people don't keep their virtual identity
  safe online, then it's almost guaranteed they will becom
  the victim of identity theft.
Cont’
• Take care when creating passwords.
Don’t use something like birth date, last name, and
  possible for someone to guess. Have a few different
  passwords for different sites, and change them regularly.
• Only keep the essentials in your wallet or purse.
 One of the biggest mistakes people make is carrying more
  sensitive information than need in their wallet or purse
  than needed.
WHY PERSONAL INFORMATION IS
            IMPORTANT?
•   Our personal information is valuable, people should treat it as their would
    any other valuable item. With crimes such as identity theft, it is even more
    important to safeguard our personal information. Criminals can use our
    personal details to open bank accounts, apply for credit cards and get state
    benefits in our name.

•    If personal information is incorrect, inadequate or out of date, it could lead
    to people being unfairly refused jobs, housing, benefits, credit or a place at
    college.

•   Always think carefully before supplying personal information. Always ask
    why an organization is requesting it, as you may not need to supply it.
HOW TO MANAGE PERSONAL
         INFORMATION?
• Store documents carrying any personal details in a safe
  place.
• Shed or destroy all documents containing any personal
  details before throwing them away.
• Check your bank and credit card statements carefully for
  unfamiliar transactions.
• Be careful when using public computers to access your
  personal information. Remove personal details on
  screen and uncheck the ‘remember password’ box.
HOW TO MANAGE PERSONAL
         INFORMATION?
• Check your credit file regularly for any suspicious
  applications.
• Always think about who you are giving information to and
  why they would need it. Don’t be afraid to ask.
• Protect your home computer with anti-virus, firewall and
  anti-spam software before going online.
• When you move house, redirect all your mail and inform
  your bank, utilities companies and other organizations of
  your new address.
How to Correct Your Personal
          Information
• If your personal data is inaccurate, you should write to
  the organization to tell them what you believe is wrong
  with your information and what should be done to correct
  it.
• There is no particular form of words that you need to
  use, provided that you make clear the following:
who you are and what personal information is wrong, and
      what should be done to correct it.
• If you are sending a letter, you should consider sending
  it by recorded delivery. You can also email your letter if
  the organization can identify you and the personal
  information you are referring to from your email.
THANK YOU 

Más contenido relacionado

Destacado

บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์Nattipong Siangyen
 
Journey of Transformation - Retail Imaging Show 2012
Journey of Transformation - Retail Imaging Show 2012Journey of Transformation - Retail Imaging Show 2012
Journey of Transformation - Retail Imaging Show 2012Island Photo Solutions Ltd
 
Final media evaluation
Final media evaluation Final media evaluation
Final media evaluation Jack Street
 
Media evaluation
Media evaluationMedia evaluation
Media evaluationJack Street
 
01 ข้อมูลและสารสนเทศ
01 ข้อมูลและสารสนเทศ01 ข้อมูลและสารสนเทศ
01 ข้อมูลและสารสนเทศNattipong Siangyen
 
บทที่ 5 การจัดการข้อความ
บทที่ 5 การจัดการข้อความบทที่ 5 การจัดการข้อความ
บทที่ 5 การจัดการข้อความNattipong Siangyen
 

Destacado (8)

uso de internet
uso de internetuso de internet
uso de internet
 
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
 
Journey of Transformation - Retail Imaging Show 2012
Journey of Transformation - Retail Imaging Show 2012Journey of Transformation - Retail Imaging Show 2012
Journey of Transformation - Retail Imaging Show 2012
 
บรู
บรูบรู
บรู
 
Final media evaluation
Final media evaluation Final media evaluation
Final media evaluation
 
Media evaluation
Media evaluationMedia evaluation
Media evaluation
 
01 ข้อมูลและสารสนเทศ
01 ข้อมูลและสารสนเทศ01 ข้อมูลและสารสนเทศ
01 ข้อมูลและสารสนเทศ
 
บทที่ 5 การจัดการข้อความ
บทที่ 5 การจัดการข้อความบทที่ 5 การจัดการข้อความ
บทที่ 5 การจัดการข้อความ
 

Similar a Ict personal info

Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftThe Identity Advocate
 
Tips For Caring For Your Parents
Tips For Caring For Your ParentsTips For Caring For Your Parents
Tips For Caring For Your Parentschriskwinn
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theftIsaac Feliciano
 

Similar a Ict personal info (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Tips For Caring For Your Parents
Tips For Caring For Your ParentsTips For Caring For Your Parents
Tips For Caring For Your Parents
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theft
 

Último

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Último (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

Ict personal info

  • 2. WHAT IS PERSONAL INFORMATION? •Any factual or subjective information, whether recorded or not, about an identifiable individual. • Information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual.
  • 3. EXAMPLE OF PERSONAL INFORMATION Personal Descriptors Name, age, place of birth, date of birth, gender, weight, height, eye color, hair color, fingerprint. Identification Numbers Health IDs, Social Insurance Numbers (SIN), Social Security Numbers (SSN), PIN numbers, debit and credit card numbers. Ethnicity Race, colour, national or ethnic origin. Health Physical or mental disabilities, family or individual health history, health records, blood type, DNA code, prescriptions.
  • 4. EXAMPLE OF PERSONAL INFORMATION Financial Income, loan records, transactions, purchases and spending habits. Employment Employee files, employment history, evaluations, reference interviews, disciplinary actions. Life Character, general reputation, personal characteristics, social status, marital status, religion, political affiliations and beliefs, opinions, comments, intentions. Education Education history.
  • 5. How to Prevent Identity Theft • Beware of Employment Schemes. Employment schemes have increased to the point that it's hard, now, to know what's safe and what's not when people looking for employment online. Scams can be targeted at anyone looking for a job, and some of them are pretty sneaky. • Monitor Credit Regularly. The fastest way to find out if your identity has been stolen is to check the credit report. Often, identity thieves will hit people in pocketbook first, and sometimes their fraudulent activity will alert people that there's a problem.
  • 6. Cont’ • Guard Your Bank and Credit Accounts. Learn how to protect your vulnerable points bank and credit accounts of your identity to reduce your threat of being victimized by identity thieves. • Protect Your Virtual Identity. The Internet is increasing your risk for identity theft dramatically. If people don't keep their virtual identity safe online, then it's almost guaranteed they will becom the victim of identity theft.
  • 7. Cont’ • Take care when creating passwords. Don’t use something like birth date, last name, and possible for someone to guess. Have a few different passwords for different sites, and change them regularly. • Only keep the essentials in your wallet or purse. One of the biggest mistakes people make is carrying more sensitive information than need in their wallet or purse than needed.
  • 8. WHY PERSONAL INFORMATION IS IMPORTANT? • Our personal information is valuable, people should treat it as their would any other valuable item. With crimes such as identity theft, it is even more important to safeguard our personal information. Criminals can use our personal details to open bank accounts, apply for credit cards and get state benefits in our name. • If personal information is incorrect, inadequate or out of date, it could lead to people being unfairly refused jobs, housing, benefits, credit or a place at college. • Always think carefully before supplying personal information. Always ask why an organization is requesting it, as you may not need to supply it.
  • 9. HOW TO MANAGE PERSONAL INFORMATION? • Store documents carrying any personal details in a safe place. • Shed or destroy all documents containing any personal details before throwing them away. • Check your bank and credit card statements carefully for unfamiliar transactions. • Be careful when using public computers to access your personal information. Remove personal details on screen and uncheck the ‘remember password’ box.
  • 10. HOW TO MANAGE PERSONAL INFORMATION? • Check your credit file regularly for any suspicious applications. • Always think about who you are giving information to and why they would need it. Don’t be afraid to ask. • Protect your home computer with anti-virus, firewall and anti-spam software before going online. • When you move house, redirect all your mail and inform your bank, utilities companies and other organizations of your new address.
  • 11. How to Correct Your Personal Information • If your personal data is inaccurate, you should write to the organization to tell them what you believe is wrong with your information and what should be done to correct it. • There is no particular form of words that you need to use, provided that you make clear the following: who you are and what personal information is wrong, and what should be done to correct it. • If you are sending a letter, you should consider sending it by recorded delivery. You can also email your letter if the organization can identify you and the personal information you are referring to from your email.