Your Cell Phone Can Continue Talking Even After You Get Rid of It

It may not seem like common sense to clean your trash before you throw it away, but with technology that is exactly what you should do. 

Before you sell, donate or trash your cell phone, make sure that your personal information has been permanently deleted.  For most phones, this means more than resetting the phone.  Although resetting the phone may appear to delete your information, recent reports suggest that software programs can retrieve the information if it was not properly deleted.

Protect Your Cell Phone Records

Most of us assume that our phone records are private. Despite mounting legal battles, information brokers on the Internet continue to offer the name and address connected to a cell phone number, an individual's phone number, even the complete record of outgoing and incoming phone calls.

Who Is Using Your Checkbook? FDIC Warns About

While many consumers are scrambling to reduce their risk of identity theft, one business appears to be making it easier than ever to forge checks. allows customers to create checks without verifying the account holder's identity, according to authorities.

RV Full-timing and Privacy Protection (Dippel)

If you really want to go “underground” and avoid junk mailers, living in an RV can help you achieve almost invisible status. Once you live in an RV (and have sold your home), you will no longer be listed on a property tax web site, for all junk mailers to see and to come after you!  Further, you will no longer need accounts with utility companies, as RV parks provide the utilities.

Bogus E-Mail Message Impersonates Social Security Administration

The Agency has received several reports of an email message being circulated with the subject “Cost-of-Living for 2007 update” and purporting to be from the Social Security Administration. The message provides information about the 3.3 percent benefit increase for 2007 and contains the following “NOTE: We now need you to update your personal information. If this is not completed by November 11, 2006, we will be forced to suspend your account indefinitely.” The reader is then directed to a website designed to look like Social Security’s Internet website.

The VA's Data Breach - Tips for Veterans and Action You Can Take under Federal Law

(May 23, 2006) Sensitive personal information of 26.5 million veterans was stolen recently when the home of a VA employee was robbed. The individual had brought a computer and disk home containing names, Social Security numbers (SSNs), dates of birth, and other information of anyone who served in the military and has been discharged since 1976. The theft apparently occurred May 3, 2006.

For a Complete Medical History, Compile Your Own Health Records but be Cautious about Storing Them Online

If you don't already keep a personal health record, now is the best time to start. Do not rely on your ability to go back in time to collate a complete medical file. The longer you wait, the more difficulty you may have in obtaining older health records.

Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003

The detection of red flags and the need to reconcile address discrepancies are among the most important anti-identity theft measures included in FACTA. Effective business policies and practices that spot attempted and actual identity theft early have great potential for relieving this national crime wave. This was the promise and Congress’ intent when it directed the Agencies to adopt Red Flag Regulations along with procedures to reconcile address discrepancies in credit reports.

Privacy Tips for Tax Season

You may be resigned to giving the government your money this tax season, but watch out for fraudsters looking for a piece of the action. Your tax forms contain sensitive information, including your Social Security Number. Taxpayers have a choice of filing by mail or electronically. Consumers may use personal software, professional services, or old-fashioned pencil and paper. Either way you can bet there is a fraudster ready with a scam. The following tips can help protect your privacy.


Showing 1-10 of 26 results
Subscribe to 2006