A Renter's Guide to Privacy: Top 5 Privacy Tips for Renters

Most people will live in a rental property at some point in their lives. It doesn't matter if you rent a studio apartment or a mansion; you are likely to have privacy concerns both during the rental process and later as a tenant. Renters often contact the Privacy Rights Clearinghouse (PRC) with questions about their privacy rights. Now, renters can consult the PRC's new Fact Sheet 38: A Renter's Guide to Privacy: What to Know Before You Sign the Lease, While You Rent, and When You Move Out.

The new consumer guide covers important privacy rights at every stage of the rental process. The PRC's top 5 tips for renters are:

1. Order your credit report before you apply for a rental. A prospective landlord will almost certainly order your credit report when considering your rental application. Before you apply, order your own report to confirm that the information is accurate and up-to-date.

2. Avoid rental scams by recognizing warning signs. Online resources such as Craigslist.org are a popular way to search for available rentals. Unfortunately, scammers also use these sites to place fake listings in an attempt to steal your money or identity. Learn to recognize common warning signs including being asked to pay or provide personal information before you see the property.

Top 10 Tips to Protect Your Privacy

The Privacy Rights Clearinghouse (PRC) recommends the following 10 tips to protect your privacy.

1. Monitor your credit report – look for errors and fraud. You have the right to one free credit report per year from each of the three credit bureaus: Equifax, Experian, and TransUnion. Order one report every four months so that you can monitor your credit reports on an ongoing basis. Learn more by reading PRC's Fact Sheet 6.

2. Reduce unwanted telemarketing phone calls. Register with the National Do Not Call Registry. If you receive a call from a company with which you do business, ask to be placed on its internal "Do Not Call List." Learn more by reading PRC's Fact Sheet 5.

3. Protect the personal information on your smartphone. Smartphone users are 33% more likely to become a victim of identity theft than non-users. Password-protect your smartphone and use the security lockout feature so that the phone automatically locks after a certain amount of time not in use. Learn more by reading PRC's Fact Sheet 2b.

Biederman Institute's First Annual Online Privacy Conference

Join legal experts, scholars, privacy advocates, and government representatives in a lively day-long conference on online privacy. The conference is presented by Southwestern Law School's Biederman Entertainment and Media Law Institute. The Privacy Rights Clearinghouse and the law firm of Johnson & Johnson LLP are co-sponsors

Friday, February 22, 2013
Southwestern Law School's Biederman Entertainment and Media Law Institute
3050 Wilshire Blvd., Los Angeles, California 90005

Featuring

Lunch & Interview with Julie Brill
Commissioner, Federal Trade Commission

Cocktails, Dinner & Interview with Erin Egan
Chief Privacy Officer, Policy, Facebook

and panel discussions on
The Why and How of Privacy
Privacy and Reputation
Privacy and the Digital Marketplace
Privacy and the Workplace

See complete details.
See the conference agenda.
See the brochure (PDF).

Smartphone Privacy: YouTube Video and Tips for Consumers

Smartphones store a tremendous amount of personal information. If your smartphone were lost or stolen, what information would someone be able to access?

  • Photos – Do you have photos on your smartphone that you wouldn't want your boss or certain friends or family to see? Do your photos reveal where you've been because you have the camera's GPS feature turned on? 

  • Emails – Do you sync your personal and/or work email accounts on your phone? Are archived and sent messages accessible? How far back do they go? 

  • Banking – Do you have apps installed that provide direct access to your banking account information? Is it possible to transfer money through the app? 

  • Social Networking – Do you have apps installed that provide direct access to your social networking accounts, including Facebook, Twitter and LinkedIn? 

  • Notes – Do you have any apps where you store notes or documents? Do any of those notes contain your Social Security number, medical information or financial account numbers?

The last in our short-film series, Smartphones: Protect Your Data explores the privacy implications of smartphones and offers practical tips to protect your privacy. In the 5-minute video, a college student named Josh misplaces his phone. Josh and his friend, Ashley, search for the phone, but can't find it. He becomes increasingly alarmed when he realizes what's at stake. Watch the video to see what happens.

Lessons from Sandy: Preparing for the Worst

Hurricane Sandy hit the northeastern United States in late October leaving thousands of Americans without homes and millions without power. How many of those affected had disaster plans in place? How effective were those plans once executed?

With every natural disaster, we are reminded how important it is to have a plan in place. Good plans require a number of worthy considerations, including having a disaster kit and an evacuation plan. As privacy advocates, we have a narrower focus when it comes to disaster preparedness: control of your personal information.

In August 2010, we published a list of disaster preparedness tips. As America recovers from the devastation caused by superstorm Sandy, we thought now would be a good time to review and update those tips. 

Facial Recognition is a Threat to Your Privacy

Imagine you’re walking down the street and a stranger snaps your photo with his smartphone. He uses a facial recognition app and within minutes, he knows your name, age, where you were born, and your Social Security number. Think it’s a scene from the movie Minority Report? Think again.

Facial recognition technology – especially as the technology becomes more sophisticated – may be one of the gravest privacy threats of our time.

Will I Be Able to Return That Unwanted Holiday Gift? The Retail Equation (formerly The Return Exchange)

When a consumer wants to make a return, the retailer will swipe the person’s driver’s license (or other government-issued ID). As customers return merchandise, The Retail Equation compares variables such as return frequency, dollar amounts and/or time against a set of rules that form the retailer’s return policy. If you make repeated returns or exchanges to a specific merchant, you may not be able to do so again at a later date.

Junk Faxes: They Are Now OK with a "Business" Relationship

Until recently, the law on fax advertising was simple and straightforward: No one could send a fax advertisement without your prior consent. Of course, this did not stop the deluge of unwanted faxes touting hot stocks, mortgage offers, and vacation deals. Now, adding to the frustration, Congress has created an exception for fax advertisements sent when you have an “established business relationship,” or EBR, with the sender.

Pages

Showing 111-120 of 233 results
Subscribe to Alert