Page 266 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 266

Unit 14: Taking Protected Measures



            As mentioned above, reputable retailers spell out how they use your information in their privacy   Notes
            policies. Check to see if your favorites sell your information to other merchants. If so, then see if
            you can opt-out of offers from third parties.

            Consider connecting to the Internet through a VPN or private proxy, which will obscure your
            IP address and therefore your location. This is only effective when you’re browsing--once you
            decide to buy, your identity will be exposed.

            Finally, if you’re really paranoid, shop at a variety of sites to limit the depth of knowledge about
            you that any one retailer can acquire. This has its risks, however; buying from that guy on 33rd
            Street just to avoid shopping too often at Nordstroms is counterproductive.

            14.3  Protect Your Privacy


            14.3.1 Avoid Identity Theft
            When you’re buying online, it can sometimes be hard to tell whether you’re dealing with a
            legitimate merchant or the online equivalent of that guy selling counterfeit watches on 33rd Street.
            Most shoppers focus on maintaining the privacy of their credit card data, and that’s good. But
            that’s not the only privacy concern you should have while shopping online.
            14.3.2 Identity Theft

            The risk: Any time you use your credit card online, your identity is at risk. Organized crime
            factions from all over the world have streamlined the process of extracting your personal details
            from all sorts of places, especially shopping sites. These attackers can harvest thousands or even
            millions of credit cards in one fell swoop. That’s a problem for two reasons.
            First, and most obviously, there’s the problem of having your credit card used to purchase all
            kinds of goods in places you’ve never been. Usually your bank protects you from such fraudulent
            charges. But it’s still a hassle to change your account numbers.
            But these days, the bad guys aren’t satisfied with credit cards alone. In fact, individual card
            numbers aren’t worth that much. But when those numbers are combined with other commonly
            available bits of personal information—such as addresses and birthdays—attackers can then
            assemble a virtual dossier of your private information. Identity thieves can parlay that information
            to secure credit in your name. That credit can be more valuable to them than your credit card
            and far more difficult and expensive for you to fix: Bank protections focus on credit cards. They
            are much less help when money is directly extracted from accounts, via debit cards or electronic
            fund transfers.
            14.3.3 Spying

            The risk: It may be convenient when your favorite online merchants e-mail offers for products
            you were thinking about buying. But wait—how did they know that? Unfortunately, if you’ve
            been using Google to browse pages for similar products, or perusing the merchant’s Website,
            it’s not a secret. You’ve been telling them what you like to buy and when—they’re just listening.

            With the advent of tracking technologies and sophisticated analytics, many Web merchants
            know exactly who you are and what you are most likely to buy. They know because you tell
            them through your buying and surfing patterns. This is valuable data, and merchants can (and
            do) sell it to each other.



                                             LOVELY PROFESSIONAL UNIVERSITY                                   259
   261   262   263   264   265   266   267   268   269   270   271