Free-Reprint Article Written by: Robert Wade See Terms of Reprint Below.
***************************************************************** * * This email is being delivered directly to members of the group: * * [email protected] * ***************************************************************** We have moved our TERMS OF REPRINT to the end of the article. Be certain to read our TERMS OF REPRINT and honor our TERMS OF REPRINT when you use this article. Thank you. This article has been distributed by: http://Article-Distribution.com Helpful Link: The Digital Millennium Copyright Act - Overview http://www.gseis.ucla.edu/iclp/dmca1.htm --------------------------------------------------------------------- Article Title: ============== Identity Theft: How Can You Protect Yourself? Article Description: ==================== Yes, it can happen to you - from seemingly minor credit card use just one dispute away, to full-fledged devastation where multiple people use your social security number to acquire jobs - making you responsible for thousands of dollars in taxes. Both Gartner Research and Harris Interactive estimate about seven million people have fallen victim to identity theft, which equals 799 people each hour or 19,178 each day. Not all incidents are easy to resolve, either. The average identity theft victim spends 600 hours conducting tasks to recover from the crime, while some never recover. Additional Article Information: =============================== 474 Words; formatted to 65 Characters per Line Distribution Date and Time: 2006-08-23 11:24:00 Written By: Robert Wade Copyright: 2006, All Rights Reserved Contact Email: mailto:[EMAIL PROTECTED] For more free-reprint articles by Robert Wade, please visit: http://thePhantomWriters.com/free_content/d/index.shtml#Robert_Wade ============================================= Special Notice For Publishers and Webmasters: ============================================= TEXT Copy-and-Paste and HTML Copy-and-Paste Versions Of Article Are Available at: http://thePhantomWriters.com/free_content/db/w/protect-from-identity-theft.shtml#get_code If you use this article on your website or in your ezine, We Want To Know About It. Use the following URL to let us know where you have used this article, and we will include a link to your website on thePhantomWriters.com: http://thephantomwriters.com/notify.php?id=3425&p=load --------------------------------------------------------------------- Identity Theft: How Can You Protect Yourself? Copyright © 2006 Vasrue.com, All Rights Reserved Written by: Robert Wade http://www.Vasrue.com Yes, it can happen to you - from seemingly minor credit card use just one dispute away, to full-fledged devastation where multiple people use your social security number to acquire jobs - making you responsible for thousands of dollars in taxes. Both Gartner Research and Harris Interactive estimate about seven million people have fallen victim to identity theft, which equals 799 people each hour or 19,178 each day. Not all incidents are easy to resolve, either. The average identity theft victim spends 600 hours conducting tasks to recover from the crime, while some never recover. Identity thieves gather information from businesses or employers, stealing computer or paper records. They can steal your mail and find credit card statements, offers or tax information. They conduct phishing and phone scams to lure information from you, cloaking their email address or Caller ID so you think you're giving information to your bank or other legitimate business. They obtain your credit reports, offering a wealth of credit and employment data. They attach devices to ATM machines or collect the information in a data storage device. Change of Address forms are completed to route victim's mail to another address. Orders are placed in your name on websites that bill after receipt, including CD, book or DVD clubs. Once your information is compromised, they can charge your credit cards to the limit, open bank accounts, sell your social security number for employment purposes, file for bankruptcy in your name, create counterfeit checks to use or sell, offer your information to the police at arrest or even take out auto loans. The ramifications are overwhelming, leading victims in a tangled mess of litigation, credit collections, bankruptcy filings, employment denials, tax evasion and possible incarceration. What can you do to protect yourself? Here's a few tips: 1. Check your credit report at all three bureaus annually to ensure accuracy. 2. Check your employers payroll and HR record security policy. 3. Shred all financial and confidential paperwork including loan applications. A small shredder is extremely inexpensive compared to the ramification you face should this data be compromised. 4. Watch what you say on your cell phone and in public conversations. Keep personal information to yourself. 5. Never disclose confidential or financial data over the phone or via email. This includes your name, address, account and social security number. 6. Protect your computer with a firewall. 7. Immediately delete suspicious email. 8. Leave your social security card at home and be cautious of those receiving this data. 9. Leave your phone number, social security and drivers' license numbers off of your checks. 10. Be suspicious of telephone solicitors. If you didn't initiate the call, it may not be the person Caller ID says it is. In today's world, information spreads in seconds. Be smart and safe, preventing identity theft before it happens to you. --------------------------------------------------------------------- Copyright (c) 2006 Vasrue.com. All Rights Reserved. Robert Wade writes about Finance. For more great articles on this subject, come back to http://www.Vasrue.com. Articles are published weekly on Travel, Real-Estate, E-business, Credit and a host of other great topics. In an effort to support other webmasters, http://www.Vasrue.com is offering each article through RSS feed free of charge. Now newspapers, ezines, magazines and independent websites can effortlessly integrate fresh, captivating content in no time. Each article is available for PDF download, RSS feed or browser printing. --- END ARTICLE --- Get TEXT or HTML Copy-and-Paste Versions Of This Article at: http://thePhantomWriters.com/free_content/db/w/protect-from-identity-theft.shtml#get_code ..................................... TERMS OF REPRINT - Publication Rules (Last Updated: May 11, 2006) Our TERMS OF REPRINT are fully enforcable under the terms of: The Digital Millennium Copyright Act http://thomas.loc.gov/cgi-bin/query/z?c105:H.R.2281.ENR: ..................................... *** Digital Reprint Rights *** * If you publish this article in a website/forum/blog, You Must Set All URL's or Mailto Addresses in the body of the article AND in the Author's Resource Box as Hyperlinks (clickable links). * Links must remain in the form that we published them. Clean links should point to the Author's links without redirects having been inserted into the copy. * You are not allowed to Change or Delete any Words or Links in the Article or Resource Box. Paragraph breaks must be retained with articles. You can change where the paragraph breaks fall, but you cannot eliminate all paragraph breaks as some have chosen to do. * Email Distribution of this article Must be done through Opt-in Email Only. No Unsolicited Commercial Email. * You Are Allowed to format the layout of the article for proper display of the article in your website or in your ezine, so long as you can maintain the author's interests within the article. * You may not use sentences from this article as an input for any software that steals sentences from others in order to build an article with software. The copyright on this article applies to the "WHOLE" article. *** Author Notification *** We ask that you notify the author of publication of his or her work. Robert Wade can be reached at: [EMAIL PROTECTED] *** Print Publication Reprint Rights *** If you desire to publish this article in a PRINT publication, you must contact the author directly for Print Permission at: mailto:[EMAIL PROTECTED] ..................................... If you need help converting this text article for proper hyperlinked placement in your webpage, please use this free tool: http://thephantomwriters.com/link-builder.pl ===================================================================== ABOUT THIS ARTICLE SUBMISSION http://thePhantomWriters.com is a paid article distribution service. thePhantomWriters.com and Article-Distribution.com are owned and operated by Bill Platt of Stillwater, Oklahoma USA. The content of this article is solely the property and opinion of its author, Robert Wade http://www.Vasrue.com --------------------------------------------------------------------- XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX --------------------------------------------------------------------- *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* To have your article appear in this distribution list, you must absolutely be a client of thePhantomWriters. We offer a paid article distribution service, and this is one of the more than 60 groups where we submit our client articles. To learn more about our program, visit: http://thePhantomWriters.com/x.pl/tpw/index.htm Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/thePhantomWriters/ <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
