Credit report - Free online credit report - Online credit report - Credit report repair - Free credit report - Credit bureau report - Consumer credit report
|
|
|
|
|
|
To better understand the issues relating to your legal situation or problem, our legal information and other law related facts may be of interest to you
|
|
|
|
|
Prevent Identity Theft Identity theft occurs when someone steals and uses another person’s or business’s identity for personal gain. It happens every day to people and businesses worldwide. You can help protect yourself, your business, and your customers from identity theft by following the practices listed below: Information Acquisition Only request information that you absolutely need to process the payment transaction and fulfill the order. Do not ask for unnecessary sensitive information, e.g., social security number, driver’s license number, etc. Be sure to collect all information in a secure manner. Work with your information technology personnel or Web developer to implement secure processes. Avoid letting potentially sensitive information sit unattended on the fax machine. Try to pick up sensitive information as soon as it arrives. Do not require customers to provide sensitive information via insecure methods. Information Storage Use strong security measures for storing data on your computer systems. Remember that the payments industry requires security compliance of all service providers and merchants that store or process sensitive customer information. If you store sensitive data (including card code values), it must be encrypted or masked. Lock up any hard copy documents containing sensitive information. Data Access Restrict access to your customer data on a need-to-know basis. Make sure that all user access is authenticated or password-protected. Perform background checks for any employees with access to customer data. Change passwords regularly, especially after employee turnover. Information Distribution Never send sensitive information via email. Leave discreet voicemail messages. Do not leave detailed messages involving sensitive information that can be overheard. Make copies carefully. Always remove and retain originals from the copy machine when making copies of sensitive documents. Do not cut and paste potentially sensitive information from any proprietary or confidential business application into emails or otherwise distribute sensitive information insecurely to customers. For transaction verification or receipts for payment gateway transactions, use the Print Receipt feature of the Transaction Detail page. Only share customer data with internal personnel on a need-to-know basis. Do not discuss sensitive information where it can be overheard. General Security: Check the Internet regularly for phony copies of your Web site. If you find a “spoof site,” contact the Web site’s provider immediately. Implement industry standard computer systems security and keep virus detection, firewall, and other prevention solutions updated. Only download software and files from sources you trust. Files from the Internet might include spyware or viruses that can compromise your security. Only use, or interface with, proprietary or confidential business applications on networks or the Internet in the manner in which they were designed. For example, to avoid the possibility that a shortcut to the Merchant Interface might break with a payment gateway update, you should enable cookies instead of using an unsupported screen-scraping program. Keep your external mailbox empty. Never leave outgoing or incoming mail in boxes overnight. Be careful with your work ID or access badge. Keep ID badges, office keys, and building entry codes in a secure place. If lost, contact your employer immediately to deactivate badges or change locks and codes. You might consider using generic badges without logos or other company information to avoid the risk of a security breach in the event that the badge is lost. Remove all sensitive materials from your immediate work area when you’re not using them or at the end of the day. Be sure to lock sensitive materials in the appropriate file cabinets, desk drawers, etc. Keep operating-system patches up to date.
|
|
|
|
Return to all Credit Report legal information
Legal Articles about Credit Report
Credit Report Frequently Asked Questions
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Credit report correction techniques
Many times the credit bureau is busy and does not handle your dispute properly ...
|
|
|
|
|
Basic rights under The Fair Credit Reporting Act
All Federal Laws are in consumer's favor and you will have the advantage ...
|
|
|
|
|
Credit Scoring and the Lending Industry
Credit scoring is crucial to your ability to get a loan. When you apply for a mortgage, your lender ...
|
|
|
|
|
Rethink how to prevent ID theft | Editorials | newspressnow.com
News-Press Now
The 81-year history of the Social Security number includes the fact it was “never intended to serve as a personal identification document.” So much for the best ...
|
|
|
News13 Shred-A-Thon helps hundreds prevent identity theft
WBTW - Myrtle Beach and Florence SC
MYRTLE BEACH, SC (WBTW) – News13 helped hundreds of people prevent identity theft for free on Saturday. More than 500 people drove through News13's free Shred-A-Thon at Broadway at the Beach. Shred360 shredded more than 20,000 pounds of ...
|
|
|
|
|
|
|
|
|
|
|
|