Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet. If you do, you may be giving away personal information to strangers, and you know what your mom said about talking to strangers.
Okay, back up a minute. You want to buy a new necklace for your wife at that great dot com you recently found. They require you to fill out a form first - your name, address, phone number and credit card information. They also want your email address, gender and income range.
So you know these people? Think about it for a minute. How many of your friends (even your best ones) have you told your true age or how much money you make. Have you divulged your credit card data to your co-workers at work? Perhaps you give your social security number to the kid at the McDonalds?
I didn't think so. Then why do you insist on giving this data to a faceless computer? You don't have any idea who is on the other side of the screen - yet every day you give away information that you would never dream of telling your parents or best friends.
Before typing in the information look around the site until you find a link named "privacy". Usually it is on the bottom of the home page (at least), and good sites will have a link to it from EVERY page. Click on the link and read the policy from start to finish. Make sure you understand it - if there are any words you do not understand pull out your handy dictionary and check them out. Once you are done, read it again. Slowly.
What's so important about this that it requires all this work? Look, you are giving out personal data about yourself. The web site owners have an obligation to inform you how this data is going to be used.
Questions that should be answered by any decent privacy policy include:
Once you fully understand a privacy policy you can make an intelligent decision as to whether or not you want to give these people your information.
I know it seems like a lot of work, but remember you don't know who these people are and you don't know what they will do with your information. If you read the privacy policy, you can at least understand what they will do with it.
So now, go finish ordering new jewelry for your wife. That's important.
About The Author
Richard Lowe Jr. is the webmaster of Internet Tips And Secrets. This website includes over 1,000 free articles to improve your internet profits, enjoyment and knowledge.
Web Site Address: http://www.internet-tips.net
Weekly newsletter: http://www.internet-tips.net/joinlist.htm
Claudia Arevalo-Lowe is the webmistress of Internet Tips And Secrets and Surviving Asthma. Visit her site at http://survivingasthma.com
Identity theft rates one of the fastest growing crimes in... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Threats we ordinary Web users face online leave us no... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Nowadays more and more people are using a computer. A... Read More
Be careful of sites that promise to send you "instant... Read More
First the basic definition of Spyware: It is a type... Read More
In the past I've never really paid much attention to... Read More
Have you ever had to call Symantec or McAfee to... Read More
This is the second in a series of articles highlighting... Read More
The top five online scams on the Internet hit nearly... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
If you constantly deal with bank or electronic accounts, it... Read More
The first thing people think about when defending their computers... Read More
Spyware is software that runs on a personal computer without... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Security leaks can be a big problem for any site... Read More
Let us take the example of scrambling an egg. First,... Read More
Ebay is a great site and is used by many... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Identity Theft is one of the most serious problems facing... Read More
There you are busily typing away on your PC or... Read More
When surfing the Internet you probably take your anonymity for... Read More
You may not realize it, but as you are surfing... Read More
If you use emails actively in your communication, you must... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Fishing on the Internet has come a long way. However,... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
First of all we need to get some terms stated.... Read More
File sharing on p2p is soaring despite the music and... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Having a good Spyware eliminator on your computer is vital... Read More
The Threat10 years ago you could probably have run no... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Since its birth, the Internet has grown and expanded to... Read More
There are several basic concepts to keep in mind when... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
In a word, no - an email message has always... Read More
The trash folder in my main inbox hit 4000 today.... Read More
This is the second in a series of articles highlighting... Read More
Huge number of spyware software applications are available in the... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
In today's times spyware is a very serious issue and... Read More
Over £5 billion pounds was spent on online shopping in... Read More
My first experience with a spyware BHO based infection was... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Spyware is the most troublesome software to appear on the... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Spyware is software that runs on a personal computer without... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
There is nothing more important that password security in world... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
So called phishers try to catch the information about the... Read More
Threats we ordinary Web users face online leave us no... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Working from home has its advantages, including no commute, a... Read More
Credit card fraud is a growing problem for online businesses... Read More
A week or so ago, I received an inquiry from... Read More
As soon as almost all computer users already got used... Read More
Internet Security |