Tag: privacy

From using a savings card at your local grocery store to exploring a social networking app on your phone, many everyday activities allow businesses access to information about your habits, tastes and activities. But where does that information go...

Protecting your personal information can help reduce your risk of identity theft. There are four main ways to do it: know who you share information with; store and dispose of your personal information securely, especially your Social Security...

Consumers are getting more and more unsolicited robocalls. As the number of these calls has multiplied, so have the number of complaints reported to the FTC, state and local law enforcement agencies, and consumer organizations across the...

Thinking of upgrading to a new mobile phone or device? Maybe returning one that didn’t work out for you? It’s important to delete any personal information you stored on the device.

How to Remove Personal Information Checking Twice...

Unwanted commercial email – also known as "spam" – can be annoying. Worse, it can include bogus offers that could cost you time and money. Take steps to limit the amount of spam you get, and treat spam offers the same way you would treat an...

The web is convenient for comparing prescription drug prices, researching health products and services, and preparing for your next medical appointment. Use these tips to be smart and safe when researching health products and services online....

The security of your computer can affect the safety of your online experience — and your kids’. Talk to your kids about what they can do to help protect your computer and your family’s personal information.

Teaching Computer Security P2P...

A minor distraction is all it takes for a laptop to vanish. If it goes missing, all the valuable information stored on it may fall into the hands of an identity thief. Keep these tips in mind when you’re out and about with your laptop:

Do:...

Getting rid of your old computer? You can ensure its hard drive doesn’t become a treasure chest for identity thieves. Use a program that overwrites or wipes the hard drive many times. Or remove the hard drive, and physically destroy it.

...

Pages