Accessibility Tools

Before Tossing Those Electronic Gadgets Consider This

Before Tossing Those Electronic Gadgets Consider This

You’d be surprised to know that simply tossing away electronic gadgets can potentially inflict damage including large financial losses

In the age of hard drives and solid-state memory and its humongous capacity to store information, a lot of details about one’s self is actually stored in many different electronic devices. Therefore, throwing electronic devices indiscriminately and hastily can potentially leave one exposed to the headaches that result from having one’s identity stolen.

The use of technology in daily life has spawned various cases of identity theft. Identity theft protection is something to be vigilant of in this day and age.

Whether using electronic gadgets for personal use or for business, ensure that the data stored in these devices are safe. This is not just for personal benefit and protection, but for the clients’ and company’s reputation and safety, as well.

Here are tips on how to dispose electronic gadgets properly and how to employ identity theft protection effectively.

Before tossing that old Palm, Blackberry, iPhone, tablet, old computer, or any other device that may store information, be sure to do the following for identity theft protection.

  1. Delete all sensitive and private information from the hard drive / memory of all electronic office equipment to be disposed of.

Most people know that disposing or re-selling old laptops and smartphones requires deleting old data from these. After all, it is common sense to NOT want the next user to gain access to personal and business information contained within these. Yet many people fail to adequately remove sensitive information.

Many more are surprised to learn the same identity theft protection principle can apply to copiers, printers, and fax machines. More often than not, electronic devices like these, which were manufactured after around 2002, were equipped with high storage capabilities. This means that when these devices were used, digital information about users have been stored inside these devices.

When disposed of hastily and without deleting sensitive information from the hard drive / memory, traces of one’s identity and personal information may end up in the wrong hands.

These information includes tax returns, voided checks, driver’s license, social security card, client information, just to name a few.

Irresponsible disposal could get one’s business in trouble. How? One’s business could be slapped with HIPAA fines or lawsuits related to professional liability issues.

  1. Remove the hard drive from the electronic office equipment prior to throwing it away. This is common sense identity theft protection procedure that’s not often done. However, it only takes a minute to do so, so be sure to make it an official protocol.

  2. If a person has no time to remove the hard drive himself, enlist the help of an e-waste company which specializes in destroying hard drives and deleting data from these.

However, if a person is doing it himself, allow for sufficient time to overwrite files from hard drives. Overwriting simply means replacing data with random information to prevent hackers and identity thieves from rebuilding data contained within the hard drive. It is highly recommended to leverage multiple-pass overwriting which is more time consuming but does a better job of removing the data.

  1. Use the company’s own fax machine, printer, or copier instead of renting or using these from a third-party provider. This way, sensitive personal information of clients cannot be stored in public and vulnerable hard drives.

  2. Keep up-to-date on information regarding data breaches, vulnerabilities, and ways to employ identity theft protection.

Legally, businesses, whether big or small, are held financially accountable for data breaches of people’s sensitive personal information. When a company fails to protect their client’s sensitive personal information, hackers and thieves could take advantage of data that’s supposed to be private. Customers will most likely file a lawsuit because of the company’s professional negligence.

Be proactive in creating a comprehensive cyber risk management plan for the company and its clients so that it won’t get caught by surprise whenever a data breach does happen. Preparation and proactive identity theft protection saves the company and client from headache, and not to mention precious dollars, from lawsuits and profit losses.

It pays to keep the company’s reputation clean. On top of these tips, it is also good to invest in an insurance product such as appropriate professional liability coverage, or identity theft insurance which can help defray costs of expensive negligence law suits if ever these happen. In a wired world where data breaches, identity thefts, and cybercrimes frequently occur, it is best to invest time, effort, and resources in making sure the company data is always safe and secure.

 

What to do if Your Tax Refund is Stolen

What to do if Your Tax Refund is Stolen

Imagine this: You’ve collected your W-2, your mortgage and student loan interest statements and your investment earnings documentation. You log into your online tax preparation software and spend the next hour inputting your information. When you hit “submit,” you breathe a sigh of relief; your taxes are complete for another year. Then you get an email saying the IRS has rejected your tax forms. Someone somewhere has already filed in your name.

Tax refund theft is happening more frequently these days than ever before. According to a government accountability office report, scammers snapped up more than $5 billion in 2013 tax returns last year. The IRS expects that number will grow even larger as identity thieves utilize some of the 6.5 million Social Security numbers stolen last year alone. In fact, some states are already seeing a spike in suspicious 2014 returns. According to The Washington Post, most of those were filed using TurboTax, one of the largest providers of tax preparation software.

Officials state filing early is one of the best ways you can protect yourself, essentially by beating criminals to the punch. Hopefully you won’t find yourself among the defrauded. However, if you are, here’s what you need to do to remedy the situation.

Report the fraud to the IRS.

The IRS identity protection division handles fraudulent tax return cases. You’ll need to fill out an Identity Theft Affidavit, which will create an alert on your account. The IRS may ask you to file your return on paper while they work to confirm your identity. You’ll then receive an identity protection personal identification number—or PIN—that you’ll need to use along with your Social Security number on future tax returns. You may also want to report the fraud to your local police department and the Federal Trade Commission.

Review your credit report.

If a thief had enough of your personal information to file a fraudulent tax return, he or she may also attempt to open new credit cards or take out loans in your name. Check your credit report at all three credit-reporting agencies as soon as you become aware of the fraud. At minimum, follow up annually. You can request a free credit report from each agency once a year at AnnualCreditReport.com. You may also want to put a freeze on your credit account. This will restrict anyone from pulling your credit report without your authorization, which will make it more difficult for an identity thief to open credit cards or loans in your name.

Change your passwords.

It may be easier to use the same password on all your financial accounts, and never change it, but you’re increasing your vulnerability to identity theft when you do so. If your information is compromised at one company, criminals will try to use it at others. Don’t let them get lucky. Create unique passwords for every account, and make them a long mix of numbers, letters and symbols. You might also want to take advantage of multi-factor authentication settings when available. These require a user to provide a code or other information in addition to their password when signing into an account, thereby increasing your protection.