• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 3. DANGER ON THE COMPUTER AND WHAT TO DO IF YOU ARE THE VICTIM OF ID...

Chapter 3. DANGER ON THE COMPUTER AND WHAT TO DO IF YOU ARE THE VICTIM OF IDENTITY THEFT

Sometimes it is hard to remember what life was like without personal computers. E-mail, shopping on line and surfing the net are only three of the uses of personal computers that are taken for granted in our everyday lives. But as much as computers have enriched our lives, they have also made us much more vulnerable to identity theft. The first step in reducing your vulnerability to identity theft through your computer is learning where you are vulnerable. However, assessing your risk is not enough. Unfortunately, there is nothing you can do to guarantee that you will not become a victim of identity theft, so it is also important to know what to do if you become an identity theft victim.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint