Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet. If you do, you may be giving away personal information to strangers, and you know what your mom said about talking to strangers.
Okay, back up a minute. You want to buy a new necklace for your wife at that great dot com you recently found. They require you to fill out a form first - your name, address, phone number and credit card information. They also want your email address, gender and income range.
So you know these people? Think about it for a minute. How many of your friends (even your best ones) have you told your true age or how much money you make. Have you divulged your credit card data to your co-workers at work? Perhaps you give your social security number to the kid at the McDonalds?
I didn't think so. Then why do you insist on giving this data to a faceless computer? You don't have any idea who is on the other side of the screen - yet every day you give away information that you would never dream of telling your parents or best friends.
Before typing in the information look around the site until you find a link named "privacy". Usually it is on the bottom of the home page (at least), and good sites will have a link to it from EVERY page. Click on the link and read the policy from start to finish. Make sure you understand it - if there are any words you do not understand pull out your handy dictionary and check them out. Once you are done, read it again. Slowly.
What's so important about this that it requires all this work? Look, you are giving out personal data about yourself. The web site owners have an obligation to inform you how this data is going to be used.
Questions that should be answered by any decent privacy policy include:
Once you fully understand a privacy policy you can make an intelligent decision as to whether or not you want to give these people your information.
I know it seems like a lot of work, but remember you don't know who these people are and you don't know what they will do with your information. If you read the privacy policy, you can at least understand what they will do with it.
So now, go finish ordering new jewelry for your wife. That's important.
About The Author
Richard Lowe Jr. is the webmaster of Internet Tips And Secrets. This website includes over 1,000 free articles to improve your internet profits, enjoyment and knowledge.
Web Site Address: http://www.internet-tips.net
Weekly newsletter: http://www.internet-tips.net/joinlist.htm
Claudia Arevalo-Lowe is the webmistress of Internet Tips And Secrets and Surviving Asthma. Visit her site at http://survivingasthma.com
Spyware is software or hardware installed on a computer without... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
If you are a parent, as am I, I think... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
If spyware were a person and he set himself up... Read More
If you are wondering how to fight spyware for safe... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
You can detect spyware online using free spyware cleaners and... Read More
They're out there. Individuals trying to make a quick buck... Read More
Computer security for most can be described in 2 words,... Read More
Have been an Internet user for more than 9 years,... Read More
Fishing on the Internet has come a long way. However,... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
There are several basic concepts to keep in mind when... Read More
This is the second in a series of articles highlighting... Read More
When it comes to reporting Internet scams most of us... Read More
So called phishers try to catch the information about the... Read More
You'd better learn news from media, not from emails, security... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Over the past few years as the internet has become... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Much has been said on the theory of password protection... Read More
Well, if that would have been said to me by... Read More
There is no doubt that "how-to articles" have become a... Read More
As you know, this time the virus under the name... Read More
Ebay is a great site and is used by many... Read More
There are folks out there who use their powers for... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
We all know that it's dangerous to use the same... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
If you have used a Windows machine for a while,... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Have you ever bought a product or service from the... Read More
Well, this is an article I never thought I would... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
If you run any type of Internet business, Adware and... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
It has been said that with the wealth of information,... Read More
Identity Theft is one of the most serious problems facing... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
If you use emails actively in your communication, you must... Read More
In a word, no - an email message has always... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
You may not realize it, but as you are surfing... Read More
Many of us have run into an annoying and time-consuming... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Today,on most internet user's computers, we have the ability to... Read More
History and BackgroundThe virus was one of the first ever... Read More
First off I should explain what phishing is. Phishing is... Read More
A week or so ago, I received an inquiry from... Read More
Some months ago, before there was much publicity regarding phishing... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Watching how the traditional media covers the latest virus or... Read More
A friend called me one day and asked if I... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Internet Security |