Identity theft occurs when someone uses another person’s personal information to take on that person’s identity in order to commit fraud or other crime. This would include personal information such as:
Several clues that indicate someone may have stolen your identity include:
will guide you through each step.
For more information:
Make sure you know who you are really dealing with. Do not give out personal or financial information on the phone, through the mail, or over the Internet unless you initiated the contact or know who you are dealing with. If a company sends you an email asking for personal information, don’t click on links in the email. Instead, go directly to their website and call their customer service number.
Use a utility that overwrites your data before disposing of a computer, printer, copier or storage device. (Anything with a hard drive). Follow the instructions on the IT Equipment Removal Request (PDF) form to get this done if this is a ذكذكتسئµ University device.
Before disposing of a mobile device, remove personal data. Check the owner’s manual or take it to the place you bought it to have it cleaned properly. Remove the memory or SIM card.
Only enter personal information on secure Web pages that encrypt your data. These pages will begin with “https” in the URL or a padlock icon will be displayed on the browser.
Use strong passwords. Be creative. Think of an easy-to-remember phase and replace some words with numbers or special characters. “I am at the Gulf of Mexico” could become 1a@tGoM.