Understand and Protect Yourself from Online Tracking

What follows is the low-down of how you are being targeted on line.

How do websites remember you? For years, the answer has been by using “cookies” – pieces of information saved by your web browser, then used to remember you and customize your browsing experience.

Now, it’s about more than cookies. Without using cookies, companies can use “device fingerprinting” to track you, based on your browser’s unique configurations and settings. Plus, mobile app developers can use “device identifiers” to monitor different applications used on your device. Tracking can also occur on smart devices, like smart TVs.

How can you control online tracking? Here are some ways to get started:

  • Delete or limit cookies. Check your browser’s settings for tools under Help, Tools, Options or Privacy.
  • Reset identifiers on your mobile devices. That makes it harder to associate your device with your past activity. iOS users can do this by following Settings > Privacy > Advertising > Reset Advertising Identifier. For Android, the path is Google settings > Ads > Reset advertising ID. Remember that this will only prevent tracking based on past activity – it won’t prevent tracking going forward.
  • Learn about tracker blockers. There are tools that allow you to block ads called tracker blockers. They prevent companies from using cookies or fingerprinting to track your internet behavior. To find tracker blocking plug-ins, type “tracker blocker” in your search engine. Then, compare features to decide which tracker blocker is best for you.

For more resources for best practices in Identity theft protection, please visit www.legalshred.com

Legal Shred is a Certified Document Destruction Service

Security is the top priority for Legal Shred.  While we recycle the shredded paper, do our best to create environmentally friendly routes to reduce our carbon footprint, and support our clients’ compliance with federal and local regulations, the most important service we provide is securely disposing confidential records.

One of the ways we assure our clients that we are the most secure means of document security is by being Mobile Shredding Association Certified.

In more detail, that means we are accountable by submitting to annual random audits.

We have already been subject to and passed a random audit earlier this year.  Here’s how the process works:

We were notified via email of our audit and given 30 days to submit the required verification materials:

  •  Proof of $1 Million Insurance liability policy
  •  Proof of meeting background testing requirements (our employees are randomly checked each year on an ongoing basis).
  •  Proof of meeting drug testing requirements (our team members are randomly drug screened on an ongoing basis).
  • Signed confidentiality statement between company and their employees and contractors who have access to client’s confidential information
  • Insurance records listing the VIN of each shred truck in operation

For more information on our top notch secured document destruction, please visit www.legalshred.com

Caller ID as a Scam

A new favorite resource for our weekly blog is the blog posted by the Division of Consumer and Business Education of the Federal Trade Commission (FTC).  Earlier this month, Andrew Johnson wrote a blog to raise awareness of a scam in which the scammers have managed to create a familiar caller id number.  As he described it “Your phone rings. You recognize the number, but when you pick up, it’s someone else. What’s the deal?”

Scammers are using fake caller ID information to trick you into thinking they are someone local, someone you trust – like a government agency or police department, or a company you do business with – like your bank or cable provider. The practice is called caller ID spoofing, and scammers don’t care whose phone number they use. One scammer recently used the phone number of an FTC employee.

The bottom line: Don’t rely on caller ID to verify who’s calling. It can be nearly impossible to tell whether the caller ID information is real. Here are a few tips for handling these calls:

  • If you get a strange call from the government, hang up. If you want to check it out, visit the official (.gov) website for contact information. Government employees won’t call out of the blue to demand money or account information.
  • Do not give out — or confirm — your personal or financial information to someone who calls.
  • Do not wire money or send money using a reloadable card. In fact, never pay someone who calls out of the blue, even if the name or number on the caller ID looks legit.
  • Feeling pressured to act immediately? Hang up. That’s a sure sign of a scam.

If you’ve received a call from a scammer, with or without fake caller ID information, report it to the FTC at FTC.gov

For more on best practices to protect your identity please visit www.legalshred.com

Protection from Text Message Spam

Today, we credit the FTC consumer information blog as the source for our weekly effort to educate our community.  The blog addresses the growing problem of text message spam.

Scammers often use the promise of free gifts, like computers or gift cards, or product offers, like cheap mortgages, credit cards, or debt relief services to get you to reveal personal information.  To claim your gift or pursue an offer, you may need to share personal information including how much money you make, how much you owe, or your bank account information, credit card number, or Social Security number. Clicking on a link in the message can install malware that collects information from your phone. Once the spammer has your information, it is sold to marketers or, worst case scenario—identity thieves.

These spam texts can also lead to unwanted charges on your cell phone  bill as well as slow down the performance of your phone by taking up space on your phone’s memory.

With few exceptions (of course political campaigns can text), for the most part, no one can send you a text without your permission.

To stop the spam texting:

  • Delete text messages that ask you to confirm or provide personal information: Legitimate companies don’t ask for information like your account numbers or passwords by email or text.
  • Don’t reply, and don’t click on links provided in the message
  • Treat your personal information like cash: Your Social Security number, credit card numbers, and bank and utility account numbers can be used to steal your money or open new accounts in your name. Don’t give them out in response to a text.
  • Place your cell phone number on the National Do No Call Registry
  • If you are an AT&T, T-Mobile, Verizon, Sprint or Bell subscriber, you can report spam texts to your carrier by copying the original message and forwarding it to the number 7726 (SPAM), free of charge.
  • Review your cell phone bill for unauthorized charges, and report them to your carrier.

For more on best practices in identity theft protection, please visit www.legalshred.com

Keeping on top of the latest scams

In a recent post by Andrew Johnson from the Federal Trade Commission’s Division of Consumer and Business Information, we get explanation of one of the latest scams.

It’s really just a new wrinkle in the old tech-support scam-the one where the scammers gain access to your computer by promising to “fix” a computer problem that doesn’t actually exist. According to Johnson, the FTC is hearing reports that people are getting calls from someone claiming to be from the Global Privacy Enforcement Network. They claim that your email account has been hacked and is sending fraudulent messages. They say they’ll have to take legal action against you, unless you let them fix the problem right away.

If you raise questions, the scammers turn up the pressure – but they’ve also given out phone numbers of actual Federal Trade Commission staff (who have been surprised to get calls). The scammers also have sent people to the actual website for the Global Privacy Enforcement Network. (It’s a real thing: it’s an organization that helps governments work together on cross-border privacy cooperation.)

Here are few things to remember if you get any kind of tech-support call, no matter who they say they are:

  • Don’t give control of your computer to anyone who calls you offering to “fix” your computer.
  • Never give out or confirm your financial or sensitive information to anyone who contacts you.
  • Getting pressure to act immediately? That’s a sure sign of a scam. Hang up.
  • If you have concerns, contact your security software company directly. Use contact information you know is right, not what the caller gives you.

For more on identity theft protection and best practices, please visit www.legalshred.com

Spring Cleaning for Confidential Records

April 22nd is Earth Day and we like to celebrate April as “Earth Month”.  Along those lines, it’s a good thing that
April pairs tax time with the urge to spring clean. It feels good to throw out some of the financial records stuffing your filing cabinets. But before you head for the dumpster, make sure you’re not tossing records you may need. You don’t want to be caught empty-handed if an IRS auditor contacts you.

In general, you must keep records that support items shown on your individual tax return until the statute of limitations runs out — generally, three years from the due date of the return or the date you filed, whichever is later. That means that now you can generally throw out records for the 2012 tax year, for which you filed a return in 2013.

In most cases, the IRS can audit your return for three years. You can also file an amended return on Form 1040X during this time period if you missed a deduction, overlooked a credit or misreported income.

So, does that mean you’re safe from an audit after three years? Not necessarily. There are exceptions. For example:

  • If the IRS has reason to believe your income was understated by 25 percent or more, the statute of limitations for an audit increases to six years.
  • If there is suspicion of fraud or you don’t file a tax return at all, there is no time limit for the IRS.

Like most issues involving the IRS or other government agencies, there’s no easy answer to that question. The IRS does not require you to keep records in any particular way. But here are some “rules of thumb”:

Completed tax returns. Many tax advisers recommend that you hold onto copies of your finished tax returns forever. Why? So you can prove to the IRS that you actually filed. Even if you don’t keep the returns indefinitely, you should hang onto them for at least six years after they are due or filed, whichever is later.

Backup records. Any written evidence that supports figures on your tax return, such as receipts, expense logs, bank notices and sales records, should generally be kept for at least the three-year period.

Exceptions. There are some cases when taxpayers get more than the usual three years to file an amended return. You have up to seven years to take deductions for bad debts or worthless securities, so don’t toss out records that could result in refund claims for those items.

Real estate records. Keep these for as long as you own the property, plus three years after you dispose of it and report the transaction on your tax return. Throughout ownership, keep records of the purchase, as well as receipts for home improvements, relevant insurance claims, and documents relating to refinancing. These help prove your adjusted basis in the home, which is needed to figure the taxable gain at the time of sale, or to support calculations for rental property or home office deductions.

Securities. To accurately report taxable events involving stocks and bonds, you must maintain detailed records of purchases and sales. These records should include dates, quantities, prices, dividend reinvestment, and investment expenses, such as broker fees. Keep these records for as long as you own the investments, plus the statute of limitations on the relevant tax returns.

Individual Retirement Accounts (IRAs).The IRS requires you to keep copies of Forms 8606, 5498 and 1099-R until all the money is withdrawn from your IRA accounts. With the introduction of Roth IRAs, it’s more important than ever to hold onto all IRA records pertaining to contributions and withdrawals in case you’re ever questioned.

If an account is closed, treat IRA records with the same rules as securities. Don’t dispose of any ownership documentation until the statute of limitations expires.

Issues affecting more than one year. Records that support figures affecting multiple years, such as carryovers of charitable deductions, net operating loss carrybacks or carryforwards or casualty losses, need to be saved until the deductions no longer have effect, plus seven years, according to IRS instructions.

These general recordkeeping guidelines are for individual tax purposes. Insurance companies and creditors may have other requirements. Businesses have different requirements. Contact your advisers for more information

Remember, the most secure and environmentally friendly way to dispose confidential records is to shred and recycle.  For more information please visit www.legalshredinc.com

Debt Collector Scam

Sham debt collectors play into peoples’ fears to scam them out of money and worsen their debt problems.

At the request of the FTC and the Illinois Attorney General, a federal court has shut down a network of businesses and operators that falsely claimed to be debt collectors collecting real payday loan debts. The FTC said that the operations — called Stark Law, Stark Recovery, Capital Harris Miller & Associates and other names — had no authority to collect the debts they called about. And yet, says the FTC, they relentlessly threatened and harassed people, and got millions of dollars in un-deserved payments.

According to the FTC, the companies called people who had applied for payday or other short-term loans, and then claimed their loans were delinquent. The companies intimidated people with threats of lawsuits, or having them charged with “defrauding a financial institution” for passing bad checks. For a time, the defendants even posed as a law firm, claiming they could sue people and get judgments against them. The companies called people repeatedly, and called their friends, relatives and employers, told lies — and generally made peoples’ lives miserable. Many people paid because they were worried about the consequences of not paying or just wanted the harassment to stop.

Even people deeply in debt have rights.  Debt collectors aren’t allowed to harass, make false statements, or use other unfair practices. Be wary about anyone who threatens to have you arrested for an old debt-there’s a good chance he’s a fake.

The FTC exists to protect Americans from scams.  In addition to information at www.legaslshredinc.com the ftc.gov is a good resource.

Identity Theft Scams That Target Women

In Jessica Rich’s recent blog in her role as Director, Bureau of Consumer Protection, FTC she honors Women’s History Month, by focusing on identity theft scams targeting women.

Women make up slightly more than half of the US population, according to the US Census Bureau. Which means that about half of the people affected by the big cases the FTC brings – against the likes of AT&T for “unlimited” data, ASUSTek for security flaws in their routers, or Lumosity for exaggerating the science behind their brain training games – are women.

Except that sometimes, offers – and scams – are targeted. Maybe to Spanish-speakers. Or older adults. Or people looking for work. Or women. Here’s a look at the work the FTC has done to shut down scammers who targeted women during the past few years:

  • All that glitters: Oro Marketing was a telemarketer that targeted Spanish-speaking women with the “opportunity” to sell brand-name products for a profit. The goods delivered (cash on delivery) were unusable junk, and when people tried to refuse shipment or return the goods, the company harassed and threatened them. The good news? The company and its owner are now forever banned from doing business in the telemarketing industry.
  • Magic underwear: Two companies ran ads claiming that their caffeine-infused shapewear would take inches off hips and thighs, and reduce the appearance of cellulite. And sometimes, according to the FTC, they didn’t have the science to back those claims. The companies had to make partial refunds and promise not to make unsubstantiated claims again.
  • “Revolutionary formula”: Lunada Biomedical’s ads told women over 40 that Amberen would relieve symptoms of menopause and perimenopause – including weight gain and hot flashes. Except, according to the FTC, they didn’t have the scientific evidence to support those claims. This case is ongoing.

Those are just a few of the cases the FTC has brought where women were the targets.

Whether male or female, we all need to vigilant about protecting ourselves from identity theft.

For more on best practices in regards to identity theft, please visit www.legalshredinc.com

Risk Management for Identity Theft

We use this blog space to identify and help manage the risks associated with identity theft.  A top risk area is non-secured documents.  A major area of risk presents itself when employees prepare the necessary information to complete a tax filing or similar confidential documents.  The data is often pulled from various locations and digital copies are frequently printed to be used as backup material. This can result in loose paperwork being stored on desktops or left at printing stations leaving the sensitive data vulnerable to snooping and data theft, and available to outside staff such as cleaners and building maintenance.

To manage the risk, implement a clear desk policy and having lockable storage units for employees can help protect confidential information not only during tax season, but throughout the year. Requiring employees to use a security code to complete a print job also ensures that confidential documents are not forgotten at printing stations.

Another area to consider is the increasing numbers of employees working from home offices or even just out on the road.  While the introduction of laptops, tablets, smart phones and external hard drives allow employees to work off-site, it also means an immense amount of confidential information is leaving the office with them. A single lost or stolen laptop has the potential to seriously damage any business.

To manage the risk, thoughtful and thorough training is a must to ensure employees understand and take appropriate precautions when removing any data from their workplace. They must not leave hardware or materials in vehicles, and should encrypt phones and hard drives, and activate passwords on electronic devices. Once out of use, devices should be securely destroyed.

Remember, we are all in this together.

For more information on identity theft best practices, please visit www.legalshredinc.com

Tax Time Vigilance Part 3

This week we wrap up our tips for tax time vigilance.

We are now deep into tax season 2016, an especially vulnerable time of year when we need to remind ourselves of best practices regarding identity theft protection particularly as they relate to filing taxes.

Identity theft still tops the list of taxpayer concerns. According to the most recent Javelin Strategy & Research, identity thieves stole $16 billion from 12.7 million US consumers in 2014.

  1. Protect your social security number: Because it one a unique way to identity individuals, many companies ask for your Social Security Number to use it as a way to build their database. That may be easier for them, but it could spell disaster for you.  Before you give out your Social Security Number, determine whether the company really needs the information – and why. If there’s not a legitimate purpose, don’t provide your Social Security Number when asked and don’t submit it online.
  2. Just like eating your vegetables–it’s important to monitor your credit report.By law, you’re entitled to one free copy of your credit report each year from each of the major credit bureaus (Equifax, Experian, and TransUnion): that’s a total of three reports every year (you may be entitled to additional copies if you’re the victim of identity theft). Review your credit report like you do your credit card or banking statements: check to make sure that the transactions and credit requests are those that you’ve approved.
  3. Finally, keep your eyes and ears open for fraud alerts.  Institutions will alert you whenever there’s a suspicious transaction on your account. It can be a little inconvenient if the transaction is legitimate but it’s loads better than having your card actually compromised and not knowing about it. Ask if your bank or lender has fraud alerts – and use them.

For more helpful tips and suggestions for best practices in the world of identity theft protection, please visit legalshredinc.com