Rover Technology Fusions
home
Rover Echo - Continuous data protection for individuals and mobile workforces
contact us home member login home
home
home
rover ink rover arc wherever ware products & services about us

Online Security

Identity Theft

Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials. In addition to running up debt, an imposter might provide false identification to police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen.

Identity theft is categorized in two ways: true name and account takeover. True name identity theft means that the thief uses personal information to open new accounts. The thief might open a new credit card account, establish cellular phone service, or open a new checking account in order to obtain blank checks. Account takeover identity theft means the imposter uses personal information to gain access to the person's existing accounts. Typically, the thief will change the mailing address on an account and run up a huge bill before the person whose identity has been stolen realizes there is a problem. The Internet has made it easier for an identity thief to use the information they've stolen because transactions can be made without any personal interaction.

Although an identity thief might crack into a database to obtain personal information, experts say it's more likely the thief would obtain information by using old-fashioned methods. Retrieving personal paperwork and discarded mail from trash dumpsters is one of the easiest ways for an identity thief to get information. Another popular method to get information is when the identity thief simply stands next to someone at a public office, such the Bureau of Motor Vehicles, and watches as the person fills out personal information on a form.

To prevent identity theft, experts recommend that you regularly check your credit report with major credit bureaus, follow up with creditors if your bills do not arrive on time, destroy unsolicited credit applications, and protect yourself by not giving out any personal information in response to unsolicited e-mail.

How Can Identity Thieves Get Personal Information?

Skilled identity thieves may use a variety of methods to obtain your data, such as:

  • Steal personal property, like wallets, purses and mail that may contain personal information.
  • Rummage through your garbage at home or work to find enough personal information to hijack your identity.
  • Gather information that you may post on the Internet.
  • Impersonation of banking organizations with personalized email requests. Never respond to email requests for personal information. Always call the company and report such activity
  • Look over your shoulder while you fill out forms containing personal information.
  • Change your address in order to divert statements from bogus bank and credit accounts to another location
  • Obtain your financial information by masquerading as a landlord or employer

> Learn about steps to select, protect & use passwords online

 

 

Copyright ®1999- Rover Technology Fusions | sitemap | disclaimer



Rover Technology Fusions, Tampa, Florida, considers information security to be of paramount importance. Rover Technology Fusions employees are bonded, insured and specifically trained to understand their responsibilities in keeping all customer information safe and confidential. Rover Technology Fusions employees follow precise security procedures and use state of the art technologies to protect your information against unauthorized access, disclosure, alteration and misuse. Rover Technology Fusions first priority is the security and privacy of your data.

Rover Technology Fusions does not give, sell or transfer your information to a third party for any reason. Rover Technology Specializes is Digital Writing, especially with the Logitech IO pen, Maxell pen and other digital writing pens. Utilizing the best of breed Anoto, and Vision Objects technology, Rover Technology Fusions creates commercial grade applications for business. Whether its digital writing, workflow analysis, tablet PC, forms development, digital forms, forms processing, digital ink, Anoto writing, word recognition, character recognition, Rover Technology speaks your Language. Rover, based in Tampa Florida sells the Rover INK Workflow solution to customers across the globe, within the US and throughout Florida.

Rover Tech Fusions also specializes in backup recovery through its Rover Echo productline. Whether its Continuous Data Protection, CDP, IBM, back-up software, Rover SPARC, laptop backup, IBM CDP, IBM SPARC, USB flash drive, USB credit card flash drive, USB flash card, back up computer files, backup your computer, computer back up, continuous data protection, disaster recovery backup, ibm continuous data protection, laptop storage, rover, rover sparc, rover tech fusions, rover technology fusions, rover usa, Tivoli, Tivoli continuous data protection Rover speaks your language. If you are looking for Rover, Rover USA, Rover Wireless, Technology Fusions, Tech Fusions we are part of the same family.