What do the apps you use collect about you? How much control over your device and your information are you giving when you download them? Are you concerned? Should you be? Do you take a look at their Privacy Notices or Statements before you download?
Take a look at this video from the #PrivacyProject:
The message: read those Terms & Conditions and Privacy Statements that apps publish before you download or give permission for an app to do something. If you cannot find a privacy notice or a statement about how they use data or what control you are giving over, think twice before downloading or do more research about that app before using it.
So since the Anthem data breach occurred, several people who either currently have or have had Anthem coverage have asked me what they should do. To the best of my knowledge, Anthem has not yet sent out any notification letters informing individuals that their specific information was breached. But, Anthem seems to know the universe of individuals whose information may have been compromised, and this is what they are using to notify the general public about the scope of the breach that has occurred. Anthem has set up a website to provide information about what happened and what data may have been compromised. For the time being, they are saying that if you are or have been a client of Anthem’s affiliated health plans and/or a member of other independent Blue Cross and Blue Shield plans in the last 10 years (essentially since 2004), you may be impacted. Many companies who offer insurance through Anthem have posted links or emailed their employees about the fact that the breach occurred. For my colleagues here at UConn, you may have seen that Kevin Lembo, the Comptroller for the State of Connecticut, has posted a notification to State Employees about the breach on the Office of the State Comptroller’s website.
So back to my post from yesterday: I have just learned that my information may have been compromised in the Anthem Breach; what do I do? Well, first I would start with Anthem’s informational website they created about the breach. Anthem is offering an option for individuals who may have been impacted by the breach to protect themselves for the next 24 months (and some of the services carry over beyond 24 months depending on what you choose to do).
More information about what Anthem is offering through AllClear ID can be found here. But to get you started, AllClear ID is offering a couple of different options to those impacted by the Anthem breach: AllClear Secure and AllClear PRO. The services are very different.
So should you consider the services offered through AllClear ID? Is AllClear ID reputable? Is taking a wait-and-see approach and using AllClear Secure if you find your identity has been harmed later the right approach? What about the fact that you would have to give AllClear ID your social security number to enroll in AllClear PRO?
Enrolling in services such as those provided by AllClear ID is a personal choice. If you are not opening up new credit any time soon (i.e., buying a car, opening a credit card, buying a home), you may be comfortable waiting or monitoring your credit on your own. If you are going to be opening up new credit, or do not want to monitor your credit on your own, you may want to consider AllClear PRO as an option.
Yes, AllClear ID is a known entity. They have handled numerous of the large breaches. In full disclosure, they are the vendor that UConn has used when we have had data breaches in the past. There are certainly other reputable companies in the marketplace that offer credit monitoring and/or identity repair services. Your bank and credit card companies likely offer services as well. Again, how you personally monitor your credit and your own sensitive information is a personal choice.
BUT, be aware that there are also scam artists out there looking to further take advantage of the vulnerability you are now feeling.
So when I start writing most blog posts, I try to come up with an interesting blog title to grab your attention. See above. Check! Next, I search the web for a great graphic (usually I Google it!) to add to the post. For this post, I Google’d the phrase “data breach victim.” Try Google’ing that and see what comes up. I was hoping I might find a cartoon of a person looking defeated or scared. Something witty by a cartoonist or journalist who could really capture what a data breach victim feels after learning his or her identity has been stolen. But instead (spoiler alert!), what came up was a page full of brand marks of several of the largest corporations hit by hackers and data thieves in the last year or so. Here are just a few of the first ones that came up:
Apparently, and quite properly, humor (and even sarcasm) are not the first reactions by anyone, including the cartoonists, when it comes to data breaches. I scrolled through more than a hundred images (mostly breached company logos) before coming to one cartoon. Serious stuff.
The first cartoon that came up kinda summed it up nicely, though:
You shop at a major retailer. You work for a large corporation. You are a client of an insurance company. And you learn that the organization you shop at, your work for or who helps insure you that you trusted with your personal and/or financial information has been hacked. You feel victimized. You feel, well… exposed. So what do you do next to protect yourself?
First, take a deep breath. You may be frustrated, angry at the organization who you trusted to protect your data or wondering if your credit has been or will be compromised. Data breaches have become so common, that fortunately there are many resources to help you.
One of the most concise resources I found that summarized the steps you should take immediately, and then later if you do find your stolen data has been used is from the Federal Trade Commission (FTC). There is a wealth of good information on the FTC’s page, including information about particular types of identity theft (medical, tax, children, etc.) and forms and sample letters to help you navigate various options to protect your information, or restore your identity if it has been harmed. But assuming you have just learned that your information was involved in a data breach, here is the best way to get started according to the FTC:
Identity theft happens when someone steals your personal information and uses it without your permission. It’s a serious crime that can wreak havoc with your finances, credit history, and reputation — and can take time, money, and patience to resolve.
If you are or were a customer of Anthem, identity theft is probably on your mind right about now. I’ll have more on the Anthem data breach later, but for now, it might be a good idea to revisit a Blog entry I originally published in January of 2013. Here is an excerpt with some practical tips about protecting your sensitive personal data that might be of particular interest to identity thieves.
Taking Care of Your Personal Information
What can you do to diminish the chances that you will become the victim of identity theft? Here are some pointers:
Watch out for imposters! Make sure you know who is asking for your personal or financial information and why they are asking for it. Don’t give out personal information on the phone, through the mail or online unless you’ve initiated the contact or know who you’re dealing with.
Manage your records. Do not keep paper or electronic records that contain sensitive personal information longer than you need to. Make sure you store your records that contain sensitive personal information in a secure location.
Properly dispose of paper records. When disposing of paper records, do not throw documents with personal information on them in the trash. Shred, shred shred!
Clear your mobile device before you get rid of it. Before you dispose of a mobile device (such as your smartphone) check your owner’s manual, the service provider’s website, or the device manufacturer’s website for information on how to delete information permanently, and how to save or transfer information to a new device properly.
Encryption as a tool. Consider encrypting files or even computer hard-drives that contain sensitive information.
Monitor your credit.Monitor your credit with each of the 3 major credit bureaus. Federal law requires nationwide consumer reporting companies to provide you with a free credit report, at your request, once per year.
Password protection.Protect your password the same way you would protect other sensitive personal information about yourself. Create complex passwords and have different ones for each account if possible. Do not share you passwords with anyone.
Do they really need my SSN? Think twice (or 3 times!) before you give out your Social Security Number. If someone asks you to share your SSN, ask that person why they need it, how it will be used, how they will protect it, and what happens if you don’t share it with them.
Be wise about Wi-Fi. Before you send personal information over your laptop or smartphone on a public wireless network in a coffee shop, library, airport, hotel or other public place, see if your information will be protected.
How social should I be? Do not overshare on social networking websites. Avoid posting personal information, such as your birth date or address. Also consider how much you post about your life. Identity thieves can use what you post to answer common challenge questions on your accounts, such as your credit card.
More and more we live in an interconnected digital world that can impact what happens to us (and our personal information!) in the real world. The video below takes things a little further than what might actually happen to most, but it could happen! Watch and enjoy, courtesy of NOVA PBS.
They say a picture is worth a thousand words. I think this graphic really speaks for itself. We will be posting tips like this throughout the month of February as part of the Data Privacy Month initiative. For now, what do you think of the tips in the graphic below? What would you add as your Top Privacy Tips for 2015?
Happy Data Privacy Day, everyone! Just what is this Data Privacy Day? Data Privacy Day is an international initiative led by the National Cyber Security Alliance, a non-profit, public private partnership focused on cyber security education for online citizens across the world. Data Privacy Day began in the United States and Canada in January 2008. However, it was celebrated long before that as Data Protection Day in Europe. The Data Privacy Day (and its predecessor Data Protection Day) commemorates the 1981 signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection. It is celebrated annually on January 28th around the world. Extensive information about Data Privacy Day itself, and events being held regionally, in the U.S. and worldwide can be found on NSCA’s Official Data Privacy Day website.
So what can YOU do today to celebrate and recognize Data Privacy Day? Think about your digital footprint. What do you want your legacy to be online? Think about what you share about yourselves, your family and your friends online. Stop.Think.Connect.
If you spend time on social media, look for the following hashtags: #DPD15, #DPM15,#DataPrivacyDay, #Stop.Think.Connect.
Maybe even post some of these hashtags yourself. And think about taking the #datainnovationpledge by posting “I Will Promote the Ethical and Innovative Use of Data! #datainnovationpledge #DPD15” on your social media accounts today.
After a brief hiatus, the UConn Privacy Blog is back. Did you miss me?
I thought, since I am refreshing this Blog, that I would remind you why I started it in the first place. Here’s flashback to my very first post.
So why restart this now? Well, a lot is going on in the privacy and data security world as we begin 2015. Big Data, big breaches, living in the cloud, MOOCs, drones, wearable technologies and the Internet of Things. I have thoughts. And my colleagues out there in the privacy and data security world have thoughts. It seemed like as good a time as any for me to time to start this Blog back up to share those thoughts and provide you with links, tips and other useful information about all-things-privacy going on around us in higher education where I sit, but also in this world around us that seems to be getting smaller and more interconnected, but more complicated in terms of managing expectations and personal control about us and our information all at the same time. Man, that’s a mouthful! Hopefully in revitalizing this Blog, I’ll be able to break down these issues and more.
So the long-and-short of it, I’m back at this Privacy Blogging Thing! And just in time for Data Privacy Day. I’ll have more on that tomorrow.
Have any topics you’d like to see me talk about? Interested in guest blogging or sharing your thoughts on Privacy, Data Security or Records Management? Let me know. I would love to hear from you.