How to Prevent Online Shopping and Debit Card Fraud.

The Electronic Payments System is being targeted more and more by fraud. In order to prevent you from being a victim, always be vigilant with your debit card activities. The ease of shopping and comparing products and prices online has made it an attractive option for many shoppers. If you notice any unusual debit card activity on your statement, please notify the bank immediately to see what your bank can do to help.

Using a card provides you with extra protection if things go wrong – protection that you don’t necessarily have if you pay by cheque or cash. In addition to this extra protection provided, there are steps you can take to safeguard yourself.

Incorporating the practices listed below into your daily routine can help keep your cards and account numbers safe.

  • Check your statements. Don’t wait for the statement to come; check your online banking regularly. Watch for transactions that you didn’t make.
  • Limit your online purchasing to one card. When you use more cards, you allow access to more accounts.
  • Invest in a reloadable card when making online purchases. Reloadable cards allow you to limit the amount you place on the card and are not linked to your bank account. For example the Nakumatt Global Card and the KCB Pepea Card
  • Open a second checking account specially used for internet purchases. Don’t allow this account to be connected to your other accounts. Transfer only the purchase amount into the account.
  • Keep record of your internet transactions. Check your email for a confirmation after you have made purchases online. Verify your mailing address with the post office and  ­financial institutions.
  • Save your receipts to compare with your statement.
  • Don’t give your information out over the phone unless you’ve made the call to a company you know.
  • Your bank should have your information on file, so, don’t give out any personal or card number information if you receive a call to “verify fraudulent activity.
  • Use an online payment service like PayPal.
  • Use familiar websites. If you’ve never done business with them before, ­first do an online search for reviews or complaints.
  • Destroy your card when it expires or when a new card becomes effective.
  • Memorize your PIN. Do not write it on your card or keep it with you. Never give it out.
  • Remember to pick up your ATM receipts before leaving the ATM.
  • Be aware of added fixtures to ATMs, Skimming devices allow fraudsters to collect card and PIN information.

Finally, your card company should be your first point of contact – not the police. It will be up to your card company and not you the account holder, to pass details to the police. Where an additional crime has been committed with the fraud, for example, you have had your wallet stolen or your card used fraudulently as a result of a burglary, or if you want to claim on your household goods then this should still be reported to the police.

Advertisements

Will you read this article about ONLINE terms and conditions? You really should do

We live in a time of terms and conditions. Never before have we signed or agreed so many. But one thing hasn’t changed: we still rarely read them.T AND CC )
While companies need to protect their interests given the frivolous lawsuits in vogue, you should know when terms and conditions become more than standard operating procedure and turn into ransom notes. The consumer is forced to agree to the terms in order to proceed to the next step, whether it is to use a service or install software.
Here are some of the things that you should look for before clicking ‘I accept’.
                                                                                               Free mobile apps
INTERNET T AND CMany so-called free apps for your smartphone or tablet are supported by ads. Read through the terms—the app could be accessing your personal information, mainly to deliver targeted ads. Also, as mobile ads will be delivered whenever the app is active, it will add to your data usage at the end of the month.
Photo sharing and printing websites
You own the intellectual property rights to your photographs, but what happens if you upload themT AND C to a photo sharing website? Who owns them if you upload them to a stock photo site? Or to a photo printing website? You might be shocked to learn that several photo sharing/printing websites retain the right to use your photographs in any way they see fit in a ‘perpetual and irrevocable’ manner. So, check before uploading.
Buying online/booking tickets
This is one area that can have a lot of ambiguity. Do manufacturer warranties apply to products bought online? What happens if there is a defect or you need to return the item? If case of airline tickets, prices are volatile and you need to read the fine print to make sure that you can return and get a refund. Many ‘special fare tickets’ are sold on the condition that they will not be returned/refunded.
Protecting Twitter & Facebook accounts
A rising trend points towards websites allowing you to sign in and start using their services by using your existing Twitter, Google or Facebook ID. Though you skip the registration process (which encourages more users), the website identifies its visitor and gets more information. This is officially allowed using Facebook, Google connect and Twitter sign in. However, you may find automated posts and tweets being sent on your behalf. Check the permissions you are granting the site or app before allowing access to your account. If it says ‘Allow app/site to post/send tweet’ or ‘Grant permission to post on your behalf’, cancel and run.
Online shopping
Have you ever thought how your name and e-mail address find their way to various websites that you have never heard of? Whenever you sign up for newsletters, to comment on an article you read, or for a community forum, your personal information can be misused. Not only could this website start sending you e-mail spam (special offers, notices), but could even sell your e-mail ID to third parties without your consent.
Sharing personal information on e-mail
Ever notice how the text ads in your e-mail inbox are creepily ‘right on the money’? All the baby clothing store ads appear if you’ve had a baby. Camera stores materialise if you’re a photographer and local restaurants pop up if you’re discussing a dinner date with a friend. Targeted ads, especially those with accurate location and demographics, can earn a lot of money. By agreeing to the terms, you become the conduit.
By accepting these terms, you are literally agreeing to anything and everything the service imagesprovider may ask of you, now or in the future, as long as you are availing of its services. There aren’t too many ways out of the situation, other than opting for another service provider. However, needless to say, it is time you started reading the terms carefully, and more frequently.

Certain cybercrimes you need to know about

Any criminal activity that uses a computer either as an instrumentality, target or a means for cyber crimesperpetuating further crimes comes within the ambit of cybercrime.
All crimes performed by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. The followings are the top listed types of cybercrime:
Hacking
Hacking is a simple term means illegal intrusion into a computer system without the permission of the computer owner/user. Hackers usually do that with the intention of obtaining confidential information.
Virus Dissemination
Virus itself is software that attacks other software. It may cause for data loss, deduction of bandwidth speed, hardware damage etc. Trojan Horse, Time Bomb, Logic Bomb, Rabbit are the malicious software.
Software Piracy
Theft of software through the illegal coping of genuine programs or distribution of products intended to pass for the original.
Credit Card Fraud
You simply have to type credit card number into www page of the vendor for online transaction. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
Sale of Illegal Articles
Narcotics, weapons and wild life etc. are sold by posting information on websites, auction websites, and bulletin board or simply by using email communication. Many of auction sites are believed to be selling cocaine in the name of money.
Intellectual Property Crimes
These include software piracy, copyrights, infringement, trademark violations, theft of computer source code etc.
Email Spoofing
A spoofed email is one that appears to originate from one source but actually has been sent from another source. Personal Relationship may be jeopardized because of email spoofing.
Cyber Defamation
With help of computers and/ or the Internet When any defamation takes place it is called cyber defamation. It can tarnish personal image of any individual or reputation of any company, bank or institution.
Cyber Stalking
Cyber stalking involves following a person’s movement across the Internet by posting messages on the bulletin boards frequented by the victim, entering the chat-room frequently by the victim, constantly bombarding the victim with emails etc.
Email Bombing
Email bombing can be committed by sending huge number of emails to the victim resulting in the victim’s email account ( in case of an individual) or mail servers ( in case of company or an email service provider) crashing. Thousands of emails are sent to the personal account or mail server until it is crashed.
Data Diddling
Data diddling may be committed by altering raw data just before it is processed by a computer and then changing it back after processing is completed. Government offices may be victims to data diddling programs inserted when private parties were computerizing their systems.
Salami Attacks
For the commission of financial crimes salami attacks are used. Here the major thing is to make alteration which is so insignificant that in a single case it would go completely unnoticed. “For example a bank employee inserts a program, into the bank servers, that deduct a small amount of money from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizeable amount of money every month.

Child pornography

Child pornography is online trading of images of the children
involved in sexual activities.

China’s Copyright Laws. A Very Useful Primer, With A Music Twist.

Undisputed Legal Inc.

By Dan Harris

The China Music Business Blog (who knew?) just did a post by University of Oregon Law School Professor Eric Priest. Priest’s bio notes that he previously “worked in the Chinese music industry as a consultant, entrepreneur, and producer.”

Priest’s post (paper) is entitled, Making Amends: China Music Copyright Law Primer, and it is broken out into the following sections:

  • The Development of PRC Copyright Law
  • Copyright Law Since China’s Entry into the WTO
  • Copyright Enforcement—Administrative and Judicial Enforcement Routes
  • Internet Enforcement

View original post 513 more words

World of Internet and Social Change it brought

Ubaid H Zahidani

Image

Internet is a world of things in this age and era of informational hype. It has brought a joyous change to our lives, perceptibly the way our ancestors have lived feels obscure to new generation. All luxuries are joys of internet which opened gates to collection of galaxies of information within itself. Accessible information provided vast research approaches and hence the technological change in a common man’s life. This era has brought such a change in our lives that each endeavor humans undertake involves a mandatory facet of intelligent technology to be embedded. The common notion of today’s web presence is admired to sought changes in social lives, as authors of book Doing Internet Research credit it with being engine of new ages change in different spheres of life. Bewildering is to notice how each sector is covered by wonderful virtual world of internet  (Jones, 1998).

Having taken…

View original post 1,600 more words

Will a denial of broadcasting service to digitally non-compliant households constitute a violation of the constitutional right to receive information and ideas?

 

Digital broadcasting has emerged as a globally accepted standard for next-generation mass media. It presents a method of relaying radio and television signals with various advantages from analogue broadcasting. It enables a more efficient use of bandwidth and the bundling of multiple channels in one frequency. Moreover, digitally broadcast images, video and audio have a higher quality than their analogue counterparts. The transition from digital to signal broadcasting is arguably the most significant technological cross-over for television and is only closely rivaled, if not slightly surpassed, by the invention of colour television.

 

At the stroke of midnight at the end of 17th June 2015, all nations will cease all analogue broadcasts of radio and television signals and switch over to the transmission of digital-only signals with the exception of

digital migration
digital migration

some developing countries for which the transition period will end on 17 June 2020. On that date, all analogue television sets for which the owners will not have installed a digital signal converter will go black.

In Kenya however, the communications Commission of Kenya (CCK) have new self-imposed datelines. They will carry out the analogue switch-off exercise in 3 phases to wit; Nairobi on 13th December, 2013; Mombasa, Malindi, Nyeri, Meru, Kisumu, Webuye, Kisii, Nakuru and Eldoret on 30th March, 2014 and the rest of the country on 30th June, 2014.

Consumers of analogue television services and members of the public in general through Consumers Federation of Kenya (COFEK) have opposed the move by CCK to switch off analogue television frequency signals by 13th December 2013 or any other date before June 2014. They contend that this notice is too short and inappropriate considering that December is a festive season, immediately after which school re-opening calendar together with prevalent economic challenges facing Kenyans puts financial pressure on poor households not to forget the need for Kenyans to follow important national developments which include devolution and constitutional implementation processes, among others.

CCK’s decision, in the event that it is sustained, will lock out millions of Kenyans from following important national matters such as legislations, government policies, and matters of national interest, among others as envisaged under Article 35 of the Constitution of Kenya. While they claim , that so far 500,000 set boxes have been sold in Nairobi, there is no similar evidence and goodwill to demonstrate that the over 3,500,000 remaining television owners will purchase the compulsory and prescribed gadgets

The consumers and general public right to information will be severely infringed because current free-to-air channels, some paid for by the taxpayer, are being forced into pay-TV bundles vide a set-top box which are not free of cost. The specific case in which consumers of television services cannot access NTV, Citizen TV and KTN on the StarTimes platform is one such discrimination, against Article 27(4) of the Constitution of Kenya, which is being perpetuated with untold impunity as CCK maintain their loud silence. It should be a requirement that all set-top boxes/integrated digital TVs must be able to receive all non-encrypted free to air TV. In Denmark, the Ministry of Research and Communication has determined (Danish Ministry of Research, departmental order no. 709 of 25 June 1996) that “Digital decoders must be constructed in a way that allows non-encrypted digital TV signals to pass transparently through them.”

Further, there has been no sufficient public information, education and communication campaign to raise awareness on digital migration to allow consumers the freedom of choice as envisaged in Article 46 of the Constitution of Kenya 2010 and the Consumer Protection Act, 2012.

digital 2
The foregoing concerns are not the bitter pill of new technology that a society must take at a certain time in its development. Rather, once resolved, they will be the relish with which the consumer will find the transition to digital broadcasting more appetizing. The national digital broadcasting switchover programme will need to anticipate and resolve these concerns.

Don’t Throw Out The Baby With The Bathwater: Changing Laws, The “I Have A Dream” Speech, And Copyright Policy

The [Legal] Artist

url

This Wednesday is the 50th anniversary of Martin Luther King’s “I Have A Dream” speech. If you’re like me, then you’ve probably seen snippets of that speech a hundred times, but never seen the full unedited version. That’s because the speech is protected under copyright law until 2038, and anyone who copies, distributes, shares, or posts a video of the speech online will be violating copyright law and will legally owe restitution to the video’s owner… Sony.* [Like when Sony ordered advocacy group Fight For The Future to remove the video from its website.]

Am I the only who thinks this is terrible? What kind of policy allows a major corporation to sue someone who wants to share with others THE ICONIC CIVIL RIGHTS MOMENT OF OUR TIME? Who is this policy protecting?

You may have noticed that I’m pretty vocal when I think changes should be made…

View original post 633 more words

Copyright Alert System Begins

Astronomy and Law

The Copyright Alert System officially has begun. The system, also referred to as the “Six Strikes” program, is intended to deter copyright infringement committed through illegal file sharing.

The Center for Copyright Information (CCI) operates the alert system. Members of the coalition include the Motion Picture Association of America, Inc., the Recording Industry Association of America, and major ISPs, including AT&T, Cablevision, Comcast, Time Warner Cable, and Verizon.

The system allows content owners to notify Internet service providers (ISPs) when they believe their copyrights are being infringed. The ISP will then notify the subscriber that his/her account may have been misused for potentially illegal file sharing. If the activity continues, the warnings issued to the subscriber will escalate and can ultimately result in “mitigation measures,” which include slowing the subscriber’s Internet connection.

Now that the program is officially underway, content holders can begin sending notices of alleged copyright infringement to…

View original post 354 more words

The Atlantic: Why Martin Luther King’s ‘Dream’ Speech Is So Hard to Find Online

Murray State Business

Students often assume everything they need is available online. Here’s an example of why that isn’t the case: Why Martin Luther King’s ‘Dream’ Speech Is So Hard to Find Online by Dustin Volz for The Atlantic.

Photo source: Library of Congress

View original post