The Impact Of Verification (White Paper) Written by Adebowale - TopicsExpress



          

The Impact Of Verification (White Paper) Written by Adebowale Sonubi,Founder of Gee Jor Connections. ----------------------------------------- According to Data statistics authorized giants,28% of our personal identifying information is publicly processed in exchange for giveaways & bonuses that are professionally being designed to insure each business plan. In relative terms, verification literally means ensuring if something is true or false, and more so, if someone is real or fake whatever the case maybe, just like identifying your point of engagement before taking the next step. Taking and making a wrong decision based on lack of investigation sometimes leads to a lifetime damage, most especially when you are only open to a one in a lifetime opportunity which has been experienced often in the same life setting strategy of survival. Now what do you need to do is the most vital question anybody reading this eBook should be asking me in my next confrontational meeting or keep on reading. My point exactly is that you have to break down a refined measurement of self inflicted policy in setting up a standard security plan in order to avoid and detect any contingency plan that warrants data breaches. Nothing pricks me more than being taken while the feeling is reversed from the perspective of the predator in as much as it resulted in a successful attack. Friends, Customers and partners are living things with emotions looking out to confide or share their content with a trusted being which might led to an exchange of intellectual properties in one way or the other. In order to safe guard this relationship, your first action should be to take prevention methods from clarifying your online presence through a particular medium or whichever platform you choose to interact with. For reference purpose, this is an excerpt from Wikipedia research on Identity Theft across the best country users of social media platforms. Philippines Social networking sites are one of the most famous spreader of posers in the online community, giving the users freedom to place any information they want without any verification that the account is being used by the real person. Philippines, known as the 10th heavy users of Facebook and other social networking sites such as Twitter, Multiply and Tumblr has been known as source to various identity theft problems. Identity of those people who carelessly put personal information on their profiles can easily be stolen just by simple browsing. There are people who meet online, get to know each other through the free Facebook chat and exchange of messages that then leads to sharing of private information. Others get romantically involved with their online friends that they tend to give too much information such as their social security number, bank account and even personal basic information such as home address and company address...... This phenomena lead to the creation of Senate Bill 52: Cybercrime Prevention Act of 2010.Section 2 of this bill states that it recognizes the importance of communication and multimedia for the development, exploitation and dissemination of information but violators will be punished by the law through imprisonment of prision mayor or a fine ranging from Php200,000 and up, but not exceeding 1 million, or depending on the damage caused, or both (Section 7). Sweden Sweden has had relatively little problems with identity theft. This is because only Swedish identity documents have been accepted for identity verification. Stolen documents are traceable by banks and some other institutions. The banks have the duty to check the identity of people withdrawing money or getting loans. If a bank gives money to someone using an identity document reported as stolen, the bank must take the loss. From 2008 any EU passport are valid in Sweden for identity check, and Swedish passports are valid all over the EU. This makes it harder to detect stolen documents, but still banks in Sweden must ensure that stolen documents are not accepted. Other types of identity theft than over the bank desk have become more common in Sweden. One common example is ordering a credit card to someone who has an unlocked letterbox and is not home in the daytime. The thief steals the letter with the credit card and then the letter with the code which typically arrives a few days later. Usage of a stolen credit card is hard in Sweden, since an identity document or a PIN code it is normally demanded. If the shop does not demand that, it must take the loss from stolen credit cards. The method of observing someone using the credit card PIN code, stealing the card or skimming it, and then use the card, has become more common. Legally, Sweden is an open society. The Principle of Public Access says that all information kept by public authorities must be available for anyone except in certain cases. Specificially anyones address, income, taxes etc. are available to anyone. This makes fraud easier (the address is protected for certain people needing it). To impersonate someone else and gain money from it is a kind of fraud, which is described in the Criminal Code (Swedish:Brottsbalken). United Kingdom In the United Kingdom personal data is protected by the Data Protection Act 1998. The Act covers all personal data which an organization may hold, including names, birthday and anniversary dates, addresses, telephone numbers, etc. Under English law (which extends to Wales but not necessarily to Northern Ireland or Scotland), the deception offences under the Theft Act 1968 increasingly contend with identity theft situations. In R v Seward (2005) EWCA Crime 1941 the defendant was acting as the front man in the use of stolen credit cards and other documents to obtain goods. He obtained goods to the value of £10,000 for others who are unlikely ever to be identified. The Court of Appeal considered sentencing policy for deception offenses involving identity theft and concluded that a prison sentence was required. Henriques J. said at para 14:Identity fraud is a particularly pernicious and prevalent form of dishonesty calling for, in our judgment, deterrent sentences. Increasingly, organizations, including Government bodies will be forced to take steps to better protect their users data. Stats released by CIFAS - The UKs Fraud Prevention Service show that there were 89,000 victims of identity theft in the UK 2010.This compared with 2009 where there were 85,000 victims.Men in their 30s and 40s are the most common UK victims and identity fraud now accounts for nearly half of all frauds recorded. ...................Surveys in the USA from 2003 to 2006 showed a decrease in the total number of victims and a decrease in the total value of identity fraud from US$47.6 billion in 2003 to $15.6 billion in 2006. The average fraud per person decreased from $4,789 in 2003 to $1,882 in 2006. According to the decrease between 2003 to 2006,there is a life in preventing & protecting the future of NOW than taking from the people,your people and our people,meanwhile,i am sorry i couldnt stretch further on the incomparable statistics of the United States identity theft record but a recent survey conducted by Bureau Justice statistics in 2010,about 8.6 million households had at least one member become a victim of identity theft. One of the most popular platforms for social networking that classified the use of verification is the recently IPO company and also the largest micro-blogging social network websiteTWITTER,as far as concern,they have recorded a lot of data breaches which led to their idea of profiling and verifying accounts that belongs to mostly celebrities,affiliated customers and government branches. I will ,and i can declare that i am a celebrity but we all know the society is familiar with a celebrity as a result of his contribution on a global platform either from the backroom of his community or profession.If not,it takes approximately $15,000 to get your account verified as an affiliated customers which are advertisers and investors to Twitter. If we can create such a great notion,a sense of belonging , a feeling of longing for a status quot attractive to the digital society,then we should be considered,i mean those normal equal citizens that wants to redeem their image before its taken away from them.Believe me,not until when i started contacting twitter to get my account verified,i had no knowledge about the in-depth of social comparison and i believe we shouldnt place that faith in the hands of our Social media controllers except your hand ,our hand. This also means it is a choice but a choice worth of a thousand endorsement strategies in as much as your collaborator can take full confidence in sharing his or her own content with you without doubting your social presence. Please remember that we are not competing but leading you to a platform that you have been waiting for...we can all be celebrities,we can all be public figures,we can all be represented as a divine contributor if only the third party is aware of your present status. I personally think we should raise and nurture this lovely start up together instead of waiting for the big names before we can forge to be ahead of adversaries with our catalogue use of personal security,cryptography and other related protection tools. Thank You for your time well spent. #GeeJor. ------------------------- Adebowale Sonubi is a creative director for new business plan and social media programs...he is more of an artist due to his method of application which has led to the establishment of his Information and Communication FirmGee Jor Connections. Adebowale Sonubi CEO & Media Consultant @amotekun1
Posted on: Thu, 31 Oct 2013 05:42:37 +0000

Trending Topics



Recently Viewed Topics




© 2015