![]() If the firm does not have one or offers you with one that you do not understand, you may not want to share your information with them.Request and study a copy of the company’s privacy policy.You do not need a UH email address to use this system More information about UH FileDrop can be found on the UH ITS website: When prompted, call the Business Office at 80 to finalize your spot and make your payment. Ask about how they will safeguard your information and with whom they will share it. Full instructions for using UH FileDrop to send your files can be found here (PDF). FileDrop or Mail ALL of the documents to: Leeward Community College Office of International Programs 96-045 Ala ‘Ike Pearl City, Hawai‘i 96782 Email: Phone: (808) 455-0570 Note: Applications are accepted on a rolling basis.Ask why the firm needs your information and what would happen if you do not disclose it.The following questions can help you decide if it is safe to share your information: When prompted to submit personal information such as your Social Security number or date of birth, don’t be hesitant to ask questions. If a company you are signed up with suffers a database leak, change your passwords.Īsk Questions Before You Share Your Information.Use unique and secure passwords for each of your accounts, and then keep them safe.Unless you will specifically require them, leave your personal information at home. Don’t share personal information because someone asks for it.Maintain your personal information (medicare, Social Security number, or bank account number) in a secure location at home and at the place of employment.Compare receipts with account statements. Watch for unauthorized transactions.Review your credit card and bank account statements.The following actions can be taken to safeguard your information: Hiring Unit: UH Manoa, College of Social Sciences, Public Administration Program Location: Manoa. Protect your personal informationĪssuring that your sensitive data is safe, whether it is saved on paper, online, on your computer, or on a mobile device, is the most crucial action you can take to protect yourself against identity theft. Identity thieves may deplete your bank and investment accounts, create new credit lines, obtain utility service, steal your tax refund, use your insurance information to obtain medical care, or provide police with your name and address when apprehended. Identity theft occurs when someone exploits your personal information to impersonate you or steal from you. Anyone may become a victim of identity theft, but you can minimize your chances by implementing a few easy precautions to safeguard your personal data.
0 Comments
Leave a Reply. |