Datensicherheit / Vertrauensinfrastruktur

Für den gesamten Bereich UNIRVM E-Learning gilt die sogenannte E-Commerce Vertrauensinfrastruktur.

Darin enthalten sind PKI (Public Key Infrastructure)-Kryptographie und die Technologie digitaler Signaturen, die über digitale Zertifikate der Secure Socket Layer (SSL) angewendet werden sowie state-of-the-art Anwendungen für Authentifizierung, Datenschutz und Datenintegrität (Schutz vor Eingriffen unbefugter Dritter während der Übertragung über das Internet).

vgl. UNIRVM "Definitionen" - SSL (Secure Socket Layer), form of encryption, developed by Netscape. In theory, a third party could intercept personal information on the network when it is transmitted across the internet from the users web browser to the server. To prevent this, some form of encryption can be used, so that the intercepting third party cannot decode it back to the original username and password. URLs that require an SSL connection start with https instead of http.

Die Schutzmaßnahmen entsprechen der Richtlinie 2002/58/EG über die Verarbeitung personenbezogener Daten und den Schutz der Privatsphäre in der elektronischen
Kommunikation (Datenschutzrichtlinie für elektronische Kommunikation) vgl. UNIRVM (elektronische-)Bibliothek und dem „Georgia Law“ (Amended 2002), vgl. UNIRVM Lernbaustein „Definitionen“.

Bei Bedarf verwenden Sie bitte die Gratis-Übersetzungs-Software UNIRVM Menüleiste, Schaltfeld „Übersetzen/Translate“.

Georgia Law

In 1998 Georgia became the third of the United States to pass an identity theft law. Amended in 2002 it includes business victims and consumer victims thus requiring companies to protect consumer information. Moreover it clarifies law enforcement’s role and definition “identifying information” and “Resources”.

§16-9-120- Definitions

(1) 'Administrator' means the administrator appointed under Part 2 of Article 15 of Chapter 1 of Title 10, the 'Fair Business Practices Act of 1975.'

(2) 'Business victim' means any individual or entity that provided money, credit, goods, services, or anything of value to someone other than the intended recipient where the intended recipient has not given permission for the actual recipient to receive it and the individual or entity that provided money, credit, goods, services or anything of value has suffered financial loss as a direct result of the commission or attempted commission of a violation of this article.

(3) 'Consumer victim' means any individual whose personal identifying information has been obtained, compromised, used or recorded in any manner without the permission of that individual.

(4) 'Identifying information' shall include, but not be limited to:

  1. Current or former names;
  2. Social Security numbers;
  3. Driver's license numbers;
  4. Checking account numbers;
  5. Savings account numbers;
  6. Credit and other financial transaction card numbers;
  7. Debit card numbers;
  8. Personal identification numbers;
  9. Electronic identification numbers;
  10. Digital or electronic signatures;
  11. Medical identification numbers;
  12. Birth dates;
  13. Mother's maiden name;
  14. Selected personal identification numbers;
  15. Tax identification numbers;
  16. State identification card numbers issued by state departments; or
  17. Any numbers or information which can be used to access a person's or entity's resources.

(5) 'Resources' includes, but is not limited to:

  1. A person's or entity's credit, credit history, credit profile, and credit rating;
  2. United States currency, securities, real property, and personal property of any kind;
  3. Credit, charge, and debit accounts;
  4. Loans and lines of credit;
  5. Documents of title and other forms of commercial paper recognized under Title 11;
  6. Any account, including a safety deposit box, with a financial institution as defined by Code Section 7-1-4, including a national bank, federal savings and loan association, or federal credit union or a securities dealer licensed by the Secretary of State or the federal Securities and Exchange Commission; and
  7. A person's personal history, including but not limited to records of such person's driving records; criminal, medical, or insurance history; education; or employment.

in order to prevent Identity Theft vgl. UNIRVM Lernbaustein “Definitionen”.

Bei Bedarf verwenden Sie bitte die Gratis-Übersetzungs-Software UNIRVM Menüleiste, Schaltfeld „Übersetzen/Translate“.

Identity Theft

Stealing personal information from another person (name, date and place of birth, account numbers, driver’s license number, social security number, credit card number, telephone number and others) and fraudulent use to obtain credit, goods and services.

Identity theft is the fastest- growing crime in the United States.

It occurs at car-rentals, hotel receptions, restaurants, purchasing goods online, filling out a form at the doctor’s office and other places or occasions when personal information is not properly managed, for example copies stored in unlocked cupboards, therefore, offering access for cleaning people.

Examples of Identity Theft

Skilled identity thieves use both low-tech and high-tech methods to steal confidential information from individuals and businesses. Here are some examples of identity theft:

  • Purse snatching. A thief steals your wallet or purse containing your ID and credit and bankcards.
  • Mail theft. Thieves steal bank and credit card statements, pre-approved credit offers, telephone calling cards and tax information from your mailbox.
  • Change of address. Thieves divert your mail to another location.
  • Dumpster diving. Thieves rummage through residential or business trash, looking for personal information.
  • Masquerading. Thieves fraudulently pose as your employer, landlord or someone else with a legitimate need for your personal information.
  • Stealing work records. Thieves get your business or personnel records at work.
    Home theft. Thieves find personal information in your home.
  • Internet theft. Thieves obtain personal information from unsecured Web sites that you may have visited.
  • Insider crime. People who have access to personal identifying information steal it to use themselves or to sell to other thieves.
  • Pretexting. Thieves pretend to be you or a legitimate requestor and persuade business employees to provide them with your personal information.
  • Corporate espionage. Thieves steal business secrets such as new product plans or bidding strategy.

What thieves do with your personal information:

  • Contact your creditors, gain access to your accounts, change mailing addresses and begin using the accounts.
  • Open new credit or bank accounts, obtain loans and establish phone and utility service fraudulently using your name, Social Security number and birth date.
  • File bankruptcy under your name to avoid paying debts they falsely incurred or to avoid eviction.
  • Counterfeit checks or debit cards and drain your bank account.
  • File fraudulent tax returns.
  • Obtain driver's licenses and other fake identification documents.
  • Use insurance information to obtain medical procedures.
  • Buy cars or houses taking out loans in your name.
  • Sell business information to competitors.

Identity thieves quite often have a field-day at online job boards, claiming to be from a company seeking personal details for a pre-employment background check.
What they really are interested in are résumés and scans of driver’s licenses and


<< Zurück