Friday, June 20, 2008

Is A VoIP Calling Plan Right For Your Home?

by: Jessica Liu


If you watch TV read magazines, or drive through and cities with billboards chances are you’ve come across advertisements for VOIP calling plans. Many of these advertisements try to sell their services on how much less expensive their services are compared to traditional calling plans. They also talk about quality and clarity of calls. You’ve probably wondered how much of this is true and how much is hype.

VOIP or Voice over Internet Protocol is probably one of the most revolutionary advances in the telecommunications industry. It allows you to talk to another person across the globe using digital network connection exactly the same as way you receive email or visit websites. Because you voice is converted into a digital signal it can be sent across the street, across the country, or across the globe for exactly the same cost. For VOIP calls the concept of long distance doesn’t exist.

VOIP calling packages come in two flavors, bulk rate pricing and unlimited calling. Bulk rate pricing allows you to have a monthly allotment of minutes to call who ever you want (just like your cell phone service). If you go over your monthly allotment you will have overage charges. Unlimited calling is exactly just like it sounds you have no limit on the amount of calls you can make. Unlimited calling plans range from $35 to $90 per month depending on the VOIP service provider and the additional features included with your plan. Unless you are making a lot of calls or the unlimited calling plan is very inexpensive bulk rate pricing is usually a better option.

Just like cellular phones VOIP service providers allow you to “port” or move switch your existing phone number into their service. This is really convenient as you won’t have to notify your friends and family you’ve changed your number. Currently there is no legislation that VOIP providers have to allow you to port your number out if you are unhappy or want to change providers. Some of them will, others will charge you a fee, and some will refuse to accommodate your request, be sure to check this before you sign any contracts.

If the VOIP company you are using “piggybacks” on your existing broadband cable connection your phone service is dependant on your cable connection. If your cable connection goes out or you drop your cable company your VOIP phone service won’t work. Additionally if you lose power in your house unless you have a backup generator your phone won’t work.

Lastly many VOIP service providers don’t interface well with emergency services (911). On traditional phone lines your address information is automatically sent when you make a call, this isn’t true for VOIP.

© Copyright VOIPTelephoneSystem.org, All Rights Reserved.

About The Author

Jessica Liu is a staff writer at http://www.voiptelephonesystem.org a news and information website about VOIP and VOIP related technologies.


Monday, June 16, 2008

The 12 Things All New Internet Marketers Should Know

by: John Woon


The author gives an easy to follow 12-point guide and advice to all new Internet marketers and online business owners to help them excel in this very interesting, exciting, rewarding and yet challenging business venture.

1) It has been reported that there are about 600,000,000 people on the Net world wide at the moment. And the annual growth of the number of surfers is exponential! You can imagine the potential market for Internet business is immensely huge. The chances of your success in the business online are tremendous. Your journey towards that would be a very exciting and rewarding one indeed.

2) Plan your work and work your plan. Like any other forms of work, you must have a plan for your Internet business. Set an achievable short term, medium term and long term objectives, prepare a budget and stick to them as far as possible. Carry out periodical checking to determine any deviations from the plan and take the necessary remedial actions.

3) Do not ever try to spam i.e. sending unsolicited e-mails to unexpected recipients under any circumstances. I get very annoyed when I find chunks of unwanted e-mails plugging my mailbox resulting in the e-mails from my friends and business associates being “lost” in the midst of these junks mails. The frustrating process of deleting them is enough to drive me through the roof! If you insisted on “spamming”, you’d very likely have your name terminated by the server. It is therefore not worth the while because eventually your business would suffer.

4) Do not try to be a Jack of all trades. Choose only a niche product or service or something where your own expertise lies in. Then consolidate your business by focusing on what you do best. Many Internet marketers have developed very enterprising, lucrative and rewarding online businesses doing what they enjoy and love best i.e. hobbies.

5) Respect, understand and always keep abreast with the advance of technology because it could help you achieve your business vision and personal goals. The ever changing technology provides us with countless tools with which we could use to enhance our businesses. A very good example is the advent of BLOGs. The software used for this today is so simple and friendly that old hats with rusty and somewhat retarded brains like me very often find the process of blogging as enjoyable and relaxing as a breezy walk in the park!

6) Design your webpage or blogs with quality content that would exert yourself and your business as an authority in your field. You should have a content that is not only attractive but also informative to advise especially the first-time visitors what benefits they would enjoy from your products or services. It should be able to persuade customers to keep coming back to your website to repeat their orders and convert casual visitors to prospects and prospects to customers.

7) You'd be tempted with countless of seemingly very attractive offers and promises from the Web to help improve your business. Do not fall into the trap of some of these promises. Just stay with a handful of strategies that work and stick with them.

For example, if you're submitting articles to drive free traffic to your sites and it's showing positive dividends, stick to it and continue with this strategy while improving and fine-tuning others.

8) By all means, study your competitors, watch their activities and every move. But love thy competitors, not hate them. Do not “knock” them into oblivion. Unlike conventional business, you should always find ways to work along them if not with them. There are many online organizations, big and small, working very closely together even in the same product or service market sectors. Very good examples are the joint venture partnerships and link exchanges among the so-called competitors.

9) Do not be too “innovative” by creating and marketing new and unproven products or services that the market is not willing or ready to buy. Conduct a web research to identify products which command good market and offer them to the hungry and ready market. You could do some modification to improve it in order to have product differentiation and hence enjoying better comparative advantage over your competitors.

10) In Internet marketing, always remember three very important words. They're…LIST, LIST and LIST. Also, do not forget the popular Internet adage “The Gold is in your LIST!” This means that a big chunk of your time, effort and concentration should be directed to getting the right strategy to drive traffic to your site. Advertising is therefore of utmost importance.

11) Although this is a home based business with all the freedom in the world, it's prudent to have some form of discipline. Once you’ve decided to sit in front of the computer to start working online, you must stay focused and do not allow any distraction to affect your concentration. Treat it as your business and not a hobby. It would be nice to stick to a schedule which is also made known to other members of your family so that they'd know when to leave you alone. However do not get carried away and spend too much time in front of your PC because your loved ones, including your pets also deserve your attention and time.

12) Internet marketing is still one of the best businesses one could venture into especially when there is no demand for big capital outlay. With this huge and expanding audience coupled with the fact that marketing and advertising can be done on the Internet so easily and at only a fraction of the costs of traditional methods, we now have a fantastic opportunity to be successful in online business.

Many companies have now positioned themselves profitably with the Internet which has created many new paradigms in the past few years. Passive incomes are made available to people from all walks of life. You can now make money online with simple and proven formula used by many to earn multiple streams of residual income.

However, like any other conventional businesses, there would be times when you would encounter failures and disappointment. Do persevere as this is not a get-rich-quick scheme. Time, effort and some financial input are necessary. It would take a while to see the fruit of your effort. Use any failures to your advantage by learning from them. See success in every failure and opportunity in every threat.

About The Author

Woon Sung-Liang (John Woon) is a Rubber and Latex Consultant with about 25 years of experience. Check this fantastic website to find out how he started his online Internet business: http://www.PlugInProfitSite.com/main-9747 Visit his website http://www.johnwoon.com. Get to know him better at his Blog: http://www.blogwithjohnwoon.blogspot.com.

Internet Home Business Secrets That Payoff!

by: Jeff Smith


I can picture you exactly where I was just a few short years ago --

Sitting in another useless meeting organized by a group of senior managers that have a combined IQ less than your own child at 3-months old.

Around in circles you go, no progress again today and only those who play the game the best will collect the bigger paychecks - but even they can't outlast this game of roulette can they?

Listen - I get asked often, even by my own wife, "why are you so driven!"

It's true, these days I am passionate about just about everything I do - especially my internet home business.

Why?

Is it the thought of a new porsche sitting in my driveway that motivated me to succeed with my internet home business?

What about cruising up and down the Pacific Coast in my new yacht?

Maybe it's being able to take a dream vacation to Australia and New Zealand?

Nope! You guessed wrong.

In fact, what motivates me everyday is the thought of having my time, energy, health and family UNDER THE CONTROL of someone other than myself scares the heck out of me.

I mean all out spiders on my face, snakes in my bed and lizards in my pants scared!

When I hit 30 back several years ago - I was in a hotel, alone on business in downtown London, England.

Incredible city, but I realized that after spending 29 birthdays with my family - I was FORCED to spend this one alone thousands of miles from home.

Every day after, I became incensed each time someone at my old job controlled some aspect of my time, health, energy or family.

I don't mean a little upset - I mean DEEPLY ANGRY.

There's only two ways to deal with something like that in your life - curl over and die a slow death or take action until you change the circumstances

Trick was, to channel that anger in the right direction - postive instead of negative.

Then I discovered something incredibly powerful --

Anger and Pain Are Part of the Formula for Success!

Name me any highly successful person and chances are I can find a burning, gut-churning, unstoppable force within them that will not let them fail. That force usually comes from anger or pain.

LET ME SAVE YOU 5-YEARS OR MORE....

Even with this incredible passion I had to control my own destiny, success didn't come right away.

I tried opportunity after opportunity, scam after scam, UNTIL...

THE HOLY GRAIL - Internet Home Business

Ever since the beginning of business, the same principles hold true - you must have;

  1. Compelling product to reachable market
  2. Competitive Advantage or Unique Selling Proposition
  3. Operation plan that is profitable
  4. Constant Plan, Do and Review process to increase profits

Whether you want to market other people's products online or create your own products or services, you must follow these fundamental business principles.

What's great about an internet home business is:

1. You can find reachable markets and compelling product ideas sitting in your office in your underwear

2. You can easily discover and communicate your Unique Selling Proposition without having to spend thousands on competitive intelligence

3. You can develop very profitable operational plans taking advantage of instant download, or build to order systems

4. It's easier, and less risky than ever before to continually test and improve your internet home business.

So - snap out of it!

Stop settling for whatever it is that is eating away at you!

Take action - right now!

Find out all you can about starting and building your own internet home business - turn your anger or pain into health and happiness today.

About The Author

You Really Can Write and Market Profit-Pulling, Niche Market eBooks That Sell Like Wildfire! Discover RED-HOT Markets, Create High Value Products Quickly and Easily. Find Out How Right Here: http://www.highertrustmarketing.com
jeff@infoproductcreator.com

Sunday, June 15, 2008

Cashing in by Blogging

by: Len Hutton

Believe it or not, but it’s actually possible to make money from blogging. One teenager has, in fact, earned $5,000 a month just from making posts on his blog! Of course, not every blogger is this lucky. It does take some skill, and some luck to make money from blogging. What it also takes is some knowledge of how exactly to generate income just by posting blogs. In this newsletter, we will go over three specific methods of making money on your blog: Adsense, Pay Per Lead, and Affiliate Links.


So how exactly do I make money on my blog?


You do it by working with another company that wants to use your blog as a form of advertising. It sounds like selling out, right? Not exactly. The advertising can be as in your face or subtle as you want. And it can still make you money, provided you have enough visitors to your blog.

What is Adsense?

Adsense is a program offered by Google. The program, if installed, will display ads provided by Google.

How do I get Adsense?

You’ll need to go to Google.com, first. At the bottom of the screen is a link for “Advertising Programs”. Click on that. Then click on the link for “Adsense”. Scroll down on the page that comes up and click “Click Here To Apply!” You then fill out the form with information about yourself. After 12-48 hours, Google will notify you via email whether or not your site has been accepted. When you’ve been accepted, set up your ads by doing either of the following:

1. If your blog is hosted on Blogger.com, you can set up your AdSense ads by going to your profile, selecting settings>template>add an element. Then select AdSense and login with your account info. Next, you’ll configure your ads and save the template. That’s it.

2. If you are self-hosting your blog, you’ll have to set up AdSense in more of a manual way. You’ll create your ads(which can be as small or as tall as you want) and then copy the HTML/Javascript code Google gives you. Then you’ll paste it into your blog(on the left, right, or top of the screen).

For the first few days, the ads displayed by Google will be Public Service Announcements. After the ads have been up a few days, though, the ads will switch to ads that are relevant to your blog.

How does Adsense work?

Every time a visitor clicks an Adsense ad, you get a little bit of money(usually around 30-60 cents). The amount you get for each ad clicked depends on the number of unique visitors you receive on your blog. The more visitors, the more money that can be earned.

Google will then send a check or pay you through Paypal once you’ve made at least $100 from the ads.

It is important to remember that Google will penalize you if you click your own ads, or if you ask visitors specifically to click ads. So don’t do that!

Pay Per Click

Pay Per Click is basically just like AdSense, except you don’t just work with Google—you work with multiple companies. BidVertiser is one such company you can sign up with to do Pay Per Click advertising.

How do I get Pay Per Click

You sign up with a site like Bidvertiser and then follow their instructions to set up the Pay Per Click ads on your site.

How does Pay Per Click work?

It works by paying you money each time someone clicks an ad that you display. You won’t get paid for multiple clicks from the same user in the same visitor, nor will you get paid for someone simply visiting your site. You only get paid for legitimate clicks.

Affiliate Links

Affiliate links are basically links which people pay you for. Companies will actually pay owners of popular blogs to post links on their blog. You can do as much Affiliate linking as you want.

How do I get Affiliate Links?

You can get Affiliate links by searching for “Affiliate Link Programs” on the internet. Once you find an Affiliate link program that looks good to you, sign up for it. Then you can follow their instructions for putting the link(s) on your blog.

How do Affiliate Links work?

Like the other two methods mentioned above, Affiliate links work by paying you money each time they are clicked. You get paid for each click per unique visitor.

So that’s it. There’s three legitimate ways to make money from blogging. It is important to keep in mind that the amount of money you are able to make depends on how many visitors your blog draws. If you draw a lot, you’ll make a lot. If not, the money you earn will be modest. But it’s still extra money, so why not do it?

Making money using Adsense, Pay Per Click or Affiliate Link programs is easy and effective. Start monetizing your blog today!


About The Author

Len Hutton is a information publisher specialising in helping people start their own home based business. Get a no cost video showing you step by step how to set up a niche ebook empire at www.nicheresidualincomes.com If you are considering using Google Pay-Per-Click Ads to promote your blog check out this web site http://rowner.freegoogle.hop.clickbank.net/

Wednesday, June 11, 2008

Is It Easy to Build An E-commerce Web Site?

by: Lester Boey

-Online Commerce--

E-Commerce website is all about selling products and services over the Internet. Amateurs may think that it is easy to build your own e-commerce system and our advice to you is to stay away from these amateurs. Building an e-commerce system is a complicated process and it requires web professionals who know the intricacies of building secure systems. Building an e-commerce system comes with the potential for a lot of errors and it is advisable to find security and database experts for the job.

Resource-consuming tasks such as order and supply tracking needs to be automated for e-commerce websites. Automated billing, invoice handling, accounting, and report generation tools make your e-commerce web sites easier to manage and handle sales. These are essential features to look out for in e-commerce websites.

--Building One Yourself--

Sure, you can try to build a basic E-commerce web site. But, an E-commerce web site without the tracking and automated is quite useless when you are trying to determine how your sales are derived and business expansion.

About The Author

Lester Boey works in an Australian SEO and Web Design company http://www.definiteweb.com/

His life revolves around SEO; providing full-time and freelance seo services to US and Australian businesses. Email: projects@definiteweb.com

definiteweb1@hotmail.com

Computer No Longer Fast?

by: Anthony Elias

Ahh...Remember that first day you brought your computer home, plugged everything in, it was a beautiful site, it was fast, web pages loaded quickly and programs launched within seconds or faster. But after a few months or weeks things began to slow down, and you think oh man what a piece of *@&* this thing only lasted a month. Let's take a look at what happened.

Disk Drive Clutter

What you may not have realized is that in all that time you were surfing the net and downloading programs installing, and uninstalling software, is that in all that time junk has been building up on your hard drive, temporary internet files, software that you tried but did not like, but never bothered to uninstall, emails from friends and family, that are sitting in your inbox and sent items. All that junk is slowing down your computer.

When you’re hard drive becomes cluttered it begins to slow down. Your computer performance is degraded substantially. The more files you have stored on your hard drive the more they get scattered and fragmented, which in turn slows down how fast programs respond to your clicks. Think about your hard drive as a huge filing cabinet, when all the files are neatly organized and labeled, it is easy to find what you are looking for, but take that same filing cabinet and dump it all over the ground, it well take longer to find that certain file or folder that you were looking for. A computers hard drive is the same way, as files become fragmented your computer takes more time to gather the correct files and execute your commands.

In addition the more files you have fragmented the less space on your hard drive your computer has, resulting in less virtual memory. That open area or unused space on the hard drive is used as virtual memory by your computer, if you have limited free disk space for data swapping your computer will become sluggish and slow to respond to commands, so keep your hard drive clean and remove or uninstall any programs or files that you don’t need and you will see a marked difference in the way your computer performs.

There are five major factors that contribute to a computers performance

1. The type of processor you have in your computer. Not all processors are created equal. Budget brand or bargain brand processors such as the Intel Celeron or the AMD Duron are lower end processors. If you want a high performance computer stay away from the lower end processors.

2. Along with processors type comes with the maximum available cache in a processor. The large cache a CPU has the less time it needs to access the computer memory.

3. Front side bus, once again the larger or faster a computer front size bus is the better a computer will perform. The front side bus is what carries all the data between the CPU and all the devices on board the computers motherboard.

4. Hard Drive, once again it comes down to speed, typically most home PC’s will have either a 5800rpm hard drive or a 7200rpm hard drive. The faster the hard drives spins the faster the CPU can access data on the hard drive.

5. And finally memory. The quality and performance of computer memory or RAM has increase significantly the past couple of years. DDR RAM set in channels of the computers mother board has substantially increased the speed and performance of today’s computers. With that said, the more memory you have the better your computer will perform. However there is a point where too much memory becomes just a waste of money. If you are a gamer you can probably never have too much memory, but if you use your computer for web surfing and email, 256-512MB is plenty good on a Windows XP machine.

About The Author

Anthony Elias has been in the information technology field for over 10 years. If you need more information on computer software, hardware or networking please visit us at http://www.amecomputers.com.

Microsoft Word: Using The AUTOTEXT Function

by: Shaun Davis


AUTOTEXT is a very useful function in Microsoft Word which is often underused. Use autotext when you want to save a block of text which you use frequently within a document. A good example could be a disclaimer paragraph at the end of a document.

Instead of writing it out repeatedly, you can simply save it as autotext, then whenever you need to insert your disclaimer text into a document simply type the name of autotext entry in this case perhaps ‘disclaimer’ although you can call it anything you like its up to you.

Once you type the first few letters of the name, Word will recognize it as an autotext entry, a prompt will appear, to insert the autotext block simply press ‘Enter’ and hey presto your autotext will appear within your document!

It’s extremely easy to set up an autotext entry, you can have as many entries as you like and they can be deleted or edited at any time. Once set up they can be used in any Word document.

Setup AUTOTEXT in 3 easy steps

1) Select the particular text in your document that you want to save as autotext, this can be a few words or several paragraphs.

2) When the selected text is highlighted either click Insert- Autotext – New on the toolbar or simply press Alt +F3 type a name for autotext in the ‘create autotext’ box that appears. Type a name for the autotext, its best to make it something memorable, that you will easily associate with the saved text, as in the above example; however you can always change the name or edit the entry later.

3) Once you have typed a name click OK and that’s it the autotext entry has been set up.

Once the autotext entry has been set up, every time you enter the first few letters of the entry name, a prompt will appear, to accept simply press enter or to decline hit the space bar and continue typing.

If you later decide to edit an autotext entry, simply insert the autotext entry into your document, then edit the text as necessary, reselect the text and press ALT+F3 the ‘create autotext entry’ box will reappear type the original autotext entry name, again in our above example ‘disclaimer’ then click OK, because our original autotext entry exists, under ‘disclaimer’ Word prompts you to redefine this autotext entry. Press enter to redefine. The autotext entry has now been updated.

Shaun Davis

About The Author

Shaun Davis

I am a frrelance writer from England UK. Main interestes include internet business, web design and health issues. Can offer advice on PC building and problems. Your welcome to email with problems you may be having.

shaun778@hotmail.com

Can Data Breaches Be Expected From Bankrupt Mortgage Lenders?

by: Tim Maliyil

The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgage related issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgage related issues do concern information security.

It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mind boggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.

Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired.

Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally.

Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters?

Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access.

What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files.

Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests.

Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right.

The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns.

Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.

The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgagerelated issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgagerelated issues do concern information security.

It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mindboggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.

Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired.

Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally.

Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters?

Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access.

What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files.

Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests.

Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right.

The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns.

Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.


About The Author

Timothy Maliyil is CEO and founder of Data Guard Systems, Inc., a leading developer and marketer of endpoint managed security services and online business management software, based in New York City. Data Guard Systems is an Application Service Provider (ASP) and offers intuitive business management software to various industries. Data Guard's flagship product is the AlertBoot data security managed service. AlertBoot offers full disk encryption and a comprehensive suite of disk security solutions as a centralized, managed service. Deployment times and support are significantly reduced, thus resulting in a lower overall total cost of ownership for an organization. Prior to founding Data Guard Systems, Mr. Maliyil served as the Director of IT at HarborTech, a privately-held supply chain house for the semiconductor industry. He also held various positions at Netegrity (now Computer Associates). Mr. Maliyil holds a B.S. in Computer Science from Tufts University.

For more information on full disk encryption go to http://www.alertboot.com/