Maintaining Your Security And Anonymity In E-Commerce

By Sam Lewis
Safely completing online transactions is a responsibility of the individual user
Many consumers accept terms and conditions of online shopping, banking, and the installation of mobile apps without a second thought. It’s this type of behavior that can compromise the individual’s online anonymity and identity.
Yes, there are some risks to e-commerce, but there are risks to in-store shopping as well. Driving to a brick-and-mortar store puts a driver at risk for an accident. Swiping a credit card during checkout places a shopper at risk for credit-card skimming. No matter the venue, there will always be risk. As the e-commerce world continues to gain momentum and evolve — e-commerce sales topped $1 trillion in 2012 — shoppers should keep several key security suggestions in mind.
If you’re not required to share it, don’t.
Online sellers create checkout forms filled with irrelevant details intended to gather customer data, but don’t require all fields to be completed. Skip through any steps not required, normally indicated by an asterisk — doing this will help protect your online anonymity.
Before you share your smartphone, make sure you trust the user. Digital wallet and credit card apps often store user names and passwords, so letting a stranger borrow your phone may leave this information exposed, and consequently, your privacy may also be. If your smartphone or tablet has banking or credit card apps downloaded, it is best to treat that device as if it was your wallet or purse — if it is lost or stolen, contact your financial institutions and card providers to reduce collateral damage.
Assuming all shared or open Wi-Fi networks are not safe for sensitive data is a consumer’s best bet to maintain security and anonymity. Everything from banking information to e-mail accounts to mobile transactions can be compromised on an open network, so it is best to err on the side of caution.
Click here to read about security measures retailers are taking to protect their networks
Verify URLs for secure connections and site legitimacy
Most online navigators are familiar with the difference between “http” and “https” in the URLs of their favorite websites. Regular online shoppers even know to make sure the URL should be encrypted, reading “https” — which offers a secure connection. But how frequently are shoppers checking this detail? Every step of the online — as well as mobile — checkout process should be encrypted. If it is not, your private and sensitive information may be at risk of being violated. It is also important to review URLs for site legitimacy. Sites discovered through advertisements, hyperlinks, email, and social media can navigate shoppers toward fraudulent websites. Consumers need not understand coding or all parts of the URL, but site content should match the name of the site, or present similar content suggested in the name. If this is not the case, it might be best to make this transaction at another online retailer. Beyond checking URLs, one way to ensure you are not being scammed is to question every site for legitimacy. This sound a lot more difficult than it actually is. First, make sure the site you plan on purchasing from has a working “About us” or “Contact us” page, complete with options to connect with the entity. Second, make sure the group has a social media presence. A simple Internet search of the group’s title should bring up Twitter, Facebook, and LinkedIn accounts associated with legitimate organizations showing interactions between themselves and customers. Internet searches of fraudulent entities will show complaints, warnings, and other indications of scams.
Keep questioning and save your receipts
Every transaction made should be accompanied by a proof of purchase. Be sure to always receive an e-mail receipt, a confirmation number, and tracking information for any e-commerce purchases. Keep this information with the company’s contact information until the transaction is completed by your item being in your possession, and all aspects of the deal have been completed. If you’re not sure you got a confirmation e-mail or receipt, be sure to take a screenshot of the order’s confirmation page and any additional information the retailer might have given you. Screenshots can also provide you with a step-by-step documentation of the transaction, showing any steps missed or boxes left unchecked. In a nutshell, the more documents about the transaction, the better.
Bank accounts and payment methods should be separate
Although credit cards and debit cards can be used interchangeably within the confines of a brick-and-mortar retailer, in e-commerce transactions, paying with a credit card offers the most protection against violations of privacy and fraud. Credit card payments come from the credit card company as a loan instead of a monetary payment from your bank account. Processing errors, excess charges, and unusual activity or charges will be noticed on a statement, if not sooner, by standard fraud protections measures of credit card companies. Furthermore, debit card payments are deducted directly from your bank account. Correcting transactions that you didn’t complete, and retrieving the money involved in those transactions is almost always more difficult with banks as opposed to credit card companies. Additionally, hackers target debit card information — once they have the information needed for a particular account, there really isn’t much stopping them from completely draining it.
Read what the General Manager of PCI Security Standards Council says about payment security
Protect your online identity — it’s the only one you’ve got
The moment you create an e-mail address or a Facebook account, you’ve created an online identity. Privacy and security settings are great ways to protect your online identity, but the best way to protect yourself is by actively monitoring all of these online accounts associated with your name.
Buying online is increasingly becoming a social experience. Have you ever chosen a “Login with Facebook” option when completing an online transaction? Most people have, and by 2015, half of Internet sales are projected to occur through social media. The convenience of Facebook filling out your login information through third-party sites comes at the cost of linking your credit card to that account. It might not be a direct connection, but it will absolutely have influence upon your online identity. Your social media presence is a key element payment and identity frauds hone in upon. Some companies are developing ways to use your digital footprint as an advantage in combatting these criminals.
Additionally, just like you wouldn’t want your boss to see a social media post you’re not proud of, don’t post anything you wouldn’t want a hacker to see. Driver’s licenses, passports, home addresses, credit card photos… all of these, and any other sensitive information you aim to protect, are items not to display publicly. Realizing that all of your online activities are interconnected, you can begin making more informed choices that protect your private information and preserve your online identity and anonymity.