Yale NetID password must be changed at least once per calendar year to a different password. Each year's password must be unique -- don't recycle previous year's passwords. Read the strong password guide.
Identity Theft and Phishing
Many people associate cyber crimes with online scams such as phishing emails. However, most identities are stolen using low-tech methods. There are many ways thieves obtain your personal information:
- Phishing/spam: They send an email or pop-up message that looks like it came from a real bank or credit card company asking for identifying information. (This is called phishing.)
- Social engineering/pretexting: They pose as a legitimate business or government officials to obtain your personal information from financial institutions, telephone companies, and other sources.
- Shoulder surfing: They watch you from a nearby location as you type in your password or credit card number, or listen in on your telephone conversation.
- Hacking: They gain unauthorized access into computer networks where information is stored.
- Old-fashioned stealing: They steal wallets and purses; mail, computers not protected with passwords, mailed bank and credit card statements, pre-approved credit offers, and new checks or tax information sent through the U.S. Mail.
- Dumpster diving or trash rips: They rummage through communal or business trash to obtain copies of your checks, credit card or bank statements, or other records that typically bear your name, address, or telephone number.
What do thieves do with your personal information?
Thieves can use illegally obtained personal identity information in various ways:
- Steal your paycheck
- Send emails to colleagues that appear to come from you (continuing cycle of compromise)
Prevention is the best defense. Try following the suggested precautions below:
- Don't give out personal information on the phone, through websites, or in email unless you are sure you know whom you are dealing with. Yale ITS will NEVER ask you to send information about your account such as passwords or other sensitive personal information via email.
- Never click on links sent in unsolicited emails.
- Use strong passwords, and change your important passwords annually. Don't use your Yale password for non-Yale activities (social media sites and other email accounts like Gmail)
Securing physical documents
- Don't carry your Social Security card or write your Social Security number on a check. Provide your Social Security number only if absolutely necessary; you can always ask to use another identifier like a Connecticut driver's license number.
- Minimize the ID information and number of credit cards you carry.
- Keep your personal information in a secure place at home.
- Do not authorize others to use your credit cards.
- Protect areas where your mail can be stolen. Secure mail receptacles and promptly remove your mail. Deposit outgoing mail in post office mail boxes.
- Never leave receipts at bank machines, bank windows, trash receptacles, or gasoline pumps.
- Sign all new credit cards with "Photo Identification Required."
- Shred documents like pre-approved credit applications, receipts, bills, and other financial information.
Phishing is a cyber crime where well designed and legitimate looking emails and pop up messages lure victims into revealing their username, password, credit card number, Social Security number, or other sensitive information. The Phishing messages used look authentic to the kind of communication you would expect to get from institutions you trust. Messages used in Phishing scams often are identical from those used by the banks, schools, and merchants you deal with.
What to do about phishing or other suspicious email messages:
Never reply to any message of email that asks for your NETID, password, account information, or anything else that would be considered sensitive information.
If you believe a message is a phish, please forward the message, along with the full headers to the email: email@example.com – if you aren't sure, the most efficient way to get help is to call the help desk when you are at the computer.
Never click on a link in a message. Never call phone numbers that are provided in messages that ask for personnel information.
Delete suspicious messages.
- Don't open or click on attachments.
- If you think your Yale University NetID password may be compromised, you can change your NetID password and recovery questions at any time. Contact Yale's HelpDesk 203-432-9000 if you have questions about a possible identity compromise or theft involving your personal or business information.
- If a Non-Yale username and password has been compromised, change your password immediately, and contact the company (i.e. Facebook) to review for signs of fraudulent activity and ask them about adding a multifactor signin option on financial, or other critical accounts.
The agency you call will automatically share the alert with the other national credit reporting agencies. This alert typically lasts 90 days, after which time you can review your credit report to determine if any other fraud has occurred.
You can also request a security freeze to block anyone from accessing your credit history. You must use a PIN to unblock the freeze prior to any application for credit.
When you send a complaint to the Federal Trade Commission (FTC) they will enter the Internet, telemarketing, identity theft and other fraud-related complaints into Consumer Sentinel, a secure, online database available to hundreds of civil and criminal law enforcement agencies worldwide. The FTC maintains a site you can use as a starting point for identity theft information.
Useful links & resources on identity theft issues:
- Federal Trade Commission (FTC)
- ID Theft Affidavit (PDF)
- Department of Justice
- National Criminal Justice Reference Service
- National Fraud Information Center/Internet Fraud Watciah
- Better Business Bureau Online
- Call For Action
- FDIC: When a Criminal's Cover Is Your Identity
- Yale University: Protecting Your Identity
Nonprofit organizations committed to promoting prevention and recovery from identify theft
Social Security Administration
- Identity Theft And Your Social Security Number
- Public Fraud Reporting Home Page
- Enhancing Social Security Number Privacy
- Fact Sheet, Social Security Identity Theft, Committee on Ways & Means (PDF)
OptOutPrescreen service to avoid financial offers through junk mail
- If you would like to reduce the number of pre-screened credit and insurance offers you are receiving, visit www.optoutprescreen.com or call 1-888-5OptOut (1-888-567-8688) to opt-out of these offers.
"Secure pages" are special web pages through which data can be sent in a coded or encrypted format. Secure pages are often used for transmitting passwords, credit card numbers, or other personal or financial information. Whenever a web page asks you to supply your password, credit card information, or other personal information, always check to be sure that the page is secure.
There are two quick ways to tell if a web page is secure:
1. Look for the "https" in the URL address line at the top of the browser window.
2. Verify that the site you are going to is legitimate. So carefully review the website address (URL). If it doesn't like legit, don't open it.
Social networking sites like Facebook and Twitter that are rich with personal information are becoming targets for identity thieves and other cyber-criminal scams. These accounts are often compromised through the result of phishing schemes.
If you use social networking sites, carefully review your "Profile" information with security in mind, particularly for information that might be useful for someone seeking to impersonate you. Home addresses, phone numbers, birth dates, pictures of yourself that might be used to fake an ID card, and other seemingly innocuous information could be very useful to an identity thief.
Steps you can take to preserve your privacy in social networking:
- Review your profile information, blog posts, Facebook "wall" comments, and even your family photos to see where you might have provided useful identity information to a potential thief.
- Don't believe everything you read on Facebook or other social sites: Scammers who have broken the security of one of your friends accounts will quickly contact all other "friends" with phishing or other scam emails that seem to come from someone you know and trust. Be especially suspicious of requests for money or personal information, or links to web sites within the body of an email message.
- Review your privacy settings to be sure that only people you choose to share information with have access to your detailed profile and pictures. But don't rely on privacy settings to protect highly sensitive information — they can't guarantee that if you post embarrassing pictures of yourself that the photos won't be distributed or viewed outside your carefully selected group of friends.
- Never put anything truly sensitive on a social media site: Social Security numbers, your exact home address, phone numbers, credit card or banking information of any kind, or detailed information on close family members could all help a thief compromise your identity.
Instant messaging (IM) allows users to send each other text, voice messages and files. Examples of IM are, Skype, AOL Messenger (AIM), MSN Messenger, ICQ, and Yahoo!Messenger. Most IM clients do not provide strong authentication, making it hard to know if you're really talking to someone you know. Also, IM clients are vulnerable to electronic eavesdropping. Many IM clients now also have file sharing capabilities, which can be used to send malicious files.
Reducing IM security threats:
- Use Yale's instant messaging service
- Make sure you have a strong password, and don't allow the program to automatically sign-in to your IM program upon computer startup.
- Don't allow auto-accept file transfers. This is the fastest way for viruses or malware to transfer among IM communities.
- Free Internet IM programs generally do NOT encrypt your session or data, and at no time should you consider their IM conversations to be completely secure. Never discuss confidential information.
- Do not accept incoming messages from sign-in names that are not on your contact list. If someone wants to begin to communicate with you via IM, they should email you or phone you to exchange IM sign-in names.
- Most IM companies will contact you when a new upgrade or security patch is available. Install the upgrade or patch ASAP since often the company is addressing a security flaw.