Participants: Cordell Thomas
Series Code: TITTB
Program Code: TITTB000037
00:01 On Take It To The Bank,
00:02 you'll find ways to get out of debt... 00:09 solve your credit card problems, 00:14 how to make and stick with the budget, 00:19 simple ways to save... 00:24 buying or selling a home 00:26 and many more financial matters on Take It To The Bank. 00:31 Hi. My name is Cordell Thomas. 00:32 And welcome to Take It To The Bank. 00:34 And we are gonna talk about something, 00:35 I think it's very important. 00:37 And I think that you should be aware of. 00:39 Did you know that you're a target 00:42 that your information is at risk? 00:44 Did you know every time you go online 00:46 there are things that happen 00:48 that, take your data, take your information 00:51 and it's used as a tool 00:54 that is retailed off to many different organizations 00:56 that want to buy information about you, 00:58 your purchase patterns or what you do, 01:00 where you go on the net, 01:01 what or where you like to purchase your things? 01:04 Did you know 01:06 that information you provide in a warranty card 01:08 is not necessary 01:09 because most items that you purchase 01:11 already come with the warranty included. 01:14 People are gonna ask you, 01:16 retailers and our corporations are gonna ask you 01:19 for your personal information 01:21 so that they can gain access to your information about you. 01:25 And many people don't think of it that way 01:27 and as we talk today about consumer privacy, 01:30 I hope this provides some type of interest to you 01:33 because did you know 01:35 that your bank records are supposed to be private? 01:39 But under federal law 01:40 your bank can sell your account information 01:43 including your bank balances unless you opt out. 01:47 So when we're talking about consumer privacy today, 01:50 it's all about the opt out. 01:52 And I hope that's what you take away from this. 01:54 We're gonna have a top ten things 01:56 you can opt out from 01:58 that can help prevent people from accessing your data. 02:02 But things have changed 02:03 quite, quite a bit over the past few years. 02:06 I can remember the time 02:07 that I used to drive a car and we didn't have cell phones. 02:09 Can you remember that day, 02:11 we could drive and we'd use the call boxes 02:14 or those, those payphones along the way 02:18 if you needed to contact anyone? 02:19 And I remember the first cell phone 02:21 that we used to test out at the automotive organization 02:24 that I worked at. 02:25 And they were the size of big purses 02:28 you know, big bags on the side you'd hang over your shoulder 02:31 and you'd be like the size of big telephone. 02:35 It's quite interesting because that was a thing. 02:37 That was everything but the cell phone at that time 02:42 couldn't do anything but call. 02:44 And it was really expensive. 02:46 And it was at the time 02:47 that they were setting up the cell towers 02:49 all over the United States. 02:50 But it was a next big thing in telecommunication 02:53 so that you could go anywhere that you wanted to. 02:57 Well, what has happened since that point in time 02:59 and I don't date myself but that was back in, 03:02 I believe it was 1989, 1990. 03:06 And the overall process 03:08 that they used since that point in time 03:11 was to give you more and more bells and whistles 03:14 that you could acquire as you moved up the chain 03:18 of buying the next generation cell phone. 03:21 Now cell phones have changed 03:23 because now they consider them, we call them smartphones. 03:27 What's the smartphone? 03:29 Well, smartphone has a lot 03:30 of applications available to them 03:32 that weren't necessarily available with the cell phone. 03:36 You know it was quite interesting 03:38 as you run into people on a day to day basis 03:39 you see those 03:40 that are still comfortable with their cell phones 03:42 because they believe inherently 03:44 that the cell phone is really only to make calls. 03:48 And when you think of it from that standpoint, 03:49 then you think differently 03:51 about a-- what a smartphone actually is. 03:54 Because a smartphone 03:55 is probably just like a computer 03:59 that's really what it is. 04:01 A computer in miniature 04:02 and so all of these different forms of technology 04:06 has taken the world by storm 04:08 and you and I have really bought in into it 04:11 because not only do many of us have the smartphone, 04:14 we also have the I-- the tablet 04:17 and then we go to the tablet mini 04:19 and we-- look at different forms and sizes 04:22 of that same type of technology 04:24 and we use it in so many dramatic ways. 04:27 But what has changed, 04:28 what is the thing that has changed 04:30 all of the scenarios that we've talked about? 04:33 Because when you look at technology, 04:36 we think technology is there to benefit us. 04:39 I'm gonna give you an insight. 04:41 Companies look to give you something 04:44 that you believe will benefit you 04:47 but in the big scheme of things, 04:51 the companies are looking for the benefit for themselves. 04:55 So the benefit is not only revenue based, what's revenue? 04:59 Well, it's income based. 05:00 You pay for one of those smartphones, 05:02 it adds revenue to their bottom line 05:05 or income to their bottom line. 05:08 And then you take-- talk about the smartphones 05:10 because you not buy the smartphone, 05:13 but you also have to pay a monthly fee 05:15 to use that smartphone. 05:17 And the costs have comedown dramatically. 05:20 And so makeup difference 05:22 in their income on a yearly basis, 05:25 they've added on different features 05:27 that you're going to pay for. 05:29 So texting and so sending personal information, 05:33 sending tweets and all of those type of things 05:36 are different forms of communicating 05:39 that we have gotten involved in. 05:41 But there is also a negative side 05:44 to this type of technology. 05:46 So you probably, 05:50 as an individual and as a consumer, 05:52 you have several different pieces of information. 05:55 You have information 05:58 that gives access to an email address, 06:01 so you have an email address. 06:02 You also have a social network account. 06:05 It could be a variety of them, a professional social network 06:08 or just a connecting social network 06:11 to your friends and your family. 06:14 The big thing that I want to make you aware of though is 06:16 in reference to all of these connections, 06:18 there are things that you're allowing 06:21 these organizations to do 06:22 with your information and with your data. 06:25 So it's not just about 06:27 going in and buying some piece of technology 06:29 and you walk to the check outline, 06:31 you buy, you get home 06:32 you take it out and you want to use it 06:34 but outfalls this warranty card and they ask you to fill it out 06:38 because if you don't, 06:40 we won't have information enough 06:42 to track your equipment and give you the warranty 06:45 in case that item breaks. 06:49 Now look, I'm not here to tell you what to do 06:52 but I just want to give you some insight 06:54 as to what's going on 06:56 in reference to your specific privacy 06:59 because there is nothing private anymore, 07:01 this facial recognition thing 07:04 is all about recognizing how you look, 07:07 who you are, so that in any type of context 07:11 you can be located and you are found. 07:14 Your location services, you can take a picture 07:17 and you can, it can be known 07:20 where that picture was taken on a global basis 07:23 and it's noted in your cell phone. 07:25 When you go to your computer 07:29 and try to sink your smartphone up to the computer 07:33 that data that you have stored in your smartphone 07:39 is now uploaded and saved in a different location. 07:42 They have those details about you. 07:45 For example, 07:46 a statistic that was just made, I was made aware of is 07:50 ten percent of all digital pictures 07:55 that were ever taken, 07:58 were taken last year. 08:00 Now that gives you pause. 08:02 It should because we've had cameras 08:05 around for close to 200 years. 08:08 But consider the fact 08:09 that ten percent of all of those pictures ever taken, 08:12 were taken last year alone. 08:14 And then you begin the process of asking that question is 08:16 how do they know that? 08:18 They have to be keeping tract someway. 08:20 But some of us don't think about it 08:21 because we have the service 08:23 and then we have the ability 08:24 to do what we want to do with that technology 08:27 not thinking that there are other elements 08:31 that support the need for the technology. 08:33 So it tracks how you look, 08:35 where you go on your computer, 08:39 it tracks where you go online, what you like, 08:43 your purchase habits, 08:45 and then of course, you have the capacity to be, 08:50 to be advertised to directly based on your needs 08:52 and what you specifically like to purchase. 08:55 So I was kind of surprise when I go to specific website 08:58 and do certain things and I'm searching kind of 09:01 different areas that I'd like to research 09:04 on behalf of even this specific show. 09:07 And when I go to that website 09:09 now all of a sudden I get books on finance. 09:13 I get information 09:15 on how you can handle your money better. 09:17 I get information on some of the top things 09:21 that you can do to better yourself 09:24 from a financial standpoint. 09:25 So this comes into me 09:27 because they think I am interested 09:29 in those elements called finance. 09:31 And so now I know 09:33 that my information is not private. 09:35 And I think that you all should be well aware of it 09:37 and concerned about the privacy issues 09:40 that are related to technology as a whole. 09:49 So then we look at 09:50 many different aspects of this technology 09:53 as-- and I mentioned 09:54 the issue of your cell phone or your email. 09:59 In your email alone, 10:00 now you have to worry about phishing, 10:03 what is phishing? 10:04 Well, if you go fishing, physically go fishing, 10:07 it's a matter of throwing out a line 10:08 and hoping to lure someone to it. 10:11 That's as same as what fishing is. 10:12 It spelled a little differently, 10:14 P-H-I-S-H-I-N-G. 10:17 And then you begin to understand 10:19 that they're trying to lure you to click on something. 10:22 And now we live in whole different world 10:25 because you can click on something 10:26 and automatically download something to your computer, 10:29 and in that computer, 10:31 you can have some kind of virus evolved. 10:34 So if you think about a virus, 10:36 I would give you the equation that says, a virus is a virus. 10:41 I consider virus something I don't want 10:43 because it can make you sick, 10:45 the same as the virus in the computer. 10:48 It makes it sick, it ties it up, 10:50 it also plans certain things there 10:52 that will expose specific personal information of yours. 10:56 It's surprising what people will put 10:59 on their social network pages. 11:01 It reveals a lot of information about it 11:04 and that you don't realize 11:06 that many people are watching those sites 11:08 because they can find your front door 11:10 if they want to. 11:12 They can use certain apps and technology 11:14 to come right into where you live 11:17 and many people are willing to put in personal information 11:22 on their sites that tell about their birthday. 11:26 What are certain criminals looking for? 11:28 Your birthday, so they can put together profile about you. 11:31 And then of course 11:33 on, at the onset of some of these social networks, 11:35 you have people updating you on an hourly basis. 11:38 Tweets that go out every hour or every 15 minutes 11:41 about I'm drinking my orange juice. 11:43 I'm eating my breakfast, I'm going to work. 11:46 And then the one thing they gets me 11:48 is that them, people, 11:50 some people are going to tell other individuals, 11:54 I'm going on vacation, I'm going to be gone 11:57 for the next two and half weeks. 11:59 What does that do to your privacy? 12:01 And when someone knows where you're located 12:04 and the fact that you have your address 12:06 on these social sites, 12:08 people can find you, can find your home 12:10 and can go and take care of 12:12 whatever criminal business they would like to 12:14 because you're not there 12:16 and you've told everyone that you wouldn't be there. 12:19 So there are things that you should be aware of 12:21 and you should think of very seriously 12:23 as you take a look at these things called, 12:26 things called technology and your privacy. 12:31 Now what's also a part of, of emails, phishing 12:35 because they try to lure you to click on the link, 12:38 you also have spam email 12:40 that was a big, big thing and I'm glad that certain, 12:42 certain rules have come into play 12:44 that engage these organizations 12:46 and many of them that have spam 12:48 hundreds of thousands people have been found at fault 12:51 and they've been penalized for what they've done. 12:54 In email, there are other issues to contend with. 12:58 For example, 13:00 when you look at spyware 13:01 that can be put onto your system, 13:04 and people can find information out about you 13:07 because it has been put in your computer system 13:10 and its only objective, 13:12 it's programmed to get information 13:16 from you and on you. 13:20 What does it do though? 13:21 What does this information do? 13:22 It provides any type of criminal 13:25 the opportunity to create a profile about you. 13:28 It creates an opportunity to access your information. 13:32 It creates an opportunity 13:34 for someone to access your funds. 13:36 You work hard for it, 13:37 you put it away and if you are as, I hope you are 13:41 an individual that saves, meticulously plans his day, 13:45 that plans his budget, 13:46 plans what they do with their time, 13:48 I would tell you 13:50 and hope that you would be the type of individual, 13:52 then think very carefully 13:54 about who has access to your information. 13:58 So there are about ten items I would like to share with you, 14:02 that would provide you 14:04 a added sense of hopefully a little security 14:07 in reference to holding onto your private data 14:10 instead of having everyone made aware of what you do. 14:16 Number one would be opting out 14:20 of prescreened offers of credit. 14:22 You can go to opt out prescreened.com 14:25 and you will have the opportunity 14:26 to take your name and or address 14:29 and you can make a request to stop receiving 14:31 any of these annoying credit and or insurance offers. 14:35 That's a very key for two reasons 14:36 because when you receive these in your mailbox, 14:39 a lot of crime happens 14:40 when people will go by mailboxes 14:42 and take these offers out. 14:44 If you're pre-qualified for a credit card, 14:47 then somebody else now has their pre-qualification 14:50 and creates the opportunity for fraud. 14:52 I've seen it happened, 14:53 I've gotten calls at times about what do I do, 14:55 what are my next steps, 14:57 how do I handle someone trying to steal my identity 15:01 and how do I get it back and fix the problem. 15:04 If you have to fix a problem that's already occurred, 15:07 it creates that much more havoc 15:09 and, and, and problems in your life. 15:13 So take a step to-- and if in fact, 15:15 your mailbox is not secure, 15:17 it's open where someone can just walk and open it 15:21 and take whatever is out, 15:22 you might think differently 15:23 about how you have your mailbox system setup. 15:26 We have locks on ours right now on our cul-de-sac 15:29 and it's beneficial from standpoint. 15:32 So I know that when the mail person 15:35 puts it in the mailbox, 15:37 it will pretty much be secure until I take it out. 15:40 Second one would be, 15:42 stop your phone records from being sold. 15:44 Did you know that your phone records are sold? 15:48 Call your landline company or your wireless phone company 15:51 and request to opt out of CPNI, 15:56 CPNI is your call records information. 15:59 Most telephone companies sell this data. 16:04 And you have to opt out 16:07 because you're automatically in the program 16:10 and they use it to sell and to gain revenue from it. 16:15 A lot of other things that are there, 16:17 the number three would be, 16:18 keep your banking account records private. 16:21 Under federal law, 16:22 your bank can sell your bank account information, 16:25 did you know that? 16:27 People don't realize that 16:28 but they are given the right to sell that data 16:31 as a matter of gaining access to data 16:34 about your specific demographic. 16:36 They know specific items. 16:38 Now they can sell information including bank balances, 16:42 of course, they are regulations to that 16:44 because they can't associate with the name 16:46 and a social security number and that type of thing. 16:49 But your information now goes out 16:50 and it's accumulated in a database 16:52 where they now can program to gain access to information 16:55 and they say, the average bank balance of an individual 17:00 that makes 35 to $40,000 a year 17:03 between ages of 40 to 60 years of age is this number. 17:08 And it's a fantastic bit of information 17:10 because they can find in tune, 17:12 their products and services as a bank to you 17:15 but now other people now have access to it 17:18 and they can say okay, 17:20 a 45 year old individual who makes this amount of money 17:23 typically will have this amount of money 17:24 saved in a bank account. 17:26 And if he has this amount of out money, 17:27 he is a pretty much good target to go after 17:30 so that-- and you begin to understand now 17:33 the full weight and capacity 17:35 and power of any type of organization 17:38 that has access to your banking information. 17:43 Now so number three on list 17:45 will be keeping your bank records private. 17:49 Get free credit monitoring. 17:51 That's offered free. 17:52 Free credit monitoring, you can actually, 17:56 there are three different agencies 17:57 that offer credit monitoring. 17:59 You can get it once every year for free. 18:02 So what I would recommend is 18:05 every four months go and request 18:07 your free credit report from that one agency 18:11 and then maybe after four, another four months 18:13 get it from second agency 18:14 and after four months get it from the third agency. 18:17 You get that for free 18:19 and you can do it by calling a specific 877 number 18:22 or going to your, 18:25 URL the annualcreditreport.com. 18:30 URL is pretty much just a website name 18:33 that you can go to, 18:34 to access that free credit report 18:36 that you will need. 18:38 Number five on the list 18:40 is considered a Do Not Call Registry. 18:45 This is something I think we should all be excited about 18:49 because we all know 18:51 the privacy issues involved with that. 18:53 I know at home when you can, 18:55 you're sitting down for dinner with your family 18:58 and someone calls at a specific time 19:01 to ask you to donate to give to be a part of whatever. 19:05 One of the things that are really annoying is, 19:07 we need to begin to speak out and vocalize our concerns 19:12 about even our elected officials. 19:14 When these election cycles come up, 19:16 we are inundated with all of these calls 19:18 by our senators and our congressmen 19:22 to influence you to vote a certain way. 19:24 And they shouldn't be able to do that type of thing. 19:28 But they do, as do many other organizations. 19:30 So by calling the Do Not Call Registry, 19:34 and enrolling your telephone number, 19:36 then, both your landline as well as wireless, 19:40 of federal trade commission, anti-telemarketing list 19:44 will add you to the list 19:46 so that you will not receive those calls. 19:49 That's critical and I really like that opportunity 19:53 because I don't like those calls. 19:55 I just hang up. 19:56 As soon as I pick up and I hear, 19:58 it's one of those robocalls calls 19:59 or the like, yeah, anyway. 20:01 We'll go on from there. 20:02 Number six 20:04 is, safeguard your social security number. 20:06 Safeguarding your social security is critical. 20:11 When we talk about items to carry with you, 20:15 and or items not to carry with you, 20:18 I would put the social security card 20:20 as an item not to carry with you. 20:23 I would memorize a number if you have to 20:25 but keep that card in a lockbox. 20:28 So no one can get access to it. 20:31 Put it in a private file 20:32 because if someone gains access to that number, 20:36 you have a major problem. 20:37 It's critical for many of the private databases 20:40 that are out there about medical records 20:43 and many other things 20:44 and that's how banks to use to identify you 20:46 in case you don't remember your account number. 20:49 So when you sit there 20:50 and think about the ramifications 20:52 of someone utilizing that social security number, 20:55 I say, put it in a safe place, 20:57 memorize the number and leave it there 20:59 unless you actually need it 21:01 for some form of actual employment 21:05 as well as or tax issue. 21:07 But lock that social security card away 21:13 and keep it in the safe place. 21:16 Did you know 21:18 that student enrollment profiling is out there? 21:20 Your children's schools can sell personal information. 21:25 And they can sell it to marketers 21:29 and as well as recruiters. 21:32 Why would recruiter want it? 21:33 Well, they're looking for good students to go after 21:37 and recruit for their specific purposes of their school. 21:41 They're also individuals that would like to just get it 21:45 to have information about performance 21:47 and other information of students 21:49 as a group or even individual performance 21:52 based on an age demographic. 21:54 Federal law allows you 21:56 to opt out of this type of information and sell. 22:00 It's critical that we consider these type of things 22:04 because without understanding 22:07 that you have to take an action, 22:09 it creates more of a problem for you than anything else. 22:14 I'm gonna take a moment and actually talk about 22:16 some of the social networks that are out there. 22:19 And you're seeing a lot of information 22:21 going back in the internet 22:23 about some of these privacy issues that you see. 22:26 And in many of them, 22:27 you need to take physical action 22:29 and go online and go to those social networks 22:32 and actually make sure you have your privacy settings 22:35 set to the right setting. 22:38 I only have friends 22:39 and or friends of friends in certain situations 22:42 but for the majority of things I just share with friends. 22:46 And that's really it. 22:48 I try to keep it as, as such 22:50 so that I don't have to deal with 22:53 not knowing where my information is. 22:55 And if consider the friends that I have trustworthy, 22:57 I know that they're not taking images 22:59 that I have and family pictures 23:01 and sending them in all over the place. 23:03 So these are things you can do to try to control 23:06 and try to do because I always tell people 23:08 when your information is out there on the internet, 23:10 when it's there, it's gone. 23:12 There is no way for you to retrieve it 23:14 and bring it back in. 23:16 Information on the super highway 23:18 is something that I really ask you to be careful about 23:22 because once you put it out there, it is gone. 23:25 So think twice, think three times 23:28 about what you're saying. 23:29 When I go on a social network and try to give an update, 23:32 I think three or four times, I try to make it positive, 23:36 I try to make it informative and I try to keep it short 23:39 and I don't' spend much time out there 23:42 and I don't say that much. 23:43 I like to watch and see and hear information 23:46 but I don't like to have my information out there 23:48 for anyone to, to look at 23:50 as well as to respond to in many different situations. 23:56 Now we'll go to, number eight 23:58 is where I think we left off, loyalty programs. 24:02 Have you ever heard of loyalty programs? 24:04 These are big, big issues 24:07 when you're looking at information being sent out 24:10 and you are lost. 24:12 When they sign you up for a loyalty program, 24:14 what do they typically ask for? 24:16 They ask for your personal information. 24:18 And when you give your personal information, 24:21 they can now track what you purchase. 24:23 They track what you purchase and guess what, 24:25 they can also send you coupons based on your purchase habits. 24:29 So they're watching it and they're tracking it. 24:31 But for the major issue 24:33 that's involved here is its information. 24:37 It's critical that you understand 24:41 that information is power, information is money. 24:45 And these guys know it, 24:47 they want to make it attractive for you 24:49 to buy into it but you shouldn't do that. 24:52 I would personally never allow, you know what, 24:55 I do have a loyalty program for an automotive retailer 25:00 and they give some pretty good breaks. 25:03 They give some information but I have not had a problem 25:06 of being inundated 25:07 by their advertising organization. 25:10 But then again, I don't know, 25:12 how they're using that information on me. 25:14 I don't know how, who they're selling it too. 25:16 Because they make money from that standpoint 25:19 so I might reassess that one. 25:20 But for the most part, 25:22 any of these programs that offer supermarket 25:25 or other type of loyalty programs, 25:28 it makes it easy for that company 25:30 to sell your information. 25:32 Be loyal to stores without the loyalty cards. 25:36 You don't need to have a loyalty card to go and do, 25:38 and of the things that my wife and I typically do 25:42 is we search some of the newspaper 25:45 for the best deals during the week. 25:47 So we have a-- we know, 25:48 when a certain a grocer 25:50 will have these type of things on sale 25:53 and we know 25:54 where they'll have these other type of things on sale. 25:56 So we will spend sometime 25:58 or we drive to two or three different locations 26:00 to make our purchases but guess what, 26:01 we save a lot of money, 26:03 we haven't been signed up for any loyalty program, 26:05 we know our information from that standpoint 26:08 is relatively safe and we get a good deal 26:11 and keep our expenditures 26:14 in grocery areas under that number. 26:17 Number nine, is secure your accounts. 26:21 Secure those accounts. 26:22 So if you have a password, 26:25 if you have not passworded your smartphone, 26:28 or if haven't put a password on many of your bank accounts, 26:32 they pretty much require that now, 26:34 but I would ask that you secure all of your accounts, 26:38 banking, telephone, utilities, 26:41 it's essential that you do that. 26:44 And number ten on the list 26:46 is, think about privacy all the time. 26:52 It's important that you don't give out 26:54 your private information to anyone 26:56 that gives you a call. 26:58 Don't give out your information online. 27:00 If you don't know 27:02 who you're sending information to, don't. 27:04 Keep your information as private as you possibly can 27:07 and don't share information. 27:09 When you receive an email that doesn't seem appropriate, 27:13 and that's asking for personal information, 27:15 delete the email. 27:16 When you get a warranty card 27:18 or information or asking to sign into, 27:21 some type of, of, of program, don't do it 27:24 because you have to understand, they're taking your information 27:28 and they're using it in creative ways 27:31 to sell to others. 27:33 This thing called consumer privacy is a big item. 27:36 With the proliferation 27:38 of so many different pieces of technology, 27:40 with tablets and smartphones, with online social networks, 27:44 it's not just about the services 27:46 they're providing you, 27:47 it's about the information they're taking from you. 27:51 Look, be smart and you'll Take It To The Bank, 27:55 God bless you. |
Revised 2016-02-11