About 4 years ago, I went to France for a week. When I returned there was a
phonecall from my credit card's Security Dept asking me if I had been to
India. I said "No!"
The bank then sent me a list of expenditures that I was supposed to have
made in India. If I remember correctly there were a number of repeat
purchases from some outlets.
I hadn't had my card stolen. They weren't large amounts.
It was quite clear that someone had stolen my card details and presumably
sent them (or taken them) to India.
Fortunately the bank was vigilant regarding my unusual expenditure patterns.
I have heard people complain when they have had problems using their card
when they go abroad because the bank's system notices an unusual spending
pattern. For this reason, you don't want to go away with a single card.
Obviously this makes sense anyway in case one card is stolen or lost.
Nick Landau
----- Original Message -----
From: "Aston Information Security" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Wednesday, June 28, 2006 10:28 AM
Subject: [data-protection] HSBC data secureity breach
>I thought the group maybe interested in this link
>
> http://www.silicon.com/financialservices/0,3800010322,39159940,00.htm
>
>
>
> JASON PARKER-SMITH
> Tel:-07813 818176
> BSB7799/ISO27001 Consultant
>
> www.astoninfosec.co.uk
>
> This e-mail is confidential and intended solely for the use of the
> individual to whom it is addressed. Any views or opinions presented
> (including attachments) are solely those of the author and do not
> necessarily represent those of Aston Information Security Ltd.
>
> If you are not the intended recipient, be advised that you have received
> this e-mail in error and that any use, dissemination,
> forwarding, printing, or copying of this e-mail is strictly prohibited.
>
> If you have received this e-mail in error, please contact the sender.
>
> Whilst every effort has been taken to ensure protection against virus
> infection, we cannot accept any responsibility for viruses. Consequently,
> please ensure that all attachments are virus checked prior to opening.
>
> ----- Original Message -----
> From: "GRAHAM Susan" <[log in to unmask]>
> To: <[log in to unmask]>
> Sent: Wednesday, June 28, 2006 9:25 AM
> Subject: [data-protection] Pseudonyms and FOI requests
>
>
> The Scottish Information Commissioner has taken the opposite position.
> At http://www.itspublicknowledge.info/yourrights/yourrights5.htm, he
> says
>
> "You must give your real name, as the public authority does not have to
> answer your request if you have used a false name or pseudonym. The
> Commissioner will not be able to carry out an investigation if he finds
> out that you have used a false name.
>
> If you have particular reasons for not wanting to reveal your identity
> to the public authority, you should ask a friend or family member to
> make the request for information."
>
> Susan Graham
> University Records Manager
> Policy & Planning
> University of Edinburgh
> Old College
> South Bridge
> Edinburgh
> EH8 9YL
>
> Tel: 0131 6514 100
>
> ---------------------------------------------------------
> Date: Tue, 27 Jun 2006 10:17:33 +0100
> From: John Hughes <[log in to unmask]>
> Subject: FW: [data-protection] Anonymity when making FOI requests of
> your own organisation
>
> ICO guidance on this is suitably precise and enlightening: "Although a
> public authority may not designate a request as vexatious simply because
> the
> applicant uses an obvious pseudonym, it may be prompted by the use of
> the
> pseudonym to consider whether the request is vexatious. It should not,
> however, base any decisions as to disclosure upon the name supplied by
> the
> applicant ...."
>
> John Hughes
> Mayday Healthcare NHS Trust
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list
> owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list
> owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|