Category Archives: Privacy Central

Who is Your Teen Discovering on Tinder?

 

Last week we shared our thoughts about the potential pitfalls of Tinder, the app that has taken taking the online dating world by storm over the past couple of years. One aspect we didn’t discuss was Tinder’s fast growing population of underage users.

Who is your teen swiping right with?

Who is your teen swiping right with?  Photo credit: Shinichi Higashi

Tinder’s founder, Justin Mateen, disclosed this stat himself earlier this year: over 7% of Tinder’s users are aged 13-17.

As we mentioned in our previous post, one of the game-changing features of Tinder and similar online dating apps is the mandatory use of GPS location services that come built-in with smartphones to connect users in a similar geographic area. With Tinder, that service can put matches within a mile of one another.

While many parenting blogs have since blown the whistle on the inappropriateness of underage kids using Tinder, some calling it “the worst app ever for teens,” Tinder’s founder has since provided some clarity on his original statement suggesting the safeguards that both Tinder and Facebook, which the app uses to authenticate its users, prevents adults and underage users from interacting, as well as unwanted contact between users.

As many sources have noted however, it is extremely easy to create either a fake or secondary Facebook account. In fact, many Tinder users create secondary Facebook accounts entirely for the purpose of trawling Tinder, or to maintain their own privacy and safety.

While the prospect of your 13 year-old using Tinder may terrify you, keep in mind many, if not most Tinder users treat the app as a game rather than a serious dating or hook up site. Tinder itself calls the app a “social discovery” tool. While many of the parenting blogs that raised the red flag on underage Tinder use suggested blocking the app from their teen’s phone, which in many cases may be justified, it won’t prevent them from using the next app that could compromise their safety.

Instead, consider employing these tactics to keep your kids aware of risks:

1. Teach your kids about the importance of their privacy and the internet. They should know which of their phone’s apps use location services like GPS and how to effectively manage privacy settings on social media platforms. If you don’t know these things, then it’s time for you to get educated, too.

2. Learn about the new people in your kids’ lives. It’s not an immediate red flag for your teenager to have a friend over the age of 18, but if you get a funny feeling, consider running a background check and talking it over with your teen.

3. Keep the lines of communication open. The worst thing that can happen is alienating your child and losing the ability to easily keep tabs on their activities, online and off.

Don’t Let Your Naked “Selfies” Reach These 3 People

 

There is nothing like a naked celebrity to concentrate  attention on an issue like data theft. This week a major scandal erupted over the hacking of major celebrities iCloud accounts. As a company focused on building trust online, stories like this obviously catch our attention.

You can take some basic steps to minimize the risk of sensitive photos appearing online. Photo credit: jdeeringdavis under Creative Commons license. https://www.flickr.com/photos/hayesandjenn/

You can take some basic steps to minimize the risk of sensitive photos appearing online. Photo credit: jdeeringdavis under Creative Commons license. https://www.flickr.com/photos/hayesandjenn

If something like this can happen to celebrities who constantly monitor and guard their public images, it likely can happen to you, too. The alleged hacker in this case notably thanked the “many people” who helped contribute to stealing the images. While the safety of storing such sensitive material on the cloud can and will be debated, we thought looking at who you should not trust with such images is a great way to minimize your own risk.

Here are three types of people you should avoid sending naked photos of yourself if you want to ensure those images stay offline:

  1. Dates

Some people like to show off their uninhibited side early on in the dating process with suggestive photos to whet their mate’s appetites. This tends to always be a bad idea. Dating is an extremely ephemeral pursuit and the odds of you having a meaningful relationship with any one date are quite low. However that picture image can live on forever. Platforms like Snapchat have emboldened this type of behavior with the idea that the photos will quickly disappear, but as this article points out, there are many hacks available to retrieve images if someone is so inclined.

  1. Significant Others / Spouses

While many people would never send a sensitive image to a date, a significant other or spouse brings is generally agreed to be a different ballgame. While there is an implied amount of trust involved in such serious relationships, one shouldn’t forget that sadly, many of these relationships -including marriages- will fail at some point. Unfortunately, many will even turn into nasty divorce and custody proceedings. Don’t let that romantic picture turn into a headache, or worse yet, a source of blackmail, later on.

  1. Yourself

You may think your naked selfie is safe on your own device, but you would be wrong. Ignoring the fact that hackers can use increasingly sophisticated means to virtually break into your device or cloud storage account (as in the recent celebrity case), there are more basic reasons to be concerned. Consider that 3.1 million mobile devices are stolen in the US each year and data shows that an American loses a phone every 3.5 seconds.

The next time you have an urge to take or send a naked picture of yourself or mate, ask yourself if you’ve thought through all of the consequences and can feel certain that you won’t regret it later.

The Key to Repelling Unwanted Phone Calls

 

When so many of us rely upon our cell phones not just for calls, but for internet access, cameras, and entertainment, getting persistent calls from unknown numbers can feel more like an orchestrated invasion rather than just a mere nuisance.

We all hate receiving unwanted phone calls. Photo by Alon: http://www.flickr.com/people/photoloni/

We all hate receiving unwanted phone calls. Photo by Alon: http://www.flickr.com/people/photoloni/

This is especially true if you answer the call and find out that it’s someone you do not want to talk to: sales calls, someone trying to pull a phone scam, a crazy ex or a stalker, or even a bill collector.

By providing you with the name of the number’s owner, BeenVerified’s reverse phone lookup service can help you identify who is trying to reach you.  Once you know who is calling, you can decide if you want to talk to them.

Hate to get sales phone calls?  We do and we try to avoid them, but sometimes it seems like some companies just ignore the Do Not Call Registry.  What may be the most challenging part of a sales call is that many of us have been raised to be polite, rather than assertive, and many telemarketers are taught to take advantage of those good manners.  Knowing a phone call is a sales call can help you avoid sales calls in two ways: first, you can choose not to answer the call; second, you can contact the company and inform them that you are on the Do Not Call Registry and ask them not to call you.

Another type of phone call that can be more than a nuisance is the scam phone call.  There are a wide variety of scam phone calls, but they all basically involve trying to get financial information or money from you.

Five of the most frequent types of scam phone calls are: charities, legal, lotteries or sweepstakes, work from home, and false banking alerts.  Charity scams are calls where people represent themselves as legitimate charities seeking contributions, but the callers are either not linked to the charity they reference or the charity is a fraudulent one.  Legal scams threaten civil or criminal legal action unless you take certain steps.  Lottery scams say that you have won something, but ask for financial information to secure your winnings.  Work from home scams offer to provide training or job opportunities so that someone can work from home, but without any actual attached job.  Finally, false banking alerts suggest that one of your accounts has had fraudulent activity and asks for identifying financial information to remedy the problem.

Almost all of us have dealt with unwanted personal phone calls.  Many of us have probably experienced the ex who calls from different numbers in an effort to communicate.  Others of us have probably had strangers call from multiple numbers as well, in a persistent stalking pattern.  Using BeenVerified’s Reverse Phone Lookup  to identify who owns a number can not only help you decide whether to answer a call, but can also be an important way to help build up a record of stalking or harassment.

The final category of unwanted calls is debt collections.  There are some pretty basic rules outlining what type of behavior is legal for debt collectors, but many of us who have fallen behind in our obligations have experienced behavior from debt collectors that steps well outside of those legal boundaries.  Using BeenVerified’s Reverse Phone Lookup service may help you identify how to contact debt collectors to direct them to contact you in writing, rather than on the phone.

If you receive persistent calls from unknown numbers, get the information you need today.

Let us know if you have any questions in the comments section.

3 Must-Reads on the Epic Google Ruling

 

As a company focused on making it easier for the average person to conduct a background check, we’ve been following the EU ruling that individuals have the “right to be forgotten” when it comes to search engine results with some interest.  As Google begins complying with the new law,  it is worth considering the implications, even if a similar ruling has yet to make it to our shores.  shhh

With an individual’s right to request removal from a search engine, might this make the ability to search public records even more valuable? Should this apply equally to those with criminal records and those with merely unpleasant embarrassments from their past? We don’t have the answers, but think it merits more attention.

Here are some links to get you caught up on this fascinating case, and remember, BeenVerified respects your privacy. Individuals have always had the right to opt out of our search results by request.

What Europe’s Right to be Forgotten Means For Google (and You)

Pedophile, politician and unpopular doctor among those who want Google to forget them 

What Google Must Forget: The EU Ruling on the Right to be Forgotten 

What do you think about this ruling? How might it affect your ability to search or be searched?  Let us know in the comments.

What’s hiding in your background check?

 

A common use of BeenVerified.com’s background check service is the self-check. Sometimes concerned, but often just curious people will “BeenVerify” themselves to know what’s out there. Just as your doctor recommends self-examinations to monitor your physical health, so should you monitor and be aware of your online reputation. Simply put, you should know what’s in your public record.

SLC Minilypse-City Library

We’ll take a closer look at some of the following items that may show up in your own public record in future blog posts and what, if any, response might be appropriate. Here are some things you might find in your search:

1. Current and Historical Addresses  BeenVerified.com is a popular destination for those looking to update their address books. Make sure your current residence is accurately listed in case old friends want to get back in touch. If you’re a homeowner, you may want to ensure your home’s vital statistics are listed accurately to ensure the correct value.

2. Criminal Records  We’ve covered how to interpret and understand criminal records in detail in the past. If you have a criminal record, there are ways to present yourself in the best possible light as we will examine in a future post. And remember, employers are barred from using BeenVerified to screen for employment or tenancy by the Fair Credit and Reporting Act (FCRA).

3. Bankruptcies, tax liens and civil judgments All three of these events can appear in your public record. It’s important these events are updated to reflect current realities of your situation. For example, an unpaid tax lien can appear on your public record for ten years after the fact and affect credit decisions for years later. If there is an inaccuracy in your public record, then you should dispute it and get it corrected.

4. Social media accounts  You may not be overly concerned if your primary social media accounts like Facebook and Twitter show up as part of your public record, as they are usually intentionally left public. But what about that old MySpace or LiveJournal account? You may decide after running a self-check that it’s time to do a social media account clean up. We’ll go into detail on some of the best ways to do that in a future post.

5. Incomplete Information  Public records do not come from one data source but disparate sources across the country from different states and municipalities. If you can’t find something you’re looking for, it may because it’s not yet been digitised. In that case, you may be interested in learning more about BeenVerified’s court runner service.

Don’t stay curious–run a background check on yourself  now with BeenVerified.com and take action if needed.

If you’ve run a check on yourself and have questions let us know in the comments section below.

Opting-Out of BeenVerified

BeenVerified offers a fast and simple method to opt-out of our search databases. Please send an email to support@beenverified.com and supply the following information.  The only reason we request this information is to help our removal team locate the correct records you would like removed.  We do not sell or use it in any other way.

  • Your name as shown on our site
  • Your Age
  • Current address (City, State, Zip)
  • Previous addresses
  • Listed Relatives
Please note that we cannot guarantee like or similar records from reappearing in the future. Public records come from multiple sources and are constantly being updated and there is no one universal system for identifying individuals that can provide a total opt out. If a like or similar record appears in the future, please feel free to simply email us and we will remove that as well.