I am just trying to imagine what all a hacker can do if he/she manages to break into my Google account. I have a far greater presence on net than my classmate (blogger and several other Google services) and misuse can be dangerous.
While every precaution is being taken to avoid such a situation, this post is a preventive measure towards Business Continuity and aims to keep my readers informed how they can detect an identity theft.
Below are a set of Operational Policies this user (Shrinidhi Hande) will always be adhering to during his online activities. If you observe any deviation from these stated policies, it is extremely likely that something is wrong and you're advised to proceed with extreme caution.
I follow highest possible standards of personal and professional ethics and never ever indulge in any activity that can hamper my reputation/credibility and damage the general interests of self, my contacts and the society.
1. I will never ask you for money. I'm adequately protected against possible financial crisis/situations and do not anticipate any possibility that I may have to ask my readers/contacts for money. Should you ever receive a request under my identity to transfer money to certain account, never ever entertain such communications without multiple verifications (such as contacting me or my family members to check if the request is genuine). I may not be able to compensate you for any loss you might suffer if you fall pray to such tricks.
2. I will never publish/circulate/solicit obscene content. If you ever see such content on this blog or receive it by mail, please notify Google of the suspicious activity
3. Sensitive personal communication will never be sent using email. If you receive love letters/hate mails under my identity which are not supported by a real life statements/approvals, please ignore them.
4. Usually I do not invite my contacts to visit/register at websites. Please use your discretion while visiting such sites. I will have no regrets if you don't join/visit. Repeated arrival of such mails are likely to be a spam activity.
5. I will not force/tempt my contacts to join under me in any sort of referral programs /memberships, chains etc. Never join/do something because I am asking you to. Use your own judgments.
6. I will not ask for your personal information such as photos, residence address etc unless there's a genuine reason. Any first meeting shall be in public place and you wont have to reveal unnecessary details.
7. Any criticism against any individual or organization shall be backed by strong analytical reasoning/evidence. There shall be no baseless allegations/accusations.
8. Abrupt changes (add/edit/delete) in this blog layout & content, side bar content, blogger/orkut profile content which can not easily be justified, can be due to a possible intruder activity.
9. I will never reveal confidential/sensitive information and never indulge in plagiarism.
What can you do if you spot a violation of above guidelines and suspect a hacking?
As I'll be online every day chances are that I will detect it in time to initiate damage control. If someone has hacked into my gmail account mailing me or writing comments at this blog will not serve the purpose.
Under such scenarios you can use following options:
- Contact me through my mobile number if you have it
- If you work in same company as I do use the corporate email ID
- You can leave comments for me at any of the blogs in my blogroll. Chances are I will read it when I visit those blogs next time.
- Please do not jump into conclusion that I have gone insane. Your support will be very crucial in recovering from such situations
An eNidhi India Business Continuity Initiative
Read Similar: New Year Resolutions | First Time visitor's Guide to this blog |