E-Mail Privacy Tips

• Understand the concerns associated with e-mail -- First you should understand some of the privacy concerns that may be associated when communicating online via e-mail.

• Know the recipient -- Make sure that your e-mail recipient is a trustworthy person and will not forward your e-mail on to others without your consent.

• Use a password -- If you share your computer with others -- such as family members or roommates -- use an e-mail application that can be password protected.

• Use Web-based applications -- Using Web-based e-mail (like Hotmail or Yahoo) may be a good approach if you're concerned about people who have access to your computer reading your locally stored e-mail.

• Delete local copies of messages -- You can also delete the local copy of your sent e-mail message by opening the "sent" or "out" folder in your e-mail program and deleting the message. You will also need to then open the "deleted" or "trash" folder in your e-mail program and delete the message one more time to make sure that it is removed from your e-mail application.

Featured

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.