2011

Table Of Contents
Use the description on the right side of the scale to choose the protection level
that better fits your security needs.
You can customize the protection level by clicking Custom level. In the window
that will appear, select the protection controls you want to enable and click
OK.
15.2. Identity Control
Identity Control protects you against the theft of sensitive data when you are online.
Consider a simple example: you have created an Identity Control rule that protects
your credit card number. If a spyware software somehow manages to install on your
computer, it cannot send your credit card number via e-mail, instant messages or
web pages. Moreover, your children cannot use it to buy online or reveal it to people
they met on the Internet.
To learn more, please refer to these topics:
About Identity Control (p. 89).
Configuring Identity Control (p. 90).
Managing Rules (p. 92).
15.2.1. About Identity Control
Keeping confidential data safe is an important issue that bothers us all. Data theft
has kept pace with the development of Internet communications and it makes use
of new methods of fooling people into giving away private information.
Whether it is your e-mail or your credit card number, when they fall into the wrong
hands such information may cause you damage: you may find yourself drowning
in spam messages or you might be surprised to access an emptied account.
Identity Control protects you against the theft of sensitive data when you are online.
Based on the rules you create, Identity Control scans the web, e-mail and instant
messaging traffic leaving your computer for specific character strings (for example,
your credit card number). If there is a match, the respective web page, e-mail or
instant message is blocked.
You can create rules to protect any piece of information you might consider personal
or confidential, from your phone number or e-mail address to your bank account
information. Multiuser support is provided so that users logging on to different
Windows user accounts can configure and use their own identity protection rules.
If your Windows account is an administrator account, the rules you create can be
configured to also apply when other users of the computer are logged on to their
Windows user accounts.
Why use Identity Control?
Privacy Control
89