Shopping Online For Contacts: Security And Privacy
- Date: 2010-07-26 - Word Count: 521
Share This!
The Fairness to Contact Lens Consumer Act, signed into law in 2004, empowered lens wearers with the right to obtain a copy of their contact lens prescription from their eye doctor. After years of anticipation, contact lens wearers were finally free to purchase their contact lens replacements wherever they felt was appropriate for them. Although mail order companies had sold contact lenses for years, online contact lens replacement providers were growing in popularity and using popular search engines to market their services to consumers.
Today, more and more consumers find that online shopping saves them money and is convenient, but how do you determine which sites are safe to deal with? Everyone is looking for great prices, but the overriding concern is to find vendors who have secure websites that protect your privacy.
How does one go about finding a secure shopping site? There are two indicators you can check to determine if a website is properly safeguarded. The first is by looking at the URL, or web page address, at the top of your web browser. As you may have noticed during your Internet surfing experience, most begin with "http". However, a secure site will have an address that begins "https". Be sure the latter prefix exists when you arrive at a web page on which you will be actually entering sensitive information. The added 's' is a signal to users that information (e.g. names and passwords) will be encrypted as it is transmitted. The second check for a safe site is to search for the padlock icon, usually located at the bottom of the screen. If the padlock is closed, the site is secure. Make sure this icon is in the browser window and not in the web page area. A click (or double-click) on a legitimate padlock icon will display a website's security information.
Reputable shopping sites also have privacy policies posted that can be easily found and understood. This is where you will learn if the contact lens vendor shares your information with affiliated companies or other third parties. If they do, there is an almost certain likelihood you will receive unsolicited e-mail ('spam')-unless the vendor expressly restricts these parties from marketing in this manner. Also look to see if the site belongs to a 'seal of approval' program administered by the Better Business Bureau or others whose job it is to set guidelines for privacy practices.
Keep in mind that policies can change, especially if the website happens to be sold to or purchased by other companies. Review the policies at websites you do business with at regular intervals so any sudden 'switches' will not surprise you. This will allow you to take timely action to stop your information from being misused.
Since there are never any guarantees, care and research is necessary in selecting a legitimate online contact lens seller. However, this should not deter you from taking advantage of the convenience offered by online shopping. Remember, a responsible shopper will always be in a better position to take advantage of new opportunities. Take the time to locate responsible vendors that will safeguard their customers' security and privacy.
Today, more and more consumers find that online shopping saves them money and is convenient, but how do you determine which sites are safe to deal with? Everyone is looking for great prices, but the overriding concern is to find vendors who have secure websites that protect your privacy.
How does one go about finding a secure shopping site? There are two indicators you can check to determine if a website is properly safeguarded. The first is by looking at the URL, or web page address, at the top of your web browser. As you may have noticed during your Internet surfing experience, most begin with "http". However, a secure site will have an address that begins "https". Be sure the latter prefix exists when you arrive at a web page on which you will be actually entering sensitive information. The added 's' is a signal to users that information (e.g. names and passwords) will be encrypted as it is transmitted. The second check for a safe site is to search for the padlock icon, usually located at the bottom of the screen. If the padlock is closed, the site is secure. Make sure this icon is in the browser window and not in the web page area. A click (or double-click) on a legitimate padlock icon will display a website's security information.
Reputable shopping sites also have privacy policies posted that can be easily found and understood. This is where you will learn if the contact lens vendor shares your information with affiliated companies or other third parties. If they do, there is an almost certain likelihood you will receive unsolicited e-mail ('spam')-unless the vendor expressly restricts these parties from marketing in this manner. Also look to see if the site belongs to a 'seal of approval' program administered by the Better Business Bureau or others whose job it is to set guidelines for privacy practices.
Keep in mind that policies can change, especially if the website happens to be sold to or purchased by other companies. Review the policies at websites you do business with at regular intervals so any sudden 'switches' will not surprise you. This will allow you to take timely action to stop your information from being misused.
Since there are never any guarantees, care and research is necessary in selecting a legitimate online contact lens seller. However, this should not deter you from taking advantage of the convenience offered by online shopping. Remember, a responsible shopper will always be in a better position to take advantage of new opportunities. Take the time to locate responsible vendors that will safeguard their customers' security and privacy.
Related Tags: contact lens, contacts, online shopping, vision, contact lenses, internet shopping, online safety, online privacy, buy contact lenses online, online security, contact lens vendors
Your Article Search Directory : Find in Articles
Recent articles in this category:
- What Is Spyware?
If you use a computer then there are certain things that you have to be educated about. Spyware is o - There's No Such Thing As The Perfect Password
Even though you can get advice on how to create the perfect password, it's important to realize that - Step-by-step Procedure Of Ssl Certificate Installation
SSL certificates are used to transfer the private data entered on the user computer to the website o - Software Protection Versus Code Obfuscation - Stable Software Protection
Security of intellectual property is crucial for every business in today's modern reality. Competiti - Portable Mini Digital Video Recorder
Portable Mini Digital Video Recorder is one of the world's smallest high-resolution mini Digital Vid - Protecting Domain Name From Cyber Squatting And Hijacking
Before I go into details about protecting domain name you should first know that there is no busines - Finding Email Senders Using Reverse Email Lookup
Most of our email inboxes are flooded with so many solicited and unsolicited messages that it's ofte - Confidentiality With Secure Email
Confidentiality, in any business, is among the most significant key in order to keep a client. There - Covering Your Computer's Footprints
When you delete a file, email, or piece of internet history on your computer, where do you think it - Email Theft: 5 Things You Should Look For
You've probably seen an email from a Nigerian prince saying how he needs help and how he needs you t
Most viewed articles in this category:
- How Does Ssl Fit Into the Over Scheme of Internet Security?
Internet has become an integral part of our life. Most of us prefer to do maximum amount of transact - Tips of Security
Protecting private information Information is the lifeblood of most, if not all, modern organis - Your Security Awareness Iq
Article about security awareness: Are you aware of the need for security? Your awareness o - Information Security Endangered
Sour time is coming. Spy programs are stealing information more easily. The reason is weak algorithm - Internet Attack Methods
The U.S. Government's National Information Assurance Glossary defines Information Security as: Prote - Computer Viruses
In information security , computer virus is a manmade program or piece of code that is loaded onto y - The Top 7 Threats to your Computer in 2007
Now that the holidays are behind us, the cost-conscious among us will be looking for those "post-hol - In Reality, Spyware is Always a Threat
I received a spam email the other day and the subject said "Tired of reality shows? Make your ow - Security Using Public Internet Array Access
Internet comes to peoples lives and then suddenly comes truth, that WE CAN'T LIVE WITHOUT INTERNET. - Anti-virus Software Comparison Test
Virus.gr tested quite a few different software companies to see how they would stack up against each