Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Question
Book Icon
Chapter 10, Problem 10.1UYK

a)

Program Plan Intro

Credit report:

Credit report is a summary of the credit history about lenders and creditors. It has been categorized into four sections they are:

  • Personal information of user
  • Credit account information like credit card, loans, and mortgages.
  • Public record information
  • Inquiries

Personal information of user:

This section used to store the user name, contact number, social security number, and employment details.

Credit account information like credit card, loans, and mortgages:

This section contains the information about loans, credit accounts and limits and payment history.

Public record information:

This section used to store the information about the tax, bankruptcies, or court judgment against the user account.

Inquiries:

This section has the business information for overall credit report.

a)

Expert Solution
Check Mark

Explanation of Solution

In my credit report, there is no error in both personal information and credit data. The following guidance used to check the credit report for last year.

Guidance to review the credit records:

The user should check the credit report at least once in a year to make sure “no errors” in report and get the information about credit history.

Evaluate the personal identifiable information and debt:

This process used to evaluate all payment history like monthly payments, interest payments, etc. If the personal information wrongly updated on the report, then the user can complain for that.

Check for inaccurate data:

An inaccurate data like mistaken name, mistyped address, or incorrect amount can confuse the user. So, checking for inaccurate data is essential to users.

b)

Program Plan Intro

Credit report:

Credit report is a summary of the credit history about lenders and creditors. It has been categorized into four sections they are:

  • Personal information of user
  • Credit account information like credit card, loans, and mortgages.
  • Public record information
  • Inquiries

Personal information of user:

This section used to store the user name, contact number, social security number, and employment details.

Credit account information like credit card, loans, and mortgages:

This section contains the information about loans, credit accounts and limits and payment history.

Public record information:

This section used to store the information about the tax, bankruptcies, or court judgment against the user account.

Inquiries:

This section has the business information for overall credit report.

b)

Expert Solution
Check Mark

Explanation of Solution

Actions that are taken by user if they find error in the credit report:

If the user got the error in the credit report, he should take the following actions. They are:

  • Inform to the credit bureaus and data furnisher about the error.
  • Markup and highlight the mistakes in the credit report
  • Request a fresh report from credit bureaus
  • Write a dispute letter per error

c)

Program Plan Intro

Credit report:

Credit report is a summary of the credit history about lenders and creditors. It has been categorized into four sections they are:

  • Personal information of user
  • Credit account information like credit card, loans, and mortgages.
  • Public record information
  • Inquiries

Personal information of user:

This section used to store the user name, contact number, social security number, and employment details.

Credit account information like credit card, loans, and mortgages:

This section contains the information about loans, credit accounts and limits and payment history.

Public record information:

This section used to store the information about the tax, bankruptcies, or court judgment against the user account.

Inquiries:

This section has the business information for overall credit report.

c)

Expert Solution
Check Mark

Explanation of Solution

Identity theft:

  • Identity theft is a crime when a hacker access enough information about other person’s identity for financial gain.
  • The information can be a signature, name, phone number, or credit card data. Using these personal information, a thief can apply for loan and run up without user knowledge.

Victims of identity theft:

If someone thinks he or she has been the victim of identity theft, he/she should follow some actions to recover his good name and data:

Give the alert on credit file:

After the identity theft, call the credit report agencies and place the fraud alert for the corresponded file.

Request for the credit report and create the identity-theft report:

Request the credit report from credit agencies to calculate theft report. Create the identity-theft report to complain the certain authority.

Contact the authority:

Inform the local law enforcement to take appropriate action for the theft.

Keep the records and originals:

Keep the good notes of all the dealings with creditors and law enforcement. Send the valuable documents as photocopies in certified mail.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
How do you keep tabs on requests for information?
Step-By-Step Assignment Instructions Assignment Topic: How data breaches occur and are discovered. Setup instructions: Go to https://www.privacyrights.org/data-breaches and review some of the information on data breaches. Then pick 3 different types of data breaches and report on one data breach each.  The types are located on the left hand side. How to submit: Submit a summary of each data breach and answer the following questions in your response: What was the data breach? How was the data breach found out? What were the threats? What were the vulnerabilities and how did the threats interact with them? Based on what you have learned in the course, what threats or vulnerabilities were present that caused the data breach? Submissions must be submitted in rich text format. Each summary should be at least 2 paragraphs in length but not more than 1 page.  In other words, since you are reviewing 3 data breaches, you will have 6 paragraphs to 3 pages total for the overall submission.
How to check plagiarism
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage