{"540151":{"#nid":"540151","#data":{"type":"external_news","title":"Why You Should Never Email a Social Security Number","body":[{"value":"\u003Cp\u003EHighlight from the \u003Cem\u003ETime\u003C\/em\u003E article:\u003C\/p\u003E\u003Cp\u003ETax season is officially in the rear view, which means most of us are breathing a sigh of relief. But some of us remain anxious. It\u2019s not about the chance of being audited (which is small, though terrifying), but rather about the fear that we\u2019ll have our identity stolen. If you\u2019re self-employed \u2014 whether an Uber driver, an Etsy artist, or something less 21st century (like a freelance journalist) \u2014 the companies that pay you are legally required to provide a 1099 to help you prepare your taxes. And with the explosion of the \u201csharing economy,\u201d more people are getting these documents instead of W-2s, the tax form reserved for employees. Companies physically mail out 1099s, but because mistakes happen, tax deadlines are immovable, and the Internet is so convenient, some finance departments email these forms out instead\u2026 When emails are sent, they typically move from the software on the sending computer to servers called mail transfer agents. They will likely go through several of these nodes until they reach their recipient. Between these relays, emails are encrypted, but when they hit a server, they are unencrypted, read, and then re-encrypted before being sent along to the next node.\u003C\/p\u003E\u003Cblockquote\u003E\u003Cp\u003EMilton Mueller, professor of public policy at the \u003Cstrong\u003EGeorgia Institute of Technology\u003C\/strong\u003E, warns this process could be \u201cimperfect\u201d in terms of security. \u201cThe content of the messages is revealed to, and can be altered by, intermediate email relays,\u201d he says.\u003C\/p\u003E\u003C\/blockquote\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/time.com\/4344632\/social-security-number-email-fraud-identity-theft-encryption\/\u0022\u003ERead Full Article\u003C\/a\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27167","created_gmt":"2016-05-25 12:12:59","changed_gmt":"2016-10-08 02:28:10","author":"Rebecca Keane","boilerplate_text":"","field_publication":"","publication":"Earsketch; hip-hop; code; computer science; music technology; CEISMC; Your Voice is Power; School of Music; School of Literature","field_article_url":"","publication_url":"http:\/\/time.com\/4344632\/social-security-number-email-fraud-identity-theft-encryption\/","dateline":{"date":"2016-05-23T00:00:00-04:00","iso_date":"2016-05-23T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"1281","name":"Ivan Allen College of Liberal Arts"}],"categories":[],"keywords":[{"id":"169169","name":"email privacy"},{"id":"169170","name":"Milton Mueller"},{"id":"169171","name":"social security number"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}