Data security seeding system

ABSTRACT

In one aspect of the invention there is provided a system for tracking seed data that has been inserted into a secured private information database listing. The system includes a network, computer, and database. Incoming communications to the network are monitored and are matched to a phone number, credit card number, address, email, or fax number that corresponds to the seed data. Depending on the incoming communication software is configured to track and store third party identification information. The information is sent to a user to determine if the incoming phone call was conducted by breaching the secured private information database listing.

CROSS-REFERENCE TO RELATED INVENTIONS

The present application is a continuation in part of U.S. applicationSer. No. 13/326,491 filed Dec. 15, 2011, which is hereby incorporatedherein by reference.

BACKGROUND OF THE INVENTION

Many companies retain private information such as customer or consumerdata. This data of private information that can be used specifically forfuture marketing and/or communication with a company's customers,employees, vendors and/or business partners. However, if thatinformation is not properly controlled problems may arise. Theunauthorized use or release of the private information can bedetrimental to a company as companies and people become hesitant to dobusiness with a company that cannot properly control and maintain insecrecy and confidence its collected private information.

While maintaining private information internally within a company canoften be difficult, further issues arise when the private information isoutsourced to external third party companies. Outsourcing the privateinformation for telemarketing, direct mailing, and email marketing isextremely common in today's global economy. The release of privateinformation to a third party is typically done under extreme confidence,but unfortunately leaks may still occur. As such internal and externalfactors are working against a company and its ability to maintain itsprivate information.

In systems used today, false information is inserted into a company'sprivate information, otherwise known as seed data. The seed data is thentracked and when an email or direct mail is sent to the seed data, thecompany can determine the email or direct mail was part of its ownmarketing efforts or if the private information was leaked. This canhopefully provide the company with the knowledge that its privateinformation has been leaked. Acting quickly in these situations cansometimes help stop the release and use of its private information.Unfortunately, the prior system are far from perfect and become moredifficult to use in today's new generation of internet basedtelecommunication technology platforms.

SUMMARY OF THE INVENTION

One or more of the embodiments provided in the present invention relatesto tracking seed data. Seed data may be defined in a number of differentembodiments, but will in most instances include information relating toa name, phone number, email address, and credit card/debit card numbers.The seed data is inserted into a secured private information databaselisting. A system in accordance with one embodiment includes a network,a computer connected to the network, and a database connected to thecomputer. The database is configured to store a record of the seed dataand further configured to store a pre-recorded voice messagecorresponding to a phone number defined by the seed data. The computeris configured to monitor incoming communications to the network. Uponreceiving a notice of an incoming phone call placed to the phone numbercorresponding to the seed data, the computer is further configured toplayback to a recipient of the incoming phone call, the pre-recordedvoice message and further configured to store a caller identificationphone number and/or record a caller voice message from the incomingphone call. The computer is further configured to forward the calleridentification phone number and/or recorded caller voice message fromthe incoming phone call to a user for a determination of whether theincoming phone call was conducted by breaching the secured privateinformation database listing.

In various aspects of the embodiment, the incoming communications caninclude e-mails, notification of attempted credit card/debit cardtransactions, and telecommunication (wireless/wired) calls. And thenetwork can further include an IP-PBX network. In addition, the systemmay further include configuring the computer to store a copy of anincoming email made to an email address corresponding to the seed dataand further configured to forward the copy of the incoming email to theuser for a determination of whether the incoming email was conducted bybreaching the secured private information database listing.

In addition, the system may further include configuring the computer tostore a copy of an incoming attempted credit, card/debit cardtransaction made to an credit card/debit card number corresponding tothe seed data and further configured to forward the copy of the incomingcredit card/debit card transaction to the user for a determination ofwhether the incoming attempted credit card/debit card transactionnotification was conducted by breaching the secured private informationdatabase listing.

Similar to the system embodiment, a method of tracking seed data is alsocontemplated. The method may include the step of providing a computerconnected to a network, wherein the computer is connected to a databaseand the database is configured to store a record of the seed data and tostore a pre-recorded voice message corresponding to a phone numberdefined by the seed data. The method may also monitor incomingcommunications to the network, wherein upon receiving a notice of anincoming phone call placed to the phone number corresponding to the seeddata, the method plays back to a recipient of the incoming phone call,the pre-recorded voice message and stores a caller identification phonenumber and/or records a caller voice message from the incoming phonecall. The method could also forward the caller identification phonenumber and/or recorded caller voice message from the incoming phone callto a user for determining whether the incoming phone call was conductedby breaching the secured private information database listing.

Further methods may also be provided for creating seed data for asecured private information database listing. The method including thesteps of creating a seed data listing, wherein the seed data listingincludes at least the following information, a name, a telephone number,a credit card/debit card number, and an email address, recording andstoring a voice message linked to the telephone number, such that whenthe telephone number is called the voice message can be replayed, andsending the seed data listing to a user for insertion into a securedprivate information database listing.

Numerous other advantages and features of the invention will becomereadily apparent from the following detailed description of theinvention and the embodiments thereof, from the claims, and from theaccompanying drawings.

DESCRIPTION OF THE DRAWINGS

A fuller understanding of the foregoing may be had by reference to theaccompanying drawings, wherein:

FIG. 1 is an illustration of a company private information database;

FIG. 2 is a method of creating seed date for insertion into thedatabase;

FIG. 3 is a method of monitoring incoming communications and reportingthe same to the company for comparison to its marketing campaigns; and

FIG. 4 is a block diagram of a computer system in accordance with oneembodiment of the present invention.

DETAILED DESCRIPTION OF THE EMBODIMENTS

While the invention is susceptible to embodiments in many differentforms, there are shown in the drawings and will be described herein, indetail, the preferred embodiments of the present invention. It should beunderstood, however, that the present disclosure is to be considered anexemplification of the principles of the invention and is not intendedto limit the spirit or scope of the invention and/or the embodimentsillustrated.

In the present invention, the creation of seed data into a company'sprivate information will be described along with a method and systemused to monitor the seed data, track and store information when the seeddata is used, and report the stored information back to the company forproper handling. As mentioned above the company's private informationcan be a very valuable piece of property. New and novel methods tosafeguard this information is important to the fabric of the company.The private information can be any type of simple or complex database ofinformation that relates to real individuals. For example, FIG. 1illustrates an exemplarily listing. The private information database 100can include, but is not limited to, a customer id 105 assigned by thecompany; a person's name 110; the person's address 115; the person'sphone number 120, and the person's email 125. The database 100 caninclude N number of entries. To seed the private information, a thirdparty provider (referred to herein as “the Provider”) will create seeddata 150 that matches all or most of the database fields and will eitherprovide the seed data to the company for entry into its database; or theProvider if given a copy of the database will insert the seed datathemselves. The seed data may be a single entry or multiple entry in thedatabase 100.

Referring now to FIG. 2, in one embodiment of the present invention, theProvider will create seed data for insertion into a private informationdatabase 200. As noted above, the seed data will most likely include aperson's name 110; the person's address 115; the person's phone number120, the person's email 125, and credit card/debit card number 130.Therefore, to create the seed data, the Provider creates a name (firstand last and in some case a middle initial) 205, creates a telephonenumber 210, creates a voicemail extension to match to a telephone numberand sets up a voicemail message on the voicemail extension 215, assignsa physical address to the name 220, creates an email address that isassigned to the name 225 and creates a credit card/debit card numberthat is assigned to the name 235. This would be repeated as needed, 230.Once the seed data is created, the Provider can either send theinformation to the company for insertion into its own privateinformation database 240 or the Provider can insert the seed dataitself, if access to the private information database 245 is provided.

For the creation of telephone number, voicemail extensions and voicemailmessages, the Provider may use an IP-PBX or an Internet Protocol PrivateBrach eXchange system. These systems are well known in the industry andpermit a Provider to have a number of telephone lines that are connectedto the public switched telephone network by trunk lines. The IP-PBXsystem also allows the Provider to set up fax lines and link a voicemailto a telephone number. The IP-PBX further includes voicemail to emailrecording, called ID recording, call monitoring and screening and a hostof other features.

With the seed data inserted into the company's private informationdatabase, the Provider having set up the seed data and the correspondingtelephone number, email address, voice message mail box, and physicaladdress can begin monitoring the incoming communications directed to theseed data. As noted above, the company may use the database for a numberof marketing or communication reasons. These marketing or communicationsmay be direct mailing to a physical address, email communications, ortelemarketing. The reasons for the communications is not important orthe subject of the invention. However, all of these communications aretypically done for legitimate purposes. However, at any given point ortime, the private information database may become compromised, stoleneither in part or in whole, or used inappropriately. Providing thecompany with information regarding communications to the seed data isinvaluable. The information on the communications can be checked by thecompany against its marketing efforts to ensure the communication wasproper, timely, efficient and/or accurate. Since the company typicallyreleases the database (either in whole or in part) to a third partymarketing company does not have any information or knowledge that thedatabase includes seed data. Moreover, since the information is accurateand corresponds to actual extensions (phone, email, physical address),the marketing company or more importantly any third party user of thedatabase does not know which data relates to real data or seed data.Marking the ability to identify and remove seed data from real datanearly impossible. The Provider, in some cases, may be the only partythat truly knows the identify of the seed data.

Referring now to FIG. 3, the Provider monitoring incoming communicationsto the seed data 300. The monitoring of the incoming communicationsincludes incoming emails 305, incoming direct mailing 310, incomingphone calls 315, incoming attempted credit card/debit card transactions318, and other incoming communications 317 such as a text message, aninstant message, a SMS (short message service) message, an EMS (enhancedmessaging service), a MMS (multimedia messaging service) message, textmessages through emails, a photo, a video clip, a fax message, internetrelay chat, and other communications which may be forthcoming in thefuture. While monitoring emails and direct mailing has typically beendone in the past by other providers in general, the monitoring andhandling of the incoming phone calls 315 and credit card/debit cardnumbers 318 is unique and novel to the invention.

When an incoming phone call is received to a seed data, the third partywill hear a normal voice message 320. However, with the use of theIP-PBX system, the system records any messages left by the third partyalong with the caller id information, which may include name and/orphone number of the third party 325. This recorded information (messageleft by third party as a way file and called id information as data)will be emailed to the Provider monitoring the seed data. Similarly,incoming email, incoming attempted credit card/debit card transactions,or incoming direct mailing pieces will be forwarded to the Providermonitoring the seed data. The Provider's receipt of various incomingcommunications and recorded information relating to the seed data isnoted at box 340. In some cases a individual at Provider may bedesignated to receive the incoming communications and recordedinformation.

Since in most common cases, the Provider does not have knowledge oraccess to the company's marketing efforts, the Provider which receivesthe incoming communications and recorded information will forward thesame to the company 345. The company may then compare the incomingcommunications and/or recorded information against its own marketingefforts to determine if the communication was proper, timely, and/orefficient 350. If the incoming communications and/or recordedinformation was not authorized 355 by the company then the company hasvirtually immediate knowledge that its database has been comprised. Thiswill allow them to take immediate action, such as tracking the impropercommunication back to the source and informing them that the use of thedatabase was in breach of their confidential information. Conversely, ifthe incoming communications and/or recorded information was proper, thenthe company can have some sense that its private information database isstill secured 360.

In addition, other incoming communications 317 such as a text message,an instant message, a SMS (short message service) message, an EMS(enhanced messaging service), a MMS (multimedia messaging service)message, text messages through emails, a photo, a video clip, a faxmessage, internet relay chat, and other communications which may beforthcoming in the future, can be monitored and recorded 327 when sentto the seed data. The incoming communication would then forward the sameto the company 345.

Furthermore, when an attempted transaction is made on a credit card ordebit card number that was created and populated in the database 100,the attempted transaction is received 318 by the system. The attemptedtransaction is recorded 328 and then forwarded to the company 345.

Referring now to FIG. 4, a illustrated system computer 400 is providedin more detail. The system computer 400 comprises a number of standardcomputer components, including a bus 405 or other communicationmechanism for communicating information and a processor 410 coupled withthe bus 405 for processing information. The system computer 400 alsoincludes a main memory 412, such as a random access memory (RAM) orother dynamic storage device and a read-only memory (ROM) 414 or otherstatic storage device, both of which are coupled to the bus 405. Thesystem computer 400 may be coupled via the bus 405 to a display 420, aninput device 422, and a cursor control 424.

The term “computer-readable instructions” as used herein refers to anyinstructions or data that may be performed or used by the processor 410or other components. Similarly, the term “computer-readable medium”refers to any storage medium that can store computer-readableinstructions. Such a medium may take many forms, including, but notlimited to, non-volatile media, volatile media, and transmission media.Non-volatile media include, for example, optical or magnetic disks, suchas the storage device. Volatile media include dynamic memory, such asmain memory. Transmission media include coaxial cables, copper wire andfiber optics, including wires of the bus. Transmission media can alsotake the form of acoustic or light waves, such as those generated duringradio frequency (RF) and infrared (IR) data communications.

The system computer 400 also includes a communication interface 430coupled to the bus 405. The communication interface 430 provides atwo-way data communication coupling between the system computer 400 anda network 432, such as the IP-PBX system, a local area network (LAN),the Internet, wireless or cellular network, or Public Switched TelephoneNetwork (PSTN). For example, the communication interface 430 may be anintegrated services digital network (ISDN) card or a modem used toprovide a data communication connection to a corresponding type oftelephone line. As another example, the communication interface may be aLAN card used to provide a data communication connection to a compatibleLAN. A network link 434, which may be a wired or wireless link,typically provides data communication through the network 432 to otherdata devices. In any such implementation, the communication interface430 sends and receives electrical, electromagnetic, optical, or othersignals that carry digital data streams representing various types ofinformation.

A data tracking module 440 and a user interface module 442 are stored onthe system computer 400, for example, in the storage device 446. Thedata tracking module 440 comprises a number of computer-readableinstructions that, when executed by the system computer 400, allows auser to create and store records of data on the system database 450 inthe manner described above. The user interface module 442 allows a userto interact with the data tracking module 440 to create and store therecords (and subsequently retrieve the records). The records provide theuser with information regarding the seed data. When the system computerreceives a hit on a seed data, information is provided to a user, whichmay then determine, for example, what information may need to be furthershared with the company or the system computer may have instructions toautomatically forward the information to the company and a user.

In one aspect of the invention there is provided a system relating totracking seed data. Seed data may be defined in a number of differentembodiments, but will in most instances include information relating toa name, phone number, credit card/debit card number, and email address.The seed data is inserted into a secured private information databaselisting. A system in accordance with one embodiment includes a network,a computer connected to the network, and a database connected to thecomputer. The database is configured to store a record of the seed dataand further configured to store a pre-recorded voice messagecorresponding to a phone number defined by the seed data. The computeris configured to monitor incoming communications to the network. Uponreceiving a notice of an incoming phone call placed to the phone numbercorresponding to the seed data, the computer is further configured toplayback to a recipient of the incoming phone call, the pre-recordedvoice message and further configured to store a caller identificationphone number and/or record a caller voice message from the incomingphone call. The computer is further configured to forward the calleridentification phone number and/or recorded caller voice message fromthe incoming phone call to a user for a determination of whether theincoming phone call was conducted by breaching the secured privateinformation database listing.

In one embodiment of the present invention there is provided amonitoring security system for tracking seed data. The system includesthe seed data for insertion into a secured private information databaselisting. The seed data would in one instances include the followinginformation data strings: a fictitious name having both a first and lastname portion, an email address associated with the fictitious name thatis capable of receiving email communications, and a phone number createdto match to and assigned with the fictitious name that is capable ofreceiving telephone and/or fax communications. The system furtherincludes a network and a computer connected to the network andconfigured to monitor incoming communications to the network. A databaseis also provided and connected to the computer. The database isconfigured to store a record of the seed data and a pre-recorded voicemessage corresponding to the phone number defined by the seed data. Thecomputer, upon receiving a notice of an incoming phone call placed tothe phone number corresponding to the seed data, has software configuredto playback to an intended recipient of the incoming phone call, thepre-recorded voice message and is further configured to store a calleridentification phone number and/or record a caller voice message fromthe incoming phone call. In addition, the software is further configuredto forward the caller identification phone number and/or recorded callervoice message from the incoming phone call to a user for a determinationof whether the incoming phone call was conducted by breaching thesecured private information database listing. Lastly, the software, uponreceiving a notice of an incoming communication from a third party tothe seed data, is further configured to store third party identificationinformation associated with the incoming communication and/or a copy ofthe incoming communication and the software is further configured toforward the third party identification information and/or the copy ofthe incoming communication to the database and/or to a user fordetermining whether the incoming communication was conducted bybreaching the secured private information database listing.

In this or any of the further embodiments incoming communications caninclude, but is not limited to, one or more of the following: e-mailcommunications, telecommunication calls, text messages, instantmessages, short message service messages, and multimedia messagingservice messages, enhanced messaging service messages, multimediamessaging service messages, photos, video clips, fax messages, internetrelay chat messages, and attempted credit card and/or debit cardtransactions.

In addition, the system may include software further configured to storea copy of an incoming email made to the email address corresponding tothe seed data and be further configured to forward the copy of theincoming email to the database and to the user for a determination ofwhether the incoming email was conducted by breaching the securedprivate information database listing.

In another embodiment of the present invention there is provided amethod for a security monitoring system that tracks fictitious seed dataagainst theft of a secured private information database listing thatcontains the fictitious seed data. The method would include the varioussteps, such as creating seed data for insertion into a secured privateinformation database listing. The seed data would typically include thefollowing information data strings, a fictitious name having both afirst and last name portion, an email address associated with thefictitious name that is capable of receiving email communications and aphone number created to match to and assigned with the fictitious namethat is capable of receiving telephone and/or fax communications. Themethod further includes the step of providing a computer and a databaseconnected to a network and the step of storing a record of the seed dataon the database and storing a pre-recorded voice message correspondingto the phone number defined by the seed data on the database. The methodwould then monitor incoming communications to the network and uponreceiving a notice of an incoming phone call placed to the phone numbercorresponding to the seed data, the method would play back to arecipient of the incoming phone call the pre-recorded voice message andthen store a caller identification phone number and/or recording acaller voice message from the incoming phone call. The method nextforwards the caller identification phone number and/or recorded callervoice message from the incoming phone call to the database and/or to auser for determining whether the incoming phone call was conducted bybreaching the secured private information database listing. Finally, thecomputer, upon receiving a notice of an incoming communication from athird party to the seed data, has software configured to further storethird party identification information associated with the incomingcommunication and/or a copy of the incoming communication and thecomputer further has software configured to forward the third partyidentification information and/or the copy of the incoming communicationto the database and to a user for determining whether the incomingcommunication was conducted by breaching the secured private informationdatabase listing.

In other aspects of the method, additional steps may be providedincluding storing a copy of an incoming email made to an email addresscorresponding to the seed data and forwarding the copy of the incomingemail to the user for a determination of whether the incoming email wasconducted by breaching the secured private information database listing.

In yet another embodiment of the present invention there is provided amethod for a security monitoring system of tracking fictitious seed dataagainst theft of a secured private information database listingcontaining the fictitious seed data. The method includes creating seeddata for insertion into a secured private information database listing,wherein the seed data includes the following information data strings, afictitious name having both a first and last name portion, a real emailaddress associated with the fictitious name and a real phone numbercreated to match to and assigned with the fictitious name; providing acomputer connected to a network, wherein the computer is connected to adatabase and the database is configured to store a record of the seeddata and to store a pre-recorded voice message corresponding to thephone number defined by the seed data; monitoring incomingcommunications to the network; wherein upon receiving a notice of anincoming phone call placed to the phone number corresponding to the seeddata, playing back to a recipient of the incoming phone call thepre-recorded voice message and storing caller identificationinformation; wherein upon receiving a notice of another type of incomingcommunication from a third party and sent to the send data, such as atext message, an instant message, a short message service message, anenhanced messaging service message, a multimedia messaging servicemessage, a photo, a video clip, a fax message, an internet relay chatmessage, email or direct mailing communication, storing third partyidentification information; and forwarding the third partyidentification information to a user for determining whether theincoming communication was conducted by breaching the secured privateinformation database listing.

As outlined herein the computer being configured to handle various taskswould be defined by various software and/or hardware components eitherdistributed across numerous aspects of the bus or contained on a singleaspect. Therefore, the aspects of the computer being configured can bedefined as software running on the computer and being configured toconduct various tasks and responses. In but another aspect of thepresent invention there is provided a monitoring security system fortracking seed data. The system includes seed data for insertion into asecured private information database listing, wherein the seed dataincludes the following information data strings, a fictitious namehaving both a first and last name portion and a fictitious credit cardand/or debit card number. A computer is provided and is connected to anetwork and configured to monitor incoming communications. A database isconnected to the computer and is configured to store a record of theseed data. The computer, upon receiving a notice of an attemptedtransaction on the fictitious credit card and/or debit card numbercorresponding to the seed data, has software configured to store thirdparty identification information relating to the attempted transactionand the software is further configured to forward the third partyidentification information and/or a copy of the attempted transaction tothe database and/or to a user for determining whether the attemptedtransaction was conducted by breaching the secured private informationdatabase listing.

The system may also have seed data that further includes a phone numbercreated to match to and assigned with the fictitious name that iscapable of receiving telephone and/or fax communications. The databasewould be further configured to store a pre-recorded voice messagecorresponding to the phone number defined by the seed data and thecomputer, upon receiving a notice of an incoming phone call placed tothe phone number corresponding to the seed data, having softwareconfigured to playback to an intended recipient of the incoming phonecall, the pre-recorded voice message and further configured to store acaller identification phone number and/or record a caller voice messagefrom the incoming phone call. The system may also have software furtherconfigured to forward the caller identification phone number and/orrecorded caller voice message from the incoming phone call to a user fora determination of whether the incoming phone call was conducted bybreaching the secured private information database listing.

In yet further aspects of this embodiment the seed data may furtherinclude an email address associated with the fictitious name that iscapable of receiving email communications. The system in this instancewould have software configured to store a copy of an incoming email madeto the email address corresponding to the seed data and furtherconfigured to forward the copy of the incoming email to the database andto the user for a determination of whether the incoming email wasconducted by breaching the secured private information database listing.

From the foregoing and as mentioned above, it will be observed thatnumerous variations and modifications may be effected without departingfrom the spirit and scope of the novel concept of the invention. It isto be understood that no limitation with respect to the specific methodsand apparatus illustrated herein is intended or should be inferred.

We claim:
 1. A monitoring security system for tracking seeddata-comprising: seed data for insertion into a secured privateinformation database listing, wherein the seed data includes thefollowing information data strings, a fictitious name having both afirst and last name portion and a fictitious credit card and/or debitcard number; a network; a computer connected to the network andconfigured to monitor incoming communications to the network; a databaseconnected to the computer, the database configured to store a record ofthe seed data; the computer, upon receiving a notice of an attemptedtransaction on the fictitious credit card and/or debit card numbercorresponding to the seed data, having software configured to storethird party identification information relating to the attemptedtransaction and the software is further configured to forward the thirdparty identification information and/or a copy of the attemptedtransaction to the database and/or to a user for determining whether theattempted transaction was conducted by breaching the secured privateinformation database listing.
 2. The system of claim 1, wherein: theseed data further includes a phone number created to match to andassigned with the fictitious name that is capable of receiving telephoneand/or fax communications; the database is further configured to store apre-recorded voice message corresponding to the phone number defined bythe seed data; the computer, upon receiving a notice of an incomingphone call placed to the phone number corresponding to the seed data,having software configured to playback to an intended recipient of theincoming phone call, the pre-recorded voice message and furtherconfigured to store a caller identification phone number and/or record acaller voice message from the incoming phone call; the software beingfurther configured to forward the caller identification phone numberand/or recorded caller voice message from the incoming phone call to auser for a determination of whether the incoming phone call wasconducted by breaching the secured private information database listing.3. The system of claim 1, wherein the network includes an IP-PBXnetwork.
 4. The system of claim 2, wherein the seed data furtherincludes an email address associated with the fictitious name that iscapable of receiving email communications.
 5. The system of claim 4further comprising: the software being further configured to store acopy of an incoming email made to the email address corresponding to theseed data; and the software is further configured to forward the copy ofthe incoming email to the database and to the user for a determinationof whether the incoming email was conducted by breaching the securedprivate information database listing.
 6. The system of claim 4, whereinthe software, upon receiving a notice of an incoming communication froma third party to the seed data, is further configured to store thirdparty identification information associated with the incomingcommunication and/or a copy of the incoming communication and thesoftware is further configured to forward the third party identificationinformation and/or the copy of the incoming communication to thedatabase and/or to a user for determining whether the incomingcommunication was conducted by breaching the secured private informationdatabase listing.
 7. The system of claim 6, wherein the incomingcommunication includes, but is not limited to, one or more of thefollowing: e-mail communications, telecommunication calls, textmessages, instant messages, short message service messages, andmultimedia messaging service messages, enhanced messaging servicemessages, multimedia messaging service messages, photos, video clips,fax messages, and internet relay chat messages.
 8. A method for asecurity monitoring system of tracking fictitious seed data againsttheft of a secured private information database listing containing thefictitious seed data, the method comprising: creating seed data forinsertion into a secured private information database listing, whereinthe seed data includes the following information data strings, afictitious name having both a first and last name portion and afictitious credit card number and/or fictitious debit card numberassociated to the fictitious name; providing a computer connected to anetwork, wherein the computer is connected to a database and thedatabase is configured to store a record of the seed data; monitoringincoming communications to the network; wherein upon receiving a noticeof an attempted transaction on the fictitious credit card and/or debitcard number corresponding to the seed data, storing information on theattempted transaction; and forwarding information on the attemptedtransaction to a user for determining whether the incoming communicationwas conducted by breaching the secured private information databaselisting.
 9. The method of claim 8, wherein the seed data furtherincludes a real email address associated with the fictitious name andthe method further includes the step of storing a copy of an incomingemail made to an email address corresponding to the seed data andforwarding the copy of the incoming email to the user for adetermination of whether the incoming email was conducted by breachingthe secured private information database listing.
 10. The method ofclaim 9, wherein the seed data further includes a real phone numbercreated to match to and assigned with the fictitious name and the methodfurther includes the step of storing a pre-recorded voice messagecorresponding to the phone number defined by the seed data and whereinupon receiving a notice of an incoming phone call placed to the phonenumber corresponding to the seed data, playing back to a recipient ofthe incoming phone call the pre-recorded voice message and storingcaller identification information, and forwarding the calleridentification information to a user for determining whether theincoming communication was conducted by breaching the secured privateinformation database listing.
 11. The method of claim 10, wherein uponreceiving a notice of another incoming communication from a third partyand sent to the seed data, such as a text message, an instant message, ashort message service message, an enhanced messaging service message, amultimedia messaging service message, a photo, a video clip, a faxmessage, or an internet relay chat message, storing third partyidentification information; and forwarding the third partyidentification information to a user for determining whether theincoming communication was conducted by breaching the secured privateinformation database listing.
 12. The method of claim 11, wherein thecaller identification information includes a caller identificationinformation phone number and/or recorded caller voice message from theincoming phone call.
 13. A method for creating seed data for a securedprivate information database listing, the method comprising: creating aseed data listing, wherein the seed data listing includes at least thefollowing information, a fictitious name having both a first and lastname portion, an email address associated with the fictitious name thatis capable of receiving email communications, a phone number created tomatch to and be assigned with the fictitious name that is capable ofreceiving telephone and/or fax communications; recording and storing avoice message linked to the telephone number, such that when thetelephone number is called the voice message can be replayed; andsending the seed data listing to a user for insertion into a securedprivate information database listing.
 14. The method of claim 13 whereinthe seed data listing further includes a fictitious credit card numberand/or fictitious debit card number associated to the fictitious name.15. A method for a security monitoring system of tracking fictitiousseed data against theft of a secured private information databaselisting containing the fictitious seed data, the method comprising:creating seed data for insertion into a secured private informationdatabase listing, wherein the seed data includes the followinginformation data strings, a fictitious name having both a first and lastname portion, a real email address associated with the fictitious nameand a real phone number created to match to and assigned with thefictitious name; providing a computer connected to a network, whereinthe computer is connected to a database and the database is configuredto store a record of the seed data and to store a pre-recorded voicemessage corresponding to the phone number defined by the seed data;monitoring incoming communications to the network; wherein uponreceiving a notice of an incoming phone call placed to the phone numbercorresponding to the seed data, playing back to a recipient of theincoming phone call the pre-recorded voice message and storing calleridentification information; wherein upon receiving a notice of anothertype of incoming communication from a third party and sent to the senddata, such as: a text message, an instant message, a short messageservice message, an enhanced messaging service message, a multimediamessaging service message, a photo, a video clip, a fax message, aninternet relay chat message, email message, or direct mailingcommunication, storing third party identification information associatedwith the third party; and forwarding the third party identificationinformation to a user for determining whether the incoming communicationwas conducted by breaching the secured private information databaselisting.