COMMON WAYS ID THEFT HAPPENS:
|
|
- Beryl Fields
- 8 years ago
- Views:
Transcription
1 CMM WAYS ID THEFT HAPPES: Skilled identity thieves use a variety of methods to steal your personal information, including: 1. Dumpster Diving. They rummage through trash looking for bills or other paper with your personal information on it. 2. Skimming. They steal credit/debit card numbers by using a special storage device when processing your card. 3. Phishing. They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information. 4. Changing Your Address. They divert your billing statements to another location by completing a change of address form. 5. ld-fashioned Stealing. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records from their employers, or bribe employees who have access. To learn more about ID theft and how to deter, detect, and defend against it, visit ftc.gov/idtheft. r request copies of ID theft resources by writing to: Consumer Response Center Federal Trade Commission 600 Pennsylvania Ave., W, H-130 Washington, DC May 2006 Fighting Back Against Identity Theft FEDERAL TRADE CMMISSI
2 DETER Identity theft is a serious crime. It occurs when your personal information is stolen and used without your knowledge to commit fraud or other crimes. Identity theft can cost you time and money. It can destroy your credit and ruin your good name. Deter identity thieves by safeguarding your information. Shred financial documents and paperwork with personal information before you discard them. Protect your Social Security number. Don t carry your Social Security card in your wallet or write your Social Security number on a check. Give it out only if absolutely necessary or ask to use another identifier. Don t give out personal information on the phone, through the mail, or over the Internet unless you know who you are dealing with. ever click on links sent in unsolicited s; instead, type in a web address you know. Use firewalls, anti-spyware, and anti-virus software to protect your home computer; keep them up-to-date. If you use Peer-to-Peer file sharing, check the settings to make sure you are not sharing your sensitive private files with other users. Visit nguardnline.gov for more information. Don t use an obvious password like your birth date, your mother s maiden name, or the last four digits of your Social Security number. Keep your personal information in a secure place at home, especially if you have roommates, employ outside help, or are having work done in your house. Detect suspicious activity by routinely monitoring your financial accounts and billing statements. Be alert to signs that require immediate attention: Bills that do not arrive as expected Unexpected credit cards or account statements Denials of credit for no apparent reason Calls or letters about purchases you did not make Inspect: DETECT Your credit report. Credit reports contain information about you, including what accounts you have and your bill paying history. r The law requires the major nationwide consumer reporting companies Equifax, Experian, and TransUnion to give you a free copy of your credit report each year if you ask for it. r Visit or call , a service created by these three companies, to order your free credit reports each year. You also can write: Annual Credit Report Request Service, P.. Box , Atlanta, GA Your financial statements. Review financial accounts and billing statements regularly, looking for charges you did not make. DEFED Defend against ID theft as soon as you suspect it. Place a Fraud Alert on your credit reports, and review the reports carefully. The alert tells creditors to follow certain procedures before they open new accounts in your name or make changes to your existing accounts. The three nationwide consumer reporting companies have toll-free numbers for placing an initial 90-day fraud alert; a call to one company is sufficient: r TransUnion: r Equifax: r Experian: EXPERIA ( ) Placing a fraud alert entitles you to free copies of your credit reports. Look for inquiries from companies you haven t contacted, accounts you didn t open, and debts on your accounts that you can t explain. Close accounts. Close any accounts that have been tampered with or established fraudulently. r Call the security or fraud departments of each company where an account was opened or changed without your okay. Follow up in writing, with copies of supporting documents. r Use the ID Theft Affidavit at ftc.gov/idtheft to support your written statement. r Ask for verification that the disputed account has been closed and the fraudulent debts discharged. r Keep copies of documents and records of your conversations about the theft. File a police report. File a report with law enforcement officials to help you with creditors who may want proof of the crime. Report the theft to the Federal Trade Commission. Your report helps law enforcement officials across the country in their investigations. r nline: ftc.gov/idtheft r By phone: ID-THEFT ( ) or TTY, r By mail: Identity Theft Clearinghouse, Federal Trade Commission, Washington, DC Federal Trade Commission 600 Pennsylvania Ave., W Washington, DC ftc.gov/idtheft ID-THEFT ( )
3 ? Y M E E R U Y W K U >D Y , the Web and Instant Messaging are all important methods of exchanging critical business information. They also present one of the biggest threats to our security. Be vigilant. Do your part to keep yourself, your colleagues and your company secure. >D Install the latest security updates. Look out for unusual words and language in s. Delete suspicious looking s immediately. Tell your IT department if you receive a suspicious . nly visit websites that you trust. Lock your computer when working away from your desk. Comply with your company s Acceptable Usage Policy (AUP). pen or forward suspicious looking s. pen s from people you don t know. Reply to spam, even if it s to unsubscribe. Click on links in suspicious s or spam. Respond to s from your bank asking for your details them to clarify first. Post your address, personal, or company information anywhere on the Internet. Download and Install programs from the Internet. Allow anyone else to access your computer. T >D >FR A CPY F YUR CMP AY S AD WEB ACCE PTABLE USAGE PLICY, CTACT Y UR IT DEPARTMET TDAY. Be certain IMAGES GEERATED USIG SURCE CDE FRM ACTUAL ITERET THREATS
4 Along with using a fi rewall and keeping your operating system, antivirus and antispyware software updated, take these steps to help protect your computer: Think before you click Clicking the wrong link or attachment can expose your computer to spyware, a virus, or ads that could clutter your screen and slow your computer. Be very cautious with attachments or links in or instant messages. If you know the sender, but the message looks suspicious, check before you proceed. If they didn t send the message, delete the or close the IM window. Think twice before you click pop-up windows or banner ads. ever click Agree, K, or I accept to get rid of a pop-up ad, an unexpected warning, or even an offer to remove spyware. Instead, close the window by clicking X in the upper-right corner or by pressing ALT + F4 on your keyboard. Download software only from Web sites you trust. File-sharing programs, and sites that offer free music, movies, games, and other information are notorious for including unwanted software in downloads. Back up your files o security method is completely foolproof. So it s important to back up critical fi les regularly, before you get hit with a problem. Learn how at Helpful Resources: update.microsoft.com onecare.live.com 0907 Part o Microsoft Corporation. All rights reserved. Microsoft, necare, Windows, Windows Live, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. This document is for informational purposes only. MICRSFT AD THE SPSRS LISTED HEREI, MAKE WARRATIES, EXPRESS, IMPLIED R STATUTRY, AS T THE IFRMATI I THIS DCUMET. PRTECT Your Computer nline safety and security begin with you
5 The Internet is a global network that connects most of the world s computers, and an increasing number of smart phones and other devices. It offers a seemingly limitless universe of information, images, and opportunities. Yet these benefits come with some risks. Just by logging on to the Internet, you can be exposed to security threats that have the power to cripple or control your computer, compromise your privacy, or destroy your valuable data. Top threats to computer security The leading threats to the security of your computer come from four types of malicious software: Viruses are software programs designed to invade computers, and to copy, damage, or delete data. Worms are sophisticated viruses that can reproduce themselves and spread to other computers without your interaction. Trojans, named for the Trojan horse, are viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing personal information. Spyware is software that tracks your online activity. Spyware may bombard you with pop-up advertising, collect your personal information, or change the settings on your computer without your knowledge or consent. This brochure will help you understand online safety and security issues and provide helpful tips. For additional guidance, tools, and resources and instructions specific to your operating system please visit Keep your firewall turned on A big part of staying safe online is paying attention, applying common sense, and learning to recognize and avoid spam scams and phishing. Here s how: The fi rewall in your Microsoft Windows operating system helps to protect your computer by placing a protective barrier between your computer and the Internet. Your Windows fi rewall operates as a kind of security checkpoint that information must pass through before it can enter or leave your computer. Your fi rewall also helps to prevent software on your computer from accepting unauthorized updates or changes sent over the Internet. Make sure your fi rewall is always turned on. Keep your software updated ne of the most important things you can do to help protect your computer is also one of the easiest: keep your operating system and other software up-to-date. Hackers work tirelessly to exploit weaknesses in software, and new security threats emerge every day. That s why software companies work even harder to help keep your computer safe with updates, and it s why you should install updates. To keep your Windows operating system current, use the Automatic Updates feature in Windows Vista and Windows XP SP2 to automatically download and install updates. You can manually update your computer at Microsoft Update ( which provides regular updates for Windows and other Microsoft products. For even greater protection, try the 90-day free trial of Windows Live necare ( Windows Live necare helps protect your computer from malicious and potentially unwanted software; backs up your important fi les; and keeps your computer tuned up and running at top speed. Use up-to-date antivirus software Antivirus programs scan everything that goes into your computer including , discs, and data fi les searching for thousands of known viruses.. Antivirus software requires regular signature updates to help protect against emerging threats. Installing antivirus software without updating it is like buying home insurance but not making the payments. Keep your antivirus software current by subscribing to an antivirus service and automatically downloading the latest updates. Windows Live necare from Microsoft offers up-todate antivirus protection as part of its comprehensive computer care service. Use up-to-date antispyware software Antispyware programs monitor your computer, looking for known spyware and watching for programs that try to install themselves without your knowledge or permission. When antispyware programs fi nd something, they warn you and help you take action against the spyware. As with antivirus software, keep your antispyware software current, and automatically download the latest updates. Microsoft Windows Defender offers always-on antispyware protection and helps you make conscious choices about the software installed on your computer. Windows Defender is built into Windows Vista and is a free download for Windows XP SP2.
Identity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
More informationClient Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.
Client Resources SAFEGUARDING YOUR IDENTITY Your personal and financial information is precious. Protect it by being savvy about identity theft. EVERYONE IS AT RISK FOR IDENTITY THEFT. It s an unfortunate
More informationHow To Get A Free Credit Report From A Credit Report Website
FACTS FOR OLDER CONSUMERS National Consumer Law Center Protect Yourself From Identity Theft Identity theft is one of the fastest growing crimes in the country. It can strike anyone, but elders may be particularly
More informationTalking About Identity Theft:
To learn more about ID theft and how to deter, detect, and defend against it, visit ftc.gov/idtheft. Or request copies of ID theft resources by writing to: Consumer Response Center Federal Trade Commission
More informationINTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
More informationIdentity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com
Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity
More informationIDENTITY THEFT VICTIMS: IMMEDIATE STEPS
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of
More informationWhat is Identity Theft?
What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.
More informationAccording to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection
According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government
More informationIdentity Theft: Informational Workshop
Identity Theft: Informational Workshop ~ Prepared By ~ Connecticut Department of Consumer Protection Jerry Farrell, Jr. Commissioner 1 The Department of Consumer Protection Mission The Department of Consumer
More informationInformation carelessly discarded into the trash can be stolen when a thief digs through the garbage.
Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause
More informationClient Education. Learn About Identity Theft
Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that
More informationI dentity theft occurs
1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,
More informationIDENTITY THEFT: MINIMIZING YOUR RISK
IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social
More informationIntercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
More informationInformation to Protect Our Customers From Identity Theft
Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns
More informationIdentity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
More informationIdentity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
More informationSaheel KHOYRATTY. Partner Technology Advisor
Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment
More information8/13/2014. Types of Identity Theft HOW IS IDENTITY THEFT DISCOVERED? Identity Theft. Run up existing accounts. Create new accounts.
According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States Increasing an average nearly 40 percent per year for the past several years. The
More informationIDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT IT S POSSIBLE@ PROTECT YOUR IDENTITY protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IT S POSSIBLE @ What Is Identity Theft? According to the FBI, identity theft is the fastest
More informationINTRODUCTION HOW IDENTITY THEFT OCCURS
The following information is from the Federal Trade Commission s booklet on Identity Theft. For more information, access the Federal Trade Commission at www.ftc.gov or contact them at 1-877-ID-THEFT. INTRODUCTION
More informationID THEFT: What It s All About
ID THEFT: What It s All About Federal Trade Commission June 2005 Dear Consumer: The Federal Trade Commission has published this booklet to help raise awareness of identity theft. We encourage you to share
More informationOnline Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
More informationTHINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
More informationHow To Protect Yourself From Identity Theft
Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the
More informationIDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT
More informationWhen Fraud Comes Knocking
When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.
More informationArmstrong State University Fall Staff Assembly. Chief Wayne Willcox, MSCJ, CLEE
Armstrong State University Fall Staff Assembly Chief Wayne Willcox, MSCJ, CLEE Identity Theft: When someone uses your personal information without your permission to commit fraud or other crime Name Social
More informationWHAT S IT ALL ABOUT?
WHAT S IT ALL ABOUT? Introduction The 1990 s spawned a new variety of crooks called identity thieves. Their stock in trade? Your everyday transactions, which usually reveal bits of your personal information:
More informationIt Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit
Identity Theft: It Could Happen To You! Attorney General Tom Reilly s Guide to Protecting Yourself and Your Credit One Ashburton Place ~ Boston, MA 02108 ~ (617) 727-2200 www.ago.state.ma.us February 2005
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationFTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen
FTC Facts For Consumers Federal Trade Commission For The Consumer August 2005 Identity Crisis... What to Do If Your Identity is Stolen Maybe you never opened that account, but someone else did...someone
More informationPREVENTING ID THEFT101
PREVENTING ID THEFT101 701.255.0042 www.capcu.org i This book is intended as a general guide to the topics discussed, and it does not deliver accounting, personal finance, or legal advice. It is not intended,
More informationIdentity Theft, Fraud & You. Prepare. Protect. Prevent.
Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot
More informationIdentity Theft Problem and Solutions
Identity Theft Problem and Solutions October 7, 2011 Michigan Cyber Summit 2011 Jon Miller Steiger Regional Director The views expressed are those of the speaker and not necessarily those of the FTC or
More informationIdentity Theft is a Crime in the State of New Jersey.
NEW JERSEY STATE POLICE Identity Theft: A Victim s Reference Identity Theft occurs when someone uses your personally identifying information like your name, Social Security number, or credit card number
More informationIdentity Theft: When You Are the Target
F O R F O R Y O U R Y O U R L I F E R E T I R E M E N T Identity Theft: When You Are the Target What s inside What Is Identity Theft?... 2 How Does Identity Theft Occur?... 2 How Can You Protect Yourself?...
More informationDeputy Mike Butler Deputy Leslie Fox Dane County Sheriff s Office
Deputy Mike Butler Deputy Leslie Fox Dane County Sheriff s Office Identity theft occurs when someone uses your personal identifying information such as: A. Your name B. Social Security number C. Credit
More informationIdentity Theft. Officer Rob Romey IPD Crime Prevention Officer. crimeprevention@indepmo.org
Identity Theft Officer Rob Romey IPD Crime Prevention Officer 816-325 325-7643 crimeprevention@indepmo.org What Is Identity Theft? Identity theft occurs when someone possesses or uses your name, address,
More informationIDENTITY THEFT RESOURCE KIT
IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What
More informationIDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09
IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do
More informationWhat to Know, What to Do
Protecting Your Identity: What to Know, What to Do BRUMMET & OLSEN, LLP Certified Public Accountants t and Consultants t Kedra J. Olsen, CPA February 6, 2014 Overview Identity yprotection Protection from
More informationCiti Identity Theft Solutions
Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information
More informationIdentity Theft. Prevention and Recovery Information Kit
Identity Theft Prevention and Recovery Information Kit A step-by-step guide designed to help you protect your identity and recover if you ve been victimized. 800-522-4100 valleynationalbank.com 2012 Valley
More informationAbout the Federal Reserve
About the Federal Reserve The Federal Reserve Bank of Philadelphia is one of 12 regional Reserve Banks in the United States that, along with the Board of Governors in Washington, D.C., make up the Federal
More informationIdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT
CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but
More informationIDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.
IDENTITY THEFT IDENTITY THEFT Identity theft is a serious crime with serious costs for victims. ID theft occurs when someone obtains your personal information such as your Social Security Number, credit
More informationCobblestone Capital Advisors. Identity Theft: What You Should Know
Cobblestone Capital Advisors Identity Theft: What You Should Know WHAT YOU SHOULD KNOW: Identity theft the stealing and fraudulent use of a person s personal or financial information has been a hot topic
More informationPROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit
PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account
More informationDVD Companion Learning Guide
DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material
More informationSecurity Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
More informationazag.gov PROTECT YOURSELF AGAINST IDENTITY THEFT Office of Arizona Attorney General TERRY GODDARD For more information, contact:
For more information, contact: Office of Arizona Attorney General Terry Goddard 1275 West Washington Street Phoenix, Arizona 85007 602-542-5763 400 West Congress, Suite 315 Tucson, Arizona 85701 520-628-6504
More information2015 Identity Theft Guide
2015 Identity Theft Guide www.feddesk.com FREE Federal & Military Guides Since 2002 2015 Identity Theft Guide Written by John D. Whitney Published by Feddesk.com FREE Federal and Military Guides Since
More informationPROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT
PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center
More informationIdentity Theft Awareness: Don t Fall Victim to these Common Scams
Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with
More informationCustomer Awareness for Security and Fraud Prevention
Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to
More informationPROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
More informationProtection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.
Common ID Theft TACTICS. HOW DOES IT HAPPEN? Identity What should I do if I m a Protection PROTECT YOURSELF: OLD-FASHIONED STEALING: Criminals steal your wallet or purse. > Never leave your wallet or purse
More informationCorona Police Department
By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,
More informationIdentity Theft/Credit Fraud Kit
Provided by: Your source for information on Credit Reports and Credit Scores, where you can also safely order your own 3 Bureau Credit Report online that includes your credit information from Equifax,
More informationIdentity Theft. Providing Your Student with a Safety Net By Sun Ow
Identity Theft Providing Your Student with a Safety Net By Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial
More informationDo s & Don ts Reference website. www.farmersidentityshield.com
What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What
More informationEL/Civics Lesson Plan
Program Name Staff Responsible for Lesson MVCTC EL/Civics Program Mary Ann Oatney Date(s) Used 11/2007 Civics Category Civics Objective Time Frame to Complete Lesson EFL(s) II. Civics Participation II.
More informationA Guide to Protecting Yourself From Identity Theft
A Guide to Protecting Yourself From Identity Theft 2010 Capital One. Capital One is a registered trademark. At Capital One, we understand that Identity Theft is a frustrating, and sometimes frightening,
More information1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
More informationEmployee ID Theft Resource Guide
Employee ID Theft Resource Guide ID Theft Resolution Legal Resources ID Theft Assistance Updates www.legalresources.net ID Theft What is Identity Theft? Identity Theft is a serious crime in which someone
More informationRetail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
More informationIDENTITY THEFT. Resource Guide LISA MADIGAN ILLINOIS ATTORNEY GENERAL
IDENTITY THEFT Resource Guide LISA MADIGAN ILLINOIS ATTORNEY GENERAL TABLE OF CONTENTS Page Introduction...3 1 ID Theft Victims: Immediate Steps...5 3 Helpful Hints...5 3 Consumer Checklist...5 3 My Identity
More informationWhat is Identity Theft?
Elix Financial Wellness presents YOUR FINANCIAL WELLNESS EXPERTS Identity Theft occurs when a thief obtains personal information about you such as your name, address, Social Security Number, account number
More informationIdentity Theft and Fraud
Identity Theft and Fraud Identity theft is a term that refers to crimes in which someone wrongfully obtains and uses another person s personal data (i.e., name, date of birth, social security number, driver
More informationIDENTITY THEFT AND PHISHING SCAMS
Grades 9-12 Lesson 10 IDENTITY THEFT AND PHISHING SCAMS Key concepts: Consumer protection of financial records, protection of one s identity through paper and online Summary: This lesson introduces students
More informationProtect Yourself From Identity Theft
Protect Yourself From Identity Theft The facts about identity theft Imagine a typical day. In our fast-paced, hectic lives, we all engage in activities that we may take for granted. We write checks and
More informationProtecting Yourself from Identity Theft
identity theft unit new york county district attorney s office Protecting Yourself from Identity Theft cyrus r. vance, jr. district attorney 5 / 2010 questions and answers Dear Friends, cyrus r. vance,
More informationHow To Get Help From The Police Department
IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification
More informationProtect Yourself From Identity Theft
Protect Yourself From Identity Theft The facts about identity theft Imagine a typical day. In our fast-paced, hectic lives, we all engage in activities that we may take for granted. We write checks and
More informationidentity theft: How To Safeguard Your Privacy and Keep Your Good Name
identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,
More informationsuntrust.com 800.SUNTRUST
suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally
More informationProtect Yourself From Identity Theft
Protect Yourself From Identity Theft Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social
More informationID Theft Protection Kit
ID Theft Protection Kit Congratulations. You ve taken a big step in protecting the power of your credit and your identity. Identity theft is a serious crime. Victims can spend a significant amount of time
More informationTABLE OF CONTENTS Appendices
TABLE OF CONTENTS Introduction........................................................ 1 ID Theft Victims: Immediate Steps.................................... 3 Helpful Hints......................................................
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
More informationUnderstanding Your Credit Report Rights. Legal Aid Society of San Diego, Inc. Consumer Protection Division
Understanding Your Credit Report Rights Legal Aid Society of San Diego, Inc. Consumer Protection Division One Free Copy Per Agency Every 12 Months The Federal Trade Commission guarantees you one free copy
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft About Medical Identity Theft and Health Information Breaches... 1 What is medical identity theft?... 1 What are the dangers of medical identity theft?... 1 How do
More informationIdentity Protection Guide. The more you know, the better you can protect yourself.
Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious
More informationAvoid Identity Theft UH Information Security Team (InfoSec)
Avoid Identity Theft UH Information Security Team (InfoSec) Who Are We? UH Information Security Team Jodi Ito - Information Security Officer Deanna Pasternak & Taylor Summers Information Security Specialists
More informationHow to Freeze Your Credit Files
Avoid Identity Theft! How to Freeze Your Credit Files County of Bucks Department of Consumer Protection/ Weights and Measures 1260 Almshouse Rd., 4th Floor Doylestown, Pa. 18901 215-348-6060 1-800-942-2669
More informationHow to Freeze Your Credit Files
Avoid Identity Theft! How to Freeze Your Credit Files County of Bucks Department of Consumer Protection/ Weights and Measures 50 North Main Street, 2nd Floor Doylestown, PA 18901 215-348-7442 1-800-942-2669
More informationU.S. Postal Inspection Service. Ensuring Confidence in the U.S. Mail
U.S. Postal Inspection Service Ensuring Confidence in the U.S. Mail Identity theft involves acquiring key pieces of someone s identifying information, such as name, address, date of birth, social security
More informationthe first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you
Identity theft is a terrible problem in this Information Age. You have already taken the first important step by contacting ACNB Bank immediately. ACNB Bank will work with you every step of the way to
More informationBeware! Identity Theft
STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal
More informationPrepared by Sgt. Gibbs, Thomas B. 82-11
Prepared by Sgt. Gibbs, Thomas B. 82-11 Collaborative partnerships between the law enforcement agency and the individuals and organizations they serve to develop solutions to problems and increase trust
More informationWhat is it? How does it occur? How potentially devastating it can be? How do we detect fraud? How can we minimize the risk of being victimized?
IDENTITY THEFT & PREVENTION Bucknell University Department of Public Safety Identity Theft Learning Objectives What is it? How pervasive is it? How does it occur? How potentially devastating it can be?
More informationFTC Fact Sheet Identify Yourself
FTC Fact Sheet Identify Yourself 5 10 15 20 25 30 35 40 You might have heard about identity theft: it s what can happen when a thief gets enough of someone s information to commit fraud. Why should people
More informationIdentity Theft. Protecting Yourself and Your Identity. Course objectives learn about:
financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index
More informationProtecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
More informationFrequently Asked Questions How our service works:
Frequently Asked Questions How our service works: 1. What does isekurity service provide? 2. Do I have to do anything else after signing up? 3. What will I receive once I enroll in isekurity? 4. When will
More informationIdentity Theft: Prevention & Survival
Identity Theft: Prevention & Survival Crime of the Century Provide By: Nick Sabetta Don t t Let Someone Steal Your Good Name What is Identity Theft? When someone uses your personal information without
More informationIdentity Theft Simple ways to keep your sensitive information safe.
Keep yourself safe from Identity Theft Simple ways to keep your sensitive information safe. Be Aware Identity theft is the number one consumer fraud perpetrated on unsuspecting citizens. In 2011, nearly
More information