1 IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09
2 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim? 5. What Should I Do If My Identity is Stolen? Q & A
3 What is Identity Theft? Identity theft is fraud perpetrated by a criminal who assumes someone else's identity in order to profit illegally. Identity Theft Statistics from U.S. Department of Justice (2006): Fastest-growing crime in the U.S. Every minute, 28 people become a victim to identity theft. 49% of people state that they do know how to protect themselves. The emotional impact is similar to that felt by victims of violent crime. It takes anywhere from 3 hours to 5,840 hours to recover from this crime.
4 What is Identity Theft? (cont d) There are 4 main types of identity theft: 1. Financial Using another's identity to obtain goods and/or services. 2. Criminal Posing as another when apprehended for a crime. 3. Identity Cloning Using another's information to assume his or her identity in daily life. 4. Business/Commercial Using another's business name to obtain credit.
5 What Do Thieves Do With A Stolen Identity? Types of information identity thieves try to steal : Name Address Date of Birth City of Birth Social Security Number Driver s License Number Mother s Maiden Name Pets Names Internet Usernames and Passwords Personal Identification Numbers (PIN) User IDs for Online Access Debit/Credit Card Account Numbers Card Expiration Dates Security Codes Tax ID number High School Name
6 What Do Thieves Do With A Stolen Identity? (cont d) Once thieves have your personal information, they use it in 5 main ways: 1. Credit Card Fraud 2. Bank or Financial Fraud 3. Phone or Utility Fraud 4. Government Document Fraud 5. Other Fraud (Employment, Medical Services, Criminal)
7 How Do Thieves Steal An Identity? There are 6 main ways thieves steal an identity: 1. Dumpster Diving 2. Skimming 3. Phishing 4. Changing Your Address 5. Shoulder Surfing 6. Pretexting
8 How Do Thieves Steal An Identity? (cont d) 1. Dumpster Diving Thieves rummage through trash looking for bills or other documents with personal information on it.
9 How Do Thieves Steal An Identity? (cont d) 2. Skimming Thieves steal credit/debit card numbers used in a legitimate transaction. Typically an inside job by a dishonest employee. Can be as simple as photocopying receipts. Thieves use scanning devices at ATMs to read your card's magnetic strip, often in conjunction with a pinhole camera to read the PIN.
10 How Do Thieves Steal An Identity? (cont d) 3. Phishing Thieves pretend to be financial institutions or companies you likely do business with and send spam or pop-up messages to trick you into revealing your personal information. Never respond to inquires asking for passwords or billing information if you didn t initiate the contact.
11 How Do Thieves Steal An Identity? (cont d) 4. Changing Your Address Thieves divert your mail to another location by completing a change of address form or by contacting your credit card issuer. The USPS now sends a "Move Validation Letter" to both the old and new address when a change is filed.
12 How Do Thieves Steal An Identity? (cont d) 5. Shoulder Surfing Thieves use direct observation techniques, such as looking over your shoulder, to steal personal information. When logging in to your computer or a personal website, make sure you have a strong password.
13 How Do Thieves Steal An Identity? (cont d) 6. Pretexting Thieves use false pretenses (create an invented scenario) to persuade you, a financial institution, or a company to release information or perform an action.
14 What Can I Do To Avoid Becoming a Victim of ID Theft? Remember to S.C.A.M. SHRED unnecessary mail and documents and be stingy about giving out your information. CHECK that you are entering a secure site when on the Internet. ASK for a FREE copy of your credit report at least twice a year. MAINTAIN careful records of your banking and financial accounts.
15 What Should I Do If My Identity is Stolen? A step-by-step approach to recovering your identity. 1. Place a fraud alert on your credit reports and review your reports. 2. Close the accounts that you believe may have been tampered with or opened fraudulently. 3. File a complaint with the Federal Trade Commission and print a copy of their ID Theft Complaint Form. https://rn.ftc.gov/pls/dod/widtpubl$.startup?z_org_code=pu03 4. File a police report where the identity theft took place.
16 What Should I Do If My Identity is Stolen? (cont d) Initial Fraud Alert vs. Extended Fraud Alert An initial fraud alert stays on your report for at least 90 days. You get one free report a year from each credit reporting agency. Potential creditors will take extra measures to verify your identity. An extended fraud alert stays on your report for 7 years. You get two free reports a year from each credit reporting agency. Potential creditors must actually contact you or meet with you in person before issuing credit. Credit reporting agencies will remove your name from marketing lists for prescreened credit offers for 5 years. You must provide agencies with an Identity Theft Report for an extended fraud alert (explained in Step 3).
17 What Should I Do If My Identity is Stolen? (cont d) ID Theft Complaint Form This form along with a police report will provide you with the following protections: 1. Permanently blocks fraudulent information from appearing on your credit report. 2. Ensures that debts do not reappear on your credit report. 3. Prevents a company from continuing to collect debts that resulted from identity theft. 4. Places an extended fraud alert on your credit report.
18 What Should I Do If My Identity is Stolen? (cont d) Additional Tips Credit Freeze Consider a credit freeze, then potential creditors will only be able to access your credit if you temporarily lift the freeze. A credit freeze will last until you ask for it to be removed. Placing a credit freeze does not affect your score, or prevent you from getting a credit report. There is a small fee ($10) associated with freezing credit, and this fee is per agency.
INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity Theft Report 9 NEXT STEPS 13 Review Your Credit Reports 13 Dispute Errors with Credit Reporting
www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director PIERSON Technological advances of the
Take Charge: Fighting Back Against Identity Theft Table of Contents INTRODUCTION... 1 HOW IDENTITY THEFT OCCURS... 2.. If Your Personal Information Has Been Lost or Stolen... 4 ID THEFT VICTIMS: IMMEDIATE
www.texasfightsidtheft.gov Office of the Attorney General Identity Theft Victim s Kit This Identity Theft Victim s Kit can help you with the process of recovering from the identity crime committed against
Date Here Welcome University of Michigan International Students U.S. Banking System Overview Banking is regulated by federal and state governments Privacy Disclosure Fraud protection Protection against
Crime and Fraud Prevention Initiatives The Attorney General s Office includes Satellite Offices throughout the State and the Fraud Fighter Van. Satellite Offices make it easier for residents to get information
Your Social Security Number And Card Your Social Security Number And Card Social Security number is important A because you need it to get a job, collect Social Security benefits, and receive some other
Things you need to know and do to operate safely online An initiative of the Australian Government that brings together existing resources, tools and websites to help small businesses understand and manage
Chapter 1 Identity Theft Alicia McAteer was an eighteen-year-old student who had just finished her second year at Kwantlen College in BC when she became a victim of identity theft. As reported in The Vancouver
Welcome to Money Smart for Older Adults! With over 50 million Americans aged 62 and older 1, Older Adults are prime targets for financial exploitation both by persons they know and trust and by strangers.
Bank On It Building: Knowledge, Security, Confidence FDIC Financial Education Curriculum TABLE OF CONTENTS Page Banking Basics 1 Opening and Maintaining a Bank Account 2 Choosing a Bank Checklist 3 Practice
PERSONAL CHECKING PERSONAL CHECKING QUICK SWITCH BOOKLET PEAPACK-GLADSTONE BANK WELCOME TO PEAPACK-GLADSTONE BANK S QUICK SWITCH KIT To help you with opening your account at Peapack-Gladstone Bank, please
Crime a) Cases through the years show how the Web changes the impact of crime and the impact of law. b) Our financial health is affected by technology all the new cybercrime that we have to keep up with
Checking Account Management 595 Market Street, 16th Floor San Francisco, CA 94105 888.456.2227 www.balancepro.net Whether you have a history of overdraft or nonsufficient funds charges or you just want
A wise choice: Checking and savings accounts Seminar lesson plan and class activities Debit A Consumer Action Publication Lesson purpose: A wise choice: Checking and savings accounts Seminar lesson plan
Insurance Fraud disaster auto A Crime identity producer contractor That Affects medical theft worker s comp senior targets Everyone Louisiana Department of Insurance James J. Donelon, Commissioner A message
Switching to your Talbot Bank checking account has never been easier with Talbot Bank s Switch Kit. (Switch Kit check list) 1. Open your new Talbot Bank checking account. You can open an account by visiting
Switching to your CNB checking account has never been easier with CNB s Switch Kit. 1. Open your new CNB checking account. You can open an account by visiting any of our convenient locations. We ve included
CUSTOMERS BANK ONLINE & MOBILE BANKING ACCESS AGREEMENT 1) Scope of Agreement 2) Definitions 3) Terms and Conditions of Online Banking A. Requirements B. Online Banking Services - General C. Electronic
LEADER S GUIDE PROTECT YOUR PHONE RECORDS A Consumer Action Publication Contents Introduction Page 2 About Your Phone Records Page 3 How Phone Records Are Accessed Illegally Page 5 Protecting Your Phone
The Department of Health and Human Services Information Systems Security Awareness Training Fiscal Year 2015 Information Systems Security Awareness Introduction Information Security Overview Information
A Parents' Guide to Cybersecurity In partnership with Top 5 Questions Parents Have About Cybersecurity 1.What are the biggest security threats to kids? Children and teens can be caught by the same kinds
Online Lead Generation: Data Security Best Practices Released September 2009 The IAB Online Lead Generation Committee has developed these Best Practices. About the IAB Online Lead Generation Committee:
99 Things You Wish You Knew Before Your Identity Was Stolen Your guide to protecting yourself from identity theft and computer fraud Robert Siciliano The 99 Series 85 N. Main Street Florida, NY 10921 646-233-4366
A Consumer Guide to Insurance Fraud INSURANCE ADMINISTRATION Table of Contents Introduction...1 Insurance Fraud....1 What Is Insurance Fraud?...2 Consequences of Insurance Fraud....................................
4 The Role of People in Security Even in the common affairs of life, in love, friendship, and marriage, how little security have we when we trust our happiness in the hands of others! WILLIAM HAZLITT In
A guide to money management for people with disabilities Developed by Pennsylvania Assistive Technology Foundation in conjunction with Widener University 2013 TABLE OF CONTENTS Chapter 1: Let s Get Started
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online