2010 Identity Fraud Survey Report: Consumer Version

Size: px
Start display at page:

Download "2010 Identity Fraud Survey Report: Consumer Version"

Transcription

1 February Hacienda Drive, Pleasanton, CA USA t f

2 Table of Contents Getting a Full Copy of the Identity Fraud Survey Report... 3 Overview... 5 Prevent, Detect, and Resolve... 6 The Difference Between Identity Fraud and Identity Theft... 6 Methods Criminals Use to Obtain Your Information... 7 How Do Identity Thieves Misuse Stolen Information?... 8 Consumer Security Alert: Dangers of Social Networking Javelin s Top Five Identity Safety Tips: How YOU can Fight Fraud Additional Recommendations: A Comprehensive Approach to Fighting Fraud Prevention How Can I Prevent Identity Fraud? Detection How Can I Detect Identity Fraud? Resolution What Should I Do if I Become a Victim of Identity Fraud? Identity Fraud Protection Solutions: What s Out There? Where Can I Go to Get More Information? Methodology Common Fraud Scams and Terms

3 Table of Figures Figure 1: Javelin s Prevention, Detection and Resolution Model... 6 Figure 2: How Theft of Personal Information Happens... 7 Figure 3: What Are the Most Common Methods of Fraud?... 8 Figure 4: Protect Your Information on Social Networking Sites Figure 5: Secure Your Computer and Personal Information Figure 6: Earlier Detection Results in Lower Costs and More Timely Resolution Figure 7: Identity Fraud Protection Services Figure 8: How to Contact the Three Credit Bureaus Where Can I Get the Industry Version of the 2010 Identity Fraud Survey Report? If you are a business or industry professional looking for more detailed statistics, incidence rates and fraud figures from our 2010 Identity Fraud Survey, please reference the full report, entitled: 2010 Identity Fraud Survey Report: Identity Fraud Continues to Rise New Accounts Fraud Drives Increase; Consumer Costs at an All Time Low The full report consists of 96 pages with 67 graphs and tables and can be accessed for purchase on the research page of our website at or by calling a sales representative at (925) This consumer version was intended for the sole purpose of consumer education and awareness. Javelin recommends purchasing the full report for a complete analysis, including an overview of the key findings, new trends, quantitative cross tabulations, and benchmarking U.S. identity fraud data. 3

4 Authors: Contributors: Research: Editor: Danielle Miceli, Research Associate Rachel Kim, Analyst Robert Vamosi, Analyst, Security, Risk and Fraud Mary T. Monahan, Managing Partner and Research Director Tom Wills, Senior Analyst, Risk and Fraud James Van Dyke, President and Founder Shailaja Dixit, Senior Analyst Alan Ruperto, Associate Analyst Levi Sumagaysay Publication Date: February 2010 Javelin s 2010 Identity Fraud Survey Report: Consumer Version provides tips and recommendations for consumers to help prevent, detect and resolve identity fraud. This study is designed to help consumers lower their risk of identity fraud by equipping them with the tools and resources necessary to detect and resolve this crime. Over the past six years, Javelin has surveyed nearly 30,000 adults to determine how consumers are being affected by identity fraud in the United States. The 2009 phone survey of 5,000 adults is the most up to date identity fraud study in the United States. Javelin s identity fraud study reaches an audience of 13 million and is a factual resource for the Federal Trade Commission (FTC) and Better Business Bureau (BBB). For commercial institutions desiring to view the complete version of this research study, the 2010 Identity Fraud Survey Report: Identity Fraud Continues to Rise New Accounts Fraud Drives Increase; Consumer Costs at an All Time Low: (96 pages) is available for purchase. This research study is made possible by companies committed to helping consumers reduce their risk of identity fraud. Through their sponsorships, Fiserv, Inc., Intersections Inc., Wells Fargo & Company and ITAC, the Identity Theft Assistance Center have contributed to combating identity fraud and educating consumers. The Better Business Bureau also supports this study. Javelin maintains complete independence in its data collection, findings, and analysis; the report is a product of Javelin employees only. The sponsors contribution to the study includes partially underwriting the data collection, analysis and reporting costs. About Javelin Javelin provides superior direction on key facts and forces that materially determine the success of customer facing financial services, payments and security initiatives. Our advantages are rigorous process, independent position, and expert people. 4

5 OVERVIEW More than 11 million adult consumers became victims of identity fraud in 2009, up from nearly 10 million in The number of fraud victims rose for the second year in a row. On the other hand, victims out of pocket costs and the time required to resolve fraud have decreased. Out of pocket costs can include unreimbursed losses, lost wages due to time taken off work, and possible legal fees for those victims attempting to prosecute. Banks have stepped up their efforts in counteracting fraud and minimizing the cost and inconvenience suffered by consumers. Most victims don t experience any out of pocket costs, but those who did suffered an average cost of $373. The average time to resolve the fraud for these victims was 21 hours. Due to the zero liability fraud protection offered by most banks and credit card companies, most victims will only have to pay out of pocket expenses to cover their time in resolving fraud, not for reimbursing fraudulent charges. Over the past six years, Javelin has collected data from nearly 30,000 adults to measure the overall impact of identity fraud on consumers. In 2009, 5,000 adults, including 703 actual fraud victims, answered questions regarding their day to day financial practices and behaviors to help determine the potential causes of such fraud. This report provides easy to follow guidelines and recommendations for consumers to protect themselves against this $54 billion crime. Javelin s goal is to equip consumers with proven methods to prevent, detect, and resolve identity fraud. The recommendations on the following pages are based on the results of our latest study and are backed by the most up to date identity fraud findings available. 5

6 PREVENT, DETECT AND RESOLVE The Difference Between Identity Fraud and Identity Theft Both identity theft and identity fraud are used throughout this report. Most people are familiar with the term identity theft, which is widely used by most media, government, consumer groups and non profit organizations. However, it is important to distinguish between the two terms, as they each have different meanings. This points to the complexity of identity theft/fraud as being a two part crime. True identity theft is the exposure of personal information and typically happens when your personal information is taken by another individual without your explicit permission. Identity fraud is the actual misuse of information for financial gain and occurs when criminals take illegally obtained personal information and make fraudulent purchases or withdrawals, create false accounts or modify existing ones, and/or attempt to obtain services such as employment or health care. Personally identifiable information such as your Social Security number (SSN), bank or credit card account numbers, passwords, telephone calling card numbers, birth date, name and address can be used by criminals to profit at your expense. By accessing and using relatively basic information, a criminal can take over your existing financial accounts or use your personal information to create new ones. There are numerous ways that a criminal can partake in identity fraud, including the following: unauthorized withdrawal of funds from an account, fraudulent purchases to credit cards, and creating new accounts (banking, telephone, utility, loans), all of which can have a damaging effect on an individual s credit. In fact, the first notification that fraud has been committed might be an unfamiliar account seen on a credit report or through contact from a debt collector. Figure 1: Javelin s Prevention, Detection and Resolution Model 2010 Javelin Strategy & Research 6

7 Methods Criminals Use to Obtain Your Information Many identity thefts can occur through traditional methods such as stolen wallets and friendly frauds, in which the crime is committed by a person known to the victim. In fact, among the victims who knew how their data was taken, lost or stolen wallets, checkbooks, or credit cards accounted for nearly two times as many instances of theft as all online attack methods combined. Identity theft occurrences are often the result of the most remedial and simple ways to steal information, not through hacking or elaborate Internet schemes. Because there are numerous methods in which information can be stolen and that identity theft can be committed, consumers should protect themselves through a variety of best practices and effective behaviors. These are discussed in detail in the Top Five Tips and Additional Recommendations sections. Figure 2: How Theft of Personal Information Happens When the victim is involved When a business or institution is involved Through a lost or stolen wallet Through transactions/purchases made in a store Through stolen information in the home or workplace by a family member, friend, or in home employee Through the mail Through hacking incidences, such as Trojan horses, keylogger software, viruses, malware/spyware on a computer Through a data breach, whereby a business or organization that accesses personal information (hospital, school, department store, company, etc.) has been compromised Through dumpster diving Through shoulder surfing, in which someone obtains personal information by looking over an unsuspecting individual s shoulder By phishing or vishing, in which someone pretends to be a bank or trusted source and tricks a customer into providing personal and confidential information through e mails, calls, or SMS text messages Through social networking sites where personal information can be found and communication with fraudulent individuals can occur Through new and innovative ways that criminals are constantly developing 2010 Javelin Strategy & Research 7

8 HOW DO IDENTITY THIEVES MISUSE STOLEN INFORMATION? Figure 3: What Are the Most Common Methods of Fraud? Make purchases in person Make purchases online Make purchases over the phone or through the mail Withdraw cash from an ATM Write checks 10% 10% 21% 42% 42% Buy prepaid cards or gift cards Make/attempt to make purchases (unspecified) Bill payments Obtained a new credit card/account in my name Obtained health care Cash withdrawal 6% 5% 4% 3% 3% 2% 0% 10% 20% 30% 40% 50% Q11: How was your information misused? November 2009, n = 649 Base: All fraud victims 2010 Javelin Strategy & Research Once criminals have stolen data, the most common methods they use to commit identity fraud are through making in store and online purchases. The chart above shows that both in person and online purchases account for more than four in 10 cases of fraud. Because online purchases require only a credit or debit card number, this method of fraud is increasingly favored by criminals. Additionally, slightly more than 20% of victims of identity fraud had their information used to make phone or mail order catalog purchases. One of the most effective ways in which consumers can protect themselves from offline and online identity fraud is to monitor their accounts online for unauthorized and unknown purchases. Through online banking, consumers can see all banking and credit card transactions in realtime. If there are purchases that were not made by the account holder, the financial institution should be notified immediately to investigate the charges. If checks or credit/debit cards are lost or stolen, notify your bank immediately to help stop criminals from being able to make purchases. 8

9 When shopping online, consumers can take additional precautions to protect their payment and personal information. Enrolling in Verified by Visa or MasterCard SecureCode, which allows you to have an additional password when making purchases online, offers consumers greater security. There are also programs such as Trusteer s Rapport and IDVault offered by financial institutions, which can alert users when they enter a website for the first time, thus creating an additional layer of security to prevent users from entering their information into a fraudulent site. In terms of offline identity theft protection, shredding all documents that contain personal identifiable information is an easy way to prevent sensitive documents from getting in the wrong hands. Consumers should never give away sensitive information over the telephone; they should make the initial call to the trusted number to ensure the identity of the source requesting information. Enrolling in paperless statements will prevent thieves from obtaining information sent through the mail. Above all, consumers should take advantage of direct deposit, paperless banking statements and electronic bill payment services to prevent unnecessary exposure of paper documents containing sensitive information. 9

10 CONSUMER SECURITY ALERT: DANGERS OF SOCIAL NETWORKING As of November 2009, more than half of all U.S. consumers indicated they have used or are using social networking sites. Popular social networking sites such as Facebook, Flickr, Friendster, LinkedIn, MySpace, and Twitter are continually gaining popularity and user adoption. Javelin found that core millennials (consumers ages 18 to 24) reported a higher account misuse or information exposure through social networking sites than other age groups, and Javelin predicts that social networking fraud and potential threats will escalate in the upcoming years. One of the dangers of social networking sites is the public display of personal information. Personal pages and account profiles can expose sensitive, personally identifiable information, and hints on how to easily find it. Criminals can harvest this information to take over accounts or open fraudulent accounts. Users should not store or reveal personal contact information, including phone numbers, Social Security number, date of birth, e mail addresses, physical addresses, mother s maiden name, or other information that could potentially allow a fraudster to obtain sensitive information or hints to passwords. Figure 4: Protect Your Information on Social Networking Sites 10

11 As more companies in the financial industry are using social networks to market their products and services, consumers must be aware of and cautious about who has access to their information. Banking and payments activity on the social networks has attracted the attention of criminal hackers, fraudsters, spammers and scammers. Consumers are more apt to trust both networking sites than other web activities because they are built on the core concept of making friends and networking. Unfortunately, the world s leading social media sites were designed with minimal privacy and security controls. Fraudsters will keep attempting to target users to obtain personal information and steal identities through these avenues. When thinking about joining and/or using a social networking site, keep the following in mind: Consider site privacy and logistics policies: Some sites allow only a controlled community of users to access posted content, while others do not have strict privacy control policies. Restrict access to your profile and information: Do not reveal sensitive information (e.g., full birth date, full address, etc.) on your profile, account settings, or through any communication. Do not correspond with anyone you do not know or trust. Do not post or reveal personal information: SSNs, addresses, driver s license number, phone numbers, or bank and credit card account numbers should never be posted or visible online. Likewise, do not post anyone else s personally identifiable information. Your typical hangouts, groups to which you belong, photographs, and similar information can be used by fraudsters to identity you and misuse your information. Use extreme caution when giving away any information. Use unidentifiable screen names: Make sure your screen name does not reveal your name, age, hometown, or residence. Do not trust strangers: You do not know who you are communicating with or what information this person can extract from your conversations. Always verify the legitimacy of a company before divulging any personal or account information. Do not provide sensitive financial information over the Internet or phone, such as SSNs, passwords, PINs or account numbers, unless you initiated the contact and are communicating with a verified and secure location, such as the number or web address on the back of a credit card or statement. 11

12 JAVELIN S TOP FIVE IDENTITY SAFETY TIPS: HOW YOU CAN FIGHT FRAUD Consumers who take precautionary steps to protect themselves and their identity, and are proactive in their approach to combat identity fraud, are less likely to have their personal information stolen and misused. Javelin s Recommendations for Prevention, Detection and Resolution of Identity Fraud This factual, comprehensive five step safety plan helps battle crimes of mistaken identity: 1. Prevent Criminal Access by Protecting your Paper Documents Keep sensitive information from prying eyes. Request electronic statements, use direct deposit, and don t put checks in an unlocked mailbox. When your Social Security number is requested as an identifier in paper documents, ask if you can provide alternate information. At home or work, secure your personal and financial records in a locked storage device last year, at least 13% of all identity crimes were committed by someone previously known to the victim. Shred any sensitive paper documents. 2. Prevent High Tech Criminal Access Install anti virus software on your computer and keep it updated along with your applications and operating system. Secure your electronic personal and financial records on your computer behind a password. Never respond to requests for personal or account information online (or over the phone). Watch out for convincing imitations of banks, card companies, charities and government agencies in the mail, on the Web, over the phone, or on your mobile device. Use legitimate sources to contact financial institutions, such as an official website or the telephone number listed on statements and the back of bank or credit cards. Don t publish your birth date, mother s maiden name, pet s name or other identifying and personal information on social media websites. Use unique and hard to guess passwords, including for your wireless Internet connection, and don t access secure Web sites using public Wi Fi. Install security patches and software updates as soon as they are released by verified sources. For phones, turn off Bluetooth and Wi Fi if they are not being used. 3. Detect Unauthorized Activity in Existing Accounts Monitor current available bank and credit card account balances at least weekly, via online, mobile, ATM, or touchtone banking. Sign up for alerts to be sent to your mobile phone or e mail account. Javelin s study of 5,000 adults finds 43% of all reported identity fraud cases are spotted by consumers self monitoring their accounts and those who use more timely electronic methods to detect fraud experience lower average out of pocket costs. 4. Detect Fraudulent Establishment of New Accounts Monitor your credit reports and non credit account information to spot unauthorized activity. Free credit reports from each of the three major credit bureaus are available each year through annualcreditreport.com or Optional fee based services, such as more extensive monitoring of credit information, personal identity records and Social Security numbers offer timely and thorough protection. If you receive a letter notifying you that your private records were involved in a data breach, 1) confirm the letter is legitimate 2) take advantage of any free protection services that are offered and 3) place a fraud alert on your credit report. A fraud alert requires lenders to make sure it is actually you applying for credit. One in four letters are followed by actual fraud, yet many who are alerted fail to take action. 5. Resolve Identity Fraud Completely Work through your bank, credit union or protection services provider to report problems immediately and take advantage of your financial provider s offers of loss protections (all large financial institutions offer zero liability for debit and credit cards and many provide the same protection for online banking and bill pay). 12

13 ADDITIONAL RECOMMENDATIONS: A COMPREHENSIVE APPROACH TO FIGHTING FRAUD In addition to Javelin s top five tips, there are many other ways for consumers to protect themselves against identity fraud. Javelin recommends a comprehensive, three part approach to best address and combat fraud: prevention, detection and resolution. This section provides steps to prevent fraud from happening, actions to detect fraud if it does occur, and how to resolve fraud if you become a victim. Figure 5: Secure Your Computer and Personal Information Prevention How Can I Prevent Identity Fraud? Consumers can best prevent identity fraud by carefully protecting sensitive information, such as PINs, banking and financial account numbers, SSNs, and limiting the exposure of potentially personally identifiable information. Consumers also should be aware of common fraudster techniques, such as phishing, vishing, and other scams. 1. Regularly install and update firewall, anti virus and anti spyware software on your computer (and mobile device when possible). Also, all operating systems and browser settings should be up to date. 2. Do not reveal sensitive or personal information on social networking sites. This includes Facebook, Flickr, Friendster, LinkedIn, MySpace and Twitter, among others. These sites can provide fraudsters with personal information to access accounts. 3. Recognize secure websites. Do not provide card or personal information at unsecured sites. EV SSL and SSL sites are the most secure and use encryption and other security methods to protect consumer information. To recognize these sites, make sure there is a padlock symbol and an s after the http in the address bar ( https ). If you double click on the padlock symbol, the SSL certificate will appear. If the website has an additional layer of security (EV SSL), green highlighting will appear in the address bar if the consumer accesses the site using a high security browser. High security browsers are safer for consumers to use (e.g., Microsoft Internet Explorer 7 and 8, Firefox 3, Opera 9.5, Safari 3.2, Google Chrome and Flock 2.0). 4. Reduce unnecessary access to financial cards and documents. Do not carry around Social Security cards or unnecessary credit cards or checks. Shred documents with sensitive information prior to disposal, and keep your documents and all personal information in a safe place, inaccessible to those around you. 13

14 5. Opt out of pre approved credit offers. Call OPTOUT ( ) or visit to be removed from credit card applications and other mail that contains personal information. 6. Follow safe password practices. Passwords should be at least eight characters long, and should be changed frequently. They should contain at least one combination of upper/lowercase letters, numbers, or symbols. Keep them stored in a safe, protected place. Do not use easily guessed passwords, such as your birth date, the name of a close relative, or your pet s name. Do not use dictionary words, the name of the website, or the word password. Capitalized letters shouldn t be the first character (capitalize a random letter) and numbers should be used throughout the password. 7. Use secure internet connections. Avoid accessing websites displaying personal or account information using unsecured Wi Fi connections, such as when at coffee shops, libraries, or airports. The page itself might be secure, but the data transmitted over unsecured wireless connections is not. Also ensure that the Internet connection used at home and at work is through a secure network protected by firewalls. 8. Be aware of your surroundings. Be mindful of those in close proximity that could overhear or watch as you access sensitive financial or personal information. This includes instances when you are on the phone, logging into websites, purchasing at stores, or reading sensitive documents. Detection It is critical that consumers detect fraud as early as possible to minimize potential losses and fraud resolution time. Faster detection results in lower out of pocket expenses for the victim, which includes unreimbursed losses, legal fees, and lost wages. The sooner fraud is detected, the easier it is to resolve, and the less the criminal is able to steal. Figure 6: Earlier Detection Results in Lower Costs and More Timely Resolution How Can I Detect Identity Fraud? Javelin research has consistently shown that consumers are the most successful at being able to detect identity fraud relating to their accounts. The most efficient way to combat fraud is when consumers and institutions (banks, government agencies such as the FTC and other organizations dedicated to fighting fraud) work together. Consumers must be proactive in their approach to best protect themselves against fraud, and should work with institutions in safeguarding their identity. 1. Monitor your credit report on a regular basis. Review and confirm that all the accounts listed belong to you, and that no unauthorized charges have been made or unknown accounts or credit lines have been opened. Free reports are available at AnnualCreditReport.com or by calling By contacting a different one of the three credit bureaus every four months, it is possible to stagger your free reports to review your credit report three times a year at no charge. To block access to your credit report, refer to the Resolution section. 14

15 2. Sign up for e mail and mobile alerts through your primary bank and credit card company. E mail and SMS text alert notifications should be set up through financial institutions to alert customers of suspicious activities and changes to their personal information. There is an array of alert offerings consumers can choose the ones that best coincide with their typical banking behaviors and practices, thereby increasing identity fraud protection. Adding a new registered user and changing the address on the account are the two most common methods used by fraudsters to take over accounts, so setting up a new user alert and an address change alert is important if your financial institution and/or card issuer offer these. 3. Review financial statements promptly. Check account balances at least weekly through online banking, mobile banking, by phone, or ATM. Regularly monitor all financial accounts; banking, biller, and credit card accounts should be carefully analyzed electronically. Waiting for paper statements is one of the slowest and most cumbersome ways to detect fraud. Consumers who discover their frauds using electronic vs. paper statement monitoring have shorter detection times and pay lower average consumer costs. Confirm that all transactions are authorized and that there is no suspicious activity or unapproved changes to accounts. Americans who monitor their accounts frequently are most likely to discover unauthorized activity and to detect fraud earlier, thus reducing costs to all parties involved in resolution. Resolution What Should I Do if I Become a Victim of Identity Fraud? The first thing to remember if you become a victim or identity theft or fraud is not to panic. When it comes to your financial accounts, for example, banks are prepared to deal with the identity theft resolution. There is most likely a team dedicated to resolving identity fraud and guide victims through the process. By following the few simple steps below, you can help ensure that your fraud case is handled as quickly and as painlessly as possible. The following actions can serve as a checklist/resource guide for what to do in the event that you become a victim. 1. Immediately contact your bank and credit card companies. If physical documents such as a checkbook, wallet, or debit or credit cards are lost or stolen, if there is unauthorized account activity (suspicious transactions), or if there are changes to personal information such as to a physical address, e mail address, new registered user, login or password, paper statement turn off, etc., the appropriate institutions must be notified as soon as possible. Depending on the individual case, the financial institutions will close your account, cancel your debit or credit cards, and take any other necessary precautions. They will also assist you in setting up new accounts and reissuing new debit and credit cards. 2. Contact the Federal Trade Commission. To report incidents of suspected fraud or identity theft, contact the FTC online at to fill out a complaint form or call IDTHEFT ( ). Alternately, the FTC can be reached via mail at Identity Theft Clearinghouse, Federal Trade Commission, 600 Pennsylvania Avenue, NW, Washington, D.C Place a fraud alert on your credit report. If your personal information has been compromised, or if you have been a victim of fraud, immediately contact the three primary credit reporting agencies: Equifax, Experian, and TransUnion. (Refer to Figure 6 on page XX for contact information.) All of these companies provide credit monitoring services as well as additional products and services. Fraud alerts notify creditors that a potential fraud has occurred and that they should verify the identity of the applicant before extending credit. An initial alert stays active for 90 days, and an extended alert for identity fraud victims lasts seven years. 4. Consider placing a security freeze on your credit report. If you have been a victim of new accounts fraud more than once and are not actively applying for credit, you may want to place a security freeze on your credit report at each of the three reporting agencies. A security freeze will block access to your credit report, and will help stop new accounts fraud from occurring, but will not stop existing accounts fraud. You should also obtain a copy of your free credit reports to see if the fraud has already occurred. 5. File a police report. If fraud has occurred, contact your local police agency to fill out an identity fraud report. Make sure to save a copy for your personal records. 15

16 IDENTITY FRAUD PROTECTION SOLUTIONS: WHAT S OUT THERE? In addition to the guidelines and recommendations above and throughout the report, there are additional services for consumers who want extra protection against new accounts fraud the type of fraud in which a criminal uses your social security number and other pieces of personal identifying information to create a fraudulent account in your name (e.g., a fraudulent credit card account, or a fraudulent cell phone account). Credit monitoring, credit freezes, and data scanning can either be purchased for a fee, while fraud alerts can be placed at no cost. Figure 7: Identity Fraud Protection Services Service Credit monitoring Fraud alert Credit freeze Personal information monitoring Description A paid subscription service that monitors your credit for suspicious activity or changes to your credit file (i.e., credit inquiries, employment changes, new accounts or address changes) Intended to detect potential new accounts fraud A message that is placed on your credit report, requiring lenders and creditors to confirm your identity before issuing a new line of credit Intended to prevent potential new accounts fraud Freezes your credit file at the credit reporting agencies, which are then prohibited from issuing your credit history to any lender, creditor, etc. Intended to prevent potential new accounts fraud Scans public records, third party databases and Internet sites to detect exposure of your personal information (credit card numbers, Social Security numbers, etc.) Intended to detect potential identity theft 2010 Javelin Strategy & Research Credit monitoring services are generally fee based. They regularly monitor your credit for suspicious activity and changes to your credit file. E mail alerts are sent when abnormal activity is detected. You have unlimited access to your credit report from all three primary credit bureaus. Credit monitoring is designed to detect potential fraud as soon as possible, and is one of Javelin s best customer safety preventative recommendations because it is extremely effective in early fraud detection. Fraud alerts can be set up at no cost by contacting the fraud departments of all three major credit bureaus and asking them to mark your credit file. Each bureau is required by law to notify the other two agencies, but Javelin and consumer privacy advocates recommend placing alerts at all three bureaus. Fraud alerts are an important feature in preventing someone from opening a fraudulent new account (such as a new credit card or loan) in your name. With an alert in place, a creditor is required to use additional measures to verify that consumers applying for credit are really who they say they are. With new accounts fraud being the most expensive and most difficult type of fraud to resolve, consumers should take advantage of this as a critical, preventative service. Fraud alerts remain in place for 90 days, after which the consumer will need to renew the alert. Fraud victims with proof of identity fraud qualify for the seven year victim statement, which will keep the alert in place for seven years. 16

17 Credit freezes lock down your credit file and prevent any lender or creditor from accessing your credit history. This service is designed to block new credit from being issued in your name. If you are a victim of identity fraud, depending upon the state in which you live, you may qualify for free coverage. If you are not eligible for free coverage, it may cost up to $30 to place a freeze and $30 to remove it through the credit bureaus. Credit freezes are only recommended for people who will not be actively applying for credit. If you place a credit freeze, you cannot apply for new credit unless you remove or temporarily lift the freeze, which could take up to a few days. Personal information monitoring is a service that scans public sources of information, including Internet sites and public records, to detect if personal information has been compromised. In using this service, you can determine if there have been changes to your accounts or information. 17

18 WHERE CAN I GO TO GET MORE INFORMATION? There are a number of places to get more information. Javelin has used the results of its study to create an easy to use safety quiz and a list of recommended tips, which can be accessed at: The 2010 Identity Fraud Report s sponsors, Fiserv, ITAC, the Identity Theft Assistance Center, Intersections Inc. and Wells Fargo & Company, also make safety recommendations: Fiserv, Inc. Intersections Inc. tools Wells Fargo & Company ITAC, the Identity Theft Assistance Center Figure 8: How to Contact the Three Credit Bureaus Credit Bureau: Equifax Experian TransUnion Order Credit Report Report Fraud Web Address Mailing Address Equifax Consumer Fraud Division P.O. Box Atlanta, GA Experian Consumer Assistance P.O. Box 9532, Allen, TX TransUnion Victim Assistance Dept. P.O. Box 6790 Fullerton, CA *Note: To order free annual credit report from any or all: contact or call toll free at

19 METHODOLOGY A detailed description of methodology for the Javelin 2010 Identity Fraud Survey Report can be found at IDsafey.net. Common Fraud Scams and Terms To clarify common fraud scams and terminology, definitions are provided below. Javelin uses identity fraud as the term to describe the crime discussed in this report. Because this report s underlying survey was based on interviews with individuals who were the victims of fraud committed using at least some portion of their personal information, it will not include other categories of crime such as synthetic identity fraud, which is based upon a wholly fictitious identity. However, Javelin believes that many identity frauds do contain a mixture of true and synthetic components, and these frauds are included in this report. To clarify the usage of common terms by Javelin and different types of scams, definitions are provided below: Account takeover fraud Advanced fee fraud Cloning mobile phone Cloning payment card Card not present (CNP) Consumer cost Credit freeze Data breach Drive by download Existing accounts fraud method of identity fraud in which a fraud operator attempts to gain access to a consumer account by fraudulently adding his/her information to the account; changing the mailing address or making other alterations any scam that, during its course, requires fees to be paid by the victim before other funds are received. Usually, these fees are explained by the criminals to be processing fees, bribes, finding fees, etc. The other funds are never received by the victim. every mobile phone has a unique electronic serial number (ESN) and telephone number (MIN); a cloned mobile phone has been reprogrammed to transmit the ESN and MIN of a legitimate cell phone and the legitimate phone is billed for the clone s calls on the magnetic stripe of a payment card are two tracks that have recorded the card details, track 1 and track 2. Criminals copy and use the track data details to create duplicate payment cards. transaction in which the card is not present at the time of transaction. Card data is manually inputted. the out of pocket costs incurred by the victim in order to resolve a fraud case. These include postage, copying, notarizing documents, legal fees, and may also include payment of any fraudulent debts in order to avoid further problems security freeze placed on a consumer s credit file to prevent the file from being shared with anyone, thus forestalling new accounts from being opened in the consumer s name unauthorized disclosure of information that compromises the security, privacy, or integrity of personally identifiable data. act of compromising a PC passively by downloading a malicious file while the victim views the content of a Web site identity fraud perpetrated against either or both existing card and existing noncard accounts 19

20 Existing card accounts fraud Existing non card accounts fraud Fraud amount Identity fraud Identity theft Interactive financial messaging Keylogger identity fraud perpetrated using existing credit or debit cards and/or their account numbers identity fraud perpetrated using existing checking and savings accounts, and existing loans, insurance, telephone, and utilities accounts total amount of funds that the fraud operator obtained or tried to obtain illegally. These may result in actual losses to various businesses and organizations (and in some cases to the consumer). These may also be funds that are either recovered or the loss is avoided due to preventive measures adopted by the businesses unauthorized use of some portion of another s personal information to achieve illicit financial gain. Identity fraud can occur without identity theft. For example, it can occur with relatives who are given access to personal information or by the use of randomly generated payment card numbers. unauthorized access to personal information. Identity theft can occur without identity fraud. For example, it can occur with large scale data breaches. two way messaging between FIs and their customers, including alerts for consumer directed prohibitions malicious, hidden software that monitors your keystrokes to collect e mail and online banking usernames and passwords. This information is remotely stored and sent to potential hackers and fraudsters. Mail order/telephone order (MOTO) mail order/telephone order: orders placed through mail or telephone channels (a type of card not present transaction) Malware Man in the middle (MITM) Mutual authentication New Accounts and Other frauds Non identity fraud Pharming Phishing Pretexting Scanning Skimming malicious software designed to gain access to or damage a computer system without the owner's knowledge or consent an attack in which a perpetrator is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised method by which both the FI and the customer can identify each other, for example, by providing and identifying shared secrets. identity fraud perpetrated by using the victim's personal information to open fraudulent new accounts direct misrepresentation by a fraudulent merchant, investment firm, charity or other organization that results in financial loss to the consumer attack in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or consent method of "fishing" for Internet users passwords, financial or personal information by luring them to a fake website through an authentic looking e mail that impersonates the victim s financial institution collection of information about an individual under false pretenses (the pretext ), usually done over the phone, such as calling a bank while posing as a customer to find out personal information a program similar to virus scanners used to detect malicious software on a computer the theft of payment card information in what is otherwise a legitimate transaction (Example: skimming devices are sometimes placed at unattended gas stations to record the card information of purchasers). 20

21 Smishing Spam Spoofing Spyware Surf through downloads Synthetic identity fraud Trojan horse True name fraud Virus Vishing VoIP Worm a version of phishing sent by SMS messaging (text messaging), which sends a cell phone message that directs victims to a website that downloads malicious spyware (Trojan horse) onto the victim s cell phone or computer. unsolicited messaging (usually in the form of e mail) sent out in large quantities to a large number of recipients, usually containing some kind of untrustworthy advertising method in which a person or program successfully disguises itself as another. Generally, the user receives e mail that appears to have originated from a legitimate source when it actually was sent from an illegitimate source. software that is installed unknowingly on a personal computer to intercept or take partial control over the user's computer activity. Spyware programs can collect different types of personal information, but can also interfere with user control of the computer, such as installing additional software and redirecting web browser activity. also known as drive by downloads, surf through downloads are downloads that occur without any knowledge of the user. Surf through downloads may happen by visiting a website, viewing an e mail message or by clicking on a deceptive pop up window. fictitious identity created to defraud an organization; typically generated using a real Social Security number and multiple different names. These frauds are covered under this survey because a consumer victim is involved. To be considered true synthetic identity fraud, all consumer information must be fictitious, which is very rare. In the unlikely event that all components of the identity are fictitious this would not be covered under this survey. program that appears to be a useful file (i.e., a music file or software upgrade) from a legitimate source, tricking the victim into opening it. Once activated, the Trojan horse allows intruders to access private information. see identity fraud a computer program that can replicate itself and infect computers without the owner s consent or knowledge. Viruses can be transmitted as attachments to an e mail or in a downloaded file, or be present on a CD or other forms of digital media. version of phishing that uses a combination of e mail and telephone, or just telephone; the victim is urged to resolve an account issue by a criminal posing as a financial institution, and is thereby prompted to provide personal information. Voice over Internet Protocol: a protocol for transmitting voice over the Internet. Criminals are using VoIP to place autodial phone calls to commit frauds because the calls are inexpensive and difficult to trace. computer program that makes copies of itself on its own. It uses a network connection to send copies of itself to other computers on the network (e.g., by sending out infected e mails). Unlike a virus, it does not need human assistance to travel. 21

2011 Identity Fraud Survey Report: Consumer Version

2011 Identity Fraud Survey Report: Consumer Version February 2011 4301 Hacienda Drive, Pleasanton, CA 94588 USA +1 925.225.9100 t +1 925.225.9101 f www.javelinstrategy.com Table of Contents Overview... 5 Identity Fraud vs. Identity Theft... 6 Methods Criminals

More information

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but

More information

Employee ID Theft Resource Guide

Employee ID Theft Resource Guide Employee ID Theft Resource Guide ID Theft Resolution Legal Resources ID Theft Assistance Updates www.legalresources.net ID Theft What is Identity Theft? Identity Theft is a serious crime in which someone

More information

Information to Protect Our Customers From Identity Theft

Information to Protect Our Customers From Identity Theft Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

What is Identity Theft?

What is Identity Theft? What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.

More information

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

When visiting online banking's sign-on page, your browser establishes a secure session with our server. The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption

More information

How Consumers can Protect Against Identity Fraudsters in 2013

How Consumers can Protect Against Identity Fraudsters in 2013 How Consumers can Protect Against Identity Fraudsters in 2013 February 2013 2 FORWARD Javelin Strategy and Research s How Consumers can Protect Against Identity Fraudsters in 2013 provides recommendations

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

I dentity theft occurs

I dentity theft occurs 1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

Fraud Information and Security

Fraud Information and Security Fraud Information and Security Updated: January 13, 2015 How We Protect You At WySTAR Global Retirement Solutions security is a top priority. We understand that your trust in us depends on how well we

More information

2008 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves

2008 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves 2008 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves February 2008 4309 Hacienda Drive, Pleasanton, CA 94588 925.225.9100 t 925.225.9101 f www.javelinstrategy.com 2008

More information

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage. Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

DVD Companion Learning Guide

DVD Companion Learning Guide DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material

More information

IDENTITY THEFT: MINIMIZING YOUR RISK

IDENTITY THEFT: MINIMIZING YOUR RISK IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social

More information

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit Identity Theft: It Could Happen To You! Attorney General Tom Reilly s Guide to Protecting Yourself and Your Credit One Ashburton Place ~ Boston, MA 02108 ~ (617) 727-2200 www.ago.state.ma.us February 2005

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

2007 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves

2007 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves 2007 Identity Fraud Survey Report Consumer Version February 2007 Telephone: 925.225.9100 Fax: 925.225.9101 Address: 4309 Hacienda Dr., Suite 380 Pleasanton, CA 94588 E-mail: inquiry@javelinstrategy.com

More information

Corona Police Department

Corona Police Department By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,

More information

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Fraud and Identity Theft. Megan Stearns, Credit Counselor Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention

More information

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft. IDENTITY THEFT IDENTITY THEFT Identity theft is a serious crime with serious costs for victims. ID theft occurs when someone obtains your personal information such as your Social Security Number, credit

More information

Identity Theft is a Crime in the State of New Jersey.

Identity Theft is a Crime in the State of New Jersey. NEW JERSEY STATE POLICE Identity Theft: A Victim s Reference Identity Theft occurs when someone uses your personally identifying information like your name, Social Security number, or credit card number

More information

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft, Fraud & You. Prepare. Protect. Prevent. Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government

More information

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to IDENTITY THEFT IDENTITY theft Identity theft can happen to anyone. Previously, criminals stole your wallet for your cash. Now they want your wallet to steal your good name. Protect yourself and your identity.

More information

WHAT S IT ALL ABOUT?

WHAT S IT ALL ABOUT? WHAT S IT ALL ABOUT? Introduction The 1990 s spawned a new variety of crooks called identity thieves. Their stock in trade? Your everyday transactions, which usually reveal bits of your personal information:

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09 IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center

More information

Protect Yourself From Identity Theft

Protect Yourself From Identity Theft Protect Yourself From Identity Theft The facts about identity theft Imagine a typical day. In our fast-paced, hectic lives, we all engage in activities that we may take for granted. We write checks and

More information

2009 Identity Fraud Survey Report: Consumer Version

2009 Identity Fraud Survey Report: Consumer Version 2009 Identity Fraud Survey Report: Consumer Version Prevent Detect Resolve February 2009 2009 Javelin Strategy & Research 4301 Hacienda Drive, Pleasanton, CA 94588 USA +1 925 225 9100 t +1 925.225.9101

More information

2009 Identity Fraud Survey Report: Consumer Version

2009 Identity Fraud Survey Report: Consumer Version 2009 Identity Fraud Survey Report: Consumer Version Prevent Detect Resolve February 2009 2009 Javelin Strategy & Research 4301 Hacienda Drive, Pleasanton, CA 94588 USA +1 925 225 9100 t +1 925.225.9101

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot

More information

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen FTC Facts For Consumers Federal Trade Commission For The Consumer August 2005 Identity Crisis... What to Do If Your Identity is Stolen Maybe you never opened that account, but someone else did...someone

More information

Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores

Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores Important Customer Notice Information Concerning Data Security Incident at Some Staples Stores Staples wants to make customers aware that we have confirmed a data security incident involving customer payment

More information

Protect Yourself From Identity Theft

Protect Yourself From Identity Theft Protect Yourself From Identity Theft The facts about identity theft Imagine a typical day. In our fast-paced, hectic lives, we all engage in activities that we may take for granted. We write checks and

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

Guide to Identity Theft

Guide to Identity Theft Guide to Identity Theft 1 Receive a free copy of your credit report. Visit www.annualcreditreport.com to get a copy of your credit report from all three credit reporting agencies. Review your credit report

More information

HOME DEPOT DATA BREACH

HOME DEPOT DATA BREACH HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data

More information

T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E

T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E A I D E N T I T Y T H E F T G U I D E Prepared and distributed as a Public

More information

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you Identity theft is a terrible problem in this Information Age. You have already taken the first important step by contacting ACNB Bank immediately. ACNB Bank will work with you every step of the way to

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information

Business Identity Fraud Prevention Checklist

Business Identity Fraud Prevention Checklist Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

Identity Protection Guide. The more you know, the better you can protect yourself.

Identity Protection Guide. The more you know, the better you can protect yourself. Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious

More information

When Fraud Comes Knocking

When Fraud Comes Knocking When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information.

We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information. EQUIFAX AUTHORIZATION CODE July, 2012 Dear [insert name]: We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information. On or

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain.

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain. Identity Theft Identity Theft Occurs when someone uses your personal information without your permission for personal gain. Someone uses your personal information to open a department store credit account

More information

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year.

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year. October 1, 2015 Office of the Attorney General Attn: Security Breach Notification 200 St. Paul Place Baltimore, MD 21202 Idtheft@oag.state.md.us To Whom It May Concern: I am writing on behalf of Scottrade

More information

How To Get Help From The Police Department

How To Get Help From The Police Department IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification

More information

IDENTITY THEFT RESOURCE KIT

IDENTITY THEFT RESOURCE KIT IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What

More information

Identity Theft. Providing Your Student with a Safety Net By Sun Ow

Identity Theft. Providing Your Student with a Safety Net By Sun Ow Identity Theft Providing Your Student with a Safety Net By Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial

More information

Identity Theft Assistance: Information for Recovering Your Good Name

Identity Theft Assistance: Information for Recovering Your Good Name Identity Theft Assistance: Information for Recovering Your Good Name I Could Be A Victim of Identity Theft! What Do I Do Next? We understand that you may have been a victim of identity theft. Enclosed

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH...

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... CONTAINMENT AND CONTROL... INVESTIGATING A SECURITY

More information

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain. Common ID Theft TACTICS. HOW DOES IT HAPPEN? Identity What should I do if I m a Protection PROTECT YOURSELF: OLD-FASHIONED STEALING: Criminals steal your wallet or purse. > Never leave your wallet or purse

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic

More information

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every

More information

Identity Theft: When You Are the Target

Identity Theft: When You Are the Target F O R F O R Y O U R Y O U R L I F E R E T I R E M E N T Identity Theft: When You Are the Target What s inside What Is Identity Theft?... 2 How Does Identity Theft Occur?... 2 How Can You Protect Yourself?...

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft identity theft unit new york county district attorney s office Protecting Yourself from Identity Theft cyrus r. vance, jr. district attorney 5 / 2010 questions and answers Dear Friends, cyrus r. vance,

More information

Corporate Account Take Over (CATO) Guide

Corporate Account Take Over (CATO) Guide Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,

More information

IDENTITY THEFT CHECKLIST PROTECTION

IDENTITY THEFT CHECKLIST PROTECTION IDENTITY THEFT PROTECTION CHECKLIST Identity theft is a risk that continues to grow and change daily. Due to the many forms identity theft can take, including medical, credit and financial theft, the threat

More information

Frequently Asked Questions How our service works:

Frequently Asked Questions How our service works: Frequently Asked Questions How our service works: 1. What does isekurity service provide? 2. Do I have to do anything else after signing up? 3. What will I receive once I enroll in isekurity? 4. When will

More information

PREVENTING ID THEFT101

PREVENTING ID THEFT101 PREVENTING ID THEFT101 701.255.0042 www.capcu.org i This book is intended as a general guide to the topics discussed, and it does not deliver accounting, personal finance, or legal advice. It is not intended,

More information

IDENTITY ALERT: The Fight to Defend Your Identity and Personal Information

IDENTITY ALERT: The Fight to Defend Your Identity and Personal Information IDENTITY ALERT: The Fight to Defend Your Identity and Personal Information A frightening crime with an untraceable weapon, identity theft is creating anxiety across the country. In fact, 2 out of 3 Americans

More information

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Identity Theft Awareness: Don t Fall Victim to these Common Scams Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with

More information

Citi Identity Theft Solutions

Citi Identity Theft Solutions Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information

More information

How to Deal With Identity Theft

How to Deal With Identity Theft FREE YOUR MIND http://freeyourmindonline.net How To Recover From Identity Theft Download the Identity Theft Help Kit (http://freeyourmindonline.net/identity-theft-help.html) to go along with this article.

More information

To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g

To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g The Internet offers the opportunity to bank and shop in safety whenever you want. More than 15 million people in the UK now use

More information

Protecting Yourself From Identity Theft And Fake Check Scams. Faculty. Question. The Law. The Law. The Law

Protecting Yourself From Identity Theft And Fake Check Scams. Faculty. Question. The Law. The Law. The Law Protecting Yourself From Identity Theft And Fake Check Scams Satellite Conference and Live Webcast Wednesday, July 16, 2008 2:00-4:00 p.m. (Central Time) Faculty Monica S. Sheeler Consumer Specialist Office

More information

How To Prevent Identity Theft

How To Prevent Identity Theft We take the protection of your personal information seriously and are diligently taking action to prevent a recurrence. Both E-conolight and our hosting company continue to investigate every aspect of

More information

Identity Theft and Fraud

Identity Theft and Fraud Identity Theft and Fraud Identity theft is a term that refers to crimes in which someone wrongfully obtains and uses another person s personal data (i.e., name, date of birth, social security number, driver

More information

suntrust.com 800.SUNTRUST

suntrust.com 800.SUNTRUST suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally

More information

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

identity theft: How To Safeguard Your Privacy and Keep Your Good Name identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity

PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity Identity fraud occurs anytime your personal information is used without your authority and is more than just credit card

More information

Protecting Yourself Against Fraud and Identity Theft

Protecting Yourself Against Fraud and Identity Theft Summit Branches are conveniently located in Rochester (8), Seneca Falls (1), Buffalo (2), Syracuse (5) and Cortland (2) Protecting Yourself Against Fraud and Identity Theft A presentation by The Summit

More information

How To Protect Yourself From Identity Theft

How To Protect Yourself From Identity Theft Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

May 11, 2016. Re: Notice of a Data Breach. Dear

May 11, 2016. Re: Notice of a Data Breach. Dear Processing Center P.O. BOX 141578 Austin, TX 78714 May 11, 2016 Re: Notice of a Data Breach Dear Kalamazoo College is committed to maintaining the privacy and security of our current and former employees

More information

Fraud. Spot it.stop it. Keep Your Finances Safe

Fraud. Spot it.stop it. Keep Your Finances Safe Fraud Spot it.stop it. Keep Your Finances Safe 2003 MasterCard International Incorporated. All rights reserved. MasterCard is a registered trademark of MasterCard International. DON T PAY A HIGH PRICE

More information

What is it? How does it occur? How potentially devastating it can be? How do we detect fraud? How can we minimize the risk of being victimized?

What is it? How does it occur? How potentially devastating it can be? How do we detect fraud? How can we minimize the risk of being victimized? IDENTITY THEFT & PREVENTION Bucknell University Department of Public Safety Identity Theft Learning Objectives What is it? How pervasive is it? How does it occur? How potentially devastating it can be?

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Substitute Notice for Village Pizza

Substitute Notice for Village Pizza Substitute Notice for Village Pizza Village Pizza is committed to protecting the personal information provided to us by our customers. This notice is regarding an incident involving some of that information.

More information

Identity Theft. Prevention and Recovery Information Kit

Identity Theft. Prevention and Recovery Information Kit Identity Theft Prevention and Recovery Information Kit A step-by-step guide designed to help you protect your identity and recover if you ve been victimized. 800-522-4100 valleynationalbank.com 2012 Valley

More information

Standard 9: The student will identify and explain consumer fraud and identity theft.

Standard 9: The student will identify and explain consumer fraud and identity theft. TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

Identity Theft. Emergency Repair Kit

Identity Theft. Emergency Repair Kit Identity Theft Emergency Repair Kit 2012 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Any duplication or reproduction is strictly prohibited. Identity Theft Emergency Repair

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY

More information