Targeting businesses can be much more profitable for fraudsters than personal identity theft.

Size: px
Start display at page:

Download "Targeting businesses can be much more profitable for fraudsters than personal identity theft."

Transcription

1 When You Aren t You: Corporate Identity Theft A New Snake in the Grass... (and Check Fraud Still #1.) CorporateIdentity Theft CorporateIdentity Theft is one of the newest financial threats facing businesses and organizations. Presented at 2015 Greg Litster, President SAFEChecks There are two major types of Corporate Identity Theft. In one major type, fraudsters target and imitate a legitimate business. Targeting businesses can be much more profitable for fraudsters than personal identity theft. Dun & Bradstreet has reported cases of corporate identity theft in at least 22 states, and predicts this crime will spread across the country. Corporateidentity theft is the unauthorized use of a company s name and information by criminals in order to illegally obtain money, goods, or services. The Internet has made it easy to create a non-existent business that looks legitimate no organization is immune from the threat of corporate identity theft. Some losses have reached a half-million dollars before the crime was discovered. 1 1

2 When banks or other commercial lenders evaluate a business, they look for evidencethat the company is what its officers say it is, and that it has the legal and financial capacity to conduct its business. Evidence = Proof of Right Proof of Right can include financial statements business addresses telephone numbers government licenses credit history etc. Each Proof of Right that can be verified increases the appearance of a company s legitimacy. Thieves can create fraudulent Proofs of Right by gaining access to state government records of legitimate businesses, and then altering company information, such as the registered agents names and addresses. Criminals open new bank accounts and obtain loans and credit cards in the name of the business, often using the compromised identity of business owners or officers. They use falsified financial statements to even lease offices, furniture and equipment, creating the illusion of a successful business. They use bank loans and retailer lines of credit to purchases items that can readily be sold for cash. Often, this leaves the unwitting victimized business awash in debt and legal fees defending itself against creditors. 2 2

3 Criminals tend to target smaller and midsize businesses with strong credit ratings that are easily identified through credit rating agencies. Business credit reports are intended to promote buying and selling, and help managers make risk assessment decisions, so business credit reports are readily available to virtually anyone. Family businesses, churches, and inactive companies have been targeted. Smaller businesses with strong credit ratings are tempting targets for criminals because they often have fewer legal and financial defenses than large corporations. Real Life Examples. In California: A seafood company received an order for $500,000 worth of goods. After completing a credit check, the company shipped the order and billed the customer. The customer responded that it had never placed nor received the order. It was discovered that the customer's credit information and a different address had been given by a fraudster. In California, identity thieves moved into the same building as a law firm under the firm's own name! and billed the firm for $70,000 worth of computers and furniture. When the products arrived, they hired a moving truck and disappeared. By that time, both the goods and the thief had already vanished. 3 3

4 In Oregon, identity thieves reinstated old mining companies to steal their corporate identity. (Oregon recently established limits on how long a company can be dormant before it is reinstated.) In Colorado: Criminals updated or altered the registration information on file with the state. After the registration information was changed, the criminals used the altered corporate identity to make online applications for credit from various retailers, including Home Depot, Office Depot, Apple and Dell. Colorado authorities became aware of the scam after one of the targeted companies was contacted by a major retailer regarding nearly $250,000 in purchases made in its name. In Colorado: A small business owner learned of his company s identity theft when he contacted Dun & Bradstreet to ensure an address change was recorded properly. That's when he learned of a new registered agent and address -an Aurora mail drop that was set up to forward everything to California. The thieves also had changed key information about his company on Dun & Bradstreet's database, such as increasing the number of his employees from 15 to 150 and his company's annual revenues by a factor of 10! In Florida: An aviation company had been dissolved by the owners. It was then reinstated by corporate identity thieves. Soon after, they applied for a $140,000 federal fuel tax credit, which was delivered as a check. The scammers and the money disappeared and the previous owners only learned about it when the IRS came knocking on their door." Solutions to this type of Corporate Identity Theft. Many state governments are actively working to help better protect government controlled and regulated business data. 4 4

5 The biggest challenge is alerting and educating organizations about this new type of crime, and motivating them actively self-monitor. Defensive strategies include using better passwords, dual-authentication controls, and checking business legal filings regularly. Organizations should protect their business EIN / TIN as they would a Social Security number. Businesses should verifyatypical large purchases and change of shipping address from current clients. Businesses should verifyunusual large purchases from new clients. Keep all documents containing business information or business identifiers in a secure place that is not accessible by unauthorized persons. Shred them when discarded. Use caution when completing a credit application. Criminals post fake credit applications, and after a legitimate company has filled it out, the criminals have all the information they need to defraud the business, or obtain loans or lines of credit in the business' name. Review your commercial and business banking agreements understand the time frames for reporting fraud, anomalies, etc. Monitor your business accounts daily. Many banks provide and text alerts regarding your account activity, which can help alert you to suspicious transactions. 5 5

6 If your business provides or maintains a list of trade or credit references, request each reference to notify you if they are contacted by a third party. If you are not applying or planning to apply for new credit, you can place a security freeze on your personal credit to prevent businesses with whom you do not already have an existing relationship from accessing your credit file. Training!! Protecting your business, and the sensitive information of your business, your customers, and employees is the responsibility of everyone in your organization. In the second major category of Corporate Identity Theft, criminals target an organization s clients or vendors through Corporate Hacking. Hackers target Accounts Receivable List Hackers target Accounts Receivable List Send bogus change-of-bank notifications to customers Hackers target Accounts Receivable List Send bogus change-of-bank notifications to customers New PO Box controlled by hackers Hackers target Accounts Receivable List Send bogus change-of-bank notifications to customers New PO Box controlled by hackers New Bank R/T and account controlled by hackers Solutions to this type of Corporate Identity Theft. 6 6

7 Banks: Monitor bank changes on outgoing repetitive wires Banks: Monitor bank changes on outgoing repetitive wires Companies: Confirm ALL bank change notifications from vendors Banks: Monitor bank changes on outgoing repetitive wires Companies: Confirm ALL bank change notifications from vendors Buy cyber crime and check fraud insurance Banks: Monitor bank changes on outgoing repetitive wires Companies: Confirm ALL bank change notifications from vendors Buy cyber crime and check fraud insurance Use payee positive pay and high security checks RESOURCES: businessidtheft.org Dun & Bradstreet Bloomberg BusinessWeek, The Council of State Governments Also, review information and resources offered by your state and local government. Check Fraud Why talk about Check Fraud? Check Fraud Produces more $ Losses than all other types of payment fraud! AFP 2015 Payments Fraud Survey 50%of organizations still issue checks. Check fraud is not going away! AFP 2015 Payments Fraud Survey Checks remain the most-often targeted payment method by those committing fraud attacks. Check fraud also accounts for the largest dollar amount of financial loss due to fraud. 7 7

8 Fraudulent Payments by Method (Respondents were hit multiple ways; total > 100%) Fraud Losses by Method How Dollars were actually lost CHECKS 77% Corporate Cards 34% Wire Tranfers 27% CHECKS 45% Corporate Credit Cards 25% Wire Transfers 20% ACH Debits 7% 40 ACH Debits 25% 40 Corporate 20 ACH Credits 10% 20 Debit Cards 2% The newest twists on Check Fraud. ACH Credits 1% 0 Percentage 0 Percentage Mobile Banking and Deposit Fraud: Double Debits Mobile Banking Deposit Fraud Scenario: A check is mailed to Dishonest Don Don deposits the check using smart phone app Digitized check is paid at drawer s bank 10 days later, Don cashes the same check at a check cashing store 2 nd check hits the drawer s bank account (check is presented for payment twice) Who Takes The Loss? The answer is found in the Rules governing Check 21 Under the Warranty Liability for the loss falls to the bankthat allowed its customer to use its smart phone app. Bank can charge the loss against its customer (assuming $$ is still there) Mobile Banking and Deposit Fraud: Holder in Due Course Scenario: A title insurance company gives John Doe a check at closing. John Doe deposits the check via a mobile app, then comes back to office and returns the check, asking that it be made payable to John Doe orjane Doe. 8 8

9 The company doesn t think to place a Stop Payment on the first check because they have the check in hand. 1. If a physical check is returned for a replacement, place a stop paymenton the returned check. It may have been deposited remotely. 2. Recipient MUST sign an affidavitstating the check was not deposited. 3. An Affidavit does not provide protection, only a right to sue and collect legal fees. Strategies to Prevent Check Fraud Don t Write Checks! Use Commercial Purchase Cards Pay electronically (ACH) But, if you are going to write checks #1. Positive Pay Positive Pay......a powerful tool! PositivePay.net #2. High Security Checks Effective check fraud prevention strategies begin with a high security check. 9 9

10 High Security Checks 1. Deter the forger(psychological warfare) 2.Thwart forgers attempts to replicateor alter the check 3.Provide legal protection from some Holder in Due Course claims (UCC 3-302) What makes a check secure? 10+ safety features Important Security Features Controlled Check Stock Dual-tone True Watermark Thermochromatic Ink (reacts to heat) Warning Bands worded correctly Toner Anchorage Copy Void Pantograph Chemical-reactive Ink + Paper Inventory Control Number on Back (laser) UV Ink + UV Fibers Microprinting Laid Lines Controlled Check Stock Is a critical security feature Checks should beunique in some wayto every other organization s check stock No two organizations should have the exact, identical check stock Uncontrolled Check Stock Checks ARE NOTuniquely designed or customized for every end-user It is sold entirely blankto countless entities, organizations, and fraudsters, by print brokers all over the USA How is Uncontrolled Check Stock a problem? Counterfeit Cashiers Checks Counterfeit Cashiers Checks Counterfeit Cashiers Checks 10 10

11 Counterfeit Cashiers Checks Counterfeit Cashiers Checks Holder in Due Course and Uncontrolled Check Stock Web: FraudTips.net HIDC & Uncontrolled Check Stock Robert Triffinv. Somerset Valley Bank and Hauser Contracting Company Obtaining Controlled Check Stock 1. Custom-manufacturechecks using an ORIGINAL design, true-watermarked paper, and at least 10 security features, OR 2. Buy from a supplierthat only sells controlled check stock that has never been replicated or used in a check fraud scam. SAFEChecks.com Other Important Security Features Dual-tone True Watermark Thermochromatic Ink (reacts to heat) Warning Bands worded correctly Toner Anchorage Copy Void Pantograph Chemical-reactive Ink + Paper Inventory Control Number on Back (laser) UV Ink + UV Fibers Microprinting Laid Lines HIDC & High Security Checks Robert Triffin v. Pomerantz Staffing Services AFP 2014 Payments Fraud Survey Check Fraud Methods Alterations: 1. Payee Name Alterations = 52% 2. Dollar Amount Alterations = 37% This is up from 49% and 22% respectively, in the 2013 Survey. AFP 2014 Payments Fraud Survey Most of these alterations could have been prevented with check security features! 1. Payee Name Alterations = 52% 2. Dollar Amount Alterations = 37% 11 11

12 Preventing Altered Payees High-security checks 14 point font for Payee Name High-quality toner Hot laser printer Payee Positive Pay Frank Abagnale s s Fraud Bulletin on Laser Check Printing Positive Pay Provides NO PROTECTION Against Added Payee Names! #3. Secure Check Writing Software To Prevent Added Payees Typical Check Layout Fix it:use a Secure Name Font Secure Name Font printed above original payee name helps eliminate Added Payee Name Risk Leaves No Room for Adding Bogus Payee Secure Name Font printed above original payee name helps eliminate Added Payee Name Risk Open Areas Where Forgers Add A New Payee Name Secure Name Font No room for an Added Payee Identical data is printed on both checks. Which check would forgers prefer to attack? Greg Litster, President SAFEChecks (800) 949-BANK (818) cell greg@safechecks.com GLITSTER@aol.com # # # # 12 12

HOLDER IN DUE COURSE and CHECK FRAUD

HOLDER IN DUE COURSE and CHECK FRAUD HOLDER IN DUE COURSE and CHECK FRAUD Frank Abagnale President, Abagnale and Associates www.abagnale.com Greg Litster President, SAFEChecks Canoga Park, CA (800) 949-2265 greg@safechecks.com Every company

More information

The New Faces of Fraud. and. and. How to Thwart Them. Mobile Banking and Deposit Fraud. Mobile Banking/Deposit Fraud: Slides #3 6

The New Faces of Fraud. and. and. How to Thwart Them. Mobile Banking and Deposit Fraud. Mobile Banking/Deposit Fraud: Slides #3 6 The New Faces of Fraud and How to Thwart Them Presented at By Greg Litster, SAFEChecks Mobile Banking/Deposit Fraud: Slides #3 6 Check Fraud and Payment Fraud: Slides #7 91 Cyber Crime: Slides #92 end

More information

CHECK 21, REMOTE DEPOSIT CAPTURE and CHECK FRAUD: Summary and Detailed Explanation

CHECK 21, REMOTE DEPOSIT CAPTURE and CHECK FRAUD: Summary and Detailed Explanation CHECK 21, REMOTE DEPOSIT CAPTURE and CHECK FRAUD: Summary and Detailed Explanation Check 21, Remote Deposit Capture and Check Fraud.in Layman s Terms Check 21 s Final Rule includes an Indemnity provision

More information

CAPITAL PERSPECTIVES DECEMBER 2012

CAPITAL PERSPECTIVES DECEMBER 2012 CAPITAL PERSPECTIVES DECEMBER 2012 MITIGATING PAYMENT FRAUD RISK: IT S A WAR ON TWO FRONTS Payment fraud continues to be one of the biggest risk management challenges facing corporate treasury managers

More information

Business Identity Fraud Prevention Checklist

Business Identity Fraud Prevention Checklist Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business

More information

The FRAUD Bulletin. Volume 14. ACH Fraud Mobile Fraud Corporate Identity Theft Small Business Fraud Check Fraud Scams Cyber Crime.

The FRAUD Bulletin. Volume 14. ACH Fraud Mobile Fraud Corporate Identity Theft Small Business Fraud Check Fraud Scams Cyber Crime. The FRAUD Bulletin ACH Fraud Mobile Fraud Corporate Identity Theft Small Business Fraud Check Fraud Scams Cyber Crime Inside this Issue Volume 14 1 Check Fraud It s Still #1 2 Fraud Goes Mobile 3 Cyber

More information

The Fraud Bulletin. Volume 11. Mobile Banking Fraud Cyber Crime Embezzlement Identity Theft Check Fraud Holder In Due Course.

The Fraud Bulletin. Volume 11. Mobile Banking Fraud Cyber Crime Embezzlement Identity Theft Check Fraud Holder In Due Course. The Fraud Bulletin Volume 11 Mobile Banking Fraud Cyber Crime Embezzlement Identity Theft Check Fraud Holder In Due Course Inside this Issue 1 Check Fraud Our Greatest Threat 2 Preventing Embezzlement

More information

Cybercrime, Mobile Banking Fraud, Check Fraud, Embezzlement. Greg Litster SAFEChecks (800) 949-2265 GLITSTER@aol.com greg@safechecks.

Cybercrime, Mobile Banking Fraud, Check Fraud, Embezzlement. Greg Litster SAFEChecks (800) 949-2265 GLITSTER@aol.com greg@safechecks. Cybercrime, Mobile Banking Fraud, Check Fraud, Embezzlement Greg Litster SAFEChecks (800) 949-2265 GLITSTER@aol.com greg@safechecks.com Smartphones and Tablets Criminals are targeting smartphones and tablets

More information

Identity Theft. Protecting Your Credit Identity 1.3.1.G1

Identity Theft. Protecting Your Credit Identity 1.3.1.G1 Identity Theft Protecting Your Credit Identity Identity Theft The dollar loss suffered because of identity theft from consumers was 343 million in 2002. Federal Trade Commission The number of identity

More information

IDENTITY THEFT: MINIMIZING YOUR RISK

IDENTITY THEFT: MINIMIZING YOUR RISK IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social

More information

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft, Fraud & You. Prepare. Protect. Prevent. Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious

More information

GUIDE TO PROTECTING YOUR BUSINESS

GUIDE TO PROTECTING YOUR BUSINESS GUIDE TO PROTECTING YOUR BUSINESS GT44GPBW As a small business owner, fraud is a significant threat to your business. According to a 2012 study by the Association of Certified Fraud Examiners, the smallest

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

Banking Solutions for Nonprofits 101. Four Money Saving Strategies for Nonprofits with Bank Products

Banking Solutions for Nonprofits 101. Four Money Saving Strategies for Nonprofits with Bank Products Banking Solutions for Nonprofits 101 Four Money Saving Strategies for Nonprofits with Bank Products Understanding Bank Options for Nonprofit Organizations What type of accounts are available for Nonprofits

More information

CHECK FRAUD. Federal Reserve System

CHECK FRAUD. Federal Reserve System CHECK FRAUD Federal Reserve System Check fraud affects every financial institution, every business, and every individual throughout the United States and around the world. Industry sources estimate that

More information

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online. 1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful

More information

Check Fraud, Identity Theft and Embezzlement

Check Fraud, Identity Theft and Embezzlement Invest in you SM F R A N K W. A B A G N A L E S Check Fraud, Identity Theft and Embezzlement VOLUME II INSIDE THIS ISSUE Check Fraud A National Epidemic........ 1 Check Fraud Prevention Best Practices....

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to IDENTITY THEFT IDENTITY theft Identity theft can happen to anyone. Previously, criminals stole your wallet for your cash. Now they want your wallet to steal your good name. Protect yourself and your identity.

More information

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are

More information

Business Email Compromise Scam

Business Email Compromise Scam Business Email Compromise Scam The FBI has issued a warning about a significant spike in victims and dollar losses stemming from an increasingly common scam in which crooks spoof communications from executives

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

IDENTITY THEFT FRAUD

IDENTITY THEFT FRAUD FRAUD ALERT! SYNTHETIC IDENTITY THEFT FRAUD & n How to Protect Yourself n Data Breaches and You n Free Credit Reports SYNTHETIC IDENTITY THEFT and FRAUD It is hardly news that identity thieves and cybercriminals

More information

Preventing Identity Theft National City Bank. How to protect your identity

Preventing Identity Theft National City Bank. How to protect your identity Preventing Identity Theft National City Bank How to protect your identity Understanding and Preventing Identity Theft Identity Theft is the fastest growing crime in America 500,000 people fall victim to

More information

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION

More information

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity

More information

Combating Fraud on Corporate Checking Accounts

Combating Fraud on Corporate Checking Accounts Combating Fraud on Corporate Checking Accounts A Bank of America White Paper One in a series of white papers prepared by Bank of America on key issues of interest to corporate treasurers. The information

More information

PROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET

PROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET PROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET Money Transfer Scams Many scammers ask consumers to send money by wire transfer through companies like Western Union and MoneyGram. If you wire money and

More information

The FRAUD Bulletin. Volume 12. ACH Fraud Mobile Fraud Corporate Identity Theft Small Business Fraud Check Fraud Scams Cyber Crime.

The FRAUD Bulletin. Volume 12. ACH Fraud Mobile Fraud Corporate Identity Theft Small Business Fraud Check Fraud Scams Cyber Crime. The FRAUD Bulletin ACH Fraud Mobile Fraud Corporate Identity Theft Small Business Fraud Check Fraud Scams Cyber Crime Inside this Issue Volume 12 1 Check Fraud It s Still #1 2 The Mobilization of Fraud

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

Client Education. Learn About Identity Theft

Client Education. Learn About Identity Theft Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that

More information

Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction.

Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction. Getting a Handle on Debit and Credit Cards Plastic Fraud State-of-the-art thieves are concentrating on plastic cards. In the past, this type of fraud was not very common. Today, it is a big business for

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

Identity Theft: It CAN Happen to You

Identity Theft: It CAN Happen to You Aging Well: Healthier, Happier and Less Hassled An Educational Series for Seniors and their Caregivers Identity Theft: It CAN Happen to You How would you feel if you were stopped for a traffic violation

More information

Identity Protection Guide. The more you know, the better you can protect yourself.

Identity Protection Guide. The more you know, the better you can protect yourself. Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious

More information

HOME DEPOT DATA BREACH

HOME DEPOT DATA BREACH HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data

More information

JUST BEGINNING. Your financial life is. I m Buying a Car!

JUST BEGINNING. Your financial life is. I m Buying a Car! Your financial life is JUST BEGINNING. The decisions you make now will put a steering wheel and a credit card in your hands. But they will also affect your financial future. Your choices may even prevent

More information

Corona Police Department

Corona Police Department By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,

More information

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center

More information

Driving License. National Insurance Number

Driving License. National Insurance Number STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

CORPORATE IDENTITY FRAUD: A PRIMER

CORPORATE IDENTITY FRAUD: A PRIMER CORPORATE IDENTITY FRAUD: A PRIMER Hanim Norza Baba, Head of Graduate Studies Center, Universiti Teknologi MARA, Melaka, Malaysia. drhanimnorzababa@gmail.com ABSTRACT Corporate identity fraud occurs when

More information

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Identity Theft Awareness: Don t Fall Victim to these Common Scams Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

Financial Safety. Protection so you can focus on what matters most

Financial Safety. Protection so you can focus on what matters most Financial Safety Protection so you can focus on what matters most Protect yourself against threats in person and online. Keeping you informed about identity theft, online scams, ATM skimmers and other

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

For more information, please refer to our Check Armor FAQ: https://www.blackbaud.com/files/pdf/blackbaud forms/checkarmorfaq.pdf

For more information, please refer to our Check Armor FAQ: https://www.blackbaud.com/files/pdf/blackbaud forms/checkarmorfaq.pdf Check fraud is one of the largest challenges facing nonprofits and financial institutions today. With the advancement of computer technology, it is increasingly easy for criminals to manipulate checks

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

CASHIER S CHECKS OTHER OFFICIAL INSTRUMENTS

CASHIER S CHECKS OTHER OFFICIAL INSTRUMENTS CASHIER S CHECKS OTHER OFFICIAL INSTRUMENTS Would You Be Deceived? Cashier s checks have long been a trusted method for making a payment. Recently, however, the use of counterfeit cashier s checks and

More information

Employment Internet Fraud FABRICS4YOU Textiles

Employment Internet Fraud FABRICS4YOU Textiles FRAUD TIP OF THE WEEK Employment Internet Fraud FABRICS4YOU Textiles A Latvian Textile Company Located in the United Kingdom By Detective Paul Henninger Salem Police Department March 2, 2007 During the

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. And EmergingWealth Investment

More information

8/13/2014. Types of Identity Theft HOW IS IDENTITY THEFT DISCOVERED? Identity Theft. Run up existing accounts. Create new accounts.

8/13/2014. Types of Identity Theft HOW IS IDENTITY THEFT DISCOVERED? Identity Theft. Run up existing accounts. Create new accounts. According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States Increasing an average nearly 40 percent per year for the past several years. The

More information

Identity Theft: Informational Workshop

Identity Theft: Informational Workshop Identity Theft: Informational Workshop ~ Prepared By ~ Connecticut Department of Consumer Protection Jerry Farrell, Jr. Commissioner 1 The Department of Consumer Protection Mission The Department of Consumer

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every

More information

Torn Identity: Preventing New Forms of Corporate Identity Theft

Torn Identity: Preventing New Forms of Corporate Identity Theft Torn Identity: Preventing New Forms of Corporate Identity Theft Bonnie J. Hertz, CTP Cash Manager North Pacific Group, Inc. Greg Hansen VP, Product Management Wells Fargo Bank 1 Agenda Overview of fraud

More information

Questions and Answers About the Identity Theft Red Flag Requirements

Questions and Answers About the Identity Theft Red Flag Requirements Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,

More information

NCUA LETTER TO CREDIT UNIONS

NCUA LETTER TO CREDIT UNIONS NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

HSS Visiting Speaker Program Frank W. Abagnale: Fraud and Theft in the Information Age. October 28, 2009

HSS Visiting Speaker Program Frank W. Abagnale: Fraud and Theft in the Information Age. October 28, 2009 1 of 8 In the United States, the FBI ranks cyber crime and identity theft as the third highest threat, just after terrorism and espionage. In October 2009, the FBI indicted the largest number of defendants

More information

Armstrong State University Fall Staff Assembly. Chief Wayne Willcox, MSCJ, CLEE

Armstrong State University Fall Staff Assembly. Chief Wayne Willcox, MSCJ, CLEE Armstrong State University Fall Staff Assembly Chief Wayne Willcox, MSCJ, CLEE Identity Theft: When someone uses your personal information without your permission to commit fraud or other crime Name Social

More information

The University of North Carolina at Charlotte Identity Theft Prevention Program

The University of North Carolina at Charlotte Identity Theft Prevention Program The University of North Carolina at Charlotte Identity Theft Prevention Program Program Adoption As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule ( Rule ),

More information

Identity Theft Grade Level 10-12

Identity Theft Grade Level 10-12 Identity Theft Grade Level 10-12 Take Charge of Your Finances Materials provided by: Karen Dawson, Family and Consumer Sciences Educator, Skyview High School, Billings, Montana Time to complete: 75 minutes

More information

Identity Theft. Officer Rob Romey IPD Crime Prevention Officer. crimeprevention@indepmo.org

Identity Theft. Officer Rob Romey IPD Crime Prevention Officer. crimeprevention@indepmo.org Identity Theft Officer Rob Romey IPD Crime Prevention Officer 816-325 325-7643 crimeprevention@indepmo.org What Is Identity Theft? Identity theft occurs when someone possesses or uses your name, address,

More information

When Fraud Comes Knocking

When Fraud Comes Knocking When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.

More information

The Home Depot Provides Update on Breach Investigation

The Home Depot Provides Update on Breach Investigation The Home Depot Provides Update on Breach Investigation Breach confirmed Investigation focused on April forward No evidence of debit PIN numbers compromised No customers liable for fraudulent charges Customers

More information

Information copied from Federal Trade Commission Website (www.ftc.gov)

Information copied from Federal Trade Commission Website (www.ftc.gov) DETER OR MINIMIZE YOUR RISK OF IDENTITY THEFT Information copied from Federal Trade Commission Website (www.ftc.gov) Protect your Social Security number Don't carry your Social Security card in your wallet

More information

Identity Theft: Prevention & Survival

Identity Theft: Prevention & Survival Identity Theft: Prevention & Survival Crime of the Century Provide By: Nick Sabetta Don t t Let Someone Steal Your Good Name What is Identity Theft? When someone uses your personal information without

More information

Market Intelligence Cell. Fighting Financial Crime

Market Intelligence Cell. Fighting Financial Crime Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach

More information

Questions and Answers

Questions and Answers Consumer Action T r a i n i n g M a n u a l www.consumer-action.org 221 Main Street, Suite 480 San Francisco, CA 94105 415-777-9635 TTY: 415-777-9456 523 W. Sixth Street, Suite 1105 Los Angeles, CA 90014

More information

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Fraud and Identity Theft. Megan Stearns, Credit Counselor Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention

More information

Protecting, Monitoring and Resolving

Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. And EmergingWealth Investment

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

CYBERCRIME: What your Bank should be doing to Protect your Business. David Pollino Senior Vice President Fraud Prevention Officer

CYBERCRIME: What your Bank should be doing to Protect your Business. David Pollino Senior Vice President Fraud Prevention Officer CYBERCRIME: What your Bank should be doing to Protect your Business David Pollino Senior Vice President Fraud Prevention Officer Agenda Changing Landscape Case of Efficient Services Escrow Group Six key

More information

01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) 01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) Authority: Board of Trustees History: Effective May 1, 2009 (approved initially April 24, 2009) Source of Authority: Related Links: Responsible Office:

More information

T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E

T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E A I D E N T I T Y T H E F T G U I D E Prepared and distributed as a Public

More information

University of Nebraska - Lincoln Identity Theft Prevention Program

University of Nebraska - Lincoln Identity Theft Prevention Program I. Purpose & Scope This program was developed pursuant to the Federal Trade Commission s (FTC) Red Flag Rules promulgated pursuant to the Fair and Accurate Credit Transactions Act (the FACT Act). The University

More information

What You Need to Know About Identity Theft. Identity Theft Prevention Tips

What You Need to Know About Identity Theft. Identity Theft Prevention Tips What You Need to Know About Identity Theft Identity theft is the fastest growing crime in America. Criminals who gain access to simply a few pieces of valid personal information can impersonate another

More information

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule SOUTH TEXAS COLLEGE Identity Theft Prevention Program and Guidelines FTC Red Flags Rule Issued June 24, 2009 Table of Contents Section Section Description Page # 1 Section 1: Program Background and Purpose

More information

B. Credit - Deferral of payment of a debt incurred for the purchase of goods services, including educational services.

B. Credit - Deferral of payment of a debt incurred for the purchase of goods services, including educational services. Date Revised: Page 1 of 16 5-21 Identity Theft Prevention Program I. BACKGROUND As a result of the increasing instances of identity theft, the United States Congress passed the Fair and Accurate Credit

More information

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense 1 of 5 11/17/2014 4:14 PM 800.268.2440 From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach

More information

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Are you a Target? On-Line Scams Credit/Debit Card Investment Identity Theft Frauds Scams Mark the following

More information

Credit and Debit Card Scams

Credit and Debit Card Scams Credit and Debit Card Scams What is a credit card scam? It happens when someone uses your credit or debit card information without your permission. It may be as complicated as someone posing as a representative

More information

Cincinnati Insurance Company v. Wachovia Bank

Cincinnati Insurance Company v. Wachovia Bank Cincinnati Insurance Company v. Wachovia Bank Wachovia Bank Wins Lawsuit Over Customer That Refused Positive Pay The Legal Rationale to Implement Positive Pay and High Security Checks Frank W. Abagnale

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft identity theft unit new york county district attorney s office Protecting Yourself from Identity Theft cyrus r. vance, jr. district attorney 5 / 2010 questions and answers Dear Friends, cyrus r. vance,

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Citi Identity Theft Solutions

Citi Identity Theft Solutions Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information

More information

How To Protect Yourself From Identity Theft

How To Protect Yourself From Identity Theft Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK ULTIMATE PLUS Your bank accounts and credit are a gold mine for identity thieves. LifeLock Ultimate Plus service gives you some peace of mind knowing you have LifeLock s most comprehensive

More information

Identity Theft and Strategies for Crime Prevention

Identity Theft and Strategies for Crime Prevention Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What

More information

ACTION PLAN FOR VICTIMS OF IDENTITY THEFT

ACTION PLAN FOR VICTIMS OF IDENTITY THEFT FOR VICTIMS OF IDENTITY THEFT A program of the Texas Legal Services Center supported by Grant No. 2007-VF-GX-K032 awarded by the Office for Victims of Crime, Office of Justice Programs, U.S. Department

More information

How To Help Protect Yourself From Identity Theft

How To Help Protect Yourself From Identity Theft How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank

More information

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal

More information

Chapter 9-Section 3. Consumer Protection Laws

Chapter 9-Section 3. Consumer Protection Laws Chapter 9-Section 3 Consumer Protection Laws Fair Credit Reporting Act Grants you the right to know what is in your credit file Gives you the ability to see who has seen your file Right to view credit

More information

Fraud Prevention Guide

Fraud Prevention Guide Fraud Prevention Guide Table of Contents Protect your Information 2 Protect your wallet or purse 3 Don t forget around the house 3 Secure your credit cards and debit cards 4 Stop the telemarketing calls

More information

I dentity theft occurs

I dentity theft occurs 1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information