Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities.

Size: px
Start display at page:

Download "Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities."

Transcription

1 Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities. i n t r o d u c t i o n Identity thieves are smarter and more organized than ever before, claiming over 8.1 million victims in 2010, accounting for more than $37 billion in losses. 1 It is still the fastest growing crime in America, but the number of victims has declined by 27% since 2009, an indication that solutions like Deluxe Provent are helping consumers/ businesses win the battle against identity thieves. The problem of identity theft demands an aggressive, innovative response with services that are more comprehensive in nature, providing more than just traditional credit monitoring services alone. That s why Deluxe offers Deluxe Provent, an integrated suite of identity theft protection services that provides identity theft protection on all fronts, including: Prevention, Detection and Restoration. Offering Solutions For Your Small Business Owners One of the biggest threats to small business owners today is the risk of a data breach or identity fraud. Small businesses are in the crosshairs of cybercriminals who see them as easier and more profitable marks. Nearly three quarters of all U.S. small businesses experienced a breach attack in Small businesses suffer more than their larger counterparts due to their inexperience in preparing for and responding to these threats they are under-resourced and overwhelmed by the options. In addition, small business owners have more assets and that puts them at greater risk of being a target for identity theft, and therefore, you need to protect those assets from exposure. T h e D e l u x e P r ov e n t S o l u t i o n Deluxe Provent offers one of the widest arrays of solution options in the industry, combining both Financial Institution (FI) Paid service options and a Consumer Paid service suite into a complete solution. It all starts with our FI Paid service options, which allow you to protect the consumers/businesses of your choice. For example, you may want to provide an FI Paid service as a loyalty benefit or account holder reward, or you may want to bundle an FI Paid option within an account, either as a way to differentiate that account and add value, or as part of the account package, for which you would charge a fee. It is up to you to decide which FI Paid options meet your needs, as well as how you would like to utilize those solutions to: deepen account holder relationships, set you apart from the competition, earn additional fee income and enhance profitability, and position you to acquire new accounts. 1 Javelin Strategy & Research Symantec 2010 SMB Information protection Survey Global: June 2010

2 2 S o l u t i o n s f o r Yo u r C o n s u m e r Ac c o u n t s We have packaged our value-added services into four easy FI-Paid options: (see Service Details for a description of each service) 1. ID Restoration SM 2. ID Protect SM ID Restoration Internet Monitoring 3. ID Protect Plus SM ID Restoration Internet Monitoring Credit Monitoring (1 Bureau) 4. Vault SM Once you have communicated with Deluxe regarding whom you want to protect with which FI Paid product, Deluxe and its partner (EZShield ) take it from there. We will reach out to the account holder via to reinforce the value of the service they have been provided by your financial institution, welcome them to the program, and direct them to a secure website to activate their service. If your customer does not have an , we will provide your financial institution a custom landing page where you direct them to activate their service. Once the consumers/businesses have activated their FI Paid services, they will be able to access their membership information via a secure member dashboard. With this dashboard, they will be presented with additional service options. Consumers/businesses get to pick and choose which services they want to enroll in. Ultimately, they have the ability to configure their unique, ideal identity protection solution. This easy upgrade model is unique in the identity theft solution industry. Instead of offering predefined packages or bundles of product components, we more often present the consumer/business with the components individually. This ultimately allows the consumer/business to pay for only what he/she is interested in, and allows the consumer/business to customize his/her own ideal identity theft solution. The consumer/business will not be paying for services within a predefined package that he/she will not use. (See page six for detailed descriptions of the various service options that are available.)

3 3 S o l u t i o n s f o r yo u r S m a l l B u s i n e s s Ac c o u n t s Why choose Deluxe Provent Small Business Solutions? Market Differentiation Strengthen your position in the market by offering your small business customers a comprehensive security and breach services solution. Bring a vital and uniquely designed offering to market before competitors. Most small businesses are inundated with their day-to-day operations, and unable to recognize that they need these solutions. Two-thirds believe that it won t happen to them while less than half have completed an assessment to verify their readiness. 3 A partner that educates a small business on the threat to the company and offers a comprehensive and easy-to-implement solution will gain both trust and loyalty from their small business customers. Most breach solutions in the market today are aimed at larger corporations, and not geared for the needs of the typical small business. Uniquely tailored to the smaller enterprise, the Deluxe Provent breach offering guides small businesses through the steps required to ensure they are current on security best practices and have a detailed breach response plan. Stronger Customer Relations Provide valuable advice and highly complex services that secures your role as trusted partner. Small businesses are understandably cautious with respect to spending. They value products and services that help them stay in business. By proactively offering a solution to help your customers head off a potentially lethal business problem, you will be seen as an advisor and not simply a vendor. Helping small businesses shift from fear to possibilities is key to developing and deepening long-term, high-value relationships. Reduce Churn Satisfaction of small businesses with banks is on the decline. Only 19% of small business customers are committed to remain with their current financial institutions. 4 They are choosing to shop around for better banking options and prefer to work with financial institutions whom they trust and will address the individual concerns of their small business clients. And they are not forgiving of perceived transgressions. When credit card fraud or a breach occurs, the small business associates the negative consequences with the financial institution where the account is held. A 2011 Javelin study found that nearly 350,000 small business owners are switching banks or credit unions due to fraud loss each year. 5 Higher Revenue Provide new revenue streams to strengthen and increase overall bottom line. With customized breach solutions for your small business customers, you can drive more revenue into your business. In addition to retaining existing customers who may be lured away by competitors, you can attract a new set of customers who may not have considered your product set before. In addition, you can build incremental revenue on top of your customer base, selling additional services to those customers who are loyal and increasing their total purchases. Perhaps the most important role you play is helping to protect the viability of the most vulnerable in your customer base. While all small businesses are at risk, those with 1 4 employees are most vulnerable due to the lack of resources and technical know-how. Representing 55% of the small business market, 3 this group can potentially grow and provide even more revenue streams in the future. Keeping them in business is an investment in your own growth. 3 Ponemon 2010 Annual Study: US Cost of a Data Breach 4 JD Power and Associates 2010 US Small Business Satisfaction Study 5 Javelin Strategy & Research 2011

4 4 Deluxe Provent for Business Services The Deluxe Provent Security and Breach Services solution provides a comprehensive package that spans the diverse needs of the small business. Deluxe Provent does more than simply provide your small business with a response to the breach once the damage is done, we help the small business get ahead of the problem. Our suite leads with our award winning restoration services then adds in-depth self-assessment to pinpoint vulnerabilities and progresses through a series of customizable offerings, culminating in a breach response plan. The recommendations offered are created with Safe Harbor, PCI, Red Flag, and HIPAA compliance in mind to ensure that the Deluxe Provent offering produces value and keeps ahead of the most critical regulatory requirements across small business industries. We package these services into four easy FI-Paid options for easy inclusion in your value-added account bundles and service upgrades. (see Service Details for a description of each service) 1. Business ID Restoration SM 2. Business ID Assess SM Business Restoration Sycurity Score SM 3. Business ID Protect SM Business Restoration Sycurity Score Internet Monitoring 4. Business ID Protect Plus SM Business Restoration Sycurity Score Internet Monitoring Credit Monitoring From these service bundles, your business account holders can upgrade into our more comprehensive small business breach offerings: Sycurity Assist SM Security is the first line of defense against fraud and breach. Sycurity Assist is designed to assist small businesses in strengthening overall security and reduce the chance of a breach incident occurring therefore ensuring the safety of the sensitive information stored. Sycurity Prepare SM Sycurity Prepare provides a comprehensive solution that educates your business on what is required in successful handling of a breach including breach process flow, forensic checklists, team roles, escalation criteria, external notification guides and notification templates to help respond quickly and effectively in the case of a breach.

5 5 E n t e r p r i s e F r au d S e r v i c e s In addition, the Deluxe Provent solution suite includes several Enterprise Fraud Service options. These services are designed to address your financial institution s needs regarding fraud and identity theft. They include: Breach Prevent: custom-scoped consulting, which could include things like a data breach risk assessment to identify risks and gaps; the development of a data protection and security manual; and training. Breach Response Retainer: development of a comprehensive, pre-breach preparation guide and plan of action that helps an FI respond immediately in the case of a breach. The plan of action includes processes and procedures for engaging EZShield immediately. EZShield is on call to help should a breach event occur. Breach Response Notification Services: support and assist an FI in notifying impacted account holders of a breach event. Includes things like notifications via mail; FAQ development; custom landing page development; and a contact phone center.

6 6 s e r v i c e d e ta i l s E Z S h i e l d I d e n t i t y R e s t o r at i o n ( I n d i v i d u a l, F a m i l y [ i n c l u d e s $ 2 5, e x p e n s e r e i m b u r s e m e n t ], o r B u s i n e s s ) Highlights Preventive Measures EZShield Wallet Activity Reports Ongoing 24/7 Expert Advice Notification Services The EZShield Promise Description of Service Preventive Measures Provides access to up-to-date education, checklists, and free or recommended resources for prevention of identity theft (ongoing 24/7 access for term of Service). Provides best-of-industry tips to help protect individuals against the many forms of identity theft, as well as links to free identity theft prevention and education resources EZShield Wallet 24/7 access to password-protected, encrypted secure information area containing essential personal information you want to manage and protect: identification, contact information, credit cards and bank accounts. EZShield Wallet helps to eliminate paper trails and reduces the risk of fraud and identity theft. Activity Reports Monthly s detailing services in effect, latest education on fraud trends to look out for, reminder of how to access services and exclusive offers for recommended services. Expert Services During the term of the Service, Customer shall be entitled to access a Resolution Specialist who will provide support directly to Customer and timely expert advice regarding the best procedures and documents for helping to prevent an identity theft event, and for responding to a Customer identity theft event. Notification Services In addition to advising Customer on the best procedures and documents to help prevent an identity theft event or to respond to an identity theft event, a Resolution Specialist can also act on behalf of Customer. For the Resolution Specialist to act on Customer s behalf *, the Customer must: 1. submit to EZShield the EZShield Identity Restoration packet; 2. complete and execute a limited power of attorney form; 3. provide proof of the criminal complaint filed with the applicable law enforcement authority; and 4. provide other documents as required by EZShield in its discretion. * Limited Power of Attorney advocacy not available to residents of the State of New York, all other services apply.

7 7 Resolution Specialists are available to assist as follows: 1. notify and request government issued identification such as State s Drivers License, Social Security card or Passport; 2. notify the three national credit bureaus (Equifax, Experian and TransUnion ) to place a fraud alert on Customer s credit reports, and review such reports to identify evidence of the identity theft event; 3. notify banks, credit card companies and merchants as directed by Customer to freeze or close any business accounts compromised by or resulting from the identity theft event; 4. notify the Federal Trade Commission and file a complaint to report the identity theft event; 5. otherwise coordinate with credit bureaus, banks, credit card companies, government agencies, and/ or merchants as suggested by the Federal Trade Commission in its February 2006 publication entitled Take Charge: Fighting Back Against Identity Theft; and 6. review the status of notification and correction requirements. The EZShield Promise EZShield will continue engaging in these services on behalf of Customer either until the records identifying the fraudulent transactions associated with the identity theft event are corrected, or until EZShield reasonably determines that further efforts to revise such records would not be successful. When EZShield determines that the circumstances of your case puts your identity at a continued risk for further identity theft events, EZShield will deploy certain preventive and complementary services to Customer, free of charge, to help mitigate such risks. Service Level Definitions Individual Restoration: Limited to individuals properly registered as a Customer Family Restoration: Limited to the individual properly registered as a Customer and his/her Affiliated Persons Business Restoration: Limited to the business properly registered as a Customer and one selected primary business owner. Notification services will be extended to Authorized Persons should the business owner or business fraud event effect these persons. Affiliated Persons: Limited to the spouse or domestic partner of registered Customer (where domestic partner is defined as any person living in a legally recognized domestic partnership with Customer in their state of residence; provided that, this definition does not affect the location in which the Service is being provided as set forth in the EZShield Terms and Conditions), dependent children under the age of 21 who live with Customer and dependent children under the age of 25 who are full-time students, as determined by IRS dependency requirements. Affiliated Person Extension: Upon request by Customer, EZShield will provide the Service for Customer s Affiliated Persons if: 1. During the Term, the Affiliated Person is the victim of an identity theft event; and 2. the Affiliated Person (or his/her authorized representative) submits the required documentation to EZShield and cooperates in the delivery of the Service as reasonably requested by EZShield. Authorized Persons: Those individuals associated with the Customer who directly own at least five percent (5%) of the Customer s outstanding equity. EZShield will provide the Service for Customer s qualified Authorized Persons if: 1. During the Term, the Authorized Person is the victim of an identity theft event; and 2. such Authorized Person s identity theft event is directly associated with Customer s identity theft event; and 3. the Authorized Person submits the required documentation to EZShield and cooperates in the delivery of the Service as reasonably requested by EZShield.

8 8 What To Expect When your account holders suffer from fraud or an identity theft event, Deluxe personally assigns them a Resolution Specialist. This Resolution Specialist will provide expert advice regarding the procedures they need to follow and the documents they need to gather. The steps the Resolution Specialist takes to help restore the account holder s credit file and good name are: 1. Receives customer call regarding suspected/actual fraud/identity theft event. 2. Communicates the basic initial steps and offers to assist as follows: a. Report all missing/stolen credit and debit cards to creditors. b. Place fraud alert with all three credit bureaus. c. Advise all banks where you hold accounts (we recommend closing your existing accounts). d. Contact check verification companies and advise them to not accept checks from the affected accounts. e. File a police report. f. Complete and file an FTC Fraud Complaint Form online. g. Request and review your credit report from each of the three credit bureaus. h. Notify the Department of Motor Vehicles if your driver s license and/or car registration are missing. i. Notify the Social Security Administration if your social security card/number has been stolen. 3. Sends a restoration packet to the customer. This package includes: a. EZShield IDR Checklist (includes all information mentioned above) b. IDR Terms & Conditions c. Incident Forms d. Limited Power of Attorney Form 4. Reviews the information returned to them to ensure it is complete. a. Resolution Specialist contacts customer to outline the recovery plan and/or to gather additional information. 5. Continues to update and review case on a weekly basis until all fraudulent data has been removed from the customer s credit report. a. If Resolution Specialist is unable to receive a response from the customer for a month, the case will no longer be considered in progress. b. If there is no contact with the customer for six months the case will be marked closed.

9 9 I n t e r n e t M o n i t o r i n g Highlights Continuous access to an online dashboard CyberScan searches Identity Theft Protection Tips (Preventive Measures) Identity Theft Risk Notification Services Description of Service In performing and displaying the Identity Theft Protection service ( Service ), EZShield will securely review and store customer s Protected Identity Elements as follows: 1 individual name 1 street address 2 addresses 3 telephone numbers 1 Social Security Number 6 bank account or credit card numbers Additional services provided: CyberScan Searches: is an ongoing customized search of hundreds of thousands of identity elements available on the Internet s black market to determine if any of the Protected Identity Elements are identified as compromised data. Identity Theft Protection Tips: provide best-of-industry tips to protect individuals and businesses against the many forms of identity theft, as well as links to complementary theft prevention and education resources. Identity Theft Risk Notifications: provides timely notifications of discovered activities and data suggesting that an identity theft event may have occurred.

10 10 C r e d i t M o n i t o r i n g Highlights Continuous access to an online dashboard Credit Report Monitoring (1 or 3 bureau) Identity Theft Protection Tips (Preventive Measures) Identity Theft Risk Notification Services Description of Service Monitoring: As part of the service, EZShield will monitor activity associated with customer s identity and make available to the customer the following search results, which may indicate identity theft or misrepresentation: 1-Bureau Credit Report Monitoring: provides alerts for any activity in the TransUnion credit file that relate to Customer s Identity. 3-Bureau Credit Report Monitoring: provides consolidated alerts for any activity from any of the three credit bureaus, allowing the customer to validate that the credit-related activity was in fact their own activity. Offered as an alternate to 1-Bureau Credit Report Monitoring; additional fees may apply. Additional services provided: Identity Theft Protection Tips: provides best-of-industry tips to protect individuals and businesses against the many forms of identity theft, as well as links to complementary identity theft prevention and education resources. Identity Theft Risk Notifications: provides timely notifications of discovered activities and data suggesting that an identity theft event may have occurred.

11 11 p u b l i c r e c o r d s M o n i t o r i n g Highlights Continuous access to an online dashboard USPS Change of Address Monitoring Court Record Monitoring Sex Offender Registry Monitoring Identity Theft Protection Tips (Preventive Measures) Identity Theft Risk Notification Services Description of Service Monitoring: As part of the Service, EZShield will monitor activity associated with customer s identity and make available to the customer the following search results, which may indicate identity theft or misrepresentation: USPS Change of Address Monitoring: provides alerts for any activity in the U.S. Postal Service Change of Address system. Court Records Monitoring: provides alerts for activity detected in criminal records from 46 states, 200+ counties and other jurisdictions totaling more than 500 aggregated sources. Sex Offender Registry Monitoring: provides alerts for activity detected in an aggregated database of state Sex Offender Registries. Identity Theft Protection Tips: provides best-of-industry tips to protect individuals and businesses against the many forms of identity theft, as well as links to complementary identity theft prevention and education resources. Identity Theft Risk Notifications: provides timely notifications of discovered activities and data suggesting that an identity theft event may have occurred.

12 12 n a m e s & a d d r e s s e s M o n i t o r i n g Highlights Continuous access to an online dashboard Customized Names and Aliases List Customized Known Addresses List Identity Theft Protection Tips (Preventive Measures) Identity Theft Risk Notification Services Description of Service Monitoring: As part of the service, EZShield will monitor activity associated with customer s identity and make available to the customer the following search results, which may indicate identity theft or misrepresentation: Customized Names and Aliases List: identifies the different names associated with customer s protected identity elements in the credit header file. Customized Known Addresses List: identifies the different street addresses associated with customer s protected identity elements in the credit header file. Additional services provided: Identity Theft Protection Tips: provides best-of-industry tips to protect individuals and businesses against the many forms of identity theft, as well as links to complementary identity theft prevention and education resources. Identity Theft Risk Notifications: provides timely notifications of discovered activities and data suggesting that an identity theft event may have occurred.

13 13 VAU LT S M Highlights Preventive Measures EZShield Wallet Activity Reports Digital organization and storage of important documents and information Top-level data security to prevent unauthorized access to stored files Description of Service Preventive Measures Provides access to up-to-date education, checklists, and free or recommended resources for prevention of identity theft (ongoing 24/7 access for term of service). Provides best-of-industry tips to help protect individuals against the many forms of identity theft, as well as links to complementary identity theft prevention and education resources. EZShield Wallet 24/7 access to a password-protected, encrypted secure information area containing essential personal information you want to manage and protect: identification, contact information, credit cards, bank accounts. It helps eliminate paper records and reduces risk of fraud and identity theft. Activity Reports Monthly s will be sent detailing services in effect, providing the latest education on fraud trends to watch for, and reminders of how to access services and exclusive offers for recommended services. Organization and Storage of Digital Files Organize and store digital copies of important records, legal and personal documents, and other items in a secure, remote location. Manage information about content for ease of search and retrieval Easily stage incoming content for proper categorization and storage Top-Level Data Security Files stored in a SAS 70 Type II-compliant data center Password access set and managed by customer Content encrypted as it is uploaded to customer s Vault

14 14 Syc u r i t y A s s i s t S M Highlights Sycurity Score SM Self-Assessment Security & Privacy Planning Employee Security & Privacy Training Materials Description of Service Sycurity Score Self-Assessment This assessment will serve as a best practice evaluation in the area of Personally Identifiable Information ( PII ). The assessment will walk Customer through a series of questions pertaining to the policies and procedures it has in place based on Customer s industry and the PII it collects. The results of the assessment will provide Customer with a guideline to determine areas of improvement in its PII protection practices. This assessment will touch on Red Flag, Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Security Standards (PCI) and EU-US Safe Harbor compliance (allowing data transfer between the United States and the European Union) needs in addition to general best practices in information security. Security & Privacy Planning Customer will receive access to a portfolio of various policy, procedure and process templates. These templates help the Customer ensure that appropriate levels of security are in place. Together, these various documents then serve as the Customer s working security & privacy plan. Security & Privacy Policy Back-up & Recovery Process Vendor Due Diligence Process Red Flags Compliance Process Employee Screening and training policy Employee Security & Privacy Training Materials The Security & Privacy Training portion of Sycurity Assist allows the Customer to educate its employees on the importance of protecting their customers and their fellow employees personal information. Small Business Employee Privacy Training will be provided to the Customer in the form of a PowerPoint presentation focused on Privacy and Security imperatives that all employees need to know and do. Also included are a post-training quiz, employee sign-off form, and quarterly newsletters to keep Customer s employees security and privacy knowledge up to date.

15 15 Syc u r i t y P r e pa r e S M Highlights Prepared Breach Response materials (including an Incident Response Plan, Victim List Template, and Incident Response Sheet) Notification plan recommendation to adhere to current applicable Laws Description of Service Sycurity Prepare EZShield s Sycurity Prepare services help Customer prepare for how it may handle a breach incident should one occur. There are three sub-areas to this service that can be leveraged to help guide the business through identifying a process flow it can execute in the event of a breach incident. The following materials will be available: Incident Response Plan Victim List Template Incident Response Sheet Incident Response Plan In order to meet tight timelines for notification of victims once a PII Breach is recognized, certain materials and processes need to be pre-positioned for action, including: incident response process incident response team roles and contact information specified data breach assessment and escalation policy prepared notification messages Victim List Template Customer will have access to EZShield s victim list template form allowing Customer to assess pre-breach incident, how it will execute delivery of this information for a faster turnaround time should an incident occur, mitigating potential legislative risks. Incident Response Sheet EZShield will provide Customer with an incident response sheet to use as a guide in outlining the various information points that will be required to determine an effective and compliant notification plan should a breach occur. Supplemental Services Customer may purchase through EZShield consulting services (to identify issues or concerns with Customer s proposed data breach response policies and procedures) and/or training services (to implement Customer s data breach response policies and procedures). Notification Plan Recommendation Upon Customer s report of a Breach Incident and completion of a Breach Incident Response Report, EZShield shall provide Customer a Breach Assessment Report which will provide a recommendation as to the course of action(s) Customer should take based on the facts provided and available to EZShield at the time of the Breach Incident Response Report is submitted. The recommendation may include a notification requirement of Customer s breach victims. Refer to deluxeprovent.ezshield.com for complete service description.

16 16 s e r v i c e s s u m m a ry Consumer FI-PAID SERVICE OPTIONS units cost to FI cost to account holder ID Restoration SM Person/month $0.16 N/A Dedicated Resolution Specialist Expert Assistance or full Advocacy on account holder s behalf EZShield Wallet; secure data storage Lost Wallet and Identity Theft recovery services ID Protect SM Person/month $1.60 N/A Restoration and Internet Monitoring ID Protect Plus SM Person/month $2.75 N/A Restoration, Internet Monitoring and Credit Monitoring Vault SM Person/month $2.20 N/A EZShield Wallet; secure data storage Digital offsite storage of important documents High Encryption Small Business FI-PAID SERVICE OPTIONS units cost to FI cost to account holder Business ID Restoration Business/month $0.85 N/A Dedicated Resolution Specialist for business and business owner Expert Assistance or full Advocacy on business owner s behalf EZShield Wallet; secure data storage Lost Wallet and Identity Theft recovery services Business ID Assess SM Business/month $3.50 N/A Business ID Restoration Sycurity Score SM ; evaluation of your data security measures Business ID Protect Business/month $4.50 N/A Business ID Restoration Sycurity Score and Internet Monitoring Business ID Protect Plus Business/month $5.50 N/A Business ID Restoration Sycurity Score, Internet Monitoring and Credit Monitoring

17 17 s e r v i c e s s u m m a ry ( c o n t i n u e d ) Consumer Minimum Monthly Charge for FI-Paid Services units monthly ANNUALLY ID Restoration SM 500 $80 $960 ID Protect SM 25 $40 $480 ID Protect Plus SM 25 $69 $825 Vault SM 25 $55 $660 Small Business Minimum Monthly Charge for FI-Paid Services units monthly ANNUALLY Business ID Restoration 589 $500 $6000 Business ID Assess SM 143 $500 $6000 Business ID Protect 111 $500 $6000 Business ID Protect Plus 91 $500 $6000

18 18 s e r v i c e s s u m m a ry ( c o n t i n u e d ) consumer-paid SUITE units cost to FI cost to account holder ID Protect SM Person/month N/A $4.99 Restoration and Internet Monitoring ID Protect Plus SM Person/month N/A $7.98 Restoration, Internet Monitoring and 1B Credit Monitoring ID Protect Platinum Person/month N/A $14.49 Restoration, Internet Monitoring, 3B Credit Monitoring, Public Record Monitoring and Name/Address Monitoring Internet Monitoring Person/month N/A $2.99 CyberCheck searches of certain data and records Identity Theft Protection Tips 1B Credit Monitoring Person/month N/A $2.99 Credit Report monitoring; Payday Loan scanning 3B Credit Monitoring Person/month N/A $6.00 Credit Report monitoring; Payday Loan scanning Public Record Monitoring Person/month N/A $2.25 Change of address scanning; aggregated criminal records scanning; aggregated sex offender registry scanning Name/Address Monitoring Person/month N/A $1.25 Customized Names and Aliases List Customized Known Addresses List 1B Credit Report* One time N/A $7.00 One-time review of Credit Report from 1 bureau (TransUnion). Optional 3B Credit Report* One time N/A $18.00 One-time review of Credit Report from 3 bureaus. Optional 1B Credit Score* One time N/A $1.99 One-time review of Credit Score from 1 bureau (TransUnion ) 3B Credit Score* One time N/A $3.99 One-time review of Credit Score from 3 bureaus Vault SM * Person/month N/A $4.50 Digital, offsite storage of important documents * Available as upgrades from base packages

19 19 s e r v i c e s s u m m a ry ( c o n t i n u e d ) Business-PAID SUITE units cost to FI cost to account holder Business ID Protect SM Business/month N/A $10.94 Business ID Restoration Sycurity Score SM ; evaluation of your data security measures Internet Monitoring Business ID Protect Plus SM Business/month N/A $13.93 Business ID Restoration Sycurity Score; evaluation of your data security measures Internet Monitoring and Credit Monitoring Sycurity Assist SM * Business/month N/A $17.95 Self-assessment of security risks; action plan Policies and Procedures Employee training Quarterly newsletter Sycurity Prepare* Business/month N/A $21.95 Breach preparedness; process flow, escalation criteria, notification guidelines and templates ENTERPRISE FRAUD SERVICES units cost to FI cost to account holder Breach Prevent Hour $250 N/A Custom-Scoped Consulting Breach Response Retainer Month $600 N/A Pre-Breach Preparation service EZShield on call to help in case of breach Breach Response Notification Services Affected Individual $7.25 N/A Mailings, portal, inbound phone support, account holder locate services * Available as upgrades from base packages

20 20 D e l u x e P r o g r a m S u p p o r t Deluxe provides the following support for financial institutions that sign up for the Deluxe Provent program: We provide standard consumer/business marketing materials for your use in promoting the Program to your account holders. There is no additional cost to you for these items. Items include in-branch brochures, table tents, statement stuffers, Web linking instructions, and more. We set up a co-branded landing page for consumer activation for your institution, at no additional cost to you. If desired, we can set up a full co-branded website for the Program for your financial institution. There is a monthly fee associated with this. This fee covers configuration, set up, implementation, ongoing maintenance, and hosting of the site. This website would be unique to your institution. The cost for this is $1,250/month. We support your institution in driving consumer/business upgrades through our easy upgrade model. With this model, we will be communicating and presenting alternative service options to your consumers/ businesses on your behalf through things like: Activation/welcome communications: once you have indicated to Deluxe who you would like to cover (and on which Financial Institution Paid product), we will then send out a welcome/activation to the customer. This communication reinforces the value of what they have been given, gives the customer important details about the service, and asks them to activate the service. These communications are co-branded at no additional cost to you. Ongoing alerts from the monitoring services: as we interact with customers via the various alerts associated with the various monitoring services, we will be reminding customers of the additional product options that are available to them. Online member dashboard: when customers go to their personalized dashboard to review their membership information, they will have access to and see the additional product options available to them. Monthly newsletters: We provide ongoing monthly newsletters to your account holders with relevant news, tips, suggestions, strategies for preventing identity theft. We provide your institution with a 15% rebate on all memberships paid for by customers identified with your institution. An implementation specialist will be assigned to assist you with all implementation steps associated with the program. This person will serve as a main point of contact for you throughout the implementation process. Deluxe and its partner handle billing, service delivery, and account holder service for the solution suite. In addition, the following account holder service support is provided with Deluxe Provent: Phone Support: Deluxe and EZShield will provide a Customer Support Team to provide secure and superior service and support for all products. The Support team is staffed with Certified Fraud Specialists during our standard hours of operation: Monday through Friday, 8:00 am to 8:00 pm EST. We will supply sufficient staff to maintain an average call wait time of less than 20 seconds. During off hours, including weekends, representatives are available to answer basic questions and forward account holder questions/requests to a certified specialist for response on the next business day. Off-hours inquiries will be responded to within 12 hours. Support: To further support our account holders, Deluxe/EZShield will also provide support for service inquiries, Frequently Asked Questions (FAQs), and other service-related questions. Our Response Team provides support Monday through Friday, 8:00 am to 8:00 pm EST. received during off hours will receive a response the next business day. Implementation Support: is available during normal Deluxe business hours, but can be made available outside of this, as needed. Technical Support: for file transmission issues, support is available 24 hours a day, 7 days a week, 365 days a year.

21 21 r e p o r t i n g The following basic reports are available to your financial institution as a standard part of the program, at no additional cost: Member Report: a monthly report that will show the membership counts associated with each service option that we offer. This report will show you how many of your account holders have enrolled and into which service options. It will also show you the changes over time. Commission Report: quarterly report that will show you the commissions you are receiving from the program. Additional reports can be generated on an ad hoc basis, as necessary. I m p l e m e n tat i o n In all instances of implementation, basic billing and account information will be gathered, Deluxe will set up your financial institution in our systems, conduct training, and order and ship marketing materials. During the implementation process, our Delivery and Account Management teams will be working with your financial institution to define and document a rollout and implementation plan. In general, our set up processes are as follows: 1. A Delivery Consultant is assigned to the event. This person leads all aspects of the implementation. 2. The Delivery Consultant works with you to define and document an implementation plan, and to set a target go live date. 3. The Delivery Consultant gathers required information in order to complete the set up in all appropriate Deluxe and EZShield systems. 4. The Delivery Consultant works with appropriate resources within Deluxe and EZShield to ensure appropriate set up within all systems. 5. The Delivery Consultant helps create and test an ongoing file transfer to Deluxe (for the FI Paid solution options). 6. The Delivery Consultant determines training needs and coordinates the completion of any said training. 7. The Delivery Consultant works with your financial institution to determine the marketing/ promotional approach that your institution would like to take, and then coordinates all printing/ shipping, customization, approvals, etc., of necessary marketing materials. 8. The Delivery Consultant verifies that everything is set up and your financial institution has everything it needs in order to launch. 9. Go Live.

Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities.

Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities. Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities. i n t r o d u c t i o n Identity thieves are smarter and more organized than ever before, claiming over 8.1 million

More information

THE PROBLEM OF IDENTITY THEFT AND FRAUD

THE PROBLEM OF IDENTITY THEFT AND FRAUD Identity theft and fraud don t just threaten financial assets and tie up resources. They leave victims feeling inconvenienced, unsettled, and even betrayed. What is Identity Theft? Identity theft is when

More information

Log on to: www.idprotectme247.com using Access Code MI521457 to register and access the benefits provided by IDProtect.

Log on to: www.idprotectme247.com using Access Code MI521457 to register and access the benefits provided by IDProtect. KALSEE Credit Union is pleased to offer identity theft protection, powered by IDProtect! Identity theft takes a serious financial and emotional toll on its victims. More than 11.6 million Americans were

More information

EVERY TWO SECONDS. The Financial Institution s Guide to Protecting Customers from Identity Crimes

EVERY TWO SECONDS. The Financial Institution s Guide to Protecting Customers from Identity Crimes EVERY TWO SECONDS The Financial Institution s Guide to Protecting Customers from Identity Crimes Don t lose your customers to identity crimes. Every 2 seconds, an identity fraud occurs in the United States.*

More information

Log on to: www.idprotectme247.com using Access Code AZ271653 to register and access the benefits provided by IDProtect.

Log on to: www.idprotectme247.com using Access Code AZ271653 to register and access the benefits provided by IDProtect. Banner Federal Credit Union is pleased to offer identity theft protection, powered by IDProtect Identity theft takes a serious financial and emotional toll on its victims. More than 11.6 million Americans

More information

Identity Theft Protection Plans

Identity Theft Protection Plans Identity Theft Protection Plans Legal Resources has partnered with IdentityForce to offer two plan options for identity theft protection for employees at the City of Virginia Beach and Virginia Beach City

More information

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK ULTIMATE PLUS Your bank accounts and credit are a gold mine for identity thieves. LifeLock Ultimate Plus service gives you some peace of mind knowing you have LifeLock s most comprehensive

More information

REWARDS PLUS CHECKING

REWARDS PLUS CHECKING REWARDS PLUS CHECKING Open or convert to a Rewards Plus Checking account today and take advantage of the services the account offers: + Yields a higher interest rate on deposits up to $20,000 + Identity

More information

Identity Theft Protection as an Employee Benefit

Identity Theft Protection as an Employee Benefit Identity Theft Protection as an Employee Benefit ID Watchdog is a leading provider of comprehensive identity monitoring as a deterrent against identity theft. Our patentpending identity monitoring solutions

More information

IDENTITY THEFT SOLUTIONS

IDENTITY THEFT SOLUTIONS IDENTITY THEFT SOLUTIONS Introduction About UNFCU Financial Advisors About AON Benfield Identity Theft Partners Product and Services Strategies Solutions -Employee -Member 1. Embed 2. Affiliate -SafeBiz

More information

Identity Theft Repair Kit

Identity Theft Repair Kit Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact

More information

Reclaiming your identity

Reclaiming your identity Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Personal Protection and Peace of Mind with IDProtect

Personal Protection and Peace of Mind with IDProtect INSIDE: Tips to safeguard your identity! Personal Protection and Peace of Mind with IDProtect IDProtectBrochRedesign_v2.indd 1 The Numbers Say It All Will you become a victim of identity theft? For the

More information

A Proposal of Employee Benefits. Innovations in IDENTITY THEFT

A Proposal of Employee Benefits. Innovations in IDENTITY THEFT A of Employee Benefits Innovations in IDENTITY THEFT Innovations in IDENTITY THEFT Name or Logo 2 Innovations in IDENTITY THEFT A Complete Identity Theft Solution Prevention to Prosecution Solution

More information

Identity Theft Plan. Guidebook. Copyright 2013 Prepaid Plans All Rights Reserved

Identity Theft Plan. Guidebook. Copyright 2013 Prepaid Plans All Rights Reserved Identity Theft Plan Guidebook Copyright 2013 Prepaid Plans All Rights Reserved Identity Theft Solutions Identity Theft Insurance Claims When filing an identity theft claim please contact a claims administrator

More information

HOME DEPOT DATA BREACH

HOME DEPOT DATA BREACH HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data

More information

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every

More information

Identity Theft Repair Kit

Identity Theft Repair Kit Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact

More information

Information Protection

Information Protection Information Protection Security is Priority One InfoArmor solutions are created to be SSAE 16, ISO 27001 and DISA STIG compliant, requiring adherence to rigorous data storage practices. We not only passed

More information

Identity Theft Protection Plan Descriptions

Identity Theft Protection Plan Descriptions As carefully as you plan for the unexpected, it is impossible to anticipate the theft of your identity, credit, or personal information. Give IdentityForce that responsibility. Innovative technology and

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

How To Get Help From The Police Department

How To Get Help From The Police Department IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification

More information

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the

More information

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT 101 4 TH Street Southeast Rochester, Minnesota 55904-3761 507-328-6800 Fax 507-328-6975 To: From: Subject: Identity Theft and Internet Crime Victims Rochester

More information

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH...

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... CONTAINMENT AND CONTROL... INVESTIGATING A SECURITY

More information

How child identity theft happens.

How child identity theft happens. How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver

More information

Family Protection Plan

Family Protection Plan Providing Customizable Products & Services Family Protection Plan The Most Comprehensive Discount Legal Product Available Legal Care Identity Theft Solutions Free & Discounted Legal Care Legal Club of

More information

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year.

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year. October 1, 2015 Office of the Attorney General Attn: Security Breach Notification 200 St. Paul Place Baltimore, MD 21202 Idtheft@oag.state.md.us To Whom It May Concern: I am writing on behalf of Scottrade

More information

Facts About FACTA Red Flag Identity Theft Prevention Program

Facts About FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg. ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...

More information

Identity Theft Victim Checklist

Identity Theft Victim Checklist CONSUMER INFORMATION SHEET 3 4/30//08 Identity Theft Victim Checklist This checklist can help identity theft victims clear up their records. It lists the actions most identity theft victims should take

More information

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE? 1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?

More information

TABLE OF CONTENTS. Identity Theft Steps to take if you are a victim Page 3

TABLE OF CONTENTS. Identity Theft Steps to take if you are a victim Page 3 Identity Theft Kit This kit has been prepared for you to use in the event you may have become a victim of Identity Theft. First National Bank Bemidji has compiled this kit of information and procedures

More information

BUILDING MEMBER LOYALTY AND TRUST: HOW IDENTITY MANAGEMENT AND FRAUD DETECTION SERVICES CAN DELIVER VALUE-ADDED BENEFITS

BUILDING MEMBER LOYALTY AND TRUST: HOW IDENTITY MANAGEMENT AND FRAUD DETECTION SERVICES CAN DELIVER VALUE-ADDED BENEFITS BUILDING MEMBER LOYALTY AND TRUST: HOW IDENTITY MANAGEMENT AND FRAUD DETECTION SERVICES CAN DELIVER VALUE-ADDED BENEFITS IDT911 1 OFFER INCENTIVES THAT DELIVER PEACE OF MIND AND REAL VALUE. DILEMMA: ATTRACTING

More information

West Palm Beach Police Department s Identity Theft Victim s Packet

West Palm Beach Police Department s Identity Theft Victim s Packet West Palm Beach Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted West Palm Beach Police Department and obtained a

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the Lafayette County Sheriff s Department and obtained a report number related to your

More information

IDENTITY THEFT PROCEDURES

IDENTITY THEFT PROCEDURES IDENTITY THEFT PROCEDURES FREQUENTLY ASKED QUESTIONS ABOUT IDENTITY THEFT INCIDENTS AND RED FLAGS Q1: How is a Red Flags incident different from a data security breach? A1: A data security breach is the

More information

March 22, 2013. Tennessee State Employees Association 627 Woodland Street Nashville, TN 37206

March 22, 2013. Tennessee State Employees Association 627 Woodland Street Nashville, TN 37206 March 22, 2013 March 22, 2013 Tennessee State Employees Association 627 Woodland Street Nashville, TN 37206 InfoArmor is pleased to present the Tennessee State Employees Association (TSEA) with the following

More information

ARE YOU A VICTIM OF AN IDENTITY CRIME?

ARE YOU A VICTIM OF AN IDENTITY CRIME? RESOURCE KIT FOR VICTIMS OF IDENTITY CRIME ARE YOU A VICTIM OF AN IDENTITY CRIME? If someone is using your identifying information, (name, date of birth, social security number, etc.), you ARE a victim

More information

How To Get A Credit Card From A Fraudulent Account

How To Get A Credit Card From A Fraudulent Account Information and Instructions This packet is to be completed once you have contacted New York State University Police and obtained a police report number related to your identity theft case. To obtain a

More information

How to Get Rid of Identity Theft

How to Get Rid of Identity Theft January 22, 2016 NOTICE OF DATA BREACH (For California Residents) What Happened? On November 20, 2015, Starwood Hotels & Resorts Worldwide, Inc. ( Starwood ) announced that a malware intrusion affected

More information

Letter from the CEO. January 25, 2014. To Our Valued Michaels Customers:

Letter from the CEO. January 25, 2014. To Our Valued Michaels Customers: Letter from the CEO January 25, 2014 To Our Valued Michaels Customers: As you may have read in the news, data security attacks against retailers have become a major topic of concern. We recently learned

More information

York County Sheriff's Office Identity Theft Victim s Packet

York County Sheriff's Office Identity Theft Victim s Packet York County Sheriff's Office Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have received a copy of your police report from the York County Sheriff's

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION Effective August 31, 2007 Publication Name(s): Version #(1): ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES

More information

Lake County Sheriff s Office Identity Theft/Fraud Packet

Lake County Sheriff s Office Identity Theft/Fraud Packet Gary S. Borders, Sheriff Lake County Sheriff s Office Identity Theft/Fraud Packet Information and Instructions The Information and Instructions portion of this packet is for you to keep and contains information

More information

Identity Theft Packet

Identity Theft Packet BOULDER POLICE DEPARTMENT 1805 33 rd Street Boulder, CO 80301 Identity Theft Packet ** Use this packet when the crime involves the stealing of someone's identity, such as when a victim finds out that someone

More information

Fraud Assist Toolbox Benefit Summary Sheet

Fraud Assist Toolbox Benefit Summary Sheet Fraud Assist Toolbox Summary Sheet The Fraud Assist Toolbox is a convenient, online tool that helps members prevent and resolve problems that arise from identity theft more quickly by using the interactive

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Lake Oswego Police Department and obtained a police report number related to your identity

More information

Why Credit is Important

Why Credit is Important Page 1 Why Credit is Important Page 6 How to Protect Yourself from Identity Theft Page 7 Cosigning and Money Lending Tips Page 8 How to Avoid Credit Card Interest Why Credit is Important Learning to build

More information

Topic Overview Responding to Identity Theft: Civil Rights & Remedies

Topic Overview Responding to Identity Theft: Civil Rights & Remedies Topic Overview Responding to Identity Theft: Civil Rights & Remedies Suzanne Begnoche, Attorney at Law Chapel Hill, North Carolina suzanne.begnoche@begnochelaw.com (919) 960-6108 Client Screening Initial

More information

IDENTITY THEFT. How To Avoid Theft And What To Do If It Happens To You. Securities Industry Association

IDENTITY THEFT. How To Avoid Theft And What To Do If It Happens To You. Securities Industry Association IDENTITY THEFT How To Avoid Theft And What To Do If It Happens To You Securities Industry Association SIA thanks its members for their thoughtful review and contributions to this publication. Illustrator:

More information

IDENTITY THEFT VICTIM S PACKET

IDENTITY THEFT VICTIM S PACKET DEPARTMENT OF PUBLIC SAFETY 1150 Canton Center S Canton, MI 48188-1699 John R. Santomauro, Director of Public Safety IDENTITY THEFT VICTIM S PACKET INFORMATION AND INSTRUCTIONS The purpose of this packet

More information

Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores

Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores Important Customer Notice Information Concerning Data Security Incident at Some Staples Stores Staples wants to make customers aware that we have confirmed a data security incident involving customer payment

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted Chandler Police Department and obtained a police report number related to your identity

More information

Employee ID Theft Resource Guide

Employee ID Theft Resource Guide Employee ID Theft Resource Guide ID Theft Resolution Legal Resources ID Theft Assistance Updates www.legalresources.net ID Theft What is Identity Theft? Identity Theft is a serious crime in which someone

More information

Child Identity Theft. Warning Signs

Child Identity Theft. Warning Signs Child Identity Theft What is Identity Theft? Immediate Steps to Repair Identity Theft Extended Fraud Alerts and Credit Freezes Repairing Your Credit After Identity Theft A child's Social Security number

More information

Benefits Handbook Date September 1, 2015. Identity Theft Protection Benefit Program Marsh & McLennan Companies

Benefits Handbook Date September 1, 2015. Identity Theft Protection Benefit Program Marsh & McLennan Companies Date September 1, 2015 Identity Theft Protection Benefit Program Marsh & McLennan Companies Marsh & McLennan Companies offers identity theft solutions, supplied by InfoArmor, to all eligible employees

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the Ottawa County Sheriff s Office and obtained a complaint number related to your identity

More information

UNC Asheville. Red Flag Rule and NC Identity Protection Act Information

UNC Asheville. Red Flag Rule and NC Identity Protection Act Information UNC Asheville Red Flag Rule and NC Identity Protection Act Information Why Should UNC Asheville be Concerned? The Federal Trade Commission (FTC) regulates financial transactions at UNC Asheville The FTC

More information

Identity Theft Assistance: Information for Recovering Your Good Name

Identity Theft Assistance: Information for Recovering Your Good Name Identity Theft Assistance: Information for Recovering Your Good Name I Could Be A Victim of Identity Theft! What Do I Do Next? We understand that you may have been a victim of identity theft. Enclosed

More information

Benefits Handbook Date March 1, 2016. Identity Theft Protection Benefit Program Marsh & McLennan Companies

Benefits Handbook Date March 1, 2016. Identity Theft Protection Benefit Program Marsh & McLennan Companies Date March 1, 2016 Identity Theft Protection Benefit Program Marsh & McLennan Companies Marsh & McLennan Companies offers identity theft solutions, supplied by InfoArmor, to all eligible employees (family

More information

Pasco County Sheriff's Office Economic Crime Unit. Identity Theft Guide

Pasco County Sheriff's Office Economic Crime Unit. Identity Theft Guide Pasco County Sheriff's Office Economic Crime Unit Identity Theft Guide This kit was designed to assist you in working through the process of resolving the theft of your personal information and to clear

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet In this packet: Information and Instructions Section 1, # of pages 6 Fair and Accurate Credit Transactions Act of 2003 Section 2, # of pages 3 ID Theft Affidavit Section

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

Leander Police Department 705 Leander Dr Leander, Texas 78641 (512) 528-2800

Leander Police Department 705 Leander Dr Leander, Texas 78641 (512) 528-2800 Leander Police Department 705 Leander Dr Leander, Texas 78641 (512) 528-2800 Identity Theft Information and Affidavit The attached Identity Theft Affidavit packet has been given to you because you may

More information

Identity Theft Victim Checklist

Identity Theft Victim Checklist Identity Theft Victim Checklist THE FOLLOWING CHECKLIST PROVIDES THE STEPS YOU SHOULD TAKE TO MINIMIZE DAMAGE TO YOUR FUNDS, FINANCIAL ACCOUNTS AND PERSONAL REPUTATION. Before you start Telephone calls

More information

Personal Information Protection Policy

Personal Information Protection Policy I Personal Information Protection Policy Purpose: This policy outlines specific employee responsibilities in regards to safeguarding personal information. To this end, each employee has a responsibility

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

General Q&A Northland Pioneer Personal Data Security Incident

General Q&A Northland Pioneer Personal Data Security Incident General Q&A Northland Pioneer Personal Data Security Incident 1. What happened? On May 2, 2016, W-2 information for 2015 was forwarded to a fraudulent email address by a college employee. Current and former

More information

Florida's Identity Theft Victim Kit

Florida's Identity Theft Victim Kit Florida's Identity Theft Victim Kit A guide for victims of identity theft, detailing what to do and who to contact. This kit is designed to help you work through the process of resolving your identity

More information

PRICELIST. for. State of Ohio State Term Schedule. Pricing Effective as of May 15, 2013. Contract #

PRICELIST. for. State of Ohio State Term Schedule. Pricing Effective as of May 15, 2013. Contract # PRICELIST for State of Ohio State Term Schedule Contractor: AllClear ID, Inc. Pricing Effective as of May 15, 2013 Contract # Table of Contents Page EXHIBIT A Description of Corporate Services 2 (Services

More information

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally

More information

Data Security Breach Notice Letter

Data Security Breach Notice Letter View the online version at http://us.practicallaw.com/3-501-7348 Data Security Breach Notice Letter DANA B. ROSENFELD & ALYSA ZELTZER HUTNIK, KELLEY DRYE & WARREN LLP A letter from a company to individuals

More information

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention

More information

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION

More information

SECURITY FREEZE INFORMATION FOR KENTUCKY RESIDENTS

SECURITY FREEZE INFORMATION FOR KENTUCKY RESIDENTS SECURITY FREEZE INFORMATION FOR KENTUCKY RESIDENTS If you live in Kentucky, you have the right as of July 12, 2006, to put a Asecurity freeze@ on your credit report with each credit reporting agency. A

More information

Identity Theft is a Crime in the State of New Jersey.

Identity Theft is a Crime in the State of New Jersey. NEW JERSEY STATE POLICE Identity Theft: A Victim s Reference Identity Theft occurs when someone uses your personally identifying information like your name, Social Security number, or credit card number

More information

IDENTITY THEFT RESOURCE KIT

IDENTITY THEFT RESOURCE KIT IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What

More information

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015 SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory

More information

What is Identity Theft?

What is Identity Theft? Elix Financial Wellness presents YOUR FINANCIAL WELLNESS EXPERTS Identity Theft occurs when a thief obtains personal information about you such as your name, address, Social Security Number, account number

More information

The Home Depot Provides Update on Breach Investigation

The Home Depot Provides Update on Breach Investigation The Home Depot Provides Update on Breach Investigation Breach confirmed Investigation focused on April forward No evidence of debit PIN numbers compromised No customers liable for fraudulent charges Customers

More information

Plymouth Township Police Department s Identity Theft Victim s Packet

Plymouth Township Police Department s Identity Theft Victim s Packet Plymouth Township Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted Plymouth Township Police Department and obtained

More information

Dear Concerned Consumer,

Dear Concerned Consumer, Dear Concerned Consumer, Identity theft is a growing problem of the Information Age. You have already taken the first important step in combating the problem by contacting HomeStar Bank & Financial Services.

More information

First Steps for Victims of Identity Theft

First Steps for Victims of Identity Theft First Steps for Victims of Identity Theft Colorado Bureau of Investigation Identity Theft/Fraud Investigation Unit Colorado Bureau of Investigation ID Theft/Fraud Unit 710 Kipling Street Suite 200 Denver

More information

Your Members May Be Under Attack From Cybercriminals

Your Members May Be Under Attack From Cybercriminals LifeLock ebook: Your Members May Be Under Attack From Cybercriminals Serve Member Needs and Build Loyalty with Identity Theft Protection 010 IDENTITY 001010011 CREDIT CARD 11010100101110 SOCIAL SECURITY

More information

Identity Theft Victim Checklist

Identity Theft Victim Checklist Page 1 of 5 Identity Theft Victim Checklist CONSUMER INFORMATION SHEET 3 This checklist can help identity theft victims to clear up their records. It lists the actions most identity theft victims should

More information

what you need to know

what you need to know A P Identity u b l i c a t i o n o f t h e S o u t h C a r o l i n a D e p a r t m e n Theft t o f C o n s u m e r A f f a i r s what you need to know Step By Step: What To Do After a Security Breach #1:

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Personal Digital Security

Personal Digital Security The following is an excerpt from: Personal Digital Security Protecting Yourself from Online Crime 2016 Revision by Michael Bazzell More information can be found at ComputerCrimeInfo.com Over the past ten

More information

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and to enhance existing efforts to educate Hoosiers about

More information

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009 Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program

More information

Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet

Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet Information and Instructions This packet should be completed once you have contacted the Avondale Police Department and obtained

More information