2007 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves

Size: px
Start display at page:

Download "2007 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves"

Transcription

1 2007 Identity Fraud Survey Report Consumer Version February 2007 Telephone: Fax: Address: 4309 Hacienda Dr., Suite 380 Pleasanton, CA Web site:

2 2007 Identity Fraud Survey Report Consumer Version (Abbreviated Version) The Javelin 2007 Identity Fraud Survey Report: Consumer Version provides guidelines for consumers to help prevent, detect and resolve identity fraud. Over the last three years, Javelin has surveyed over 25,000 adults in order to find out the actual ways consumers are being affected by identity fraud in the United States. This year s phone survey of over 5,000 adults is the largest, most up-to-date study of identity fraud in the US. Our recommendations for consumers are solidly based upon the results of this thorough research and are backed by accurate and careful analysis of the data. For institutions desiring to view the complete version of this research study, the 2007 Identity Fraud Survey Report (66 pages) is available for purchase. Author: Rachel Kim, Research Associate Contributors: Mary T. Monahan, Editor and Analyst Bruce Cundiff, Senior Analyst James Van Dyke, President and Founder Research: Stephen Matava-Knighten, Research Associate Don Phan, Senior Analyst Publication Date: February, 2007 This survey was made possible, in part, by CheckFree Corporation, Wells Fargo Bank and Visa USA. Sponsors partially underwrite Javelin s cost of data collection, analysis and reporting in return for having their organization cited in the release of the study. Javelin retains complete independence of data analysis and reporting and the following report has been created solely by Javelin employees. About Javelin Javelin is the leading provider of independent, industry-specific, quantitative research and strategic direction for payments and financial services initiatives. Javelin conducts rigorous research and analysis to create successful strategies related to financial institutions, payments firms, technology vendors, merchants and billers, regulators and other policy-makers, associations, and consumer or business end-users. Page i Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property laws. You may display or print the content available for your use only. You may not sell, publish, distribute, retransmit or otherwise provide.

3 Table of Contents Getting a Full Copy of the Identity Fraud Survey Report... iii Overview...1 What Are Identity Theft and Identity Fraud?...2 How Does Identity Theft Happen?...2 Who Commits Identity Fraud?...3 Prevention...4 How Can I Prevent Identity Fraud?...4 Detection...6 How Can I Detect Identity Fraud?...6 Resolution...7 What Should I Do if I Become a Victim of Identity Theft or Fraud? Identity Fraud Focus: Young Adults Identity Fraud Focus: Low Income Individuals...8 Where Can I Go to Get More Information? Identity Fraud Report: Preview...9 Common Fraud Scams and Terms...10 Methodology...14 Table of Charts Figure 1 Javelin s Prevention, Detection and Resolution Model...1 Figure 2 Who Is the Most Common Fraud Operator?...3 Figure 3 Prevention Tips...4 Figure 4 The Longer it Takes to Detect Fraud, the Higher the Cost...6 Figure 5 How to Contact the Three Credit Bureaus...9 Figure 6 Numbers of Victims before Weighting by Year...14 Figure 7 Mean Dollar Value of Misappropriated Funds...16 Figure 8 Three-Year Averaging of Fraud Amounts...17 Page ii Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property laws. You may display or print the content available for your use only. You may not sell, publish, distribute, retransmit or otherwise provide.

4 Getting a Full Copy of the Identity Fraud Report If you are a business or industry professional looking for more detailed statistics, incidence rates and fraud figures from our 2007 Identity Fraud Survey please reference the full report titled 2007 Identity Fraud Survey Report: Identity Fraud Is Dropping, Continued Vigilance Necessary The full report consists of 66 pages with 40 graphs and tables and can be accessed for purchase on the research page of our Web site at or by calling a sales representative at (925) ext. 26. This Consumer Version was intended for the sole purpose of consumer education and awareness. Javelin recommends purchasing the full report for a complete overview of the key findings, analysis, new trends, and overall benchmarking of identity fraud in the US. Page iii Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property laws. You may display or print the content available for your use only. You may not sell, publish, distribute, retransmit or otherwise provide.

5 Overview In the last year, 8.4 million Americans became the victims of identity fraud, half a million fewer victims than the year before. The total fraud amount dropped 12%, from $55.7 billion to $49.3 billion. 1 While efforts are showing signs of success, consumers and their financial institutions must continue to work together aggressively to fight back against this serious crime. In the last year, the average victim of an existing account fraud paid $587 out-of-pocket in consumer costs. If the thief opened a new account in the victim s name, the average consumer had to pay $617. The Javelin 2007 Identity Fraud Survey Report: Consumer Version provides guidelines for consumers to help prevent, detect and resolve identity fraud. Over the last three years, Javelin has surveyed over 25,000 adults in order to find out how consumers are being affected by identity fraud. This year s phone survey of over 5,000 adults is the largest, most up-to-date study of identity fraud in the US. Our recommendations for consumers are solidly based upon the results of this thorough research and are backed by accurate and careful analysis of the data. Prevent, Detect, and Resolve Figure 1 Javelin s Prevention, Detection and Resolution Model New Account Fraud Existing Account Fraud Average Victim Costs: $617 Average Victim Costs: $587 Prevention How it works: Stops identity theft at the source; preventing unauthorized material harm to private data. If an identity theft has occurred, these methods thwart the criminal s use of private information to obtain funds Detection How it works: Detection of fraudulent activity occurs through company monitoring systems, consumer alerts, account monitoring, reviewing credit reports and other methods for identifying unusual activity Resolution How it works: After identity fraud has occurred, consumers and providers use these services and tools for restoration of accounts and credit worthiness 2007 Javelin Strategy & Research 1 Differences in percentage change due to rounding effect. Actual numbers were used to calculate change. Page 1 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

6 What Are Identity Theft and Identity Fraud? Identity theft happens when someone gains access to your personal data without your permission. Identity fraud occurs when the criminal takes that personal information and misuses it for financial gain. Identifying information such as your Social Security number, bank or credit card account numbers, passwords, telephone calling card number, birth date, name, address and so on can be used by criminals to profit at your expense. With the right information, a criminal can take over your identity to take out loans in your name, withdraw funds from your accounts, rack up credit card and phone charges, and damage your credit rating. How Does Identity Theft Happen? Javelin research has found that, contrary to many expectations, identity thefts happen in the physical world and not just through the Internet or data breaches. In fact, your chances of suffering identity fraud from a lost or stolen wallet are more than three times greater than your chances of suffering fraud from an Internet hacker, according to the 42% of victims who knew how their information was accessed. Your personal or financial information can be stolen in a variety of ways: Through a lost or stolen wallet, checkbook or credit card From a criminal changing the address on an account Through information stolen in your own home, including by friends, relatives, and in-home employees By someone who s, calls, or text messages you, pretending to be a bank or other trusted source to get you to divulge private information By hacking, viruses, and spyware on a computer or ATM machine By a data breach at a retailer, school, bank, hospital or any agency that maintains access to your private information By a corrupt business employee who has access to your records Through eavesdropping by a criminal while you conduct a public transaction ( shoulder surfing ) Through mail theft from an unlocked mailbox From a trash can, a method known as dumpster diving Through new and different methods that criminals are continually developing Because theft can be committed through so many methods, consumers are advised to put into practice a variety of the most effective measures to protect themselves. Page 2 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

7 Who Commits Identity Fraud? Figure 2 Who Is the Most Common Fraud Operator? (Based on the 31% of Victims Who Knew the Perpetrator s Identity) 45% 53% Someone who is familiar to you Someone using the Internet Other 2% Q21: Was the person who stole your personal information n = 144 Base: Victims who know the identity of the perpetrator 2007 Javelin Strategy & Research Contrary to what most consumers believe, in cases where the thief is found out, over half of the time the fraud operator turns out to be a coworker, neighbor, in-home employee, friend or family member. While some fraud is unavoidable, it is important to practice safe habits even in our own homes, for example, by not leaving sensitive financial information out where a new roommate can easily view it. Page 3 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

8 Prevention How Can I Prevent Identity Fraud? Figure 3 Prevention Tips To Prevent Criminals from Stealing Your Identity -PINs, Passwords, SSN -Sensitive Personal Information -Computer, PDA, Mobile Phone -Credit Cards, Debit Cards, IDs -Invoices, Statements, Checks -Incoming/Outgoing Paper Mail Secure Your Personal Information! 2007 Javelin Strategy & Research Top 10 Tips While it is impossible to totally prevent identity fraud, it is possible to greatly reduce your risk of becoming a fraud victim. The drop in the number of fraud victims (500,000 less) and fraud dollar amounts ($6.4 billion decrease) last year testify to the fact that fraud prevention methods work. 1) Only carry credit, debit and identification cards that you use, and do not carry your Social Security number. Lock personal information, sensitive documents, checkbooks, credit cards, etc. in a secure place. 2) Replace paper invoices, statements and checks with electronic versions, if offered by your employer, bank, utility or merchant. Sign up for automatic payroll deposits. 3) Protect your accounts (banking, utility, merchant, etc.) by adding PINs and passwords to them. a. Select difficult to deduce PINs and passwords, mixing numbers with letters. Page 4 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

9 b. Do not use easily known information for your PIN or password, e.g. birth-date, maiden name, etc. c. Secure PINS and passwords, even inside your home, do not share them, and change them frequently. 4) Never provide personal information unless you initiate the contact. Do not click on a link to a Web site when responding to s or text messages. Do not respond to automated phone messages prompting you call a number to resolve a bank account issue, or to s that ask you to contact a number. Instead, use contact addresses, sites or phone numbers that you can verify are legitimate. 5) Install and regularly update firewall, anti-spyware, anti-virus and browser security software if you have a home computer. If you use public computers, ensure that they are equipped with the appropriate security software. When shopping online, make sure you are doing business with a reputable firm. The business should display an approved security symbol and the transaction should be conducted on an encrypted site. 6) Secure your sensitive mobile data whether it is stored on a laptop, PDA or phone. Use encryption software if there is any chance the data may be exposed to theft. 7) Be cautious of solicitations asking for fees in advance. These usually come in the form of guaranteed loans or credit cards despite bad credit history. Remember, if it sounds too good to be true, it often is. Verify the identity of the organization through a legitimate source (such as the Better Business Bureau) before sending any payment. To opt-out of unsolicited credit and insurance offers, call OPTOUT ( ). 8) Shred all sensitive documents prior to disposal. Destroy all sensitive digital data when disposing of old computers, PDAs (personal data assistants) and phones. 9) Use a secure mail box for incoming or outgoing mail. If your home mailbox is not secure, consider receiving your mail at work or renting a mail box at the US Post Office. Place outgoing mail (especially if it contains sensitive documents, such as checks, etc.) in a secure US Postal Service mailbox. 10) Be aware of your surroundings when transacting in public. Cover your keypad and any screens that display sensitive data. Page 5 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

10 Detection Figure 4 The Longer it Takes to Detect Fraud, the Higher the Cost Costs to the Consumer Less than one day One week to less 1 to 11 months 1 year or more than one month FRAUD DETECTION TIME Q19: From the time the misuse of your information first began, how long did it take you to discover it had been misused? by Q30. What is the approximate total dollar value of what the person obtained while misusing your information? n = 458 Base: All fraud victims 2007 Javelin Strategy & Research How Can I Detect Identity Fraud? Javelin research has consistently shown that consumers are the best detectors of identity fraud, though the most effective crime fighting is done when financial institutions and consumers partner together to stop fraud. 1) Monitor your bank and credit card activity regularly. Check your account balances weekly through the Internet, phone or ATM. Confirm that all transactions are authorized. (This is also one of the best ways to prevent identity fraud.) 2) Use or telephone alerts to monitor address changes, transfers, payments, low balances and withdrawals if this service is offered by your bank. Check your frequently. 3) Watch for statements, checks, and new or renewed credit or debit cards. 4) Review your credit information regularly. Free reports are available at or by calling Stagger your free credit reports with each of the three credit bureaus to receive a free report every four months. Confirm that all accounts listed are yours. 5) Consider signing up for a credit monitoring service. For the best protection, make sure the service monitors all three credit bureaus. Page 6 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

11 Resolution What Should I Do if I Become a Victim of Identity Theft or Fraud? First of all, don t panic. Financial institutions have been working to make fraud resolution faster and easier; in fact, resolution times have dropped by more than one-third over the last year. There are a few simple steps that consumers can take to quickly resolve their fraud issues. 1) Contact your bank, credit card company or merchant immediately, by phone and in writing, if you think you might be a victim of identity theft or fraud, if your checkbook, wallet or debit/credit cards are lost or stolen or if you fail to receive statements, invoices or new or renewed credit/debit cards. Notify your financial providers at once if any existing accounts were misused. 2) Close any accounts that may have been compromised. Closing accounts without delay will help to minimize fraud losses. 3) Ask your financial provider about their fraud resolution teams and their zero-liability guarantees against fraud to help you resolve and recover from any potential losses. 4) Place a credit alert at any one of the three credit bureaus (Equifax, Experian and TransUnion) and get a copy of your credit report at.annualcreditreport.com. The bureau you notify is required by law to notify the other two agencies. Credit alerts notify potential creditors that there is a problem with your account. An initial fraud alert will stay in place for 90 days. During this time you can also sign up for an extended fraud victim alert which will stay in place for seven years. 5) Be informed of your data breach notification rights, which vary by state. In certain states, you must be notified whenever a data breach occurs and the decision of when and if to notify should not be left up to a company. Notices should include what information was stolen and a number to call for additional information. 6) Consider placing a credit freeze, if your information has been compromised. This will completely stop your credit report from being shared with anyone. Currently twelve select states allow credit freezes, so check to see if you qualify for coverage (free in some states). 7) File a report with your local police where the identity theft took place. Get a copy of the police report for your records. 8) Notify the Federal Trade Commission at or online at 9) Consider signing up for a credit monitoring service. For the best protection, make sure the service monitors all three credit bureaus. Page 7 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

12 2007 Identity Fraud Focus: Young Adults Based on 2007 survey data, Javelin finds that young adults (18-24) suffer higher rates of identity fraud than any other age group. Surprisingly, younger victim are almost twice as likely as other age groups to be victimized by people they know such as friends, roommates and neighbors. This means that young people must be extra vigilant about protecting their private financial data inside their homes. Young adult victims (18-24) are the least likely of any age group to turn off paper statements, least likely to be using anti-virus, anti-spyware software or firewalls, and the least likely to practice shredding of their financial information before disposal. Among the consumer recommendations young adults should be especially observant of the following guidelines: Turn off paper statements and use electronic versions for transactions, whether paying bills, viewing statements or monitoring accounts. Javelin has found electronic monitoring of accounts cuts down on identity fraud. Regularly use and update a firewall and anti-malware for your personal computer. Anyone using the Internet needs to put these needed safety features in place. Properly dispose of sensitive documents by shredding them. By engaging in these basic precautions, young adults can be more successful in protecting themselves against fraud Identity Fraud Focus: Low Income Individuals Despite being the least likely group to experience fraud, the lowest income individuals (under $15K) still suffered from the longest misuse periods, most prolonged detection times and lengthiest resolution times. Javelin determined that compared to higher income groups, a significantly lower percentage of lower income individuals with Internet access utilize online banking services, anti-malware or online bank bill pay, even though the data clearly shows these methods, used properly, reduce fraud. Among those low-income individuals who have been victims of identity fraud, the majority decide to significantly limit online activity out of fear of being victimized again. Low income online consumers should focus on the following action steps: Replace paper invoices, statements and checks with electronic versions, if offered by your employer, bank, utility or merchant. Regularly monitor your accounts. Install and regularly update firewall, anti-spyware, anti-virus and browser security software on your home computer. Page 8 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

13 Where Can I Go to Get More Information? There are a number of places to get more information. Javelin has used the results of its study to create an easy-to-use safety quiz and a list of recommended tips which can be accessed at: The 2007 Identity Fraud Report s co-sponsors (CheckFree, Visa and Wells Fargo) also offer safety recommendations: CheckFree Corporation Visa Corporation Wells Fargo Figure 5 How to Contact the Three Credit Bureaus Credit Bureau: Equifax Experian Transunion Order Credit Report Report Fraud Web Address Mailing Address Equifax Consumer Fraud Division P.O. Box Atlanta, GA Experian Consumer Assistance 475 Anton Blvd. Costa Mesa, CA Transunion Victim Assistance Dept. P.O. Box 6790 Fullerton, CA Identity Fraud Report: Preview 2007 Javelin Strategy & Research The complete Javelin 2007 Identity Fraud Survey Report: Identity Fraud Is Dropping, Continued Vigilance (over 60 pages long with 40 graphs and tables) is available for purchase at our Web site at The full report provides a detailed, comprehensive analysis of identity fraud in the United States, in order to help consumers and businesses better understand the effectiveness of methods used for its prevention, detection and resolution. This report is issued as a longitudinal update to the Javelin 2006 Identity Fraud Survey Report, the Javelin 2005 Identity Fraud Survey Report and the Federal Trade Commission s (FTC) 2003 Identity Theft Survey Report. Page 9 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

14 Common Fraud Scams and Terms To clarify common fraud scams and terminology, definitions are provided below. Javelin uses identity fraud as the term to describe the crime discussed in this report. Because this report s underlying survey was based on interviews with individuals who were the victims of fraud committed using at least some portion of their personal information, it will not include other categories of crime such as synthetic identity fraud, which is based upon a wholly fictitious identity. However, Javelin believes that many identity frauds do contain a mixture of true and synthetic components and these frauds are included in this report. To clarify the usage of common terms by Javelin, definitions are provided below. Account takeover fraud Advanced fee fraud Consumer cost Credit freeze Data breach Existing Card Accounts fraud a method of identity fraud, where a fraud operator attempts to gain access to a consumer account by fraudulently adding his/her information to the account; changing the mailing address or making other alterations any scam that, during its course, requires advanced fees to be paid by the victim. Usually, these fees are explained by the criminals to be processing fees, bribes, finding fees, etc. the out-of-pocket costs incurred by the victim in order to resolve a fraud case. These include: postage, copying, notarizing documents, legal fees, and may also include payment of any fraudulent debts in order to avoid further problems a security freeze that is placed on a consumer s credit file to prevent the file from being shared with anyone, thus forestalling new accounts from being opened in the consumer s name the unauthorized disclosure of information that compromises the security, privacy, or integrity of personally identifiable data. identity fraud perpetrated using existing credit or debit cards and/or their account numbers Page 10 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

15 Existing Non-Card Accounts fraud Fraud amount Identity fraud Identity theft Interactive financial messaging Mutual authentication Man-in-the-middle (MITM) New Accounts and Other frauds Non-identity fraud Phishing identity fraud perpetrated using existing checking and savings accounts, and existing loans, insurance, telephone, and utilities accounts the total amount of funds that the fraud operator obtained or tried to obtain illegally. These may result in actual losses to various businesses and organizations (and in some cases to the consumer). These may also be funds that are either recovered or the loss is avoided due to preventive measures adopted by the businesses the unauthorized use of some portion of another s personal information to achieve illicit financial gain. Identity fraud can occur without identity theft. For example, it can occur with relatives who are given access to personal information or by the use of randomly generated payment card numbers. the unauthorized access to personal information. Identity theft can occur without identity fraud. For example, it can occur with large scale data breaches two-way messaging between FIs and their customers, including alerts for consumer-directed prohibitions a method by which both the FI and the customer can identify each other, for example, by providing and identifying shared secrets. an attack in which an perpetrator is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised identity fraud perpetrated by using the victim's personal information to open fraudulent new accounts direct misrepresentation by a fraudulent merchant, investment firm, charity or other organization that results in financial loss to the consumer the method of "fishing" for Internet users passwords, financial or personal information by luring Page 11 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

16 Pretexting Smishing Synthetic identity fraud Trojan horse True name fraud them to a fake Web site through an authenticlooking that impersonates the victim s financial institution the collection of information about an individual under false pretenses (the pretext ), usually done over the phone, such as calling a bank while posing as a customer to find out personal information. a version of phishing sent by SMS messaging (text messaging) which sends a cell phone message that directs victims to a Web site that downloads malicious spyware (Trojan horse) onto the victim s cell phone or computer. a completely fictitious identity created in order to defraud an organization. To be considered synthetic identity fraud, all consumer information must be fictitious. (Usually at least one part of the identity in an identity fraud is based upon actual consumer information, for example, a real name or real Social Security number, and these cases are not considered synthetic identity fraud because a consumer victim is involved.) a program that appears to be a useful file (i.e., a music file) or software upgrade from a legitimate source, tricking the victim into opening it. Once activated, the Trojan horse allows intruders to access private information. see identity fraud Vishing a version of phishing that uses a combination of e- mail and the telephone, or just telephone; the victim is urged to resolve an account issue by a criminal posing as a financial institution, and is thereby prompted to provide personal information Page 12 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

17 Page 13 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

18 Methodology The Javelin 2007 Identity Fraud Survey Report provides consumers and businesses an in-depth and comprehensive examination of identity fraud in the United States. Its purpose is to help readers understand the causes and incidence rates of identity fraud and the success rates of methods used for its prevention, detection and resolution. This report builds on the Javelin 2006 Identity Fraud Survey Report, 2005 Identity Fraud Survey Report and the Federal Trade Commission s 2003 Identity Theft Survey Report. Survey Questionnaire The set of questions and underlying methodology used for this report were identical to or highly similar to the 2006, 2005 and 2003 surveys. This allows the ability to provide longitudinal trends on various subjects, such as incidence rates and detection methods. In addition, to more deeply explore the significance of past responses, a discrete number of new questions were added. These probed the behaviors of consumers before and after personal information was compromised and/or misused, in order to identify any correlations to the fraud operators behaviors and to discover potential opportunities for consumer education. Some questions from the previous surveys were modified to improve the accuracy of our estimates. Questions used to measure the fraud amounts, consumer cost, and resolution hours previously provided ranges of responses. In the 2007 report, these questions were changed to collect exact amounts. Survey Respondents In all, 5,006 consumers, representative of the US population, were interviewed via a standardized 41-question telephone survey to develop more accurate and actionable insight into this pervasive and costly crime. The polling yielded interviews with 469 fraud victims. After weighting the responses to standardize to national demographics, 2 the 2007 survey s computed number of victims interviewed was 458. For comparison, the numbers of victims in previous years, before and after weighting, are provided below: Figure 6 Numbers of Victims before Weighting by Year Number of victims before weighting Number of victims after weighting Javelin Strategy & Research 2 Responses were adjusted to be nationally representative based on respondents age, gender, income level, and race/ethnicity as reported by US Census on 12/11/2006 accessed 12/11/2006 Page 14 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

19 Survey Data Collection Javelin employed the Discovery Research Group for this survey s data collection. Discovery, one of the nation s largest data collection providers, is recognized as a reputable data collection service firm with over 18 years of experience in the industry. Previous studies employed Synovate for all phases of data collection using Computer Assisted Telephone Interviewing (CATI) via Random-Digit-Dialing (RDD). Synovate has since changed their sampling method from RDD to a remunerated opt-in panel. In order to maintain consistency in methodology by continuing to sample respondents through RDD, for the 2006 study Javelin engaged the services of the Discovery Research Group. The study was conducted using interviews administered by telephone with 5,006 US adults over age 18 and a sample that is representative of the US census demographics distribution. Data collection began September 29, 2006 and ended November 7, Margin of Error For questions answered by all 5,006 respondents, the maximum margin of sampling error is +/- 1.4% at the 95% confidence level. For questions answered by all 458 identity fraud victims, the maximum margin of sampling error is +/- 4.6% at the 95% confidence level. For questions answered by a proportion of all identity fraud victims, the maximum margin of sampling error varies and is greater than +/- 4.6% at the 95% confidence level. Categorizing Fraud With one exception, this report continues to classify fraud within the three categories originally defined by the FTC. Starting in 2006, debit card fraud was re-categorized as Existing Card Accounts fraud, 3 instead of Existing Non-Card Accounts fraud. 4 Javelin believes that this change reflected a more accurate representation of debit card fraud, since much of its means of compromise, its fraudulent use and detection methods parallel those of credit cards. The categories of fraud are listed below from least to most serious: Existing Card Accounts: This category includes both the account numbers and/or the actual cards for existing credit and card-linked debit accounts. Existing Non-Card Accounts: This category includes existing checking and savings accounts, and existing loans, insurance, telephone, and utilities accounts New Accounts and Other Frauds: This category includes new accounts or loans for committing theft, fraud, or other crimes using the victim's personal information 3 Formerly titled Existing Credit Card Accounts in the 2003 and 2005 reports 4 Formerly titled Existing Non-Credit Card Accounts in the 2003 and 2005 reports Page 15 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

20 Many victims experience identity fraud within more than one of these categories. In reporting the overall incidence rates of the three categories or types of accounts, the victims of crimes to more than one type of account are categorized based on the most serious (as designated by the FTC) problem reported. Thus, victims who reported that new accounts had been opened using their information and also that their existing credit cards had been misused would be placed in the New Accounts and Other Frauds classification, not in the Existing Card Accounts classification. This categorization is applicable only for reporting the rates of the three types of fraud. Calculations Comparing Annual Numbers To create a more accurate understanding of the costs of identity fraud Javelin has departed from using ranged brackets (e.g., $0 to $50) to measure the fraud amount, consumer cost, and hours spent resolving fraud. This change in methodology leads to a lower estimate of the average fraud amount. By converting the data collected into the previous year s methodology, Javelin has found that the means derived from the former, bracketed methodology overstate the average losses by over 20%. The graph below shows that for each of the ranges, the mean generated using the bracketed, 2006 methodology consistently inflated the mean compared to the current methodology. By adopting this change, Javelin has created a more accurate picture of the impact of identity fraud in the US. $80,000 Figure 7 Mean Dollar Value of Misappropriated Funds Comparing 2007 and 2006 Methodologies Mean Value $70,000 $60,000 $50,000 $40,000 $30,000 $20,000 $10,000 $- $22 $50 Less than $ Methodology 2006 'Bracketed' Methodology $227 $300 $649 $750 $1,975 $100 - $499 $500 - $999 $1,000 - $4,999 Q30. What is the approximate total dollar value of what the person obtained while misusing your information? $3,000 $6,690 $7,500 $5,000 - $9,999 Bracket Ranges $14,006 $17,500 $33,080 $37,500 $60,649 $75,000 $10,000 - $24,999 $25,000 - $49,999 $50,000 - $99,999 n = 458 Base: All fraud victims 2007 Javelin Strategy & Research Page 16 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

21 To allow for comparisons to previous years, it is necessary to re-bracket the actual amounts and this is what has been done. In the future, access to these actual (versus bracketed) numbers will allow for comparisons of like figures using the more accurate actual numbers. Due to rounding errors, the percentages on graphs add up to 100% plus or minus one percent. The percentage change of 12% from 2006 to 2007 was calculated using the underlying actual dollar figures after adjusting for inflation and data smoothing (i.e., $55.72 billion for 2005, $49.26 billion for 2006). To assure consistency in comparing year-to-year changes, historical figures were adjusted for inflation by using the Consumer Price Index (CPI) survey numbers were adjusted by 2.1%, 2005 survey numbers were adjusted by 5.4% and 2003 numbers were adjusted by 8.9% to normalize the value of currency. 5 Data Smoothing Techniques 2006 and 2007 total dollar cost estimates have been smoothed using a moving three-year averaging method. Time series data smoothing techniques are used to eliminate noise created by random data fluctuations and uncover real trends. Figure 8 Three-Year Averaging of Fraud Amounts Original Amount $53.8 $55.5 $57.8 $34.5 Three-year moving average N/A N/A $55.7 $49.3 Calculating Mean and Median Values 2007 Javelin Strategy & Research Where responses pertained to a range in value, e.g., one day to less than one week, to calculate the median or mean value, the midpoint of the range, rounded up to the nearest whole unit, was used. Example: If the response selected for fraud amount was one day to less than one week, the assigned value the assigned value would be the median of 1 day and 7 days, inclusive or 4.5 days. Deviation from FTC and 2003 Methodology and Reporting When reporting victims average financial damages or resolution times in dollars or hours, the entire amounts of damages or losses are placed into every type of fraud that the victims suf survey dollar costs have been adjusted for inflation by for the period beginning April 2003 and ending Oct. 2006, 2005 survey dollar costs by for the period beginning Nov and ending Oct. 2006, and 2006 survey dollar costs by for the period beginning Nov and ending Oct using the Consumer Price Index (CPI-U, Base =100))issued by the Bureau of Labor Statistics, ftp://ftp.bls.gov/pub/special.requests/cpi/cpiai.txt Accessed 10/26/2006. Page 17 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

22 fered. For example, for a victim who reports that a total of $100 is obtained for both New Accounts & Other Frauds category and Existing Card Accounts, the $100 is counted in both categories. This method of reporting costs by types of fraud will not change the overall total costs of fraud across all three categories, but the average amount of dollars or time associated within the three types of fraud should not be summed as there will be overlapping amounts. In the 2003 report, responses to the New Accounts and Other Frauds question (Q9) were modified based on respondents subsequent answers to question s question 14 is slightly modified from 2003 s, thus avoiding the possibility of needing to adjust responses to question 15 in order to maintain the longitudinal integrity s responses to question 9 are reported as they were reported by the victims. Secondly, 2007 s detection time question (Q19) is categorized differently from the 2003 study. While the 2003 study provided 13 answers from which victims could choose, the 2006 study contained only 9 such responses. Javelin merged similar response categories that contained few replies in 2003 into single categories, allowing the data to be cross tabbed with larger numbers and fewer categories for a more robust calculation. On several other questions, longitudinal comparisons are performed with numbers that Javelin calculated using 2003 raw data instead of 2003 reported figures. This was done in order to avoid inserting rounding errors or methodology differences. Contributing Organizations The extensive survey was, in part, made possible by CheckFree Services Corporation, Visa USA, and Wells Fargo Bank. To preserve the project s independence and objectivity, the sponsors were not involved in the tabulation, analysis or reporting of final results. Getting a Copy of the Full Report: If you are a business or industry professional looking for more detailed statistics, incidence rates and fraud figures from our 2007 Identity Fraud Survey please reference the full report titled: 2007 Identity Fraud Survey Report: Identity Fraud Is Dropping, Continued Vigilance Necessary The full report consists of 66 pages with 40 graphs and tables and can be accessed for purchase on the research page of our Web site at or by calling a sales associate at (925) , ext. 26. This Consumer Version was intended for the sole purpose of consumer education and awareness. Javelin recommends purchasing the full report for a complete overview of the key findings, analysis, new trends, and overall benchmarking of identity fraud in the United States. Page 18 Copyright 2007 Javelin Strategy & Research. All rights reserved. This report is protected by copyright and other intellectual property

2008 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves

2008 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves 2008 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves February 2008 4309 Hacienda Drive, Pleasanton, CA 94588 925.225.9100 t 925.225.9101 f www.javelinstrategy.com 2008

More information

2006 Identity Fraud Survey Report

2006 Identity Fraud Survey Report 2006 Identity Fraud Survey Report January, 2006 Consumer Version (abridged from the full 61-page report) Telephone: 925.225.9100 Fax: 925.225.9101 Address: 4309 Hacienda Drive, Suite 380 Pleasanton, CA

More information

2009 Identity Fraud Survey Report: Consumer Version

2009 Identity Fraud Survey Report: Consumer Version 2009 Identity Fraud Survey Report: Consumer Version Prevent Detect Resolve February 2009 2009 Javelin Strategy & Research 4301 Hacienda Drive, Pleasanton, CA 94588 USA +1 925 225 9100 t +1 925.225.9101

More information

2009 Identity Fraud Survey Report: Consumer Version

2009 Identity Fraud Survey Report: Consumer Version 2009 Identity Fraud Survey Report: Consumer Version Prevent Detect Resolve February 2009 2009 Javelin Strategy & Research 4301 Hacienda Drive, Pleasanton, CA 94588 USA +1 925 225 9100 t +1 925.225.9101

More information

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

Information to Protect Our Customers From Identity Theft

Information to Protect Our Customers From Identity Theft Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns

More information

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft, Fraud & You. Prepare. Protect. Prevent. Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic

More information

Corona Police Department

Corona Police Department By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,

More information

I dentity theft occurs

I dentity theft occurs 1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,

More information

What You Need to Know About Identity Theft. Identity Theft Prevention Tips

What You Need to Know About Identity Theft. Identity Theft Prevention Tips What You Need to Know About Identity Theft Identity theft is the fastest growing crime in America. Criminals who gain access to simply a few pieces of valid personal information can impersonate another

More information

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage. Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Fraud and Identity Theft. Megan Stearns, Credit Counselor Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention

More information

What is Identity Theft?

What is Identity Theft? What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you Identity theft is a terrible problem in this Information Age. You have already taken the first important step by contacting ACNB Bank immediately. ACNB Bank will work with you every step of the way to

More information

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft. IDENTITY THEFT IDENTITY THEFT Identity theft is a serious crime with serious costs for victims. ID theft occurs when someone obtains your personal information such as your Social Security Number, credit

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

Protect Yourself From Identity Theft

Protect Yourself From Identity Theft Protect Yourself From Identity Theft The facts about identity theft Imagine a typical day. In our fast-paced, hectic lives, we all engage in activities that we may take for granted. We write checks and

More information

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit Identity Theft: It Could Happen To You! Attorney General Tom Reilly s Guide to Protecting Yourself and Your Credit One Ashburton Place ~ Boston, MA 02108 ~ (617) 727-2200 www.ago.state.ma.us February 2005

More information

2010 Identity Fraud Survey Report: Consumer Version

2010 Identity Fraud Survey Report: Consumer Version February 2010 4301 Hacienda Drive, Pleasanton, CA 94588 USA +1 925 225 9100 t +1 925.225.9101 f www.javelinstrategy.com Table of Contents Getting a Full Copy of the Identity Fraud Survey Report... 3 Overview...

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

Protect Yourself From Identity Theft

Protect Yourself From Identity Theft Protect Yourself From Identity Theft The facts about identity theft Imagine a typical day. In our fast-paced, hectic lives, we all engage in activities that we may take for granted. We write checks and

More information

Employee ID Theft Resource Guide

Employee ID Theft Resource Guide Employee ID Theft Resource Guide ID Theft Resolution Legal Resources ID Theft Assistance Updates www.legalresources.net ID Theft What is Identity Theft? Identity Theft is a serious crime in which someone

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

Identity Protection Guide. The more you know, the better you can protect yourself.

Identity Protection Guide. The more you know, the better you can protect yourself. Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious

More information

Federal Trade Commission Identity Theft Survey Report

Federal Trade Commission Identity Theft Survey Report Synovate Tel 703 790 9099 1650 Tysons Blvd Fax 703 790 9181 Suite 110 www.synovate.com McLean VA 22102 Identity Theft Survey Report Prepared for Prepared by Synovate September, 2003 Table of Contents Methodology...Page

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

2011 Identity Fraud Survey Report: Consumer Version

2011 Identity Fraud Survey Report: Consumer Version February 2011 4301 Hacienda Drive, Pleasanton, CA 94588 USA +1 925.225.9100 t +1 925.225.9101 f www.javelinstrategy.com Table of Contents Overview... 5 Identity Fraud vs. Identity Theft... 6 Methods Criminals

More information

DVD Companion Learning Guide

DVD Companion Learning Guide DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material

More information

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center

More information

Identity Theft is a Crime in the State of New Jersey.

Identity Theft is a Crime in the State of New Jersey. NEW JERSEY STATE POLICE Identity Theft: A Victim s Reference Identity Theft occurs when someone uses your personally identifying information like your name, Social Security number, or credit card number

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

PREVENTING ID THEFT101

PREVENTING ID THEFT101 PREVENTING ID THEFT101 701.255.0042 www.capcu.org i This book is intended as a general guide to the topics discussed, and it does not deliver accounting, personal finance, or legal advice. It is not intended,

More information

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain.

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain. Identity Theft Identity Theft Occurs when someone uses your personal information without your permission for personal gain. Someone uses your personal information to open a department store credit account

More information

PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity

PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity Identity fraud occurs anytime your personal information is used without your authority and is more than just credit card

More information

IDENTITY THEFT RESOURCE KIT

IDENTITY THEFT RESOURCE KIT IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What

More information

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to IDENTITY THEFT IDENTITY theft Identity theft can happen to anyone. Previously, criminals stole your wallet for your cash. Now they want your wallet to steal your good name. Protect yourself and your identity.

More information

How Consumers can Protect Against Identity Fraudsters in 2013

How Consumers can Protect Against Identity Fraudsters in 2013 How Consumers can Protect Against Identity Fraudsters in 2013 February 2013 2 FORWARD Javelin Strategy and Research s How Consumers can Protect Against Identity Fraudsters in 2013 provides recommendations

More information

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How

More information

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Identity Theft Awareness: Don t Fall Victim to these Common Scams Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with

More information

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

identity theft: How To Safeguard Your Privacy and Keep Your Good Name identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,

More information

Identity Theft: Informational Workshop

Identity Theft: Informational Workshop Identity Theft: Informational Workshop ~ Prepared By ~ Connecticut Department of Consumer Protection Jerry Farrell, Jr. Commissioner 1 The Department of Consumer Protection Mission The Department of Consumer

More information

IDENTITY THEFT: MINIMIZING YOUR RISK

IDENTITY THEFT: MINIMIZING YOUR RISK IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Identity Theft. Protecting Your Credit Identity 1.3.1.G1

Identity Theft. Protecting Your Credit Identity 1.3.1.G1 Identity Theft Protecting Your Credit Identity Identity Theft The dollar loss suffered because of identity theft from consumers was 343 million in 2002. Federal Trade Commission The number of identity

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information

Beware! Identity Theft

Beware! Identity Theft STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft identity theft unit new york county district attorney s office Protecting Yourself from Identity Theft cyrus r. vance, jr. district attorney 5 / 2010 questions and answers Dear Friends, cyrus r. vance,

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

Identity Theft Assistance: Information for Recovering Your Good Name

Identity Theft Assistance: Information for Recovering Your Good Name Identity Theft Assistance: Information for Recovering Your Good Name I Could Be A Victim of Identity Theft! What Do I Do Next? We understand that you may have been a victim of identity theft. Enclosed

More information

Identity Theft: Prevention & Survival

Identity Theft: Prevention & Survival Identity Theft: Prevention & Survival Crime of the Century Provide By: Nick Sabetta Don t t Let Someone Steal Your Good Name What is Identity Theft? When someone uses your personal information without

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

Identity Theft. Emergency Repair Kit

Identity Theft. Emergency Repair Kit Identity Theft Emergency Repair Kit 2012 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Any duplication or reproduction is strictly prohibited. Identity Theft Emergency Repair

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IDENTITY THEFT IT S POSSIBLE@ PROTECT YOUR IDENTITY protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IT S POSSIBLE @ What Is Identity Theft? According to the FBI, identity theft is the fastest

More information

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government

More information

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen FTC Facts For Consumers Federal Trade Commission For The Consumer August 2005 Identity Crisis... What to Do If Your Identity is Stolen Maybe you never opened that account, but someone else did...someone

More information

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH...

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... CONTAINMENT AND CONTROL... INVESTIGATING A SECURITY

More information

Standard 9: The student will identify and explain consumer fraud and identity theft.

Standard 9: The student will identify and explain consumer fraud and identity theft. TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial

More information

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09 IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do

More information

Identity Theft: When You Are the Target

Identity Theft: When You Are the Target F O R F O R Y O U R Y O U R L I F E R E T I R E M E N T Identity Theft: When You Are the Target What s inside What Is Identity Theft?... 2 How Does Identity Theft Occur?... 2 How Can You Protect Yourself?...

More information

Protecting Yourself From Identity Theft And Fake Check Scams. Faculty. Question. The Law. The Law. The Law

Protecting Yourself From Identity Theft And Fake Check Scams. Faculty. Question. The Law. The Law. The Law Protecting Yourself From Identity Theft And Fake Check Scams Satellite Conference and Live Webcast Wednesday, July 16, 2008 2:00-4:00 p.m. (Central Time) Faculty Monica S. Sheeler Consumer Specialist Office

More information

WHAT S IT ALL ABOUT?

WHAT S IT ALL ABOUT? WHAT S IT ALL ABOUT? Introduction The 1990 s spawned a new variety of crooks called identity thieves. Their stock in trade? Your everyday transactions, which usually reveal bits of your personal information:

More information

U.S. Postal Inspection Service. Ensuring Confidence in the U.S. Mail

U.S. Postal Inspection Service. Ensuring Confidence in the U.S. Mail U.S. Postal Inspection Service Ensuring Confidence in the U.S. Mail Identity theft involves acquiring key pieces of someone s identifying information, such as name, address, date of birth, social security

More information

How To Protect Yourself From Identity Theft

How To Protect Yourself From Identity Theft Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ 85211-1466

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ 85211-1466 FRAUD PACKET Instructions and Useful Information Please read entire packet and follow instructions to complete this packet properly. **This packet should ONLY be completed if you are a victim of Identity

More information

Do s & Don ts Reference website. www.farmersidentityshield.com

Do s & Don ts Reference website. www.farmersidentityshield.com What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What

More information

Protecting Yourself Against Fraud and Identity Theft

Protecting Yourself Against Fraud and Identity Theft Summit Branches are conveniently located in Rochester (8), Seneca Falls (1), Buffalo (2), Syracuse (5) and Cortland (2) Protecting Yourself Against Fraud and Identity Theft A presentation by The Summit

More information

Fraud Information and Security

Fraud Information and Security Fraud Information and Security Updated: January 13, 2015 How We Protect You At WySTAR Global Retirement Solutions security is a top priority. We understand that your trust in us depends on how well we

More information

How To Get Help From The Police Department

How To Get Help From The Police Department IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification

More information

Client Education. Learn About Identity Theft

Client Education. Learn About Identity Theft Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that

More information

IDENTITY ALERT: The Fight to Defend Your Identity and Personal Information

IDENTITY ALERT: The Fight to Defend Your Identity and Personal Information IDENTITY ALERT: The Fight to Defend Your Identity and Personal Information A frightening crime with an untraceable weapon, identity theft is creating anxiety across the country. In fact, 2 out of 3 Americans

More information

suntrust.com 800.SUNTRUST

suntrust.com 800.SUNTRUST suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

what you need to know

what you need to know A P Identity u b l i c a t i o n o f t h e S o u t h C a r o l i n a D e p a r t m e n Theft t o f C o n s u m e r A f f a i r s what you need to know Step By Step: What To Do After a Security Breach #1:

More information

How To Get A Credit Card From A Credit Union

How To Get A Credit Card From A Credit Union Refuse to be a target of identity crime. Protecting the Real You and Only You. The International Association of Chiefs of Police 515 N. Washington Street, Alexandria, VA 22314 Telephone: 1.800.843.4227

More information

Power Against Identity Theft

Power Against Identity Theft Power Against Identity Theft What is Your Identity Theft Probability Score? 1. I pay bills with checks and place them in my mailbox or in a corner postal box. 2. I do not use direct deposit or electronic

More information

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT

More information

When Fraud Comes Knocking

When Fraud Comes Knocking When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

Preventing identity theft

Preventing identity theft Preventing identity theft About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence

More information

Dear Concerned Consumer,

Dear Concerned Consumer, Dear Concerned Consumer, Identity theft is a growing problem of the Information Age. You have already taken the first important step in combating the problem by contacting HomeStar Bank & Financial Services.

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Identity Theft Simple ways to keep your sensitive information safe.

Identity Theft Simple ways to keep your sensitive information safe. Keep yourself safe from Identity Theft Simple ways to keep your sensitive information safe. Be Aware Identity theft is the number one consumer fraud perpetrated on unsuspecting citizens. In 2011, nearly

More information

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain. Common ID Theft TACTICS. HOW DOES IT HAPPEN? Identity What should I do if I m a Protection PROTECT YOURSELF: OLD-FASHIONED STEALING: Criminals steal your wallet or purse. > Never leave your wallet or purse

More information

Criminal Investigation

Criminal Investigation Criminal Investigation Stolen Identity Refund Fraud (SIRF) Nneka Sutherland Special Agent (267) 941 6281 Nneka.Sutherland@ci.irs.gov Joseph Carl Special Agent (267) 941 6117 Joseph.Carl@ci.irs.gov IRS

More information

About the Federal Reserve

About the Federal Reserve About the Federal Reserve The Federal Reserve Bank of Philadelphia is one of 12 regional Reserve Banks in the United States that, along with the Board of Governors in Washington, D.C., make up the Federal

More information

SECURITY BREACH FACT SHEET FOR DEPARTMENT OF ADMINISTRATION CALL CENTER

SECURITY BREACH FACT SHEET FOR DEPARTMENT OF ADMINISTRATION CALL CENTER PRICE WATERHOUSE COOPERS SECURITY BREACH FACT SHEET FOR DEPARTMENT OF ADMINISTRATION CALL CENTER Who is affected by the breach? Participants in the Public Employees Retirement System and the Teachers Retirement

More information

Identity Theft. Prevention and Recovery Information Kit

Identity Theft. Prevention and Recovery Information Kit Identity Theft Prevention and Recovery Information Kit A step-by-step guide designed to help you protect your identity and recover if you ve been victimized. 800-522-4100 valleynationalbank.com 2012 Valley

More information

Guide to Identity Theft

Guide to Identity Theft Guide to Identity Theft 1 Receive a free copy of your credit report. Visit www.annualcreditreport.com to get a copy of your credit report from all three credit reporting agencies. Review your credit report

More information

Identity Theft Repair Kit

Identity Theft Repair Kit Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact

More information