White Paper. Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper

Size: px
Start display at page:

Download "White Paper. Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper"

Transcription

1 White Paper Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper Dave Whitin, Consultant Michiko Wolcott, Statistician September 2006

2 Table of contents Executive summary Introduction Legal responses to identity theft Challenges in modeling for fraud Project goals Data sources Performance Conclusion About Equifax About the authors

3 Executive summary Identity theft continues to be a major white-collar crime in the United States. Its consequences are borne evenly by consumers, credit grantors and credit bureaus. To complicate matters, identity thieves are constantly changing their techniques, so their patterns of behavior are difficult to predict and monitor. Identity theft can be defined as any act in which someone uses the personal information of another (name, address, Social Security number, date of birth, account numbers) without the knowledge or consent of that individual. In the world of consumer credit lending, this often leads to the fraudster opening a line of credit in the victim s name. The perpetrator then takes the fraudulent card on a spending spree. A common term for this type of identity theft fraud is true-name fraud. Optimum performance is achieved when the solution draws upon a variety of data types, including credit-file data, identification match quality data and applicationspecific data. The risk and exposure associated with true-name fraud has sparked demand for advanced solutions that can identify this type of activity at the source; the time of application. By implementing real-time, cost-effective solutions with a low false-positive rate, lenders will increase compliance with legislation. Perhaps more importantly, lenders can bolster consumer confidence, deter fraud attempts, and cut their financial losses. In 2003, Equifax Analytical Services completed a detailed study for a national card issuer to analyze how to best achieve predictive modeling for true-name fraud. The study, which was revalidated in 2005 with a newly refined model, found that the most effective true-name-fraud solution needs to incorporate multiple types of data and should be customized to a specific lender. Optimum performance is achieved when the solution draws upon a variety of data types, including credit-file data, identification match quality data and application-specific data. This paper provides a background on identity theft and summarizes the performance of both the original and the refined models. The paper s goal is to help the reader learn more about the challenges of risk modeling for fraud. 1

4 Introduction The Federal Trade Commission (FTC) tracks the number of fraud and identity theft complaints it receives. As Figure 1 shows, the number of complaints soared from 2001 (the first year tracked) through Since then, identity theft complaints have climbed at a slower rate. Identity theft complaints as a percentage of total complaints have actually declined slightly (from 40% in 2003 to 37% in 2005). 300,000 Number of identity theft complaints 250, , , ,000 50, Figure 1. Number of identity theft complaints received by the FTC According to the Identity Theft Resource Center, in 2005 each new identity theft victim spent an average of 60 hours resolving the resulting problems. Identity theft is carried out when the perpetrator hijacks someone s identity information, such as name, address or social security information, to commit fraud. This type of crime can affect anyone, anywhere, at any time. According to the Identity Theft Resource Center, in 2005 each new identity theft victim spent an average of 60 hours resolving the resulting problems. It is fairly easy for a criminal to obtain personal information to use in a fraudulent manner. Some websites facilitate internet fraud, either by revealing private information or by enabling amateur fraudsters to create an extremely legitimate-looking fake ID using a victim s name, address and date of birth information. 2

5 Legal responses to identity theft The surge of consumer fraud over the last decade prompted a variety of legislative, regulatory and litigious actions. Section 326 of the USA PATRIOT Act specifically requires financial institutions to implement a Customer Identification Program (CIP). The program establishes procedures for collecting ID information, maintaining ID records, verifying customers identity and determining if a customer is on any list of suspected terrorists. At least 25 states have passed security freeze laws, which lock a consumer s credit report and prevent anyone from opening a credit account or loan. The FTC, by law, must log all identity theft complaints in its data repository, provide victim assistance and consumer education, and refer complaints to appropriate reporting agencies and law enforcement agencies. In 2004, penalties for aggravated identity theft were increased. Many states have laws specifying criminal penalties for identity theft or laws aiding in the victim s recovery. Most states have rules or policies to protect Social Security numbers and personal financial information in court records. Versions of California s data theft notification law are being considered by many states and at the federal level. At least 25 states have passed security freeze laws, which lock a consumer s credit report and prevent anyone from opening a credit account or loan. The Federal Financial Institutions Examination Council is prodding financial institutions to take stronger measures for risk assessments, customer authentication and verification of new customers. Organizations that have experienced significant data losses are being hit with fear factor lawsuits, where courts must decide if merely the fear of identity theft warrants damages to plaintiffs who have not yet been harmed. Challenges in modeling for fraud Lenders attempting to manage the problem of identity theft and fraud face a multitude of challenges. Some of the toughest are: Varying definitions. Different lenders have different opinions on what defines fraud, and therefore losses are difficult to estimate. A common debate is whether or not to classify first-payment 3

6 defaults as fraud. A first-payment default is defined as an account that opens, charges up a balance and never makes a single payment. All first-payment defaults, however, are not necessarily fraudulent. Moving target. Fraud patterns and behavior are constantly changing. Fraudsters find a weakness in a lender s system and exploit it until it no longer works. Once the lender makes an adjustment, the fraudsters move on to another strategy. This changing nature of fraudulent behavior makes it extremely difficult to model. While a standard consumer risk model can remain predictive for many years, a fraud model will have to be regularly validated in order to ensure that it stays effective. High false-positive rates. These occur when applications are incorrectly classified as highly likely to be fraudulent based on some score or criteria. When a score yields a high false-positive rate, lenders must either decline or manually review a large portion of the through-the-door population. Both options are unattractive; declining too many good applications erodes profitability. Manually reviewing a high percentage of applicants is inefficient, time consuming and costly. Data validity. The relatively low rates of true-name fraud, combined with the issue of correctly identifying fraudulent activity, makes it difficult to create a valid sample for predictive modeling. The card issuer needed to maintain a reasonable falsepositive rate to minimize the inefficiency of manual reviews and the revenue lost when declining the false-positive cases. Project goals In 2003, Equifax Analytical Services was engaged by a national card issuer to prepare an in-depth modeling study for predicting fraudulent activity. The remainder of this paper describes the background and results of this project, and the subsequent engagement in 2005 to refine the model. The original study used two months of application data from a portfolio of revolving cards. The lender had identified transactions that were confirmed as true-name fraud. The applications came through multiple channels, including point of sale (register), Internet, phone, fax and mail. The lender wanted a predictive tool that would identify fraudulent applications in a real-time environment. They needed to maintain a reasonable false-positive rate to minimize the inefficiency of manual reviews and the revenue lost when declining the false-positive cases. 4

7 Data sources Equifax gathered data to be tested as independent predictive variables, or attributes, in the fraud solution. Each type of data was pulled from a point in time that corresponds with the application dates. The following data sources were used to create the independent attribute set: 1. Credit file attributes: These are characteristics from the individual credit file, such as balance, high credit, utilization, delinquency and inquiry information. Some credit attributes enter the model because they indicate deviations from the consumer s normal credit activities. Other credit file characteristics help describe the profile of a fraud victim. The model captured 37% of true-name frauds in the bottom-scoring 1% of applications and over 63% captured in the bottomscoring 5%. 2. Identification match quality attributes: A fraudulent application often has identification information that is slightly different from the victim s true information. Match attributes measure the quality of the identification information on the application. Examples of situations that generate flags: Zip code fails to match city Application address and phone number fail to match those on the credit file The Social Security number is invalid The driver s license number doesn t match the format of the issuing state 3. Application-specific attributes: Any information on the application that could potentially be used as an indicator for fraud was also tested as an independent attribute. This included, among other factors, the channel that the application came through, the state of residence on the application, and the day and time of the application. As previously discussed defining fraud is a challenge when building a predictive model. For this study, true-name fraud was defined as any application in which the individual submitting the information uses someone else s identification. In other words, the applicants are not who they say they are. The data set used for this model development exercise contained over 3,500 verified true-name frauds. Based on thorough follow-up research that the lender conducted on each of these complaints, they were verified as frauds. 5

8 Performance Original model s results (2003) The final model scorecard proved to be extremely effective in identifying true-name fraud on the development data sample. The model captured 37% of true-name frauds in the bottomscoring 1% of applications and over 63% captured in the bottom-scoring 5%. For the lender, this means the majority of cases can be handled without manual review or additional processing. The model s stability was validated on two separate holdout samples, both from different points in time than the development sample. Each of the validation samples contained verified truename frauds. The validation results also proved to be strong: Both validation samples had more than 37% of true-name frauds captured in the bottom scoring 1% of applications, mirroring the performance of the development sample. The summary of these results can be found in Table 1 below. Table Data set KS value TNF bottom 1% TNF bottom 5% TNF bottom 10% Development % 63.4% 74.6% Validation % 56.0% 68.1% Validation % 60.0% 69.7% The model s predictive power was initially proven on the development sample, with a KS1 value of 67. More importantly, the model performance remained very strong and consistent on the two separate validation holdout samples, with KS values of 62 and 61. Given the ever-changing nature of fraudulent activity, these validations results speak well for the stability of the model. The contributions of the various types of data are graphically depicted in Figure 2 below. Application 8% Although credit-file data made up nearly two thirds of the variable set, the other sources added strongly to the overall performance of the model. Identification match quality 27% Credit file 65% 1 The Kolmogorov-Smirnov(KS) test is a method of determining if two datasets differ significantly. Figure 2. True-name fraud data sources 6

9 The composition of the final model included data from the sources described earlier. Although credit-file data made up nearly two-thirds of the variable set, the other sources added strongly to the overall performance of the model. Equifax tested several models without such variety, but the alternative models were not able to match the high standard of overall performance achieved when including the supplementary data sources. We therefore conclude that each data source added significant power to the model. Updated model s results (2005) Ever-changing patterns of identity theft necessitate periodic refinements to any predictive model. In 2005, Equifax updated the true-name fraud model for this lender. In two years, the model s capture rate for the bottom 1% had declined from 36.8% to 25.0%. Equifax believed that modest refinements could produce significant performance improvements. Table 2 compares the models, which have similar combinations of data types. The new model was able to identify 37.7% of true-name fraud cases in the bottom 1% of the population, exceeding the performance of the original model at its inception. The results verified that (1) the combination of data sources used in 2003 remains effective in predicting true-name fraud, and (2) fraud tools should be refreshed frequently for maximum effectiveness. Table 2. Model KS value TNF bottom 1% TNF bottom 5% TNF bottom 10% Original (2003) % 49.5% 61.4% Original (2005) % 61.4% 71.2% 7

10 Conclusion Identify theft continues to be a major problem for lenders, consumers, credit reporting agencies and government. Increased public awareness of the problem and attention from lawmakers, however, is helping to combat fraud losses. Lenders hold another key; predictive modeling gives lenders an effective tool to scrutinize applications and demonstrably reduce losses from true-name identity theft. Predictive modeling gives lenders an effective tool to scrutinize applications and demonstrably reduce losses from true-name identity theft. Fraud is a difficult behavior to define, and even more difficult to predict. The criminals that steal identities are constantly changing their methods, making patterns hard to establish. To maintain high-performance levels, therefore, predictive solutions must be continually updated with the latest data. As demonstrated by the study discussed in this paper, predictive modeling for fraud can produce highly effective results. Credit data alone can be very predictive; however, for optimum performance, credit data should be augmented with other data sources. In this study, some of the data sources that enhanced performance of credit-data-only models included: The quality of the address that is on the application The quality of the Social Security Number and phone number The quality of the application address and phone number match to the credit file Custom, lender-specific attributes from the application Fraud rates can vary drastically by application channel and by merchant or branch. Every consumer company has a different procedure for processing an application, and accordingly, fraud patterns are going to be different for each lender. This clearly calls for customized strategies for predicting fraud. Consumer companies today need to build fraud solutions that maintain consistent performance over time. The solutions should include multiple types of data, including credit file characteristics, and a variety of consistency checks that can be run on the address and other various application data elements. Equifax offers a powerful, cost-effective solution by leveraging the company s experience in true-name fraud detection and the data many lenders already use in their current bureau application processes. 8

11 About Equifax Equifax Inc. is a global leader in information technology that enables and secures global commerce with consumers and businesses. We are one of the largest sources of consumer and commercial data. Utilizing our databases, advanced analytics and proprietary enabling technology, we provide real-time answers for our customers. This innovative ability to transform information into intelligence is valued by customers across a wide range of industries and markets. Headquartered in Atlanta, Georgia, Equifax Inc. operates in the U.S. and 14 other countries throughout North America, Latin America and Europe. Equifax is a member of Standard & Poor s (S&P) 500 Index. Our common stock is traded on the New York Stock Exchange under the symbol EFX. About the authors Dave Whitin, Consultant, joined Equifax Analytical Services in He has experience providing scoring and analytical consulting to customers in a wide variety of industries. Dave holds a B.S. in Statistics from the University of South Carolina and an M.S. in Statistics from the University of Georgia. Michiko I. Wolcott, Statistician, joined Equifax Analytical Services in Working in the Custom Modeling group, she builds credit-risk and marketing scorecards. Michiko has an M.S. in Statistics from Florida State University and degrees in Music from Florida State University and the Peabody Conservatory. 9

12 Equifax is a registered trademark of Equifax Inc. Inform, Enrich, Empower is a trademark of Equifax Inc. Copyright 2009, Equifax Inc., Atlanta, Georgia. All rights reserved. Printed in the U.S.A. EFS-714-ADV 7/09

White Paper. Account Opening: The Front Door of Fraud. Effective Enterprise-wide Fraud Mitigation Solutions to Combat New-Account Fraud

White Paper. Account Opening: The Front Door of Fraud. Effective Enterprise-wide Fraud Mitigation Solutions to Combat New-Account Fraud White Paper Account Opening: The Front Door of Fraud Effective Enterprise-wide Fraud Mitigation Solutions to Combat New-Account Fraud August 2010 Table of Contents Introduction..........................................1

More information

ALERTS NOTIFICATION USER GUIDE

ALERTS NOTIFICATION USER GUIDE Page 1 of 10 ABOUT EQUIFAX ALERTS NOTIFICATION USER GUIDE Equifax Canada Inc. Box 190 Jean Talon Station Montreal, Quebec H1S 2Z2 Equifax empowers businesses and consumers with information they can trust.

More information

White Paper. The Data Matching Game: Enabling Customer Data Integration and Protecting Consumer Privacy. October 2008

White Paper. The Data Matching Game: Enabling Customer Data Integration and Protecting Consumer Privacy. October 2008 > White Paper The Data Matching Game: Enabling Customer Data Integration and Protecting Consumer Privacy October 2008 Table of Contents Introduction..............................................1 What

More information

All About Credit Reports from A to Z

All About Credit Reports from A to Z All About Credit Reports from A to Z Adverse Action Notice A notice that you have been denied credit, employment, insurance, or other benefits based on information in a credit report. The notice should

More information

Dear Concerned Consumer,

Dear Concerned Consumer, Dear Concerned Consumer, Identity theft is a growing problem of the Information Age. You have already taken the first important step in combating the problem by contacting HomeStar Bank & Financial Services.

More information

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age How to Battle the Leading Identity Fraud Tactic in The Digital Age In the 15 years since synthetic identity fraud emerged as a significant threat, it has become the predominant tactic for fraudsters. The

More information

CREDIT SCORE USER GUIDE

CREDIT SCORE USER GUIDE Page 1 of 11 ABOUT EQUIFAX Equifax empowers businesses and consumers with information they can trust. A global leader in information solutions, we leverage one of the largest sources of consumer and commercial

More information

A Unique Perspective into the World of Identity Fraud

A Unique Perspective into the World of Identity Fraud White Paper A Unique Perspective into the World of Identity Fraud Explore the value of LexisNexis FraudPoint solutions in fraud detection. Risk Solutions Identity Management Executive Summary There are

More information

IDENTITY THEFT PROCEDURES

IDENTITY THEFT PROCEDURES IDENTITY THEFT PROCEDURES FREQUENTLY ASKED QUESTIONS ABOUT IDENTITY THEFT INCIDENTS AND RED FLAGS Q1: How is a Red Flags incident different from a data security breach? A1: A data security breach is the

More information

Empowering Brokers to Identify and Combat Mortgage Fraud

Empowering Brokers to Identify and Combat Mortgage Fraud Empowering Brokers to Identify and Combat Mortgage Fraud An Equifax White Paper October 2007 Author: Paul Wills Equifax Global Product Management Introduction In today s lending environment, mortgage fraud

More information

Profitably Managing Risk in Your Credit Portfolio

Profitably Managing Risk in Your Credit Portfolio Profitably Managing Risk in Your Credit Portfolio An Equifax White Paper February 2007 Author: Richard Becker Assistant Vice President, Product Development Equifax Inc. As Acquisition Marketing Cools Off,

More information

Financial Crime Report

Financial Crime Report Classification 484(g) PC 530.5 PC ALHAMBRA POLICE DEPARTMENT Financial Crime Report DR Number UCR INSTRUCTIONS 1. If the suspect is known, contact this Department by calling (626) 570-5151. 2. Please provide

More information

Identity Theft Victim Checklist

Identity Theft Victim Checklist Page 1 of 5 Identity Theft Victim Checklist CONSUMER INFORMATION SHEET 3 This checklist can help identity theft victims to clear up their records. It lists the actions most identity theft victims should

More information

Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions

Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions Leveraging Risk & Compliance for Strategic Advantage IBM Information Management software Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions XXX Astute financial services

More information

Identity Theft Victim Checklist

Identity Theft Victim Checklist CONSUMER INFORMATION SHEET 3 4/30//08 Identity Theft Victim Checklist This checklist can help identity theft victims clear up their records. It lists the actions most identity theft victims should take

More information

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions

More information

Identity Theft Packet

Identity Theft Packet BOULDER POLICE DEPARTMENT 1805 33 rd Street Boulder, CO 80301 Identity Theft Packet ** Use this packet when the crime involves the stealing of someone's identity, such as when a victim finds out that someone

More information

Reclaiming your identity

Reclaiming your identity Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist

More information

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic

More information

YOUR GOOD CREDIT The Importance of Your Credit Report and Your Credit Score Maintain Good Credit Combat Identity Theft FACT Act Rights

YOUR GOOD CREDIT The Importance of Your Credit Report and Your Credit Score Maintain Good Credit Combat Identity Theft FACT Act Rights YOUR GOOD CREDIT The Importance of Your Credit Report and Your Credit Score Maintain Good Credit Combat Identity Theft FACT Act Rights WHY YOU NEED TO KNOW ABOUT CREDIT REPORTS & CREDIT SCORES Having good

More information

CREDIT REPORT USER GUIDE

CREDIT REPORT USER GUIDE Page 1 of 17 ABOUT EQUIFAX CREDIT REPORT USER GUIDE Equifax Canada Inc. Box 190 Jean Talon Station Montreal, Quebec H1S 2Z2 Equifax empowers businesses and consumers with information they can trust. A

More information

IDENTITY THEFT RESOURCE KIT

IDENTITY THEFT RESOURCE KIT IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the Lafayette County Sheriff s Department and obtained a report number related to your

More information

Lake County Sheriff s Office Identity Theft/Fraud Packet

Lake County Sheriff s Office Identity Theft/Fraud Packet Gary S. Borders, Sheriff Lake County Sheriff s Office Identity Theft/Fraud Packet Information and Instructions The Information and Instructions portion of this packet is for you to keep and contains information

More information

Identity Theft Repair Kit

Identity Theft Repair Kit Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact

More information

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative

More information

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively

More information

IDENTITY THEFT AFFIDAVIT INSTRUCTIONS

IDENTITY THEFT AFFIDAVIT INSTRUCTIONS IDENTITY THEFT AFFIDAVIT INSTRUCTIONS To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you did not create the debt to each of

More information

Facts On Credit Bureaus

Facts On Credit Bureaus Facts On Credit Bureaus The following information relates to the understanding and use of a credit score. Listed are details regarding the determination of a credit score, how you can find out what your

More information

What is identity theft?

What is identity theft? i den ti ty theft noun What is identity theft? the illegal use of someone else's personal identifying information (such as a Social Security number) in order to get money or credit Source: Merriam-Webster

More information

Identity Theft Repair Kit

Identity Theft Repair Kit Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact

More information

Florida's Identity Theft Victim Kit

Florida's Identity Theft Victim Kit Florida's Identity Theft Victim Kit A guide for victims of identity theft, detailing what to do and who to contact. This kit is designed to help you work through the process of resolving your identity

More information

Credit Scores. www.howtogainwealth.com. Copyright 2009 How to Gain Wealth. All rights reserved.

Credit Scores. www.howtogainwealth.com. Copyright 2009 How to Gain Wealth. All rights reserved. Credit Scores Why is my Credit Score important? Lenders, such as banks and credit card companies, use credit scores to evaluate the potential risk posed by lending money to consumers and to mitigate losses

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet In this packet: Information and Instructions Section 1, # of pages 6 Fair and Accurate Credit Transactions Act of 2003 Section 2, # of pages 3 ID Theft Affidavit Section

More information

SECURITY FREEZE INFORMATION

SECURITY FREEZE INFORMATION SECURITY FREEZE INFORMATION Any consumer in Massachusetts may place a security freeze on his or her credit report by sending a request in writing, by mail to all credit reporting agencies. The credit reporting

More information

How To Get A Credit Card From A Fraudulent Account

How To Get A Credit Card From A Fraudulent Account Information and Instructions This packet is to be completed once you have contacted New York State University Police and obtained a police report number related to your identity theft case. To obtain a

More information

How To Fix A Credit Report On A Credit Card

How To Fix A Credit Report On A Credit Card Credit Analyzer Results for TransUnion [Rapid Rescoring mode] Credit Report Date: 08/16/2005 Credit Analyzer scans your credit reports and automatically finds potential problems (such as inaccurate or

More information

Identity Theft Victim Checklist

Identity Theft Victim Checklist Identity Theft Victim Checklist THE FOLLOWING CHECKLIST PROVIDES THE STEPS YOU SHOULD TAKE TO MINIMIZE DAMAGE TO YOUR FUNDS, FINANCIAL ACCOUNTS AND PERSONAL REPUTATION. Before you start Telephone calls

More information

ARE YOU A VICTIM OF AN IDENTITY CRIME?

ARE YOU A VICTIM OF AN IDENTITY CRIME? RESOURCE KIT FOR VICTIMS OF IDENTITY CRIME ARE YOU A VICTIM OF AN IDENTITY CRIME? If someone is using your identifying information, (name, date of birth, social security number, etc.), you ARE a victim

More information

Identity Theft Assistance: Information for Recovering Your Good Name

Identity Theft Assistance: Information for Recovering Your Good Name Identity Theft Assistance: Information for Recovering Your Good Name I Could Be A Victim of Identity Theft! What Do I Do Next? We understand that you may have been a victim of identity theft. Enclosed

More information

Executive summary. Incorporate more information into the decisioning process, especially for high-dollar unsecured transactions.

Executive summary. Incorporate more information into the decisioning process, especially for high-dollar unsecured transactions. Executive summary The biggest risk to an institution is not the consumer whose identity has been verified; it is the individual whose true identity is unknown. Meridian Research, Inc. 1 Know your customers

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Lake Oswego Police Department and obtained a police report number related to your identity

More information

Checking and Clearing Credit History for Young People

Checking and Clearing Credit History for Young People Checking and Clearing Credit History for Young People The Child and Family Services Improvement and Innovation Act of 2011 requires each youth age 16 and older in foster care to receive each year until

More information

How to Prevent It What to Do If You Are a Victim

How to Prevent It What to Do If You Are a Victim How to Prevent It What to Do If You Are a Victim www.tn.gov/consumer www.tn.gov/safety Tennessee Division of Consumer Affairs Identity theft happens when someone steals your personal information and uses

More information

SECURITY FREEZE INFORMATION

SECURITY FREEZE INFORMATION SECURITY FREEZE INFORMATION Any consumer in New Mexico may place a security freeze on his or her credit report by requesting it in writing by certified mail to the credit reporting agency or by telephone

More information

SECURITY FREEZE INFORMATION

SECURITY FREEZE INFORMATION SECURITY FREEZE INFORMATION Any consumer in North Dakota may place a security freeze on his or her credit report by requesting one in writing by certified or overnight mail to the credit reporting agency.

More information

A summary of your financial reliability

A summary of your financial reliability A summary of your financial reliability Used by banks and other financial institutions, landlords, utility companies and insurance companies 3 major credit bureaus: Transunion, Equifax, Experian 1. Identifying

More information

The Facets of Fraud. A layered approach to fraud prevention

The Facets of Fraud. A layered approach to fraud prevention The Facets of Fraud A layered approach to fraud prevention Recognizing Fraud The various guises of fraud lead many organizations to believe they are not victims of deception or to vastly underestimate

More information

Investigation and Prosecution of Identity Theft

Investigation and Prosecution of Identity Theft Investigation and Prosecution of Identity Theft In an effort to assist you in dealing with problems related to Identity Theft, the Menomonee Falls Police Department has prepared this packet of information

More information

HOME DEPOT DATA BREACH

HOME DEPOT DATA BREACH HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data

More information

Crime Prevention Tips

Crime Prevention Tips Crime Prevention Tips The suggests the following crime prevention techniques to avoid becoming a victim of Identity Theft: 1. To minimize the amount of information an identity thief can steal, do not carry

More information

SECURITY FREEZE INFORMATION Any consumer in Wisconsin may place a security freeze on his or her credit report by requesting it in writing.

SECURITY FREEZE INFORMATION Any consumer in Wisconsin may place a security freeze on his or her credit report by requesting it in writing. SECURITY FREEZE INFORMATION Any consumer in Wisconsin may place a security freeze on his or her credit report by requesting it in writing. The credit reporting agency is not allowed to charge a fee to

More information

West Palm Beach Police Department s Identity Theft Victim s Packet

West Palm Beach Police Department s Identity Theft Victim s Packet West Palm Beach Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted West Palm Beach Police Department and obtained a

More information

SECURITY FREEZE INFORMATION

SECURITY FREEZE INFORMATION SECURITY FREEZE INFORMATION Any consumer in Tennessee may place a security freeze on his or her credit report by requesting it in writing by certified mail to the credit reporting agency. Beginning January

More information

IDENTITY THEFT PREVENTION PROGRAM OVERVIEW

IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE IDENTITY THEFT PREVENTION PROGRAM OVERVIEW What is the Red Flag Ruling? The Red Flag Ruling requires automotive dealerships to implement policies and procedures to prevent fraud due to identity

More information

Dear Consumer, What's in this packet: Identity Theft Victim Checklist Identity Theft Victim Worksheet Sample Letters

Dear Consumer, What's in this packet: Identity Theft Victim Checklist Identity Theft Victim Worksheet Sample Letters Dear Consumer, Sometimes an identity thief can strike even if you ve been very careful about protecting your personal information. If you suspect that your personal information has been stolen and used

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso Police Department and obtained a police report number related to your identity

More information

Identity Theft Victim Packet

Identity Theft Victim Packet Chelsea Police Department ED TOTH JR. CHIEF OF POLICE 311 S. MAIN STREET Chelsea, Michigan 48118 OFFICE (734) 475-9122 FAX (734) 475-1996 EMAIL etoth@city-chelsea.org Identity Theft Victim Packet The purpose

More information

Office of Privacy Protection Safeguarding Information for Your Future

Office of Privacy Protection Safeguarding Information for Your Future W I S C O N S I N Office of Privacy Protection Safeguarding Information for Your Future Credit report security freeze Wisconsin consumers have the right to place a security freeze on their credit reports.

More information

V. NEW ACCOUNT FRAUD

V. NEW ACCOUNT FRAUD V. NEW ACCOUNT FRAUD New account fraud is generally defined as fraud that occurs on an account within the first 90 days that it is open. It occurs when it is found that the account was opened with the

More information

SECURITY FREEZE INFORMATION Any consumer in Texas may request a security freeze in writing by certified mail to the credit reporting agency.

SECURITY FREEZE INFORMATION Any consumer in Texas may request a security freeze in writing by certified mail to the credit reporting agency. SECURITY FREEZE INFORMATION Any consumer in Texas may request a security freeze in writing by certified mail to the credit reporting agency. The credit reporting agency shall not charge a fee to victims

More information

SECURITY FREEZE INFORMATION

SECURITY FREEZE INFORMATION SECURITY FREEZE INFORMATION The state of Georgia has passed a security freeze law that will go into effect on August 1, 2008. Until then, consumers can get security freezes from the three major credit

More information

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH...

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... CONTAINMENT AND CONTROL... INVESTIGATING A SECURITY

More information

Protecting your identity

Protecting your identity Protecting your identity Though it might not seem like it, your identity is one of the most precious things you possess. Criminals who are able to steal your identifying information can pretend to be you,

More information

IDENTITY THEFT VICTIM S PACKET

IDENTITY THEFT VICTIM S PACKET DEPARTMENT OF PUBLIC SAFETY 1150 Canton Center S Canton, MI 48188-1699 John R. Santomauro, Director of Public Safety IDENTITY THEFT VICTIM S PACKET INFORMATION AND INSTRUCTIONS The purpose of this packet

More information

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims

More information

Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet

Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet Information and Instructions This packet should be completed once you have contacted the Avondale Police Department and obtained

More information

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government

More information

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK ULTIMATE PLUS Your bank accounts and credit are a gold mine for identity thieves. LifeLock Ultimate Plus service gives you some peace of mind knowing you have LifeLock s most comprehensive

More information

what you need to know

what you need to know A P Identity u b l i c a t i o n o f t h e S o u t h C a r o l i n a D e p a r t m e n Theft t o f C o n s u m e r A f f a i r s what you need to know Step By Step: What To Do After a Security Breach #1:

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the Ottawa County Sheriff s Office and obtained a complaint number related to your identity

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted Chandler Police Department and obtained a police report number related to your identity

More information

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT 101 4 TH Street Southeast Rochester, Minnesota 55904-3761 507-328-6800 Fax 507-328-6975 To: From: Subject: Identity Theft and Internet Crime Victims Rochester

More information

NCUA LETTER TO CREDIT UNIONS

NCUA LETTER TO CREDIT UNIONS NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and

More information

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and to enhance existing efforts to educate Hoosiers about

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

Identity Theft/Credit Fraud Kit

Identity Theft/Credit Fraud Kit Provided by: Your source for information on Credit Reports and Credit Scores, where you can also safely order your own 3 Bureau Credit Report online that includes your credit information from Equifax,

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

Tempe Police Department Victim s Fraud Packet

Tempe Police Department Victim s Fraud Packet 1 Tempe Police Fraud Packet: Report # - Tempe Police Department Victim s Fraud Packet Do not complete this packet until you have contacted Tempe Police Department to file a report and obtained a police

More information

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft RED FLAGS RULE Identifying, Detecting, & Mitigating Possible Identity Theft What is the Red Flag Rule? The Federal Trade Commission (FTC), along with federal bank regulators and the National Credit Union

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

Facts About FACTA Red Flag Identity Theft Prevention Program

Facts About FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

York County Sheriff's Office Identity Theft Victim s Packet

York County Sheriff's Office Identity Theft Victim s Packet York County Sheriff's Office Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have received a copy of your police report from the York County Sheriff's

More information

Office of the Privacy Commissioner of Canada. Identity Theft and You

Office of the Privacy Commissioner of Canada. Identity Theft and You Office of the Privacy Commissioner of Canada Identity Theft and You There have always been scammers who pose as somebody else to carry out fraudulent activities. With today s proliferation of technology,

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

A UNIQUE SERVICE PACKAGE FOR WHITE MOUNTAINS INSURANCE GROUP

A UNIQUE SERVICE PACKAGE FOR WHITE MOUNTAINS INSURANCE GROUP A UNIQUE SERVICE PACKAGE FOR WHITE MOUNTAINS INSURANCE GROUP As part of your employee benefit package you are provided with a suite of OneBeacon Services! The suite of services provides help with avoiding

More information

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM

THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM Program Adoption THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule, implementing

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you didn t create the debt

More information

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with

More information

Milford Police Department

Milford Police Department Identity Theft Packet Information and Instructions This packet is to be completed once you have contacted Milford Police Department and obtained a police report number related to your identity theft case.

More information

Prepared by Sgt. Gibbs, Thomas B. 82-11

Prepared by Sgt. Gibbs, Thomas B. 82-11 Prepared by Sgt. Gibbs, Thomas B. 82-11 Collaborative partnerships between the law enforcement agency and the individuals and organizations they serve to develop solutions to problems and increase trust

More information

The AFI Resource Center is pleased to provide this presentation about credit reports.

The AFI Resource Center is pleased to provide this presentation about credit reports. The AFI Resource Center is pleased to provide this presentation about credit reports. This is one of several presentations developed for AFI grantees on a variety of financial education topics, including

More information

How To Check Your Credit Report For Not Credit History

How To Check Your Credit Report For Not Credit History Your Credit Report P.O. Box 15128 Spokane Valley, WA 99215 800.852.5316 www.hzcu.org You may not think about them every day, but your credit report and the three little digits that make up your credit

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you didn t create the debt

More information

Plymouth Township Police Department s Identity Theft Victim s Packet

Plymouth Township Police Department s Identity Theft Victim s Packet Plymouth Township Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted Plymouth Township Police Department and obtained

More information

Fraud detection in newly opened accounts. Connecting data helps predict identity theft

Fraud detection in newly opened accounts. Connecting data helps predict identity theft Fraud detection in newly opened accounts Connecting data helps predict identity theft Executive summary Fraud continues to be a genuine threat and challenge. After a sharp and unexplained drop in identity

More information