How Consumers can Protect Against Identity Fraudsters in 2013

Size: px
Start display at page:

Download "How Consumers can Protect Against Identity Fraudsters in 2013"

Transcription

1 How Consumers can Protect Against Identity Fraudsters in 2013 February 2013

2 2 FORWARD Javelin Strategy and Research s How Consumers can Protect Against Identity Fraudsters in 2013 provides recommendations to help consumers prevent, detect, and resolve identity fraud. This report provides easy tofollow guidelines for consumers to protect themselves against this $21 billion crime of identity fraud. Javelin Strategy & Research s goal is to equip consumers with proven methods to prevent, detect, and resolve identity fraud. A deeper analysis of economic indicators and identity fraud trends is available for purchase in the full version of the 2013 Identity Fraud Report, along with a detailed breakdown of how different economic factors, payment purchasing trends, and security dynamics correlate with changes in identity fraud. Now in its tenth consecutive year, the comprehensive analysis of identity fraud trends is independently produced by Javelin Strategy & Research, a division of Greenwich Associates. Javelin maintains complete independence in its data collection, findings, and analysis; the report is a product of Javelin only Identity Fraud Report: Data Breaches Becoming a Treasure Trove for Fraudsters Learn More: com/brochure/276 The full report consists of: 82 pages 56 graphs and tables. An overview of the key findings New trends Quantitative cross tabulations Longitudinal U.S. identity fraud data from This research study is made possible by our sponsors, Intersections and Citigroup. These companies are dedicated to consumer fraud prevention and education

3 3 TABLE OF CONTENTS OVERVIEW... 4 Identity Fraud vs. Identity Theft... 6 How Criminals Obtain Information RECOMMENDATIONS FOR CONSUMERS CONSUMER PROTECTION CHECKLIST PREVENTION How Can I Prevent Identity Fraud? Data Breach Notification Letters What Should I Do If I Receive a Breach Notification Letter? DETECTION How Can I Detect Identity Fraud? RESOLUTION What Should I Do If I Become a Victim of Identity Fraud? Identity Fraud Protection Solutions ABOUT JAVELIN METHODOLOGY ADDITIONAL RESOURCES GLOSSARY OF TERMS TABLE OF FIGURES Figure 1: Overall Identity Fraud Incidence Rate and Total Fraud Amount by Year... 4 Figure 2: Fraud Incidence by Data Breach Victims, Non Data Breach Victims, and All Fraud Victims... 7 Figure 3: Fraud Incidence by Ownership of Technology Products... 9 Figure 4: How Theft of Personal Information Happens Figure 5: Javelin s Prevention, Detection, and Resolution Identity Fraud Model Figure 6: Data Breaches Are at an All Time High Figure 7: How to Contact the Three Credit Bureaus Figure 8: Methods of Detection, Figure 9: Identity Fraud Protection Services... 26

4 4 OVERVIEW For the second consecutive year, the number of identity fraud victims in the U.S. increased, rising by 1 million consumers in 2012 to a total of 12.6 million consumers. This means that 5.26% of U.S. adults, or more than 1 in every 20 consumers, learned that they were victims of identity fraud in New Account Fraud: the use of a fraud victim's personal information to open fraudulent new accounts in the victim s name. Identity Fraud Is on the Rise Figure 1: Overall Identity Fraud Incidence Rate and Total Fraud Amount by Year Millions of victims $ $ $ $ $ $ $ $ Millions of victims $50 $45 $40 $35 $30 $25 $20 $15 $10 $5 $0 Billions U.S. Total one year fraud amount October 2012, n= varies: 4,784 5,249 Base: All Consumers 2013 Javelin Strategy & Research Account Takeover Fraud: the method of identity fraud in which a fraud operator attempts to gain access to a consumer s account by fraudulently adding his or her information to the account. Annual overall fraud amounts (the amount of money stolen by fraud perpetrators) also rose in 2012, increasing to $20.9 billion and reversing improvements made in 2010 and This increase in fraud amounts was driven by dramatic jumps in the two most severe fraud types: Newaccount fraud (NAF) and account takeover fraud (ATF). Traditionally, newaccount fraud and account takeover fraud have been experienced by a

5 5 lower proportion of fraud victims, but these two types of fraud consistently produce the highest average fraud amounts and consumer costs. So while there are fewer victims of these two types of fraud, they feel the sting the most. Average consumer costs rose slightly to $365 in 2012, up from $354 in Consumer costs are any out of pocket expenses suffered by the fraud victim, including unreimbursed monetary losses, and lost wages as a result of time spent to resolve the fraud as well as any related legal costs and credit monitoring costs. However, of the 12.6 million victims in 2012, 80% did not suffer any consumer costs (median out of pocket costs to consumers of $0) at all. These costs were instead absorbed by banks and credit card companies through their zero liability policies and coverage, which shield consumers from most of the costs associated with fraud. Consumers also spent relatively little time resolving their fraud cases. The average resolution time remains unchanged at 12 hours, but more than half of all victims spent three hours or less resolving fraud incidents with their providers. The expansion of zero liability policies, security protections, and dedicated fraud and claims teams at financial institutions (FIs) and card issuers have expedited the resolution process in cases of fraud and have helped lower consumers costs over the last decade. Zero-Liability Policies: Zeroliability policies are fraud protection programs that banks or credit card providers offer to protect consumers from losses associated with fraud on their payment cards (credit, debit, or prepaid) or other financial accounts.

6 6 IDENTITY FRAUD VS. IDENTITY THEFT Most individuals are familiar with the term identity theft, which is widely used by media, government, and consumer groups, as well as nonprofit organizations. However, it is important to distinguish between identity theft and identity fraud because the terms have different meanings, although Javelin uses identity fraud more commonly throughout the identity fraud survey and corresponding reports. Identity theft occurs after the exposure of personal information; typically someone s personal information is taken by another individual without explicit permission. Identity fraud is the actual misuse of information for financial gain; it occurs when criminals use illegally obtained personal information to make purchases or withdrawals, create false accounts or modify existing ones, or attempt to obtain services such as employment or health care. Personally identifiable information (PII) such as a Social Security number (SSN), a bank or credit card account number, a password, a telephone calling card number, a birthdate (month/date/year), a name, or an address can be used by criminals to profit at a victim s expense. By accessing and using relatively basic information, a criminal can take over existing financial accounts (existing card fraud or existing non card fraud) or use a victim s personal information to create new accounts (new account fraud). A criminal can commit identity fraud numerous ways, including: making an unauthorized withdrawal of funds from an account, making fraudulent purchases with a credit card, and creating new accounts (e.g., banking, telephone, utilities, and loans). All of them can have a damaging effect on an individual s credit. In fact, the first notification that fraud has been committed might be the appearance of an unfamiliar account on a credit report or a contact from a debt collector.

7 7 Consumer Information Exposed in Data Breaches Leads to Fraud Consumers should pay particularly close attention to any notifications or letters they receive from their FIs, credit card providers, health care providers or merchants regarding a breach in personally identifiable information. Almost 1 in 4 consumers who received a data breach notification in 2012 became a fraud victim. Of particular concern is that consumers who were notified that their Social Security numbers were compromised in one of these data breach incidents were 5 times more likely to be a victim of identity fraud than all other consumers and 14 times more likely to become a victim of new account fraud. As discussed previously, new account fraud victims suffer above average fraud losses and consumer costs. Fraud Rate Among Data Breach Victims Outpaces Fraud Rates Among All Consumers Figure 2: Fraud Incidence by Data Breach Victims, Non Data Breach Victims, and All Fraud Victims 25% 22.5% 20% 18.9% 15% 10% 5% 4.4% 1.4% 11.8% 4.9% 5.3% 2.4% 2.9% All consumers Non data breach victims Data breach victims 0% Q2. In the past 12 months, have you been notified by a business or other institution that your personal or financial information has been lost, stolen, or compromised in a data breach? October , n = varies 337 5,249 Base: All consumers, data breach victims, non data breach victims Javelin Strategy & Research

8 8 Online Retail Shopping Is Becoming More Lucrative to Fraudsters As online shopping expands, so too does the misuse of consumer information to commit online retail fraud. Online retail fraud occurs when a perpetrator uses online payment credentials, such as a credit or debit card account number, to make fraudulent purchases online (known in the industry as card not present (CNP) purchases). Online retail fraud increased from 41% of all fraud victims in 2011 to 45% in Payment cards, such as credit cards and debit cards, represent 95% of the misused information in these cases. Online retail fraud through CNP transactions is the least expensive fraud type for consumers in 2012, with an average consumer cost of $326. However, it is also highly pervasive in the U.S., affecting 7.5 million Americans, who then spend an average of 11 hours resolving these cases. Consumers should take the time to review their statements each month for fraudulent charges and contact their FIs and card providers for useful online authentication and security options. Rising online sales lead to increase in online fraud Malware Attacks Mobile Consumers and Puts Them at Constant Risk of Fraud The 105 million smartphone users and 42 million tablet users in the U.S. are constant targets for fraudsters, who use malware, exploit software vulnerabilities, launch phishing and smishing attacks, and compromise unsecured Wi Fi connections to obtain users valuable personal information. Tablet users are more likely to be victims of fraud than all consumers (9.6% compared with 5.3%), which can be attributed both to tablet users being younger and less risk averse than older consumers and the inherent security vulnerabilities that are typical of new technologies.

9 9 Tablet Owners Are 80% More Likely Than All Other Consumers to Become Fraud Victims Figure 3: Fraud Incidence by Ownership of Technology Products Fraud incidence rate 15% 14% 13% 12% 11% 10% 9% 8% 7% 6% 5% 4% 3% 2% 1% 0% 5.3% All consumers 5.6% Mobile phone owners 6.0% Laptop owners 6.3% 6.5% Desktop computer owners Smartphone owners 9.6% Tablet owners Q39A: Please indicate which of the following products you personally own and use. Q5: How long ago did you discover that your personal or financial information had been misused? October 2012, n = varies 1,062 to 5,249. Base: All consumers, owners of various products Javelin Strategy & Research Additionally, for the nearly 211 million Americans who regularly use online banking, malware poses an increasing threat as an avenue for compromising and gaining control of users accounts. Fraudsters stole $4.9 billion in 2012 from consumer accounts through account takeover schemes. Malware poses a direct threat to consumers, businesses, and FIs alike, because these malicious programs seek to infect various device types and compromise the type of consumer financial account information and credentials necessary to commit fraud.

10 10 How Criminals Obtain Information Many identity thefts occur through traditional methods such as stolen wallets and familiar frauds, in which a person known to the victim has access to the victim s statements or other legal documents. Identity theft occurrences are often the result of simple lost or stolen information and not necessarily through hacking or elaborate Internet schemes, although online and mobile threats remain viable sources of information. Figure 4 shows some of the many ways that identity theft can occur. Identity Theft Occurs Through Various Methods Figure 4: How Theft of Personal Information Happens AT HOME: Through information left out in the home (or at work) and stolen by family or friends WHILE YOU ARE OUT: By means of a lost or stolen wallet or purse Through dumpster diving by crooks looking for unshredded paperwork that contains personal or financial information Through theft of your mail from your mailbox or diversion of your mail by a fraudster who changes the address to obtain your account statements Through shoulder surfing, in which someone obtains personal information by looking over your shoulder By card skimming, when someone illegally records an imprint of your credit or debit card information for later use THROUGH A BUSINESS YOU USE: BY TRICKERY OR PRETENSE: Through a security data breach, Through phishing or vishing, in which whereby a business or organization that someone pretends to be a bank or accesses your personal information trusted company and tricks you into (hospital, school, department store, providing confidential personal financial company, etc.) has been information via e mails, calls or SMS/ compromised text messages Through hacking incidences, such as Trojan horses, keylogger software, viruses or malware/spyware on a computer Through social networking sites where personal information can be found and communication with fraudulent individuals can occur Through these and other new and innovative ways that criminals are constantly 2013 Javelin Strategy & Research

11 11 RECOMMENDATIONS FOR CONSUMERS Consumers should monitor accounts frequently and, if you have not already done so, use financial alerts for your bank and financial accounts. Because identity theft can occur by numerous methods, you can protect yourself by adopting a variety of best practices and effective behaviors. Javelin recommends a comprehensive, three part approach to combat identity fraud effectively: prevention, detection, and resolution. The next section provides data on current trends, steps to prevent fraud, actions to detect fraud if it occurs, and ways to resolve fraud if you become a victim. Figure 5: Javelin s Prevention, Detection, and Resolution Identity Fraud Model 2013 Javelin Strategy & Research

12 12 CONSUMER PROTECTION CHECKLIST Below is Javelin s consumer protection checklist. The checklist highlights the nine most important ways to prevent, detect, and resolve fraud in your financial accounts. Take some time and review the list below to see how prepared you are. The more items you can check off the list, the greater security you have against identity fraud. Remember, the most efficient way to combat fraud is for financial institutions and consumers to work together to stop criminals. To get even more customized recommendations, visit Javelin s IDSafety.net website, where we offer an 18 question quiz that will provide personalized recommendations for your daily activities.

13 13 PREVENTION Consumers can best prevent identity fraud by carefully protecting and limiting the exposure of sensitive information, such as PINs, banking and account numbers, and Social Security numbers. You also should be aware of common fraudster techniques, such as phishing, vishing, smishing, and other scams. How Can I Prevent Identity Fraud? Mobile Device Security. Mobile devices are treasure troves of information for fraudsters. The always on functionality of mobile devices provides fraudsters with new avenues for stealing information. We recommend the following steps to prevent identity fraud: Install mobile software only from trusted sources and official app stores. App users should also read the permissions requested by new apps carefully and determine whether the permissions coincide with the alleged function of the app. Most smartphone users should also install an antivirus/ antimalware program to mitigate instances of mobile malware. Apple maintains that no antivirus is needed for iphone users as long as the OS is kept up to date, and none is available in the Apple App Store. Mobile devices are increasingly used to store and transmit personal information. You should use antivirus/antimalware software to guard that information from malicious applications.

14 14 Make sure all operating systems are the latest versions. Updates are used to patch security holes found on the previous version of the operating system. Devices that continue to run on old operating systems continue to experience those security vulnerabilities. Install or enable a passcode lock on your smartphone. Passcodes act as a strong deterrent to thieves and can give you the time you need to enable your remote wiping or antitheft software. Be Social, Be Responsible. Social media sites like Facebook, Flickr, Tumblr, LinkedIn, MySpace, Google+, and Twitter are exploding in popularity, and the growing ubiquity of these 1. Social networking sites can provide fraudsters with personal information to access accounts. 2. Use caution when sharing such details on your profile. sites has introduced a new set of risks for the user. We are not suggesting you not participate in social media, but examine your current behaviors that expose personal information that is typically used by banks and other companies to verify a consumer s identity. Do not reveal sensitive or personal information on social networking sites. Such personal details are commonly used by banks and credit card companies as security questions to identify an individual before clearing access to his or her financial accounts, credit card logins, and more. Use caution when using apps on social networking sites. Verify that the app does not have access to any personally identifiable information. Users of certain social media apps experience a significantly higher incidence of fraud than the general public.

15 15 Stay Safe Online. Transitioning your financial activities away from paper statements and onto online channels can significantly reduce the time it takes to detect fraud as well as reduce risks associated with physical documents containing personal information. However, the Internet also introduces new threats that you should take into account. Regularly install and update firewall, antivirus, and antispyware software on your computer and mobile device when possible. Be aware of the dangers of online threats and install antivirus and antimalware software on your computer, smartphones, and tablets, and update it along with applications, browsers, and operating systems. 7.4 % consumers who accessed public wi-fi hotspots in the past 12 months became a fraud victim. This is much higher than those that did not (4.6%) Download browser security software to protect against man in the browser attacks. Install security patches and software updates as soon as they are released by verified sources. Use and recognize secure websites. Do not provide card or personal information at unsecured sites. To recognize these sites, look for the padlock symbol and an s after the http in your browser s address bar. If the website has an additional layer of security (EV SSL), green highlighting will appear in the address bar when you access the site using a high security browser. Avoid accessing websites that display personal or account information using unsecured Wi Fi connections, such as those at cafes, public libraries, or airports. You are more secure using your mobile device s 3G or 4G connection than using a public hot spot. Ensure that your Internet connection at home and work is secure or protected by a firewall.

16 16 Turn off Bluetooth and Wi Fi when they are not being used. Watch out for and attachments from convincing imitations of banks, card companies, charities, and government agencies. Never respond directly to requests for personal or account information online, over the phone, in , or through your mobile device including SMS text messages. Instead, use your bank s contact info listed on their website, on statements, or the back of credit cards. Call them directly. Do not click on embedded links in any or SMS. If you get an from your bank or FI, go to its main website or use its dedicated downloadable application. Follow safe password practices. Do not use: Dictionary words, the name of the website, or the word password. Don t just capitalize the first character; instead, capitalize a random letter. Integrate numbers into your password. Do not use easily guessed passwords, such as your birthdate, the name of a close relative, or your pet s name. Use passwords for wireless Internet connections, and don t access unsecure websites or type in PII using public Wi Fi on mobile devices, laptops, or computers. Take advantage of available online shopping and payment security features like one time passwords and virtual credit card account numbers. Many of the largest payment networks and financial institutions offer enhanced security tools for more secure shopping online. Services like Verified by Visa, MasterCard SecureCode, and Citibank s Virtual Account Numbers offer additional layers of security to your online shopping experience giving improved fraud protection. Wipe clean electronic devices, such as smartphones, tablets and computers, before disposing of, turning in, or selling them.

17 17 Stay Safe Offline. Being aware of your surroundings and destroying physical documents that contain sensitive information are essential in safeguarding your identity. Take these simple precautions to ensure that your identity is safe. Keep sensitive information from prying eyes. At home or work, secure your personal and financial records in a locked storage device or a password protected file. Javelin Data Snack: In 2012, 12% of all identity fraud crimes were committed by someone known to the victim. Shred paper documents that contain sensitive information before disposing of them. Avoid providing your full nine digit SSN whenever possible, and do not carry your financial cards and documents with sensitive information. When your Social Security number is requested as an identifier, ask if you can provide alternate information. Request electronic statements and use online bill pay whenever possible. Enroll in direct deposit, and don t put checks in an unlocked mailbox. Switch from paper statements to online financial account management. Opt out of preapproved credit offers. Javelin Data Snack: In 2012, 28% of fraud victims reported having their SSN stolen. Call: OPTOUT Visit: To be removed from credit card applications.

18 18 DATA BREACH NOTIFICATION LETTERS Organizations typically send data breach letters to notify customers about the possible leak of personally identifiable information, such as Social Security numbers, driver s license numbers, credit card numbers, etc. The letter would also specify what information was stolen or leaked and the steps required to ensure further protection of customers accounts. In 2012, 12% of U.S. adults received such letters. What Should I Do If I Receive a Breach Notification Letter? Currently, 46 states (plus the District of Columbia, Guam, Puerto Rico, and the U.S. Virgin Islands) require companies to notify you if a breach of security occurs at their place of business and your personal information has been placed at risk. Receiving this notification does not necessarily mean that you will suffer a fraud. However, Javelin data shows that consumers who received breach notifications in 2012 had a substantially higher risk of identity fraud, almost 5 times higher, than those who didn t receive these notifications. Take Action to Protect Yourself If You Receive a Security Breach Notification Figure 6: Record Number of Data Breach Recipients Became ID Fraud Victims in Javelin Strategy & Research

19 19 Consumers who receive security breach notifications therefore need to take action to protect themselves. If you receive a data breach letter, take the following steps: 1. Verify that the letter is legitimate. 2. You are strongly encouraged to take advantage of any free services the notification letter offers, such as credit monitoring. 3. You should also call the toll free numbers or visit the websites listed in the letter to learn more about the breach, determine your level of risk, and identify the actions you need to take to protect yourself from more damage. 4. Different breaches have different levels of risk that require specific action by consumers to prevent further harm. The action could be as simple as changing passwords to accounts that are linked to the FI to canceling the credit or debit card affected to changing security questions and answers to affected accounts. Or the action could be far reaching, such as the following: Monitoring your financial accounts. Closing affected accounts. Placing a fraud alert on your credit report with the three primary credit bureaus: Equifax, Experian, and TransUnion (refer to Figure 7 for contact details). Fraud alerts notify creditors that a potential fraud has occurred and that they should verify the applicant s identity before extending credit. An initial alert stays active for 90 days, and an extended alert for identity fraud victims lasts seven years. A fraud alert will trigger a credit report, which the consumer needs to review for any signs of fraud. Placing a credit freeze on your account with the three primary credit bureaus. A credit freeze is stronger than a fraud alert because it locks your credit report down to prevent new credit from being extended.

20 20 DETECTION Credit Bureau Information Figure 7: How to Contact the Three Credit Bureaus Credit Bureau Order credit Report fraud Web address EQUIFAX EXPERIAN TRANSUNION Mailing address Equifax Consumer Fraud Division P.O. Box Atlanta, GA Experian Consumer Assistance P.O. Box 9532 Allen, TX TransUnion Victim Assistance Dept. P.O. Box 6790 Fullerton, CA Note: To order a free annual credit report from any or all agencies, contact or call toll free at It is critical that consumers detect fraud as early as possible to minimize potential losses and fraud resolution time. Faster detection results in lower out of pocket expenses, which include unreimbursed losses, legal fees, and lost wages. The sooner fraud is detected, the easier it is to resolve and the less the criminal is able to steal Javelin Strategy & Research How Can I Detect Identity Fraud? Javelin research has consistently shown that consumers can be very successful at detecting identity fraud relating to their accounts. The most efficient way to combat fraud is for consumers and institutions (banks, government agencies such as the Federal Trade Commission, and other

21 21 organizations dedicated to fighting fraud) to work together. Consumers must be proactive in their approach to protect themselves against fraud and should work with institutions to safeguard their identity. Self Detection vs. External Fraud Detection Financial account protection is a shared responsibility between FIs and customers. In 2012, fraud detection was almost equally split between fraud victims and external sources (e.g., FIs and law enforcement). While 50% of victims were able to self detect fraud by regularly monitoring their accounts, credit reports, or enrolling in identity protection services, 33% of consumers relied on their banks or credit card providers. The latter group realized they had been defrauded only when they were notified by these external sources. Consumers Are Equally Relying on Self Detection to Discover Fraud on Their Accounts Figure 8: Methods of Detection, 2012 Self Detection 50% By monitoring accounts through the Internet, ATM, or other electronic means Monitored account through paper statements Notified by Bank or Credit Card Provider 33% Balance shrank/credit overdrawn Reviewed credit report Using a credit monitoring or identity protection service Other 17% Q22: How did you first discover you were a victim of identity theft? Was it...? October 2012, n= 827 Base: All fraud victims. Survey base: n=5, Javelin Strategy & Research

22 22 It is important to note that self detection is still the most effective way to detect fraud. Certain types of fraud are more difficult for FIs to detect and can lead to longer detection times and higher consumer costs for victims. For example, in cases of familiar fraud (instances of fraud where the victim Free reports are available at AnnualCreditReport.com or by calling personally knows the perpetrator) only 10% of victims reported being informed by banks or credit card companies that fraudulent activities had occurred on their accounts, compared to 33% of victims of other types of fraud. These cases are often difficult to detect by external security systems because the perpetrator is usually familiar with the victim s behaviors and/ or lives in the close geographical area. It is in the consumers interest for them to play an active role in managing their financial security and keeping a close watch on their financial activity. Javelin recommends doing the following to detect fraud early: Sign up for and mobile alerts through your primary bank, credit card company, and/or service provider. Set up and SMS text notifications through FIs so that they will alert you to suspicious activity and changes to your accounts or personal information. You can choose among a wide array of alert offerings for the ones that apply to your banking behaviors and practices, thereby increasing your identity fraud protection. Contact your bank, credit card provider, or service provider and ask for information about account alerts. By contacting a different one of the three credit bureaus every four months, you can stagger your free reports to review your credit three times a year at no charge. The most common method that fraudsters use to take over accounts is changing the physical address, so set up an address change alert whenever possible. Monitor your credit report on a regular basis. Review and confirm that all the accounts listed belong to you and that no unauthorized charges have been made or unknown accounts or credit lines have been opened.

23 23 Optional fee based services, such as more extensive monitoring of credit information, personal identity records, and Social Security numbers, provide extra security and convenience for those who don t want to personally monitor their information. When choosing an identity protection service, select a provider that covers both personal information and credit monitoring. 3 Review financial statements promptly. Check account balances at least weekly through online banking, mobile banking, phone, or ATM. Regularly monitor all financial accounts electronically, including banking, biller, and credit card. Confirm that all transactions are authorized and that no suspicious activity has occurred or unapproved changes have been made to your accounts. 3 For more information about the specific services offered by some of the top ID protection products, please refer to Javelin s 2012 Identity Protection Services Scorecard: How to Deliver Customer and Market Value in a Regulated $4B Market.

24 24 RESOLUTION What Should I Do If I Become a Victim of Identity Fraud? If you become a victim of identity theft or fraud, don t panic. When it comes to your financial accounts, FIs and credit card providers are prepared to help you resolve the identity theft. Most FIs have a team dedicated to resolving identity fraud and guiding victims through the Javelin Data Snack: The average amount of time required to resolve a case of identity fraud has steadily decreased, from 18 hours in 2004 to 12 hours in process. With technological advancements, identity fraud resolution has improved. By following the few simple steps below, you can help ensure that your fraud case is handled quickly and painlessly. These actions can serve as a checklist/resource guide if you become a victim. Immediately contact your bank and credit card companies. Report problems and work with your bank, credit union, or identity protection service provider to take advantage of resolution services and reimbursement policies. If your FI provides fraud resolution specialists, ask for their assistance to ensure the fraud is resolved. Notify the appropriate institutions as soon as possible if physical documents such as a checkbook, wallet, debit card, or credit card are lost or stolen, if unauthorized or suspicious account activity occurs, if changes are made to personal information (e.g., physical address, address, registered users, login or password), or if paper statements are turned off. Depending on each individual case, an FI may close your account, cancel your debit or credit cards, and take other necessary precautions. It will also assist you in setting up new accounts and will issue new debit and credit cards.

25 25 Educate yourself on your FI s and issuer s zero liability protections on debit cards and ATM withdrawals because they vary among providers. Report all lost or stolen cards or fraudulent transactions immediately because the timing of your report may affect the amount that you are liable for under the law. Contact the Federal Trade Commission. Place a fraud alert on your credit report. If your personal information has been compromised or if you have been a victim of fraud, immediately contact the three primary credit reporting agencies: Equifax, Experian, and TransUnion (refer to Figure 7 for contact information) to place a fraud alert. These agencies provide credit monitoring services as well as additional products and services. File a police report. If fraud has occurred, contact your local police department to file an identity fraud report. Make sure to save a copy for your personal records. Consider enrolling in a high quality ID protection service. To report incidents of suspected fraud or identity theft, visit the FTC online at c.gov/features/ feature identity-theft or call IDTHEFT ( ). Victims who find that their driver s license numbers or SSNs have been compromised should consider enrolling in ID protection services that monitor credit reports as well as noncredit related databases for unauthorized use of stolen information. Identity Fraud Protection Solutions Specific services are available for consumers who want extra protection against new accounts fraud the type of fraud in which a criminal uses a victim s Social Security number and other personally identifiable information to create a fraudulent account in the victim s name (e.g.,

26 26 credit card, cell phone, or utilities) and other types of fraud. Identity protection services such as credit monitoring and personal information monitoring can be purchased for a fee. Javelin advises consumers who purchase fee based services to look for the firm s BBB rating. These services can provide peace of mind and convenience for consumers who want extra protection. Credit Monitoring and Personal Information Monitoring Services SERVICE Credit monitoring Personal information monitoring Fraud alert Credit freeze Figure 9: Identity Fraud Protection Services DESCRIPTION A paid subscription service that monitors your credit for suspicious activity or changes to your credit file (e.g., credit inquiries, employment changes, new accounts or address changes) Intended to detect potential identity fraud Scans public records, third party databases and Internet sites to detect exposure of your personal information (credit card numbers, Social Security numbers, etc.) Intended to detect potential identity theft A message that is placed on your credit report, requiring lenders and creditors to confirm your identity before issuing a new line of credit Intended to prevent new accounts fraud Freezes your credit file at the credit reporting agencies, which are then prohibited from issuing your credit history to any lender, creditor, or others Intended to prevent new accounts fraud 2013 Javelin Strategy & Research Consider placing a security freeze on your credit report. If you have been a victim of fraud related to an opening of a new account more than once and you are not actively applying for credit, you may want to place a security freeze on your credit report at each of the three reporting agencies.

27 27 ABOUT JAVELIN Javelin Strategy & Research, a division of Greenwich Associates, provides strategic insights into customer transactions, increasing sustainable profits and creating efficiencies for financial institutions, government agencies, payments companies, merchants, and other technology providers. Javelin s independent insights result from a uniquely rigorous three dimensional research process that assesses customers, providers, and the transactions ecosystem. Authors: Contributors: Publication Date: February 2013 James Jarzab, Research Specialist Al Pascual, Security Risk and Fraud Senior Analyst Sarah Miller, Security Risk and Fraud Analyst Mary Monahan, Executive Vice President and Research Director James Van Dyke, President and Founder Additional Resources The 2013 Identity Fraud Report s sponsors Intersections and Citigroup also make safety recommendations: Intersections d.com/what-isidentity-theft/ Citigroup online.citibank.co m/us/jrs/pands/ detail.do? ID=SecurityCenter Editor Chuck Ervin ABOUT THE METHODOLOGY Since 2003, Javelin has collected data from approximately 5,000 adults each year to measure the overall impact of identity fraud on consumers. In 2012, 5,249 adults, including 1,186 fraud victims, answered questions regarding their daily financial practices and behaviors to help determine the causes of and provide important details about such fraud. Javelin s identity fraud study reaches an audience of 63 million and is a factual resource for the Federal Trade Commission (FTC).

28 28 GLOSSARY OF TERMS account takeover fraud card not present (CNP) casual social network activity users cloud consumer cost or out ofpocket cost credit freeze credit monitoring data breach drive by download Method of identity fraud in which a fraud operator attempts to gain access to a consumer s account by fraudulently adding his or her information to the account (e.g., changing account mailing address, adding himself or herself as a registered user, or making other alterations). Transaction in which the card is not present; card data is manually entered. This includes purchases made online, by phone, or through the mail. Social network users who indicated that they sometimes use the indicated social networking activity or often use the indicated social networking activity. The cloud is a metaphor for the Internet. With the cloud, software services and data are not hosted locally but globally and are accessible remotely by browser. Amazon, Google, and Rackspace, for example, offer large cloud networks that are leased to various businesses. Out of pocket costs incurred by the victim to resolve a fraud case, including postage, copying, notarizing of documents, and legal fees; costs may also include payment of any fraudulent debts to avoid further problems. Security freeze placed on a consumer s credit file to prevent the file from being shared with creditors, thus forestalling new accounts from being opened in the consumer s name. Service that scrutinizes a consumer s credit file for suspicious activity or changes on his or her credit report such as credit inquiries, delinquencies, negative billing information, employment changes, and address changes. Monitoring is particularly helpful in detecting new account fraud after it occurs. The most effective credit monitoring companies will monitor all three credit bureaus because many lenders will contact only one. Unauthorized disclosure of information that compromises the security, privacy, or integrity of personally identifiable data. Act of passively compromising a PC by downloading a malicious file while the victim views the content of a website.

29 29 existing account fraud existing card account fraud existing non card account fraud external detection methods fraud amount frequent social networking activity users familiar fraud identity fraud identity theft key logger Identity fraud perpetrated against either or both existing card and existing non card accounts. Identity fraud perpetrated through use of existing credit or debit cards and/or their account numbers. This fraud type can also be referred to as existing card fraud or ECF. Identity fraud perpetrated through use of existing checking and savings accounts or existing loan, insurance, telephone, and utilities accounts or other accounts. This fraud type can also be referred to as existing non card fraud or ENCF. Methods of detecting fraud in which an external resource is the first to discover the fraud. Examples of external detection methods include discovering fraud through notifications from the bank, law enforcement, or debt collectors. Total amount of funds the fraud operator obtained illegally; these may result in actual losses to various businesses and organizations and, in some cases, to the consumer. Social network users who indicated that they always use the indicated social networking activity or often use the indicated social networking activity. Fraud committed by someone who knows the fraud victim personally, such as a family member, co worker, or friend. Familiar fraud is more damaging (harder to detect and longer to resolve) because the perpetrators tend to be aware of the victim s habits and know how to hide the fraud. Also, victims tend not to report familiar fraud to authorities. Unauthorized use of some portion of another s personal information to achieve illicit financial gain. Identity fraud can occur without identity theft (for example, by relatives who are given access to personal information or by the use of randomly generated payment card numbers). Unauthorized access to personal information; identity theft can occur without identity fraud, such as through large scale data breaches. Spyware that captures and records user keystrokes on a computer and is used by fraudsters to obtain passwords, PINs, logins, and other sensitive information.

30 30 mail order/telephone order (MOTO) malware man in the browser (MITB) man in the middle (MITM) mutual authentication new accounts fraud personal information monitoring phishing privacy settings Orders placed through mail or telephone channels (a type of card not present transaction). Malicious software designed to access a computer or operating system without the knowledge or consent of the user. Some examples of malware are computer viruses, worms, Trojan horses, spyware, malicious adware, and rootkits. Malware is damaging code or programming that gathers information without permission. Attack in which a perpetrator is able to read, insert into, and modify, at will, messages between the Internet browser and a server without either party s knowing that the link between them has been compromised. Attack in which a perpetrator is able to read, insert into, and modify, at will, messages between two parties without either party s knowing that the link between them has been compromised. MITB attacks are a subset of MITM attacks in which the browser is exploited to trick the legitimate parties into revealing sensitive information. Method by which the FI and the customer identify each other by providing and identifying shared secrets. Identity fraud perpetrated through use of the victim's personal information to open fraudulent new accounts. Service that keeps an eye on a consumer s personally identifiable information by monitoring channels, including online surveillance, public records and databases, Internet sites, and carding forums (underground sites where stolen credit card numbers are bought and sold). Third party solutions that offer this service provide additional value because they can more holistically prevent and detect identity fraud, including medical and health insurance fraud. Method of "fishing" for Internet users passwords and financial or personal information by luring them to a fake website through an authentic looking that impersonates a trusted party. Phishing s could attempt to impersonate an FI, issuer, merchant, or biller. User defined controls that allow users to manage the visibility of various parts of their social media profiles, including who has access to specific information.

31 31 self detection methods severely impacted smartphone smishing social networking Trojan horse two way actionable alerts: review and release two way actionable alerts: review and respond Methods of detecting fraud in which the consumer is the first to discover the fraud. Examples of self detection include discovering fraud through electronic or paper monitoring or reporting a card lost or stolen. Victims who report that they have suffered a significantly negative effect because they have been fraud victims. Consumers rate the impact a 4 or 5 on a scale where 1 represents little or no effect and 5 represents a severe effect. A mobile device with phone, keyboard, web access, and apps (e.g., Android, iphone, Windows Mobile, BlackBerry, etc.) A form of criminal activity, using techniques similar to phishing, in which a fraudster uses SMS messages to mobile devices to lure victims into revealing personal information. Similar to phishing, it could attempt to impersonate an FI, issuer, merchant, or biller and can include a fraudulent URL link to a faked website or phone number to a fake automated voice response system. A medium for consumers to interact with one another online. Users are responsible for generating content and can post and edit conversations, pictures, and media. Some of the most popular social media sites are Facebook, MySpace, LinkedIn, Twitter, FourSquare, Yelp, and YouTube. Program that appears to be a useful file (e.g., a music file or software upgrade) from a legitimate source, tricking the victim into opening it; once activated, the Trojan horse allows intruders to access private information. Review and release alerts are user defined notifications that alert the consumer when the transaction is still pending. The transaction that triggered the alert remains pending until the consumer can verify or deny it within the alert. Review and respond alerts notify consumers after a transaction has been completed but allows the consumer to respond within the alert if he or she wants to take certain action. This could include reporting the transaction as fraudulent or transferring funds from one account to another.

32 32 Wi Fi hot spots Wi Fi Protected Access (WPA) Location that offers Internet access over a wireless local area network. These hot spots can be set up in public venues where users can connect using laptops, smartphones, tablets, and other Internetaccessing devices. Designed to replace WEP by using stronger encryption. Extensions of WPA and WPA2 include Temporal Key Integrity Protocol (TKIP) and pre shared key (PSK, also known as personal) mode. Both require the addition of a pass phrase that is used in the process of encrypting the data packet.

2011 Identity Fraud Survey Report: Consumer Version

2011 Identity Fraud Survey Report: Consumer Version February 2011 4301 Hacienda Drive, Pleasanton, CA 94588 USA +1 925.225.9100 t +1 925.225.9101 f www.javelinstrategy.com Table of Contents Overview... 5 Identity Fraud vs. Identity Theft... 6 Methods Criminals

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but

More information

Information to Protect Our Customers From Identity Theft

Information to Protect Our Customers From Identity Theft Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns

More information

2010 Identity Fraud Survey Report: Consumer Version

2010 Identity Fraud Survey Report: Consumer Version February 2010 4301 Hacienda Drive, Pleasanton, CA 94588 USA +1 925 225 9100 t +1 925.225.9101 f www.javelinstrategy.com Table of Contents Getting a Full Copy of the Identity Fraud Survey Report... 3 Overview...

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

DVD Companion Learning Guide

DVD Companion Learning Guide DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material

More information

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Fraud and Identity Theft. Megan Stearns, Credit Counselor Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention

More information

I dentity theft occurs

I dentity theft occurs 1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit Identity Theft: It Could Happen To You! Attorney General Tom Reilly s Guide to Protecting Yourself and Your Credit One Ashburton Place ~ Boston, MA 02108 ~ (617) 727-2200 www.ago.state.ma.us February 2005

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center

More information

Identity Protection Guide. The more you know, the better you can protect yourself.

Identity Protection Guide. The more you know, the better you can protect yourself. Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious

More information

IDENTITY THEFT: MINIMIZING YOUR RISK

IDENTITY THEFT: MINIMIZING YOUR RISK IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social

More information

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft, Fraud & You. Prepare. Protect. Prevent. Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage. Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause

More information

Corona Police Department

Corona Police Department By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,

More information

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you Identity theft is a terrible problem in this Information Age. You have already taken the first important step by contacting ACNB Bank immediately. ACNB Bank will work with you every step of the way to

More information

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft. IDENTITY THEFT IDENTITY THEFT Identity theft is a serious crime with serious costs for victims. ID theft occurs when someone obtains your personal information such as your Social Security Number, credit

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

When visiting online banking's sign-on page, your browser establishes a secure session with our server. The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption

More information

What is Identity Theft?

What is Identity Theft? What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.

More information

Business Identity Fraud Prevention Checklist

Business Identity Fraud Prevention Checklist Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business

More information

Identity Theft is a Crime in the State of New Jersey.

Identity Theft is a Crime in the State of New Jersey. NEW JERSEY STATE POLICE Identity Theft: A Victim s Reference Identity Theft occurs when someone uses your personally identifying information like your name, Social Security number, or credit card number

More information

Fraud Information and Security

Fraud Information and Security Fraud Information and Security Updated: January 13, 2015 How We Protect You At WySTAR Global Retirement Solutions security is a top priority. We understand that your trust in us depends on how well we

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

WHAT S IT ALL ABOUT?

WHAT S IT ALL ABOUT? WHAT S IT ALL ABOUT? Introduction The 1990 s spawned a new variety of crooks called identity thieves. Their stock in trade? Your everyday transactions, which usually reveal bits of your personal information:

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Employee ID Theft Resource Guide

Employee ID Theft Resource Guide Employee ID Theft Resource Guide ID Theft Resolution Legal Resources ID Theft Assistance Updates www.legalresources.net ID Theft What is Identity Theft? Identity Theft is a serious crime in which someone

More information

Guide to Identity Theft

Guide to Identity Theft Guide to Identity Theft 1 Receive a free copy of your credit report. Visit www.annualcreditreport.com to get a copy of your credit report from all three credit reporting agencies. Review your credit report

More information

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government

More information

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH...

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... CONTAINMENT AND CONTROL... INVESTIGATING A SECURITY

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to IDENTITY THEFT IDENTITY theft Identity theft can happen to anyone. Previously, criminals stole your wallet for your cash. Now they want your wallet to steal your good name. Protect yourself and your identity.

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

identity theft: How To Safeguard Your Privacy and Keep Your Good Name identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

Identity Theft Protection

Identity Theft Protection History of Identity Theft Identity Theft Protection Identity Theft is not a new crime, rather it has mutated to include new technology such as ATMs and transactions on the World Wide Web. The first forms

More information

How To Get Help From The Police Department

How To Get Help From The Police Department IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification

More information

How To Protect Yourself From Identity Theft

How To Protect Yourself From Identity Theft Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself

More information

2007 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves

2007 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves 2007 Identity Fraud Survey Report Consumer Version February 2007 Telephone: 925.225.9100 Fax: 925.225.9101 Address: 4309 Hacienda Dr., Suite 380 Pleasanton, CA 94588 E-mail: inquiry@javelinstrategy.com

More information

2008 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves

2008 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves 2008 Identity Fraud Survey Report Consumer Version How Consumers Can Protect Themselves February 2008 4309 Hacienda Drive, Pleasanton, CA 94588 925.225.9100 t 925.225.9101 f www.javelinstrategy.com 2008

More information

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How

More information

HOME DEPOT DATA BREACH

HOME DEPOT DATA BREACH HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data

More information

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic

More information

what you need to know

what you need to know A P Identity u b l i c a t i o n o f t h e S o u t h C a r o l i n a D e p a r t m e n Theft t o f C o n s u m e r A f f a i r s what you need to know Step By Step: What To Do After a Security Breach #1:

More information

Protect Yourself From Identity Theft

Protect Yourself From Identity Theft Protect Yourself From Identity Theft The facts about identity theft Imagine a typical day. In our fast-paced, hectic lives, we all engage in activities that we may take for granted. We write checks and

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

IDENTITY THEFT CHECKLIST PROTECTION

IDENTITY THEFT CHECKLIST PROTECTION IDENTITY THEFT PROTECTION CHECKLIST Identity theft is a risk that continues to grow and change daily. Due to the many forms identity theft can take, including medical, credit and financial theft, the threat

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

The Home Depot Provides Update on Breach Investigation

The Home Depot Provides Update on Breach Investigation The Home Depot Provides Update on Breach Investigation Breach confirmed Investigation focused on April forward No evidence of debit PIN numbers compromised No customers liable for fraudulent charges Customers

More information

PREVENTING ID THEFT101

PREVENTING ID THEFT101 PREVENTING ID THEFT101 701.255.0042 www.capcu.org i This book is intended as a general guide to the topics discussed, and it does not deliver accounting, personal finance, or legal advice. It is not intended,

More information

Protect Yourself From Identity Theft

Protect Yourself From Identity Theft Protect Yourself From Identity Theft The facts about identity theft Imagine a typical day. In our fast-paced, hectic lives, we all engage in activities that we may take for granted. We write checks and

More information

2009 Identity Fraud Survey Report: Consumer Version

2009 Identity Fraud Survey Report: Consumer Version 2009 Identity Fraud Survey Report: Consumer Version Prevent Detect Resolve February 2009 2009 Javelin Strategy & Research 4301 Hacienda Drive, Pleasanton, CA 94588 USA +1 925 225 9100 t +1 925.225.9101

More information

Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty

Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty Conducted by Javelin Strategy & Research June 2010 All Rights Reserved Rising Fraud

More information

2009 Identity Fraud Survey Report: Consumer Version

2009 Identity Fraud Survey Report: Consumer Version 2009 Identity Fraud Survey Report: Consumer Version Prevent Detect Resolve February 2009 2009 Javelin Strategy & Research 4301 Hacienda Drive, Pleasanton, CA 94588 USA +1 925 225 9100 t +1 925.225.9101

More information

Identity Theft Simple ways to keep your sensitive information safe.

Identity Theft Simple ways to keep your sensitive information safe. Keep yourself safe from Identity Theft Simple ways to keep your sensitive information safe. Be Aware Identity theft is the number one consumer fraud perpetrated on unsuspecting citizens. In 2011, nearly

More information

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen FTC Facts For Consumers Federal Trade Commission For The Consumer August 2005 Identity Crisis... What to Do If Your Identity is Stolen Maybe you never opened that account, but someone else did...someone

More information

Corporate Account Take Over (CATO) Guide

Corporate Account Take Over (CATO) Guide Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,

More information

Online Banking Customer Awareness and Education Program

Online Banking Customer Awareness and Education Program Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are

More information

Frequently Asked Questions How our service works:

Frequently Asked Questions How our service works: Frequently Asked Questions How our service works: 1. What does isekurity service provide? 2. Do I have to do anything else after signing up? 3. What will I receive once I enroll in isekurity? 4. When will

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft identity theft unit new york county district attorney s office Protecting Yourself from Identity Theft cyrus r. vance, jr. district attorney 5 / 2010 questions and answers Dear Friends, cyrus r. vance,

More information

Power Against Identity Theft

Power Against Identity Theft Power Against Identity Theft What is Your Identity Theft Probability Score? 1. I pay bills with checks and place them in my mailbox or in a corner postal box. 2. I do not use direct deposit or electronic

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Fraud. Spot it.stop it. Keep Your Finances Safe

Fraud. Spot it.stop it. Keep Your Finances Safe Fraud Spot it.stop it. Keep Your Finances Safe 2003 MasterCard International Incorporated. All rights reserved. MasterCard is a registered trademark of MasterCard International. DON T PAY A HIGH PRICE

More information

PRACTICAL MONEY GUIDES IDENTITY THEFT. How to safeguard your identity and financial information from theft

PRACTICAL MONEY GUIDES IDENTITY THEFT. How to safeguard your identity and financial information from theft PRACTICAL MONEY GUIDES IDENTITY THEFT How to safeguard your identity and financial information from theft SHIELD YOUR PERSONAL FINANCIAL INFORMATION TO AVOID CARD FRAUD AND IDENTITY THEFT When your personal

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Protecting Yourself Against Fraud and Identity Theft

Protecting Yourself Against Fraud and Identity Theft Summit Branches are conveniently located in Rochester (8), Seneca Falls (1), Buffalo (2), Syracuse (5) and Cortland (2) Protecting Yourself Against Fraud and Identity Theft A presentation by The Summit

More information

Cobblestone Capital Advisors. Identity Theft: What You Should Know

Cobblestone Capital Advisors. Identity Theft: What You Should Know Cobblestone Capital Advisors Identity Theft: What You Should Know WHAT YOU SHOULD KNOW: Identity theft the stealing and fraudulent use of a person s personal or financial information has been a hot topic

More information

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

Personal Digital Security

Personal Digital Security The following is an excerpt from: Personal Digital Security Protecting Yourself from Online Crime 2016 Revision by Michael Bazzell More information can be found at ComputerCrimeInfo.com Over the past ten

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

What is Identity Theft?

What is Identity Theft? Elix Financial Wellness presents YOUR FINANCIAL WELLNESS EXPERTS Identity Theft occurs when a thief obtains personal information about you such as your name, address, Social Security Number, account number

More information

Identity Theft and Online Security

Identity Theft and Online Security Identity Theft and Online Security ACI-588788 American Century Investment Services, Inc. Goals for Presentation Identity Theft - What is it and how are we at risk? Social Media - How much online security

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. And EmergingWealth Investment

More information

Avoid Identity Theft UH Information Security Team (InfoSec)

Avoid Identity Theft UH Information Security Team (InfoSec) Avoid Identity Theft UH Information Security Team (InfoSec) Who Are We? UH Information Security Team Jodi Ito - Information Security Officer Deanna Pasternak & Taylor Summers Information Security Specialists

More information

IDENTITY THEFT RESOURCE KIT

IDENTITY THEFT RESOURCE KIT IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What

More information

Identity Theft Still a Major Problem

Identity Theft Still a Major Problem July/August 2005 Volume 9 Issue 4 Identity Theft Still a Major Problem Inside This Issue Identity Theft Still a Major Problem page 1 Identity Theft How Thieves Get Your Information page 2 Identity Theft

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

Dear Concerned Consumer,

Dear Concerned Consumer, Dear Concerned Consumer, Identity theft is a growing problem of the Information Age. You have already taken the first important step in combating the problem by contacting HomeStar Bank & Financial Services.

More information

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK ULTIMATE PLUS Your bank accounts and credit are a gold mine for identity thieves. LifeLock Ultimate Plus service gives you some peace of mind knowing you have LifeLock s most comprehensive

More information

Personal Security Check List

Personal Security Check List CASE is a Partnership of the District Attorney and the Community to Prevent Fraud and Exploitation Denver District Attorney Fraud Line 720-913-9179 www.denverda.org Denver District Attorney Mitch Morrissey

More information

Identity Theft: When You Are the Target

Identity Theft: When You Are the Target F O R F O R Y O U R Y O U R L I F E R E T I R E M E N T Identity Theft: When You Are the Target What s inside What Is Identity Theft?... 2 How Does Identity Theft Occur?... 2 How Can You Protect Yourself?...

More information

P.O. Box 15128 Spokane Valley, WA 99215 800.852.5316 www.hzcu.org. Identity Theft Solutions

P.O. Box 15128 Spokane Valley, WA 99215 800.852.5316 www.hzcu.org. Identity Theft Solutions P.O. Box 15128 Spokane Valley, WA 99215 800.852.5316 www.hzcu.org Identity Theft Solutions Table of Contents Identity Theft Risk Assessment 2 Common Practices 3 Preventing Identity Theft 4 Consumer Rights

More information

Criminal Investigation

Criminal Investigation Criminal Investigation Stolen Identity Refund Fraud (SIRF) Nneka Sutherland Special Agent (267) 941 6281 Nneka.Sutherland@ci.irs.gov Joseph Carl Special Agent (267) 941 6117 Joseph.Carl@ci.irs.gov IRS

More information

Fraud Prevention Guide

Fraud Prevention Guide Fraud Prevention Guide Table of Contents Protect your Information 2 Protect your wallet or purse 3 Don t forget around the house 3 Secure your credit cards and debit cards 4 Stop the telemarketing calls

More information