FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015 OVERVIEW TEACHER NOTES TEACHER NOTES
|
|
|
- Sharlene Woods
- 10 years ago
- Views:
Transcription
1 FLIP (Financial Literacy in Practice) February 2015 IDENTITY THEFT OVERVIEW This resource complements the material in Operation Financial Literacy. It has been written to address current issues which specifically relate to Module 11: Scams Don t be caught out. Module 11 aims to provide students with an overview of all aspects of scams and how to effectively respond to them. FLIP POWER WORDS authentication fabrication indemnity theft encryption fraud shoulder surfing utilities evidence document identity skimming Before students begin the activities, some classroom discussion and research on definitions, power words and the likely outcomes of identity theft is advised. 1. To introduce this activity, first discuss and distinguish the phrases identity theft and identity fraud (which is the result of identity theft). The following definitions are from the 2013 Crime and Justice Statistics on the ABS website: IDENTITY THEFT This involves the theft and fraudulent use of personal details or documents such as a driver s licence, tax file number or passport to conduct unauthorised transactions including conducting business or opening accounts in another person s name or otherwise using a person s identity without permission. IDENTITY FRAUD Identity fraud involves the theft of personal details without a person s consent. The person s name, date of birth, address, financial details or other personal details are then used to engage in fraudulent activities, such as conducting business, purchasing goods, withdrawing cash, opening accounts, taking out loans or avoiding criminal liability. This comprises of identity theft and credit or bank card fraud. 1
2 2. Encourage students to investigate some different types of identity crimes. It may also be useful to discuss the meaning and implications of the FLIP power words. The following definitions are sourced from this website: Identity encompasses the identity of natural persons (living or deceased) and the identity of companies. Identity crime can be used as a generic term to describe activities/offences in which a perpetrator uses a fabricated identity, a manipulated identity or a stolen/assumed identity to facilitate the commission of a crime(s). Identity fabrication can be used to describe the creation of a fictitious identity. Identity manipulation describes the alteration of one s own identity. Shoulder surfing usually happens at ATM machines or public phones. Criminals may watch you from a nearby location, or behind you in a queue, as you key in your PIN. They may also listen in on your conversation if you give your credit card number over the phone, for example, when making a hotel reservation or booking a rental car. Skimming is the unauthorised copying of information stored on the magnetic strip of a credit card. This information is used to create a cloned card, which is then used for fraudulent transactions in retail outlets or on the internet. The stolen details can also be used for identity theft. 3. Once an identity has been stolen it can be almost impossible to recover. Victims may have problems for years to come. Brainstorm with students about the types of fraud which could be committed once thieves have access to personal information. Further information on this can be found here: IdentitySecurity/Documents/Protecting%20Your%20Identity%20booklet%20%20 What%20Everyone%20Needs%20to%20Know%20.PDF Potential kinds of fraud that could be committed using personal identity include: tricking banks or financial institutions into giving access to money and other accounts opening new accounts and accumulating large debts (which will ruin the credit rating and good name of the victim) taking control of bank accounts by changing the address for credit card or other accounts so that statements are not received (The victim may not even be aware that there is a problem) opening a phone, internet or other service account claiming government benefits lodging fraudulent claims for tax refunds, thereby preventing the victim from being able to lodge a legitimate return using the victim s name to plan or commit criminal activity embarrassing or misrepresenting the victim, such as through social media. 2
3 SOLUTIONS TO ACTIVITIES ACTIVITY 1: What do thieves want? CATEGORY A (evidence of the legal existence of name and date of birth) Passport Driver s licence Birth certificate Australian citizenship certificate Birth certificate or birth card CATEGORY B (evidence of the use of name in the community) Medicare card Centrelink card DVA card Debit or credit card Educational institution student identity card CATEGORY C (evidence of residential address) Motor vehicle registration papers Motor vehicle insurance papers Property rates notice Property lease agreement Home insurance papers Utilities bills Bank or credit card statement 3
4 SOLUTIONS TO ACTIVITIES (continued) ACTIVITY 2: A nasty surprise Whilst some of the items stolen in this scenario have monetary value, or might allow a thief to gain access to other physical items of even more significant value (e.g. credit cards and house keys), the focus of the activity is for students to restrict the investigation to sources of information which might lead to theft of identity. ITEM/DOCUMENT Mobile phone Computer (tablet, laptop, etc) Driver s licence Credit card Debit card Medicare card Health insurance card Employee or student ID card House keys Work keys Key to your post office box Portable GPS navigation device Opener for house gate or garage door Opener or access card for work doors or work garage Vehicle registration papers Vehicle insurance papers Motor vehicle assistance card Health club card Library card Store loyalty cards Passport Birth certificate Bank statements Utilities bills Taxation documents INFORMATION WHICH COULD BE USED FOR IDENTITY THEFT Phone numbers, and physical addresses, birth dates for your contacts Passwords, codes and PINs Sensitive corporate information about your employing organisation Remembered passwords for banking and other accounts Saved documents, statements, etc. containing personal details, passwords and PIN details containing personal details Secure information and documentation relating to your employer Access to your social media accounts Personal details Photo ID Credit card number Security code (CVV or CVC) Debit card number Medicare card number Card number Card number Access to your home Access to your place of employment Access to your mail, name and address Access to your home and work addresses Access to your home Access to your place of work and address and address and address Physical after-hours access to your gym Account number Evidence of your legal existence Date of birth Your date of birth Account numbers Evidence of residential address Evidence of residential address TFN (Tax File Number) 4
5 SOLUTIONS TO ACTIVITIES (continued) ACTIVITY 3: Act quickly Students use this website to find the correct order of steps: 1 Contact your banks, other financial institutions and card issuer to advise them of the disputed transactions or other concerns you may have. This may involve: Stopping payment of lost or stolen cheques Changing PINs and/or passwords Discuss with your bank whether there is a need to close your current accounts and reopen new ones. Ensure that you advise the banks, financial institutions and card issuers of all accounts that are involved. 2 Also report identity theft to your local State or Territory Police you may be asked to undergo police routines of photographing and fingerprinting to establish that you are not the same person as the one who stole your identity and used it fraudulently. 3 Contact the Credit Reporting Agency. Tell them that you believe you have been compromised by identity theft and request a file note to be placed on your file. You may also want to obtain your file to: Check your credit file carefully for unauthorised entries and look for accounts that have been opened in your name, or unauthorised changes to your existing accounts. If you find fraudulent applications or overdue account listings on your report, you will need to contact the companies that have listed them so that they can investigate the matter and have the fraudulent entries removed from your credit history. Request a further report in a few months time to ensure that no further fraudulent activity has occurred. If there have been further entries, then carry out the same actions as detailed previously. 4 Contact your local Post Office to check if your mail has been diverted to another address. 5 Document (time, date, contact person and telephone number, and advice received) the timing and nature of conversations in reporting the incidents to the various agencies, including the police. 6 Contact any relevant government agencies or departments, for example Centrelink or the Australian Passport Office. ACTIVITY 4: Don t be a victim This extension activity is useful for highlighting some key issues associated with identity theft. The time needed to complete the activity (and its complexity) depends on the medium chosen. This website links to some useful fact sheets on how to avoid identity theft: 5
FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015. ACTIVITY 1 What do thieves want? STUDENT WORKSHEET
FLIP (Financial Literacy in Practice) IDENTITY THEFT February 2015 ACTIVITY 1 What do thieves want? There are many documents that thieves could use to steal your identity. Government departments, financial
IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09
IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do
Driving License. National Insurance Number
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
Reclaiming your identity
Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist
IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority
MEMBER IDENTITY PROTECTION Protect Your Identity Security of Personal Information is Our Top Priority Imagine this Unexpectedly, you get turned down for a loan, you get a call from a collection agency
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY
Privacy and Information Protection Bulletin
Privacy and Information Protection Bulletin March 2005 Fasken Martineau DuMoulin LLP Identity Theft Sara Levine and Joanna Erdman (student-at-law), Toronto Vancouver Calgary Toronto Montréal Québec City
EL/Civics Lesson Plan
Program Name Staff Responsible for Lesson MVCTC EL/Civics Program Mary Ann Oatney Date(s) Used 11/2007 Civics Category Civics Objective Time Frame to Complete Lesson EFL(s) II. Civics Participation II.
Corona Police Department
By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,
PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
Protecting Yourself From Identity Theft
Protecting Yourself From Identity Theft We re hearing a lot more about identity theft these days from hackers stealing credit card numbers from big banks and retail stores to individuals opening up credit
Veda: Fraud Focus Group Forum
Veda: Fraud Focus Group Forum Identity Crime Trends, Risks and Solutions Dr Russell G Smith Principal Criminologist Outline Identity crime concepts The scope of identity crime Identity crime taxonomies
Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
Do s & Don ts Reference website. www.farmersidentityshield.com
What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What
Standardisation of definitions of identity crime terms: A step towards consistency Report Series No. 145.3
Standardisation of definitions of identity crime terms: A step towards consistency Report Series No. 145.3 This publication was obtained from www.acpr.gov.au STANDARDISATION OF DEFINITIONS OF IDENTITY
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
Preventing Identity Theft National City Bank. How to protect your identity
Preventing Identity Theft National City Bank How to protect your identity Understanding and Preventing Identity Theft Identity Theft is the fastest growing crime in America 500,000 people fall victim to
Credit Card Conditions of Use. Credit Guide.
Credit Card Conditions of Use Credit Guide. Effective Date: September 2015 This document contains the terms and conditions that apply to St.George Bank Business Visa Debit Card cardholders and to all transactions
Identity Theft Victim Checklist
CONSUMER INFORMATION SHEET 3 4/30//08 Identity Theft Victim Checklist This checklist can help identity theft victims clear up their records. It lists the actions most identity theft victims should take
Identity Theft Simple ways to keep your sensitive information safe.
Keep yourself safe from Identity Theft Simple ways to keep your sensitive information safe. Be Aware Identity theft is the number one consumer fraud perpetrated on unsuspecting citizens. In 2011, nearly
Privacy and Information Protection Bulletin
Privacy and Information Protection Bulletin September 2003 Fasken Martineau DuMoulin LLP Identity theft Vancouver Calgary Yellowknife Toronto Montreal Québec City New York London www.fasken.com Identity
HSBC Premier Debit Card User Guide. 13 N Bangkok, Thailand
HSBC Premier Debit Card User Guide 13 N Bangkok, Thailand Congratulations on receiving the HSBC Premier Debit Card for access to your HSBC account. Enjoy the convenience of shopping online, over the phone
Debit MasterCard. Conditions of Use. These are the conditions of use that apply to your Rabobank Debit MasterCard. You must read and retain them.
Debit MasterCard Conditions of Use These are the conditions of use that apply to your Rabobank Debit MasterCard. You must read and retain them. May 2013 Contents 1. Signing your card... 3 2. Ownership
Security Guide. for electronic transactions. UniBank is a division of Teachers Mutual Bank Limited
Security Guide for electronic transactions UniBank is a division of Teachers Mutual Bank Limited Teachers Mutual Bank Limited ABN 30 087 650 459 AFSL/Australian Credit Licence 238981 Who We Are UniBank
Guide to credit card security
Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely
The Canadian Resource Centre for Victims of Crime Centre canadien de ressources pour les victimes de crimes. Identity Theft and Phishing
The Canadian Resource Centre for Victims of Crime Centre canadien de ressources pour les victimes de crimes Identity Theft and Phishing July 2009 What Is Identity Theft? Identity theft is a serious crime
IDENTITY THEFT: MINIMIZING YOUR RISK
IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social
INTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
Information to Protect Our Customers From Identity Theft
Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns
http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html
Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available
Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
I know what is identity theft but how do I know if mine has been stolen?
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT
CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but
Credit Card Conditions of Use. Credit Guide.
Credit Card Conditions of Use. Credit Guide. Effective Date: 20 May 2016 This document does not contain all the terms of this agreement or all of the information we are required by law to give you before
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
DVD Companion Learning Guide
DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material
Business Vantage Visa Credit Card. Conditions of Use. Effective Date: 20 May 2016
Business Vantage Visa Credit Card Conditions of Use 1 Effective Date: 20 May 2016 Business Vantage Visa Conditions of Use Bank of Melbourne This document does not contain all the terms of this agreement
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the
15 Bad Things Identity Thieves Can Do With Your Identity
This free ebook is provided to help you protect yourself from fraud and identity theft by LeMay Mobile Shredding. LeMay Mobile Shredding offers mobile document shredding to help you destroy old tax forms,
Helping you to protect yourself against fraud and financial crime
Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you
Fraud and Identity Theft. Megan Stearns, Credit Counselor
Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
PRACTICAL MONEY GUIDES DEBIT CARD BASICS. What you need to know about using your debit card
PRACTICAL MONEY GUIDES DEBIT CARD BASICS What you need to know about using your debit card MONEY IN THE BANK If credit cards mean pay later, debit cards mean pay now. These cards are issued by your bank,
Identity Theft Victim Checklist
Identity Theft Victim Checklist THE FOLLOWING CHECKLIST PROVIDES THE STEPS YOU SHOULD TAKE TO MINIMIZE DAMAGE TO YOUR FUNDS, FINANCIAL ACCOUNTS AND PERSONAL REPUTATION. Before you start Telephone calls
Visa Debit Card User Guide
Visa Debit Card User Guide Visa Debit Card User Guide Introducing the card This user guide explains how our Visa debit card service works in conjunction with your account. You are welcome to contact our
3 What Personal Information do we collect and why do we need it?
Privacy Policy 1 Protecting your privacy The worldwide rental system operated as Europcar is owned by Europcar International, a French Corporation. A number of independently owned licensees also trade
Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com
Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity
Identity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
How To Get Help From The Police Department
IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification
Reduce your Risk of Credit Card & Identity Fraud
Reduce your Risk of Credit Card & Identity Fraud This is the ITSecurityExpert s guide for reducing personal risk of Credit Card Fraud and Identity Theft. 20 Tips for Reducing the Risk 1. Invest in a decent
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
Identity Theft Victims Universal Complaint Form (FTC)
Average time to complete: 10 minutes A voluntary form for filing a report with law enforcement and disputes with credit reporting agencies and creditors about identity theft-related problems. Visit ftc.gov/idtheft
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
Yes, your card will expire at a given date, which is printed on the front of your card.
What is the Debenhams Prepaid Card? Debenhams Prepaid Card works in a similar way to a pay as you go mobile phone. You top up what you need, when you need it. You top the card up with money which can be
Identity Theft Victim Checklist
Page 1 of 5 Identity Theft Victim Checklist CONSUMER INFORMATION SHEET 3 This checklist can help identity theft victims to clear up their records. It lists the actions most identity theft victims should
Diners Club Corporate Cards. Description of Insurance Cover Effective 1 February 2013
Diners Club Corporate Cards Description of Insurance Cover Effective 1 February 2013 Contents What is this booklet? 3 Zurich The issuer of this insurance cover 3 Other Insurances 3 Sanctions 3 Enquiries
Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
ATM FRAUD AND COUNTER MEASURES
ATM FRAUD AND COUNTER MEASURES GENESIS OF ATMs An automated teller machine was first introduced in 1960 by City Bank of New York on a trial basis. The concept of this machine was for customers to pay utility
RC284. Protect Yourself Against Identity Theft
RC284 Protect Yourself Against Identity Theft Identity theft the unauthorized use of your information by third parties involves the collection and use of personal information such as your name, date of
Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA
Taxpayer Guide to Identity Theft Protect yourself By Beatriz Landa-Sanchez, EA What is tax-related identity theft? Tax-related identity theft occurs when someone uses your stolen Social Security number
T s And C s. On 28 May 2015, Kiwibank will be changing its Credit Card Terms and Conditions. View the new Credit Card Terms and Conditions here
On 28 May 2015, Kiwibank will be changing its Credit Card Terms and Conditions. View the new Credit Card Terms and Conditions here T s And C s. Credit card terms Effective April and 2012 conditions Effective
Identity Theft Repair Kit
Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact
Identity Theft, Fraud & You. Prepare. Protect. Prevent.
Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer
Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation
Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation June 2009 Cairo, Egypt Joanna P. Crane Identity Theft Program Manager Senior Attorney The views
Another Legal Guide from Bonallack & Bishop Solicitors
Another Legal Guide from Bonallack & Bishop Solicitors 80 PRACTICAL TIPS TO HELP COMBAT ALL YOU NEED TO KNOW INTRODUCTION... Over the last few years, identity theft has become one of the fastest growing
FINANCIAL CRIMES. Lesson Plan and Course Outline. INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts
FINANCIAL CRIMES Lesson Plan and Course Outline Instructor Detective Kelly Smith Method of Presentation Lecture Duration 8 Hours Trainee Equipment/Materials Note taking material INSTRUCTOR EQUIPMENT/MATERIALS
MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008
MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008 Current Laws: A person shall not obtain or attempt to obtain
Protect Yourself From Identity Theft
Protect Yourself From Identity Theft Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social
ID Theft Toolkit and Affidavit
ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information
Identity Theft Victim Packet
Chelsea Police Department ED TOTH JR. CHIEF OF POLICE 311 S. MAIN STREET Chelsea, Michigan 48118 OFFICE (734) 475-9122 FAX (734) 475-1996 EMAIL [email protected] Identity Theft Victim Packet The purpose
Credit Card Contract
Credit Card Contract Credit Card Booklet Cardholder enquiries & Lost and stolen cards Telephone : (679) 321 4300 Facsimile : (679) 330 3738 BSP/SecDocTemp006 Page 1 of 21 Template Issue No.3 reviewed 19032012
Title: Information Security: Preventing Identity Theft Code: 20327 Date: 1/5/2012 Screen:0
Title: Information Security: Preventing Identity Theft Code: 20327 Date: 1/5/2012 Screen:0 Revision Log: Overview: Who: When: Why: Sections: Welcome Pretest Tutorial Recap Job Aid Test Index Tutorial Sections:
Market Intelligence Cell. Fighting Financial Crime
Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach
According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection
According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government
