Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation
|
|
- Ambrose Armstrong
- 8 years ago
- Views:
Transcription
1 Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation June 2009 Cairo, Egypt Joanna P. Crane Identity Theft Program Manager Senior Attorney The views expressed are those of the speaker and not necessarily those of the FTC or any other person.
2 Victim Video 2
3 What is Identity Theft? Identity Theft involves someone stealing and using the personal information of someone else to pose as that person, in order to: fraudulently obtain goods or services in the victim s name, or conceal their true identity from government and law enforcement authorities or others who perform background checks 3
4 How do thieves misuse stolen identities? Percent of all ID Theft Victims , FTC 2006 Survey For Financial Gain Credit Card 63.5% Bank 33.2% Telephone/Wireless 15.3% Internet Payment Accounts 7.0% Medical 4.5% For Concealment Given to Police 5.0% Employment 1.0% 4
5 USPIS Reshipping Video 5
6 Why has Identity Theft become such a big problem? The new Electronic Marketplace is a key factor: Increasing dependence on information Growth in information databases Social Security number used as key identifier and authenticator Greater accessibility of public record information Credit/debit transactions are extremely common and continue 6 to increase in the U.S.
7 How does Identity Theft disrupt e-commerce? Identity Theft Harms the Electronic Marketplace: Information databases corrupted with bad information Thief posing as consumer seen as low risk - results in financial loss to business Victim seen as high risk - opportunity loss for business Inaccurate information disseminated extensively, victim may not be able to fully correct Challenge to fair and accurate credit marketplace and efficient regulation of system 7 Loss of consumer confidence in cyberspace, electronic marketplace
8 How many new victims each year? In U.S.: 2003 FTC: 2005 FTC: 2005 Javelin: 2006 Javelin: 2007 Javelin: 2008 Javelin: 9.9 million 8.3 million 9.3 million 8.9 million 8.4 million 9.9 million 8
9 What is the cost of ID Theft to business each year? In U.S.: 2003 FTC: 2005 Javelin: 2005 Javelin: 2006 Javelin: 2007 Javelin: 2008 Javelin: $50 Billion $60 Billion $57 Billion $51 Billion $45 Billion $48 Billion 9
10 How does Identity Theft harm the Victim? Victim does not realize until after thief has committed fraud in his name, resulting in Direct financial losses Damage to financial status and reputation Time and costs of repairing damage Emotional harm Possible Civil Judgment or Criminal Record 10
11 Different Levels of Harm by Type of Crime ( Victims, FTC 2006 Survey) 11
12 How do thieves steal identities? Old fashioned ways - lost or stolen wallets, theft by family or friends, someone going through the victim s or company s garbage, stolen mail, buying it from a corrupt insider at a bank, hotel, car rental agency, or other business 12 12
13 How do thieves steal identities? Newer and More High Tech Ways Skimming Data breaches Phishing Keystroke loggers and malicious code Peer to Peer file sharing 13
14 Skimming The copying of electronically transmitted data on the magnetic strip of a credit card, to enable the thief to make purchases. The equipment is available over the Internet The software and hardware are very user friendly and extremely mobile The skimmed information can be transmitted via anywhere in the world within hours after it is skimmed Cardholders are not aware that they have been victimized until they receive statements showing the fraudulent charges 14
15 Skimming Common Skimming Locations Restaurants Hotels Gas Stations (affixed to pumps) ATMs (affixed to machine) Why are these locations so popular? Heavy customer volume Credit card is common payment method Multiple employees (difficult to identify suspect) Employee turnover (co-conspirators easy to recruit / emplace) Covertly placed (gas pumps and ATMs) 15
16 Skimmers Capture Device 16
17 Camera for PIN Number 17
18 Data Breaches Breaking into computer systems Networks designed for perimeter defense Firewalls on the outside, trust within Intruders need find only the weakest link Vulnerable system Unsecured network Disgruntled or Corrupt insider Once inside, often free to search and steal data 18
19 Takedown of Major International ID Theft Ring Through International Cooperation
20 20
21
22 Breached Data Quickly Sold on Black Market Carding Websites Credit cards in unlimited quantities Highest quality MasterCard and Visa with and without CVV2 No expired cards All declines replaced without questions Contacts: ICQ
23 Phishing Sending authentic-looking but fraudulent designed to trick the respondent into giving out sensitive personal information Significant magnitude: 34,758 different companies used in attacks in December 2008 Estimate that 1 in 13 households gave phishers personal information last year - 1 in 7 scam victims lost money Estimated $483 million total damage in 2008 Source: Consumer Report State of the Net Survey, 2008: 23
24 Phishing IRS Stimulus Scam 24
25 Infected computers Internet users end up infecting themselves by falling for scam or sharing their files with other users Thieves goal is to get a user with a vulnerable system (i.e., most of them) to click a link A program secretly loads that captures any keys that the bad guy wants to capture No organization is immune because it is very hard to control who senders say they are Even FTC has been used as cover Current economic downturn creating more opportunities Job Search Sites, Economic Stimulus Sites 25
26 FOX video on Peer to Peer 26
27 How can we stop Identity Theft? Prevention and Detection Challenges Our personal information is in multiple locations over which we have no control Authentication mechanisms to detect attempted identity theft have not been fully realized and adopted The Social Security number is used as both identifier and authenticator, makes identity theft too easy Thieves operate under the radar commit multiple smaller 27 fraud transactions spread out over multiple jurisdictions
28 President s Task Force Recommendations for Preventing Identity Theft Stop the thief from gaining access to the information If he gains access, stop the thief from successfully using the information If he successfully uses the information, detect it immediately and shut it down Deter further criminal behavior through prosecution and punishment 28
29 How you can protect your personal information Shred financial documents before disposing of them Don t give out your personal information unless you are sure who you are dealing with avoid scams Keep personal information secure - at home, in car, at office Monitor accounts and review financial statements regularly Watch the mail for statements for accounts or credit cards that you did not open and to make sure you receive the statements you are expecting 29
30 Guard against Identity Theft when online OnGuard Online Keep anti-virus software up-to-date Be careful in any Social Network or Peer to Peer File Sharing environment If you have online accounts, use difficult to guess passwords When online shopping look for indications that the site is secure 30
31 31 Businesses Best Practices To Prevent Data Breaches Four Key Principles for Data Security Take stock Know what you collect Scale down Only maintain what you need Lock it Use appropriate physical and electronic safeguards Pitch it properly dispose of information you no longer need
32 ORDER COPIES 32
33 Companies Should Have Identity Theft Prevention Programs Warning Signs are called Red Flags Red Flags 33
34 Examples of Red Flags Warning from credit reporting agencies Suspicious documents Suspicious personal information Fraud or active duty alert included in consumer report Documents provided for identification appear to be altered Inconsistent with external information sources 34
35 Examples of Red Flags Unusual use of account Notice from customers Account used in a way inconsistent with historical patterns of activity Customer notifies you about identity theft 35
36 What is the hardest part of resolving Identity Theft problems? 36 Proving their identity that they are who they say they are and not the thief Proving they did not commit the fraudulent transaction Company must decide whether the victim s claims are true, and, if so: Company must absolve a true victim of the debt Company is left holding the debt The wrongdoer likely is not found or unable to pay
37 Best Practices for Assisting Identity Theft Victims Give victims clear information on what documents they will need to provide you to resolve fraudulent debts Adopt a Standard Identity Theft Affidavit Eases burden on victim Establish one point of contact within the company for identity theft victims Recovery process often fragmented between collections, fraud department, or different business units, such as credit and depository channels 37
38 38
39 Best Practices For Assisting Identity Theft Victims Give victims closure letters absolving them of the fraudulent debt when the incident is resolved Ensure that fraudulent debt is not sold as bad debt to third party for collection Ensure that fraudulent debt is not reported to credit reporting agency, and clear any information previously reported to credit reporting agency 39
40 Establish a Centralized Business-Funded Victim Assistance Center Identity Theft Assistance Center (ITAC), established in 2004, is a nonprofit coalition of financial services companies united in their commitment to protect and remediate customers from identity theft Recently helped its 40,000th victim in its four years of operation Phone counselor assist victims in clearing thier credit report, resolving disputes with all other members 40
41 41
42 For More Information ftc.gov/infosecurity ftc.gov/idtheft ftc.gov/privacy 42
43 Publications President s Task Force Report - Security in Numbers: SSNs and ID Theft - Fighting Fraud with the Red Flags Rule: A How-to Guide for Business - AvoID Theft: Deter, Detect, Defend Consumer Education Kit
44 Publications Protecting Personal Information: A Guide for Business Take Charge: Fighting Back Against Identity Theft - How to Plan and Host Protect Your Identity Days Kit
45 Joanna P. Crane The views expressed are those of the speaker and not necessarily those of the FTC or any other person. 45
Identity Theft Problem and Solutions
Identity Theft Problem and Solutions October 7, 2011 Michigan Cyber Summit 2011 Jon Miller Steiger Regional Director The views expressed are those of the speaker and not necessarily those of the FTC or
More informationIdentity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com
Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity
More informationI know what is identity theft but how do I know if mine has been stolen?
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
More informationIdentity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012
Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers Privacy, Governmental Liaison and Disclosure May 9, 2012 Today s presentation How identity theft is a threat to the taxpayer What IRS is
More informationPROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
More informationIdentity Theft: Informational Workshop
Identity Theft: Informational Workshop ~ Prepared By ~ Connecticut Department of Consumer Protection Jerry Farrell, Jr. Commissioner 1 The Department of Consumer Protection Mission The Department of Consumer
More informationDo s & Don ts Reference website. www.farmersidentityshield.com
What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What
More informationIdentity Theft is a Crime in the State of New Jersey.
NEW JERSEY STATE POLICE Identity Theft: A Victim s Reference Identity Theft occurs when someone uses your personally identifying information like your name, Social Security number, or credit card number
More informationDVD Companion Learning Guide
DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material
More informationWith the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
More informationIdentity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot
More informationHow the IRS Helps Taxpayers and Assists Victims
How the IRS Helps Taxpayers and Assists Victims Combating Identity Theft and Online Fraud Justin McCarty January, 2014 What is identity theft? Identity theft occurs when someone uses your personal information
More informationSAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
More informationINTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
More informationIdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT
CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but
More informationFraud and Identity Theft. Megan Stearns, Credit Counselor
Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention
More informationEmployee ID Theft Resource Guide
Employee ID Theft Resource Guide ID Theft Resolution Legal Resources ID Theft Assistance Updates www.legalresources.net ID Theft What is Identity Theft? Identity Theft is a serious crime in which someone
More informationProtecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?
Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat
More informationSecurity Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
More informationSCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection
SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
More informationTax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud
Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Marc Standig Enrolled Agent What is tax-related identity theft? Tax-related identity
More informationThe President s Task Force on Identity Theft and The FTC s Role in Identity Theft
The President s Task Force on Identity Theft and The FTC s Role in Identity Theft Joanna P. Crane Federal Trade Commission The views expressed are those of the speaker and not necessarily those of the
More informationInformation to Protect Our Customers From Identity Theft
Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns
More informationIdentity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
More informationIDENTITY THEFT: MINIMIZING YOUR RISK
IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social
More informationTo all GRSB debit and credit card customers:
To all GRSB debit and credit card customers: A data breach at the Target Corporation may have exposed 40 million credit/debit cards to potential fraudulent activity. If you made purchases in a Target store
More information2006 National Community Policing Conference Identity Theft: Investigation and Prevention Tools July 27, 2006 Joanna Crane, FTC IDT Program
2006 National Community Policing Conference Identity Theft: Investigation and Prevention Tools July 27, 2006 Joanna Crane, FTC IDT Program IDT Surveys - FTC 2003/Javelin 2006 Annual Rates & Cost of Identity
More informationAdvanced Identity Theft - The Big Picture
The National Center for Victims of Crime is pleased to provide the slides used in our March 26, 2015 Webinar, Advanced Identity Theft. Please be advised that these materials are provided through the generosity
More informationIDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT
More informationwhat you need to know
A P Identity u b l i c a t i o n o f t h e S o u t h C a r o l i n a D e p a r t m e n Theft t o f C o n s u m e r A f f a i r s what you need to know Step By Step: What To Do After a Security Breach #1:
More informationIDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09
IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do
More informationPROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT
PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center
More informationDeterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.
Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints
More informationIdentity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud
Identity Theft: How the IRS Protects Taxpayers and Helps Victims Combating Identity Theft and Online Fraud What is identity theft? Identity theft occurs when someone uses your personal information such
More informationHow the IRS Helps Taxpayers and Assist Victims
How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud Phil Oliver and Mark Harrington Privacy, Governmental Liaison and Disclosure May 31, 2013 What is identity theft?
More informationSection 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
More informationWhat to Know, What to Do
Protecting Your Identity: What to Know, What to Do BRUMMET & OLSEN, LLP Certified Public Accountants t and Consultants t Kedra J. Olsen, CPA February 6, 2014 Overview Identity yprotection Protection from
More informationGuide to credit card security
Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely
More informationIDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT IT S POSSIBLE@ PROTECT YOUR IDENTITY protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IT S POSSIBLE @ What Is Identity Theft? According to the FBI, identity theft is the fastest
More informationPROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit
PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account
More informationIdentity Theft Assistance: Information for Recovering Your Good Name
Identity Theft Assistance: Information for Recovering Your Good Name I Could Be A Victim of Identity Theft! What Do I Do Next? We understand that you may have been a victim of identity theft. Enclosed
More informationMASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
More informationIdentity Theft: Prevention & Survival
Identity Theft: Prevention & Survival Crime of the Century Provide By: Nick Sabetta Don t t Let Someone Steal Your Good Name What is Identity Theft? When someone uses your personal information without
More informationIdentity Theft. The Most Pervasive Financial Crime Today. Presented by; Wells Fargo Corporate Security. Wells Fargo All Rights Reserved 1
Identity Theft The Most Pervasive Financial Crime Today Presented by; Wells Fargo Corporate Security Wells Fargo All Rights Reserved 1 It s so very simple to be anyone you please, on any given morning
More informationIdentity Theft, Fraud & You. Prepare. Protect. Prevent.
Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer
More informationRetail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
More informationPolicy for Protecting Customer Data
Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees
More informationIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What
More informationIDENTITY THEFT VICTIMS: IMMEDIATE STEPS
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of
More informationPersonal Security - Preventing and Curing Identity Theft
identity theft tool kit How to protect yourself against identity theft Contents What is identity theft? 3 How can someone steal my identity? 4 Protecting yourself against identity theft 5 How can I tell
More informationHow child identity theft happens.
How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver
More informationIntegrity We are above reproach in everything we do.
Identity Theft Protection Program Compliance with FTC Red Flags Rule Approved by AHC Organizational Committee on: May 26 th, 2009 Electronic Copy Available on AHC s OIP Web Site Integrity We are above
More informationAccording to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection
According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government
More informationIDENTITY ALERT: The Fight to Defend Your Identity and Personal Information
IDENTITY ALERT: The Fight to Defend Your Identity and Personal Information A frightening crime with an untraceable weapon, identity theft is creating anxiety across the country. In fact, 2 out of 3 Americans
More informationIdentity Theft. Protecting Yourself and Your Identity. Course objectives learn about:
financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index
More informationIdentity Theft. Occurs when someone uses your personal information without your permission for personal gain.
Identity Theft Identity Theft Occurs when someone uses your personal information without your permission for personal gain. Someone uses your personal information to open a department store credit account
More informationIdentity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
More informationHFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity
More informationCrime Prevention Tips
Crime Prevention Tips The suggests the following crime prevention techniques to avoid becoming a victim of Identity Theft: 1. To minimize the amount of information an identity thief can steal, do not carry
More informationAwareness, Deterrence and
Identity Theft Awareness, Deterrence and Recovery Ian Howe Assistant Attorney General Consumer Protection Division Opinions presented are those of the speaker and not an official opinion of the Office
More informationCorona Police Department
By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,
More informationIdentity Theft Information
Identity Theft Information Houston Police Department Criminal Investigations Command Financial Crimes Unit 713-308-2500 The information contained on this page is intended to assist the citizens of Houston
More informationProtect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY
More informationCredit Card Fraud Training
Credit Card Fraud Training Lesson Plan A Consumer Action Publication Consumer Action created this project in partnership with Chase 2009 Consumer Action Credit Card Fraud Training Lesson Plan (For the
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationIdentity Theft Don t Be a Victim How IRS and Tax Professionals Can Prevent Identity Theft and Assist Taxpayers Who Are Victims
Identity Theft Don t Be a Victim How IRS and Tax Professionals Can Prevent Identity Theft and Assist Taxpayers Who Are Victims Narina Bchtikian Stephen Connor Senior Stakeholder Liaison IRS Small Business/Self-Employed
More informationIRS & Partners Combat Tax-Related Identity Theft What s New for 2016
IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 General Scope of Identity Theft Identity theft costs U.S. victims more than all property crimes combined Identity theft remains number
More informationClient Education. Learn About Identity Theft
Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious
More informationIDENTITY SMART. Resources to Help Against Identity Theft and Fraud
IDENTITY SMART Resources to Help Against Identity Theft and Fraud IDENTITY ALERT: The Fight to Help Defend Your Identity and Personal Information A crime with an untraceable weapon, identity theft is creating
More informationIDENTITY THEFT RESOURCE KIT
IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What
More informationProtect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
More informationHow To Protect Yourself From Identity Theft
Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the
More informationFrom Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense
1 of 5 11/17/2014 4:14 PM 800.268.2440 From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach
More informationThe Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.
1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful
More informationIdentity Theft. Providing Your Student with a Safety Net By Sun Ow
Identity Theft Providing Your Student with a Safety Net By Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial
More informationWISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
More informationClient Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.
Client Resources SAFEGUARDING YOUR IDENTITY Your personal and financial information is precious. Protect it by being savvy about identity theft. EVERYONE IS AT RISK FOR IDENTITY THEFT. It s an unfortunate
More informationDeception scams drive increase in financial fraud
ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud
More informationIdentity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section
Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic
More informationProtect Yourself From Identity Theft
Protect Yourself From Identity Theft Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social
More informationIdentity Theft. Emergency Repair Kit
Identity Theft Emergency Repair Kit 2012 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Any duplication or reproduction is strictly prohibited. Identity Theft Emergency Repair
More informationIdentity Theft. Today s Goals. Identity Theft Statistics 03/26/2013. Joel Jacobsen Information Security Officer
Identity Theft Joel Jacobsen Information Security Officer Today s Goals Definitions and Statistics Identity Thief Tactics Warning Signs Prevention Tips Identity Theft Statistics #1 complaint to the Federal
More informationPrivacy and Information Protection Bulletin
Privacy and Information Protection Bulletin March 2005 Fasken Martineau DuMoulin LLP Identity Theft Sara Levine and Joanna Erdman (student-at-law), Toronto Vancouver Calgary Toronto Montréal Québec City
More informationPrepared by Sgt. Gibbs, Thomas B. 82-11
Prepared by Sgt. Gibbs, Thomas B. 82-11 Collaborative partnerships between the law enforcement agency and the individuals and organizations they serve to develop solutions to problems and increase trust
More informationIdentity Theft. Prevention and Recovery Information Kit
Identity Theft Prevention and Recovery Information Kit A step-by-step guide designed to help you protect your identity and recover if you ve been victimized. 800-522-4100 valleynationalbank.com 2012 Valley
More informationInformation carelessly discarded into the trash can be stolen when a thief digs through the garbage.
Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause
More informationTHINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
More informationSCAMS. Action: Throw out the letter and contact Social Security directly by phone at 1-800-441-2555 or visit their website. http://www.ssa.
SCAMS SOCIAL SECURITY SCAMS You use your Social Security number for your identity, to get a job, and to apply for Medicare and Social Security as you become older. Unfortunately though, there are a lot
More informationHelping you to protect yourself against fraud and financial crime
Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you
More informationFTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen
FTC Facts For Consumers Federal Trade Commission For The Consumer August 2005 Identity Crisis... What to Do If Your Identity is Stolen Maybe you never opened that account, but someone else did...someone
More informationACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.
ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...
More informationIdentity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
More informationPasco County Sheriff's Office Economic Crime Unit. Identity Theft Guide
Pasco County Sheriff's Office Economic Crime Unit Identity Theft Guide This kit was designed to assist you in working through the process of resolving the theft of your personal information and to clear
More informationOFFICE OF KANSAS ATTORNEY GENERAL DEREK SCHMIDT
OFFICE OF KANSAS ATTORNEY GENERAL DEREK SCHMIDT Attorney General Derek Schmidt BEING A SMART CONSUMER Jackie Williams, Assistant Attorney General Consumer Protection Division Duties of the Attorney General:
More informationAnother Legal Guide from Bonallack & Bishop Solicitors
Another Legal Guide from Bonallack & Bishop Solicitors 80 PRACTICAL TIPS TO HELP COMBAT ALL YOU NEED TO KNOW INTRODUCTION... Over the last few years, identity theft has become one of the fastest growing
More informationhttp://www.ftc.gov/bcp/edu/microsites/idtheft/index.html
Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available
More informationIdentity Theft/Credit Fraud Kit
Provided by: Your source for information on Credit Reports and Credit Scores, where you can also safely order your own 3 Bureau Credit Report online that includes your credit information from Equifax,
More information