FTC Fact Sheet Identify Yourself
|
|
|
- Edmund Gilmore
- 9 years ago
- Views:
Transcription
1 FTC Fact Sheet Identify Yourself You might have heard about identity theft: it s what can happen when a thief gets enough of someone s information to commit fraud. Why should people care about it? Because recovering a stolen identity can be a time-consuming and expensive process. Imagine that someone pretends to be you: they use your name; they even convince businesses that they re you and they open a credit card in your name, get a cell phone in your name, or buy things using checks or a credit card that have your name on them. ID thieves can be creative about getting your information. There are some low-tech ways they get it: sometimes they steal garbage, going through it to find personal information, or they steal mail. Of course, it s illegal to steal mail and to steal your identity. There are high-tech ways, too: ID thieves might put software onto your computer without you knowing it it can happen when you open an attachment, click on a pop-up ad, or download some music files, for example. The software, called spyware or badware, lets a thief see everything on your computer, track where you go, and record everything you type on your computer. Unfortunately, even if you re really careful with your personal information, thieves can still get people s personal information. Sometimes, they hack into computer systems at stores or schools, hospitals or businesses. They look for personal information to use or sell to other thieves. It s pretty easy for you and your family to make it harder for a thief to steal your identity. You can start with the low-tech defenses: being careful with your mail and garbage. If your family doesn t have a shredder, you might want to get one. Tell your parents to shred anything that has personal information on it before they throw it away. And be sure to take care with your purse, your wallet, or your backpack. It s especially important not to carry your Social Security card with you. Keep it in a safe, locked place at home. Practice some routine higher-tech defensive plays, too: protect your computer by installing and turning on an up-to-date firewall along with antispyware and anti-virus software. Once you re online, be careful with your personal information. Some sites might ask for a credit card number maybe for something you re buying, maybe as proof of age. Ask yourself if they really need that number. If your answer is yes, stop and check. Before you type in your number, look for the closed lock icon in the lower right-hand corner of the screen, and look for the URL that starts with These are two ways to tell if a site is secure. When you get or pop-ups on your computer, don t respond automatically. s that ask you to reply or click a link to update your account or avoid cancellation could be thieves trying to trick you into giving them your personal information. It s a technique called phishing, because the thieves are fishing for your information. Pop-ups for free downloads or screensavers could be Grade 7 ELA 9 Common Core Sample Questions
2 45 spyware in disguise; clicking them could let someone see what you do and where you go online. Stop and think before you click it could help keep your information private, and keep spyware off your computer. Words that could be defined for students are in bold. Grade 7 ELA 10 Common Core Sample Questions
3 6 How does the information in lines 9 17 help to develop the article? A It tells why people should care about identity theft. B It describes how thieves obtain information for identity theft. C It explains ways people can protect themselves from identity theft. D It emphasizes the importance of avoiding identity theft. Key: B Aligned to CCLS: RI.7.5 Commentary: This item aligns to RI.7.5 because it asks students to analyze how a section of text (lines 9 17) contributes to the development of the entire passage as a whole. Rationale: Option B is correct. Lines 9 17 explain how thieves obtain information for identity theft. The rest of the passage describes why people should care about identity theft and how to avoid it. Grade 7 ELA 11 Common Core Sample Questions
4 7 Which statement is not supported by the information in the article? A Schools can be targets of identity thieves. B Music downloads can often expose you to spyware. C Secure websites can protect your information. D Identity thieves can only target people on the internet. Key: D Aligned CCSLS: RI.7.1; additional standards may be added after further development. Commentary: This item aligns to RI.7.1 because it asks students to find the textual evidence that supports the statements and determine which statement is not supported by the text. Rationale: Option D is correct. The author explains that identity thieves take information from schools, businesses, mail, etc. not just from information people share online. The ideas behind options A, B, and C are explicitly stated in the text. Grade 7 ELA 12 Common Core Sample Questions
5 8 Which statement best expresses the author s view of identity theft? A Identity theft will eventually be stopped as computer software becomes more sophisticated. B Identity theft is a serious threat that can generally be prevented with a few simple habits. C Identity theft happens more commonly to adults because they are typically less familiar with computers. D Identity theft is an uncontrollable consequence of the amount of personal information that is shared through computers in today s world. Key: B Aligned CCLS: RI.7.2 Commentary: This item aligns to RI.7.2 because it asks students to summarize the general idea of the text. Rationale: Option B is correct. The author views identity theft as a real threat to most people, but one that can be generally prevented with low- and high-tech strategies. Grade 7 ELA 13 Common Core Sample Questions
6 9 Read this sentence from the article: Practice some routine higher-tech defensive plays, too: protect your computer by installing and turning on an up-to-date firewall along with anti-spyware and anti-virus software. The word plays in this sentence most closely means A games B scripts C techniques D attacks Key: C Aligned CCLS: RI.7.4 Commentary: This item aligns to CCLS RI.7.4 because it asks students to determine the specific connotation of a word as it is used in a text. Rationale: Option C is correct. In this context, plays means techniques for defending against identity theft. Grade 7 ELA 14 Common Core Sample Questions
7 10 The article suggests all of the following strategies for preventing identity theft EXCEPT A don t put personal information in the trash B don t take your Social Security card out of the house C don t enter your credit card on shared public computers D don t download free software without considering if it s necessary Key: C Aligned CCLS: RI.7.1; additional standards may be added after further development. Commentary: This item aligns to CCLS RI.7.1 because it asks students to find textual evidence that supports the statements and determine which statement is not supported by the text. Rationale: Option C is correct. The article does not discuss the use of shared public computers. All of the other strategies are presented. Grade 7 ELA 15 Common Core Sample Questions
Identity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
When Fraud Comes Knocking
When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
PREVENTING HIGH-TECH IDENTITY THEFT
1 PREVENTING HIGH-TECH IDENTITY THEFT Presented by The Monument Group Companies Featured speaker: David Floyd November 19, 2014 2 Introduction Preventing Identity Theft (this session) Monitoring for Theft
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
Beware! Identity Theft
STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal
Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.
Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
Standard 9: The student will identify and explain consumer fraud and identity theft.
TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial
I dentity theft occurs
1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,
According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection
According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government
Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
Identity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
IDENTITY THEFT: MINIMIZING YOUR RISK
IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
7 PRACTICES FOR SAFER COMPUTING
7 PRACTICES FOR SAFER COMPUTING The Committee on Social Responsibility Produced in cooperation with the Federal Trade Commission EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES
STOP THINK CLICK Seven Practices for Safer Computing
Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations
What to Know, What to Do
Protecting Your Identity: What to Know, What to Do BRUMMET & OLSEN, LLP Certified Public Accountants t and Consultants t Kedra J. Olsen, CPA February 6, 2014 Overview Identity yprotection Protection from
Information to Protect Our Customers From Identity Theft
Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns
Identity Theft, Fraud & You. Prepare. Protect. Prevent.
Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer
PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT
PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center
Identity Theft. Occurs when someone uses your personal information without your permission for personal gain.
Identity Theft Identity Theft Occurs when someone uses your personal information without your permission for personal gain. Someone uses your personal information to open a department store credit account
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
How To Protect Yourself From Identity Theft
Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the
NORWALK STATION 12335 Civic Center Dr. Norwalk, CA 90650 - Phone: (562) 863-8711 www.lasd.org. News Release
NORWALK STATION 12335 Civic Center Dr. Norwalk, CA 90650 - Phone: (562) 863-8711 www.lasd.org News Release 1. Identity theft starts with the misuse of your personal identifying information such as your
Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com
Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity
Saheel KHOYRATTY. Partner Technology Advisor
Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment
When life happens... Protect Against Identity Theft. Keeping personal information safe & what to do if it happens to you
When life happens... Protect Against Identity Theft Keeping personal information safe & what to do if it happens to you An Identity Theft Epidemic Identity theft is a huge business in the U.S. and around
IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT
CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but
Do s & Don ts Reference website. www.farmersidentityshield.com
What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT
SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Corona Police Department
By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,
Fraud Prevention Tips
Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back
The Canadian Resource Centre for Victims of Crime Centre canadien de ressources pour les victimes de crimes. Identity Theft and Phishing
The Canadian Resource Centre for Victims of Crime Centre canadien de ressources pour les victimes de crimes Identity Theft and Phishing July 2009 What Is Identity Theft? Identity theft is a serious crime
IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT IT S POSSIBLE@ PROTECT YOUR IDENTITY protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IT S POSSIBLE @ What Is Identity Theft? According to the FBI, identity theft is the fastest
Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on
Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Are you a Target? On-Line Scams Credit/Debit Card Investment Identity Theft Frauds Scams Mark the following
Protect Yourself From Identity Theft
Protect Yourself From Identity Theft Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social
How to protect your identity. Identity fraud explained
How to protect your identity Identity fraud explained What is identity fraud? Identity theft is when someone gets hold of your personal information without your permission. This can include your name,
Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.
Client Resources SAFEGUARDING YOUR IDENTITY Your personal and financial information is precious. Protect it by being savvy about identity theft. EVERYONE IS AT RISK FOR IDENTITY THEFT. It s an unfortunate
Preventing identity theft
Preventing identity theft About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence
A Guide to Protecting Yourself From Identity Theft
A Guide to Protecting Yourself From Identity Theft 2010 Capital One. Capital One is a registered trademark. At Capital One, we understand that Identity Theft is a frustrating, and sometimes frightening,
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
Identity Theft Problem and Solutions
Identity Theft Problem and Solutions October 7, 2011 Michigan Cyber Summit 2011 Jon Miller Steiger Regional Director The views expressed are those of the speaker and not necessarily those of the FTC or
Cobblestone Capital Advisors. Identity Theft: What You Should Know
Cobblestone Capital Advisors Identity Theft: What You Should Know WHAT YOU SHOULD KNOW: Identity theft the stealing and fraudulent use of a person s personal or financial information has been a hot topic
Activities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
Online Security Tips
Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized
Fraud Prevention Guide
Fraud Prevention Guide Table of Contents Protect your Information 2 Protect your wallet or purse 3 Don t forget around the house 3 Secure your credit cards and debit cards 4 Stop the telemarketing calls
Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.
Common ID Theft TACTICS. HOW DOES IT HAPPEN? Identity What should I do if I m a Protection PROTECT YOURSELF: OLD-FASHIONED STEALING: Criminals steal your wallet or purse. > Never leave your wallet or purse
Learning English with CBC Radio Living in Alberta. Identity Theft
Learning English with CBC Radio Living in Alberta Identity Theft by Maroro Zinyemba Project Manager: Justine Light Daylight Consulting Inc. Integration Enhancement Lesson: Identity Theft CLB Level: 6 CLB
Introduction to Computer Security
Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security
DVD Companion Learning Guide
DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
How To Get Help From The Police Department
IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification
How To Get A Free Credit Report From A Credit Report Website
FACTS FOR OLDER CONSUMERS National Consumer Law Center Protect Yourself From Identity Theft Identity theft is one of the fastest growing crimes in the country. It can strike anyone, but elders may be particularly
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Identity fraud explained. How to protect your identity
Identity fraud explained How to protect your identity Contents Raising the alarm 3 What is identity fraud? 4 When your identity is in danger 4 Keeping your identity safe 6 Spotting the warning signs 6
PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
Fraud and Identity Theft. Megan Stearns, Credit Counselor
Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention
Identity Theft Simple ways to keep your sensitive information safe.
Keep yourself safe from Identity Theft Simple ways to keep your sensitive information safe. Be Aware Identity theft is the number one consumer fraud perpetrated on unsuspecting citizens. In 2011, nearly
Identity Theft. Presented By: Information Technology. James Blackwood, Michael Fouts, & Tiffany Mixon
Identity Theft Presented By: Information Technology James Blackwood, Michael Fouts, & Tiffany Mixon What is Identity Theft? How can someone steal your identity? Identity theft occurs when someone uses
Avoid completing forms in email messages that ask for personal financial information.
INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus
the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you
Identity theft is a terrible problem in this Information Age. You have already taken the first important step by contacting ACNB Bank immediately. ACNB Bank will work with you every step of the way to
Reduce your Risk of Credit Card & Identity Fraud
Reduce your Risk of Credit Card & Identity Fraud This is the ITSecurityExpert s guide for reducing personal risk of Credit Card Fraud and Identity Theft. 20 Tips for Reducing the Risk 1. Invest in a decent
suntrust.com 800.SUNTRUST
suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally
EL/Civics Lesson Plan
Program Name Staff Responsible for Lesson MVCTC EL/Civics Program Mary Ann Oatney Date(s) Used 11/2007 Civics Category Civics Objective Time Frame to Complete Lesson EFL(s) II. Civics Participation II.
E-MAIL & INTERNET FRAUD
FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud
Coping with Identity Theft
Anthony L. Soave, CLU, ChFC Chartered Financial Consultant 601 Three Mile NW, Suite B Grand Rapids, MI 49544 616-647-7000 888-467-0560 [email protected] www.raymondjames.com/soave Coping with
