Veda: Fraud Focus Group Forum
|
|
|
- Merryl Townsend
- 9 years ago
- Views:
Transcription
1 Veda: Fraud Focus Group Forum Identity Crime Trends, Risks and Solutions Dr Russell G Smith Principal Criminologist
2 Outline Identity crime concepts The scope of identity crime Identity crime taxonomies and measurement categories Methods used to obtain personal information Quantifying the extent of identity crime Crime victimisation surveys and business surveys Official crime statistics The Australian National Identity Security Strategy Key elements of the Commonwealth Strategy Risks arising from online verification of evidence of identity Online verification processes (e-authentication) and risks Database, data capture and data matching irregularities Developing solutions to address emerging risks Legislative, policy and technological solutions
3 The scope of identity crime Public sector Income tax, customs duty and GST fraud, superannuation fraud Obtaining welfare and health care benefits in false names Immigration fraud and taking English language tests for someone else Private sector Opening bank accounts in false names and obtaining finance ATM, online and mobile banking and payment card fraud Funds transfer fraud and securities and investment fraud Consequential activities Money laundering ARS, SVCs, virtual worlds, trade-based Motor vehicle re-birthing; art and antiquity fraud Obtaining security guard, motor vehicle, boat and shooters licences Avoiding driving demerit points and local government fees Avoiding detection and prosecution for violent crime
4 Identity crime taxonomies ACPR-AUSTRAC Proof of Identity Steering Committee 2006 Scope living and deceased individuals, and corporations ID fabrication creation of a fictitious identity ID manipulation alteration of an identity or evidence of identity Lent IDs use of another person s identity with their permission ID theft assumption of a pre-existing identity without authority ID fraud gaining benefits or avoiding liabilities using identity info. ID crime generic term for criminal activities using identity info. Categories of methods used to obtain personal information Semantic social engineering to obtain personal information Syntactic fabrication and alteration of documentary evidence and other high-tech methods hacking, skimming, cloning, spoofing Blended identity crime attacks spamming via botnets, phishing
5 Quantifying the extent of identity crime SIRCA (2003) Direct loss from identity fraud in Australia was $420 million Total cost of identity fraud $1.1 billion (including prevention & recovery) Personal identity fraud (ABS) Total personal fraud in ,600 victims ($1.4b); 6.7% pop n ID theft 124,000, 0.8% (2007); 44,700, 0.3% ( ) [-64%] Card fraud 383,300, 2.4% (2007) ; 662,300, 3.7% ( ) [+73%] Official dishonesty offence statistics recorded by police 24% decline in offences; 35% decline in rate/100,000 pop n since 2000
6 Trends in officially recorded fraud in Australia Rate per 100,000 popn, recorded by Australian police (1953/ /12) Source: Australian Police Services
7 Quantifying the extent of identity crime SIRCA (2003) Direct loss from identity fraud in Australia was $420 million Total cost of identity fraud $1.1 billion (including prevention & recovery) Personal identity fraud (ABS) Total personal fraud in ,600 victims ($1.4b); 6.7% pop n ID theft 124,000, 0.8% (2007); 44,700, 0.3% ( ) [-64%] Card fraud 383,300, 2.4% (2007) ; 662,300, 3.7% ( ) [+73%] Official dishonesty offence statistics recorded by police 24% decline in offences; 35% decline in rate/100,000 pop n since 2000 Plastic card fraud (APCA) 0.015% of card transactions fraudulent in 2006; 0.052% in 2011(Aust) Card-not-present fraud losses increased: $31.8m (2006) $198m (2011) Sept ,000 false cards worth $37.5m seized by police
8 Payment card fraud trends Plastic card fraud losses in basis points for selected countries Sources: APCA, UK Payments Association, Observatory for Payment Card Security (France) and Visa Inc.
9 Quantifying the extent of identity crime SIRCA (2003) Direct loss from identity fraud in Australia was $420 million Total cost of identity fraud $1.1 billion (including prevention & recovery) Personal identity fraud (ABS) ID theft 124,000, 0.8% (2007); 44,700, 0.3% ( ) [-64%] Card fraud 383,300, 2.4% (2007) ; 662,300, 3.7% ( ) [+73%] Official dishonesty offence statistics recorded by police 24% decline in offences; 35% decline in rate/100,000 pop n since 2000 Plastic card fraud (APCA) 0.015% of card transactions fraudulent 2006; 0.052% in 2011(Aust) Card-not-present fraud losses increased: $31.8m (2006) $198m (2011) Sept ,000 false cards worth $37.5m seized by police Cybercrime Verizon 621 data breaches involving 44 million records in 2012 APWG Phishing attacks 176 (Jan 2004); 25,444 (Jan 2012)
10 Anti-Phishing Working Group Data January unique attacks January ,444 unique attacks 14,000% increase over 8 years Source:
11 Commonwealth identity-related fraud Internal fraud 5% of agencies reported internal fraud involving misuse of identity External fraud 11% of agencies reported external fraud involving misuse of identity 1,153 incidents of creating and/or using a fictitious identity / forgery 2,859 incidents of unauthorised use of another person s TFN/ABN Australian Federal Police AFP recorded 41 offences of identity fraud in (85 in ) Examples of Commonwealth identity-related fraud Receipt of $125,463 in social security in 3 false names over 8 years Receipt of $200,000 for mother s pension for 22 years after her death Pharmacist submitted fraudulent prescriptions worth $400,000 Source: Australian Institute of Criminology Commonwealth Fraud Survey data (2010)
12 National Identity Security Strategy 1. Enrolment standards Registration and enrolment standards for use by agencies which enrol individuals to issue government documents (Gold Standard Enrolment Framework and National e-authentication Framework) 2. Document security and verification standards Security standards for such documents to reduce the possibility of forgery or unauthorised alteration of documents (Security Standards for Proof of Identity Documents) 3. Document verification Improved ability for Government agencies across jurisdictions to verify information on such documents (National Document Verification Service) includes drivers licences, passports, visas and citizenship certificates extending to 17,000 private sector organisations on a fee-for-service basis
13 National Identity Security Strategy Recording identity data Standards in the processing and recording of identity data to improve the accuracy of existing records (where appropriate) and to prevent the creation of inaccurate identity records in future (e.g. Better Practice Guidelines for Recording Names) 5. Agency service provision Standards for Government agencies to apply where they provide services to a person whose identity needs to be verified and there are significant risks associated with the wrong person getting access to a service 6. Biometric interoperability Measures to enhance the national interoperability of biometric identity security measures (e.g. Standards Australia Committee on Biometric and Identification Technologies - IT-032)
14 Proof of identity framework 4-Location Phone accounts Council rates, lease agreements Utilities power, water, gas, ISP 1-Commencement Birth certificate if born in Australia DIAC certificate if born overseas 3-Social Footprint Cth Medicare, ATO, Centrelink cards/numbers State Marriage certif, Tertiary student ID card Local Rates notice Business Bank cards 2-Identity-Person Linkage Biometrics e.g. Drivers Licence photo Passport biometrics photo, signature, face Knowledge PINs, passwords, secret question Source: Derived from Report to COAG on NISS (2007)
15 Online verification (e-authentication) Credential checking Gold standard credentials are read electronically using Public Key Infrastructure identifier protected by a digital certificate Two-factor authentication Something you have USB token, password generator, PKI key Something you know PIN, password, secret question, transactions Something you are Facial image, voice, fingerprint Delivery channels Post, phone, SMS, online Data security Adhere to government standards on e-authentication, smartcard and token security, PKI Gatekeeper for digital certificates, ICT security
16 Online verification risks Database irregularities Failure due to inaccurate personal information in legacy databases Mistakes in enrolment of new personal information Intentional manipulation of database entries Accidental, negligent or intentional data leakage
17 Online verification risks Database irregularities Failure due to inaccurate personal information in legacy databases Mistakes in enrolment of new personal information Intentional manipulation of database entries Accidental, negligent or intentional data leakage Data capture irregularities Submission of false proof of identity credentials / e-counterfeiting Spoofing biometric capture systems
18 Spoofing biometrics Voluntary finger cloning gummy fingers References Thalheim et al. - Rick Smith - The Register - biometric_sensors_beaten_senseless/
19 Online verification risks Database irregularities Failure due to inaccurate personal information in legacy databases Mistakes in enrolment of new personal information Intentional manipulation of database entries Accidental, negligent or intentional data leakage Data capture irregularities Submission of false proof of identity credentials / e-counterfeiting Spoofing biometric capture systems Data matching irregularities Technological errors creating false positives and false negatives External manipulation of data flows active network attacks; trawling Internal corruption of staff within agencies Coercion of individuals to provide information under duress
20 Legislative and policy solutions Legislation Global normative approaches and harmonisation (UNODC) Criminalisation of identity fraud and possession of equipment Procedural and evidentiary reforms to aid prosecution Assets confiscation, unexplained wealth laws and AML/CTF regime Policy solutions Using multiple solutions rather than one Ensuring cooperation between Commonwealth & states and territories Ensuring cooperation between public and private sectors Improving education coordination (e.g. ACFT), computer security, risks of social media, enhanced standards computer driving licence Improving victim support reporting, loss recovery, counselling, identity fraud court victimisation certificates
21 Technological solutions Document security and verification Document security solutions; RFID blocking Electronic document verification Chip/PIN card roll-out; PC smart card readers for home and business Industry responses Secure data transmission and storage using PKI ATM anti-skimming technologies BNZ liquid encryption numbers, radio jamming, shields, vibration sensors, touch screens, voice recog. Enhanced security of online personal information Transaction monitoring, notification and blocking Biometrics e-passports (facial scanning) Biometric ATM/POS (fingerprints)
22
Cyber Crime Research. Presentation by the Australian Institute of Criminology. Dr Russell G Smith Principal Criminologist
Cyber Crime Research Presentation by the Australian Institute of Criminology Dr Russell G Smith Principal Criminologist The Australian Institute of Criminology Australia's national research and knowledge
Report to the Council of Australian Governments. A Review of the National Identity Security Strategy
Report to the Council of Australian Governments A Review of the National Identity Security Strategy 2012 Report to COAG - Review of the National Identity Security Strategy 2012 P a g e i Table of contents
FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015 OVERVIEW TEACHER NOTES TEACHER NOTES
FLIP (Financial Literacy in Practice) February 2015 IDENTITY THEFT OVERVIEW This resource complements the material in Operation Financial Literacy. It has been written to address current issues which specifically
Standardisation of definitions of identity crime terms: A step towards consistency Report Series No. 145.3
Standardisation of definitions of identity crime terms: A step towards consistency Report Series No. 145.3 This publication was obtained from www.acpr.gov.au STANDARDISATION OF DEFINITIONS OF IDENTITY
IDENTITY SECURITY NATIONAL IDENTITY SECURITY STRATEGY. Identity crime and misuse in Australia
NATIONAL IDENTITY SECURITY STRATEGY Identity crime and misuse in Australia Key findings from the National Identity Crime and Misuse Measurement Framework Pilot IDENTITY SECURITY ISBN: 978-1-925118-34-6
Commonwealth Fraud Control Guidelines Annual Reporting Questionnaire 2009-10
Commonwealth Fraud Control Guidelines Annual Reporting Questionnaire 2009-10 Please read this first In accordance with the Commonwealth Fraud Control Guidelines (the Guidelines) issued under Regulation
NATIONAL POLICE HISTORY CHECK INFORMATION 2014. Western Australian Education and Training Sectors
NATIONAL POLICE HISTORY CHECK INFORMATION 2014 Western Australian Education and Training Sectors HOW TO COMPLETE THE NATIONAL POLICE CHECKING SERVICE (NPCS) APPLICATION/CONSENT FORM Please read all information
NATIONAL IDENTITY SECURITY STRATEGY. Identity crime and misuse in Australia 2013 14 IDENTITY SECURITY
NATIONAL IDENTITY SECURITY STRATEGY Identity crime and misuse in Australia 2013 14 IDENTITY SECURITY Acknowledgement The Attorney-General s Department appreciates the assistance of the Australian Institute
Identification GETTING STARTED
Identification GETTING STARTED 3 This is Booklet 3 in the Getting Started Series. Getting Started is a guide for people leaving prison. Booklets 1 The First Week 2 Housing 3 Identification 4 Alcohol and
Your secure identity. Meeting proof of identity requirements
Your secure identity Meeting proof of identity requirements The Department of Transport (DoT) is committed to safeguarding your identity through secure information management and personal identification
Application to register a change of name (adult 18 years or over)
Government of Western Australia Department of the Attorney General Registry of Births, Deaths & Marriages BDM400 Application to register a change of name (adult 18 years or over) Eligibility You must be
Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 No 99
New South Wales Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 No 99 Contents Page 1 Name of Act 2 2 Commencement 2 Schedule 1 Principal amendments to Crimes Act 1900 No 40 3 Schedule
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
Tasmanian Government Identity and Access Management Toolkit
Tasmanian Government Identity and Access Management Toolkit Summary January 2010 Department of Premier and Cabinet For further information on the Toolkit, contact the Office of egovernment: [email protected]
Driving License. National Insurance Number
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010
DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
Application for superannuation benefits temporary residents departing Australia permanently
GPO Box 89 Melbourne Vic 3001 VicSuper Member Centre 1300 366 216 vicsuper.com.au Application for superannuation benefits temporary residents departing Australia permanently * Indicates that providing
Application for Bond Loan and Rental Grant assistance
Office use only (application number) Bond Loan Rental Grant Application for Bond Loan and Rental Grant assistance The Department of Housing and Public Works provides Bond Loans and Rental Grants to people
FINANCIAL CRIMES. Lesson Plan and Course Outline. INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts
FINANCIAL CRIMES Lesson Plan and Course Outline Instructor Detective Kelly Smith Method of Presentation Lecture Duration 8 Hours Trainee Equipment/Materials Note taking material INSTRUCTOR EQUIPMENT/MATERIALS
Crimes Amendment (Fraud and Forgery) Bill 2009
New South Wales Crimes Amendment (Fraud and Forgery) Bill 2009 Contents Page 1 Name of Act 2 2 Commencement 2 Schedule 1 Principal amendments to Crimes Act 1900 No 40 3 Schedule 2 Consequential and other
A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or
SBA Procedural Notice TO: All SBA Employees CONTROL NO.: 5000-1323 SUBJECT: Acceptance of Electronic Signatures in the 7(a) and 504 Loan Program EFFECTIVE: 10/21/14 The purpose of this Notice is to inform
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Overseas: NOTES. Application for an Australian Passport. Your checklist. Keep your passport safe at all times.
Application for an Australian Passport Overseas: NOTES Who can apply for an Australian passport? All Australian citizens can apply if you have any questions or doubts about your Australian citizenship,
Identity: The Key to the Future of Healthcare
Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital
T-CY Guidance Note #4 Identity theft and phishing in relation to fraud
www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)8E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #4 Identity theft and phishing in relation to fraud Adopted by the 9 th Plenary of the
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with
CHC30113 Certificate III in Early Childhood Education and Care
ENROLMENT APPLICATION FORM CHC30113 Certificate III in Early Childhood Education and Care About this application Use this Enrolment Application to apply for enrolment in the CHC30113 Certificate III in
The Manitoba Identification Card. Secure proof of age, identity and Manitoba residency
The Manitoba Identification Card Secure proof of age, identity and Manitoba residency The Manitoba Identification Card A voluntary option for Manitoba residents The Manitoba Identification Card is a voluntary,
Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.
Polling Question Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Please type in your response. This poll will close promptly at 1:00 pm CDT Getting the
Privacy and Information Protection Bulletin
Privacy and Information Protection Bulletin March 2005 Fasken Martineau DuMoulin LLP Identity Theft Sara Levine and Joanna Erdman (student-at-law), Toronto Vancouver Calgary Toronto Montréal Québec City
Criminal Code And Civil Liability Amendment Bill 2007
1 Criminal Code And Civil Liability Amendment Bill Explanatory Notes Objectives of the Bill The Bill seeks to: Amend section 328A of the Criminal Code to increase the maximum penalties for the offence
Criminal Law Consolidation (Identity Theft) Amendment Act 2003
No 60 of 2003 assented to 11.12.2003 South Australia Criminal Law Consolidation (Identity Theft) Amendment Act 2003 An Act to amend the Criminal Law Consolidation Act 1935 and to make a related amendment
NATIONAL POLICE CHECKING SERVICE (NPCS) INFORMED CONSENT FORM
SECTION 1: PERSONAL INFORMATION Please select appropriate box only: Employee Contracr/Consultant Volunteer Individual Other (Please specify) Is this a renewal check? Yes No Names by which I am, or have
Application Form and Lodgement Guide
First Home Owner Grant Application Form and Lodgement Guide Please read the Terms used for explanations in completing the application 4 easy steps to claim your grant 01 02 03 04 Read lodgement guide Important
Appendix A DRAFT INFORMATION MANAGEMENT PLAN
1 Appendix A DRAFT INFORMATION MANAGEMENT PLAN Pacific Region Identity Protection Project PRIPP April 2004 Forum Eyes Only 2 ABBREVIATIONS Throughout this report the following abbreviations will be utilised:
AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA
Australian Payments Clearing Association AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA 214 Australian Payments Clearing Association Limited ABN 12 55 136 519 CONTENTS OVERVIEW 1 SECTION 1 Fraud rates 4 SECTION
Identity Theft. What it is and How to Protect Yourself
Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Identity Theft
PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit
PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account
Identity Theft Victims Universal Complaint Form (FTC)
Average time to complete: 10 minutes A voluntary form for filing a report with law enforcement and disputes with credit reporting agencies and creditors about identity theft-related problems. Visit ftc.gov/idtheft
Child. Application for an Australian Passport. Your checklist
Application for an Australian Passport Child Appointments Only certain applicants should lodge their forms at a passport office in Australia. Appointments are essential. See notes for details. Protect
Application for Visa Credit card
Application for Visa Credit card How to lodge your application: bankvic.com.au [email protected] 13 63 73 option 4 Reply Paid 669, BankVic PO Box 669, Carlton Sth Vic 3053 Visit a branch Information
Identity Theft Packet
BOULDER POLICE DEPARTMENT 1805 33 rd Street Boulder, CO 80301 Identity Theft Packet ** Use this packet when the crime involves the stealing of someone's identity, such as when a victim finds out that someone
Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.
Defeating cybercriminals Protecting online banking clients in a rapidly evolving online environment The threat As the pace of technological change accelerates, so does the resourcefulness and ingenuity
Application to register a change of name (adult 18+ years)
Application to register a change of name (adult 18+ years) July 2014 Recognising the significance of life events Important information about your change of name application If you require access to a translation
Two-Factor Authentication: Guide to FEXCO CFX SMS/APP Verification
Guaranteeing you the Highest Levels of Security Online At FEXCO CFX, we are dedicated to ensuring that our clients enjoy the highest standards of security. In order to combat the risk of online fraud and
Attention: AT&T Theft of Identity Fax No: 866-761-0538 Or. P.O. Box 2767 Houston, TX 77252-2767
Re: ATT Account Number: Balance Due Dear Thank you for contacting Southwest Credit regarding the above telephone account. Like you, we want to resolve your dispute regarding the account as soon as possible.
Recovering Your Identity. Advice for victims of identity crime
Recovering Your Identity Advice for victims of identity crime How will you know your identity has been stolen? Identity crime is unfortunately very common. Around 1 in 5 Australians have been a victim
LUMP SUM APPLICATION FOR PAYMENT OF A PRESERVED LUMP SUM ENTITLEMENT 1. PERSONAL DETAILS 2. TAX FILE NUMBER (TFN) 3. TYPE OF ENTITLEMENT APPLIED FOR
LUMP SUM APPLICATION FOR PAYMENT OF A PRESERVED LUMP SUM ENTITLEMENT Form Please complete all the details on this form in BLOCK LETTERS and return the signed original to. 1. PERSONAL DETAILS Mr Ms Miss
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the
Direct Recruitment Privacy Policy
Direct Recruitment Privacy Policy Direct Recruitment manages personal information in accordance with the Privacy Act 1988 and Australian Privacy Principles (APP). This policy applies to information collected
Personal Information. About you. Personal information and your identity.
Personal Information About you. Personal information and your identity. 213301 Keeping you safe and stopping fraud. More and more people are worried about identity theft and fraud. We re working 24/7 to
Identity Verification Program Guide
Identity Verification Program Guide The National Crime Prevention and Privacy Compact Council (Compact Council) is a15-member body of local, state, and federal governmental officials which prescribes system
IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09
IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do
UNCLAIMED MONEY HOW TO CLAIM YOUR MONEY
UNCLAIMED MONEY HOW TO CLAIM YOUR MONEY Do not complete this form to claim funds where your search shows the Type of money as 'Banking', 'Life' or 'Company Gazette'; or if you are claiming funds listed
Consumer and Business Services
Consumer and Business Services Born in South Australia Register a Change of Name Application (child under 18) To change a child s name you must complete this form, pay the appropriate fee and provide documentation
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Life Events/Salary Increase cover
Fact sheet and form Life Events/Salary Increase cover What this fact sheet covers This fact sheet provides information about Life Events insurance cover and Salary Increase cover available through our
Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police
Department of Communications Enhancing Online Safety for Children Discussion Paper Submission by the Australian Federal Police March 2014 1 Introduction The AFP welcomes the opportunity to make a submission
How To File An Identity Theft Complaint And Affidavit
Average time to complete: 10 minutes Identity Theft Victims Complaint and Affidavit A voluntary form for filing a report with law enforcement and disputes with credit reporting agencies and creditors about
Motorcycle Policy Summary and Important Information
Motorcycle Policy Summary and Important Information This is a summary of the policy and does not contain the full terms and conditions of the cover, which can be found in the policy documentation. It is
Privacy Policy. January 2014
Privacy Policy January 2014 Privacy Policy Introduction This policy explains your rights as an individual when using services provided by Her Majesty s Passport Office. Our commitment to you Her Majesty
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
Identity Theft Victim Checklist
Identity Theft Victim Checklist THE FOLLOWING CHECKLIST PROVIDES THE STEPS YOU SHOULD TAKE TO MINIMIZE DAMAGE TO YOUR FUNDS, FINANCIAL ACCOUNTS AND PERSONAL REPUTATION. Before you start Telephone calls
Yes, your card will expire at a given date, which is printed on the front of your card.
What is the Debenhams Prepaid Card? Debenhams Prepaid Card works in a similar way to a pay as you go mobile phone. You top up what you need, when you need it. You top the card up with money which can be
American Express. Business Credit Card Conditions
American Express Business Credit Card Conditions Effective 1st June 2006 Postal Address American Express Australia Limited Cardmember Services GPO Box 1582 Sydney NSW 2001 Lost or Stolen Cards In Australia
Identity Theft Victim s Packet
Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the Lafayette County Sheriff s Department and obtained a report number related to your
Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
Identity Cards Act 2006
Identity Cards Act 2006 CHAPTER 15 Explanatory Notes have been produced to assist in the understanding of this Act and are available separately 6 50 Identity Cards Act 2006 CHAPTER 15 CONTENTS Registration
Security Guide. for electronic transactions. UniBank is a division of Teachers Mutual Bank Limited
Security Guide for electronic transactions UniBank is a division of Teachers Mutual Bank Limited Teachers Mutual Bank Limited ABN 30 087 650 459 AFSL/Australian Credit Licence 238981 Who We Are UniBank
Credit Card Conditions of Use. Credit Guide.
Credit Card Conditions of Use Credit Guide. Effective Date: September 2015 This document contains the terms and conditions that apply to St.George Bank Business Visa Debit Card cardholders and to all transactions
IDENTITY THEFT VICTIM S PACKET
DEPARTMENT OF PUBLIC SAFETY 1150 Canton Center S Canton, MI 48188-1699 John R. Santomauro, Director of Public Safety IDENTITY THEFT VICTIM S PACKET INFORMATION AND INSTRUCTIONS The purpose of this packet
Medicare enrolment application
Medicare enrolment application When to use this form Use this form if you are: a migrant living in Australia applying for permanent residency and living in Australia a visitor to Australia an Australian
Bendigo Term Deposit Accounts and Facilities. Terms & Conditions. 19 October 2015
Bendigo Term Deposit Accounts and Facilities. Terms & Conditions. 19 October 2015 Terms and Conditions About this document This document must be read in conjunction with the Schedule of Fees, Charges
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
CRIMINAL HISTORY CHECK APPLICATION
NORTHERN TERRITORY POLICE SAFE NT Phone 1800 723 368 (1800 SAFENT) Office Hours 8 30am 4 30pm Monday Thursday 9 30am 5 30pm Friday CRIMINAL HISTORY CHECK APPLICATION PF095 06/12 C APPLICATION FOR CRIMINAL
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
