GSA SmartPay Conference. Citibank Presents: Information Security and Identity Theft

Size: px
Start display at page:

Download "GSA SmartPay Conference. Citibank Presents: Information Security and Identity Theft"

Transcription

1 GSA SmartPay Conference Citibank Presents: Information Security and Identity Theft

2 Citibank Presents: Continue the Revolution Citibank Commercial Cards, Government Services The Ninth Annual GSA SmartPay Conference - Philadelphia, Pennsylvania

3 The Ninth Annual GSA SmartPay Conference Information Security August 22, 2007

4 Goals and Objectives Define Information Security Gain a clearer perspective on social engineering, internet thieves, phishing concepts, and electronic scams Provide you with the knowledge to protect data against intrusion and theft Refer you to resources that can provide assistance in the event of data or identity theft

5 Agenda Information security - what is it? Password protection tips Protecting against social engineering Recognizing phishing scams Know the game of thieves Identity theft What to do if you are a victim? Resources

6 How Much? Citibank manages one petabyte of electronic data 1,125,899,906,842,624 bytes = 1,500,000 Equivalent to 1.5 million CDs

7 Why Protect Information? Valuable asset Client trust Laws and regulations Financial loss Reputation

8 Laws and Regulations Citibank is subject to laws and regulations relating to Information Security: Customer privacy is a federal requirement: The Gramm-Leach-Bliley Act (GLBA) Privacy and information security legislation has increased significantly over past five years

9 What is Information Security? A collective set of policies, standards, processes and procedures that limits or controls access to, and use of, information to authorized users. IS is the process of protecting data from unauthorized access, use, disclosure, destruction, modification, or disruption. Are Information Security Methodologies new? Julius Caesar is credited with the invention of the Caesar cipher c50 B.C. to prevent his secret messages from being read should a message fall into the wrong hands. WW II brought about significant advancements in IS in that formalized classification of data based upon sensitivity of information and who could have access to the information was introduced. The rapid growth and wide spread use of electronic data processing and electronic business conducted through the Internet fueled the need for better methods of protecting these computers and the information they store, process and transmit.

10 What is Information Security? Information Security Core Principles: Confidentiality Holding sensitive data in confidence, limited to an appropriate set of individuals or organizations. Integrity Data can not be created, changed, or deleted without authorization Availability The information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed. The opposite of availability is denial of service (DOS)

11 Password Construction Techniques Constructing tough-to-crack passwords is an important way that you can protect information and your identity. Citibank Information Security Standards require that all static passwords (passwords that remain the same each time you log on to the system or application) must: Never be shared or written down Consist of a minimum of six (6) alphabetic and numeric characters A good password must also be unique. When constructing your password, never use easy-to-guess password elements such as: Your User ID (jsmith) A phone number or street address Names of family members, close friends, coworkers, pets, etc. Your title or function (secretary, manager, security, etc.) Names of places

12 Password Protection Technique Once you ve constructed a hard-to-guess password, these are some important steps you should take to protect it: Do not give your password anyone even if they claim they have a valid business reason. Change your passwords on a periodic basis as even the strongest passwords can be guessed or misplaced over time. In most cases, your business will select the appropriate period and it will be enforced automatically by the operating system or application. Watch out for applications that "remember" your password, so that you do not have to input the password again. Typically these applications have a checkbox on the log in screen that asks: "Remember my ID on this computer?" Always select no in response to this question.

13 Social Engineering A facet of Information Security aimed at manipulating people Creating a false sense of trust in order to Gain insider access Obtain sensitive information Bypass an organization's existing physical security controls

14 Types of Social Engineering Psychological Subversion Establishing a relationship with an insider to gain access to continuing stream of information Masquerading Impersonating people with legitimate access or a need to know to gain access Shoulder Surfing Stealing information by watching a legitimate user type in a password

15 Examples of Social Engineering Tailgating Entering secure locations by following behind someone with legitimate access Dumpster Diving Finding improperly discarded information

16 Examples of Social Engineering Federal Agency Example (Masquerading) Audit Risk Review Team (Dumpster Diving) Look out for Rushing Name-dropping Intimidation Small mistakes, for example: misspellings, misnomers, odd questions, etc. Requesting forbidden information

17 Identity Theft What is it? A component or subset within IS principles and the CIA Triad. According to the non-profit Identity Theft Resource Center, identity theft is "sub-divided into four categories: Financial Identity Theft - using another's name and SSN to obtain goods and services Criminal Identity Theft - posing as another when apprehended for a crime Identity Cloning - using another's information to assume his or her identity in daily life Business/Commercial Identity Theft - using another's business name to obtain credit

18 Recognizing Phishing Scams Phishing is a type of internet deception designed to steal your valuable personal data. In other words, Phishing may be considered a means to commit Identity Theft. Thieves might send fraudulent messages that appear to come from websites you trust and have existing relationships with. BEWARE they may not be legitimate What does a phishing scam look like? Often include official-looking logos from real organizations and other identifying information taken directly from legitimate websites.

19 Phishing Example

20 Phishing The links that you are urged to click may contain all or part of a real company's name and are usually "masked," meaning that the link you see does not take you to that address but somewhere different, usually a phony website.

21 Internet Thieving and Electronic Scams How can I spot a true website from a fake? Look for the lock or key icon at the bottom of the browser. If the site has changed since your last visit, be suspicious. A list of popular financial sites that use a secure page for logins is maintained on pharming.org Check spelling, grammar, and punctuation. If there are errors chances are you may have been phished. Hover over suspicious links to find masked URL s (as in the previous example). A reputable business will never ask you to verify account information online. Did you initiate the contact? What to do? Report suspicious incidences to the Organization immediately

22 Don t be a victim of Identity Theft Types: Hijacking existing accounts and deposits Creating new alternate identities How can someone steal my identity? Stealing records Trash (Dumpster Diving) Credit Reports Theft of wallet, purses Electronic scams (as discussed)

23 What if I am a victim? Five steps to minimize damage/maximize control: Contact the fraud department at one of the three major credit bureaus Review your credit report Contact institutions where fraud occurred File a police report File report with the Federal Trade Commission

24 Statistics Surveys in the USA from 2003 to 2006 showed a decrease in the total number of victims but an increase in the total value of identity fraud to US $56.6 billion in The average fraud per person rose from $5,249 in 2003 to $6,383 in Only 15% of victims find out about the theft through proactive action taken by a business. The average time spent by victims resolving the problem is about 40 hours. 73% of respondents indicated the crime involved the thief acquiring a credit card

25 Statistics

26 Resources Federal Trade Commission Identity Theft Clearing House

27 Resources: Credit Bureau Agencies Equifax Experian Experian ( ) TransUnion Free credit reports

28 Summary Defined Information Security Set clear roles and responsibilities Know your password rules! Be aware of social engineering and data theft techniques Know what to do if you are a victim! Questions?

29 Reminders Thank you for attending this session! Visit the Citibank Welcome Center Room 104 A/B, 1 st Floor National Industries for the Blind will have a display of products Conference Slide Show come see yourself shine! Visit the Citibank Technical Demonstration Center Room 106 A, 1 st Floor Please take a moment to complete your GSA survey for this session!

30 IRS Circular 230 Disclosure: Citigroup Inc. and its affiliates do not provide tax or legal advice. Any discussion of tax matters in these materials (i) is not intended or written to be used, and cannot be used or relied upon, by you for the purpose of avoiding any tax penalties and (ii) may have been written in connection with the "promotion or marketing" of the Transaction. Accordingly, you should seek advice based on your particular circumstances from an independent tax advisor. Any terms set forth herein are intended for discussion purposes only and are subject to the final terms as set forth in separate definitive written agreements. This presentation is not a commitment to lend, syndicate a financing, underwrite or purchase securities, or commit capital nor does it obligate us to enter into such a commitment, nor are we acting as a fiduciary to you. By accepting this presentation, subject to applicable law or regulation, you agree to keep confidential the existence of and proposed terms for any transaction contemplated hereby (a Transaction ). Prior to entering into any Transaction, you should determine, without reliance upon us or our affiliates, the economic risks and merits (and independently determine that you are able to assume these risks) as well as the legal, tax and accounting characterizations and consequences of any such Transaction. In this regard, by accepting this presentation, you acknowledge that (a) we are not in the business of providing (and you are not relying on us for) legal, tax or accounting advice, (b) there may be legal, tax or accounting risks associated with any Transaction, (c) you should receive (and rely on) separate and qualified legal, tax and accounting advice and (d) you should apprise senior management in your organization as to such legal, tax and accounting advice (and any risks associated with any Transaction) and our disclaimer as to these matters. By acceptance of these materials, you and we hereby agree that from the commencement of discussions with respect to any Transaction, and notwithstanding any other provision in this presentation, we hereby confirm that no participant in any Transaction shall be limited from disclosing the U.S. tax treatment or U.S. tax structure of such Transaction. We are required to obtain, verify and record certain information that identifies each entity that enters into a formal business relationship with us. We will ask for your complete name, street address, and taxpayer ID number. We may also request corporate formation documents, or other forms of identification, to verify information provided. Any prices or levels contained herein are preliminary and indicative only and do not represent bids or offers. These indications are provided solely for your information and consideration, are subject to change at any time without notice and are not intended as a solicitation with respect to the purchase or sale of any instrument. The information contained in this presentation may include results of analyses from a quantitative model which represent potential future events that may or may not be realized, and is not a complete analysis of every material fact representing any product. Any estimates included herein constitute our judgment as of the date hereof and are subject to change without any notice. We and/or our affiliates may make a market in these instruments for our customers and for our own account. Accordingly, we may have a position in any such instrument at any time. Although this material may contain publicly available information about Citi corporate bond research or economic and market analysis, Citi policy (i) prohibits employees from offering, directly or indirectly, a favorable or negative research opinion or offering to change an opinion as consideration or inducement for the receipt of business or for compensation; and (ii) prohibits analysts from being compensated for specific recommendations or views contained in research reports. So as to reduce the potential for conflicts of interest, as well as to reduce any appearance of conflicts of interest, Citi has enacted policies and procedures designed to limit communications between its investment banking and research personnel to specifically prescribed circumstances Citibank, N.A. All rights reserved. Citi and Citi and Arc Design and Citibank are trademarks and service marks of Citigroup Inc. or its affiliates and are used and registered throughout the world.

Information Security & Identity Theft

Information Security & Identity Theft GSA SmartPay Conference Information Security & Identity Theft Maureen Garlock Vice President, Citi 11 th Annual GSA SmartPay Conference Phoenix, Arizona July 28 th - July 30 th, 2009 Techniques for Establishing

More information

Using CitiManager Card Management Module Travel

Using CitiManager Card Management Module Travel 2011 GSA SmartPay Training Conference Using CitiManager Card Management Module Travel Instructor s Name Instructor s Title, Citi A Winning Hand: Solutions, Savings and Sustainability with GSA SmartPay

More information

Citibank Custom Reporting System (CCRS) Exporting and File Management

Citibank Custom Reporting System (CCRS) Exporting and File Management GSA SmartPay Conference Citibank Custom Reporting System (CCRS) Exporting and File Management Aras Toker Analyst Citibank Presents: Continue the Revolution Citibank Commercial Cards, Government Services

More information

Citibank Presents: Techniques for Establishing a Successful Audit Process

Citibank Presents: Techniques for Establishing a Successful Audit Process GSA SmartPay Conference Citibank Presents: Techniques for Establishing a Successful Audit Process David Ruda, Noak Smith (VA) Vice President, Public Sector Market Manager, Commercial Cards Citibank Presents:

More information

Program Audit Tool (Reporting Solution)

Program Audit Tool (Reporting Solution) 2011 GSA SmartPay Training Conference Program Audit Tool (Reporting Solution) Heelay Yaftali Vice President, Citi A Winning Hand: Solutions, Savings and Sustainability with GSA SmartPay The 13 th Annual

More information

Dematerialization of Turkish Government Debt Instruments

Dematerialization of Turkish Government Debt Instruments Dematerialization of Turkish Government Debt Instruments Asli Gunel Central Registry Agency Gunsel Topbas Citibank A.S. Turkey 19 January 2012 1 Government Debt Instruments Quick Facts Central Bank of

More information

Citibank Custom Reporting System (CCRS) Cycle based Reporting

Citibank Custom Reporting System (CCRS) Cycle based Reporting GSA SmartPay 2010 Conference Citibank Custom Reporting System (CCRS) Cycle based Reporting Mini Session 12 th Annual GSA SmartPay Conference Atlanta, GA August 10 12, 2010 Goals and Objectives This course

More information

Centralizing Treasury in Latin America

Centralizing Treasury in Latin America Centralizing Treasury in Latin America Liquidity Perspectives Ron Chakravarti Managing Director Treasury Advisory Citi Treasury and Trade Solutions Treasury Models: Some Variations Group Treasury Local

More information

Tax Initiatives The Common Reporting Standard

Tax Initiatives The Common Reporting Standard Treasury and Trade Solutions February 2016 Tax Initiatives The Common Reporting Standard The Common Reporting Standard (CRS) The Common Reporting Standard - Overview The Common Reporting Standard ( CRS

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

How To Harmonize Tax Processing On Flows In Euro Zone

How To Harmonize Tax Processing On Flows In Euro Zone T2S Dedicated Info Session on Getting Ready for Cross-CSD Settlements Issue #2: Tax Processing Marcello Topa Citi Global Transaction Services EMEA 15/03/2012 Milan, Italy Issue #2: Tax Processing Scope

More information

Citi Supplier Finance

Citi Supplier Finance Treasury & Trade Solutions North America Trade Finance Citi Supplier Finance Supplier Finance Program for UTC Suppliers The Solution UTC and Citi have entered into a partnership that enables preferred

More information

GSA SmartPay Conference. Electronic Tools Overview Navy

GSA SmartPay Conference. Electronic Tools Overview Navy GSA SmartPay Conference Electronic Tools Overview Navy The Tenth Annual GSA SmartPay Conference Towards New Horizons! Denver, Colorado July 22 nd - July 24 th, 2008 Goals and Objectives Provide an overview

More information

What s New in Citi s Online Tools

What s New in Citi s Online Tools GSA SmartPay 2010 Conference What s New in Citi s Online Tools David Lipke Citi Product Development 12 th Annual GSA SmartPay Conference Atlanta, GA August 10 12, 2010 House Rules To ensure the best possible

More information

Treasury and Trade Services Global Payments. Citi Payment Analytics User Guide

Treasury and Trade Services Global Payments. Citi Payment Analytics User Guide Treasury and Trade Services Global Payments Citi Payment Analytics User Guide Table of Contents 1. Accessing Payment Analytics 2. Dashboard Overview Getting to the Citi Payment Analytics Dashboard Overview

More information

Understanding & Realizing Big Data Potential

Understanding & Realizing Big Data Potential Understanding & Realizing Big Data Potential 2014 Latin America Treasury & Finance Conference A Blueprint for a Digitally Connected Treasury Driss R. Temsamani Analytics & Innovation Head [email protected]

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

CIPI Soundbite: CPO/CTA Registration & non-us Funds

CIPI Soundbite: CPO/CTA Registration & non-us Funds CIPI Soundbite: CPO/CTA Registration & non-us Funds Citibank International Plc, Ireland Branch October 2012 Glossary You must learn to talk clearly. The jargon of scientific terminology which rolls off

More information

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but

More information

Treasure Trove The Rising Role of Treasury in Accounts Payable

Treasure Trove The Rising Role of Treasury in Accounts Payable Treasury and Trade Solutions North America July 30, 2015 Treasure Trove The Rising Role of Treasury in Accounts Payable 2015 Citibank, N.A. All rights reserved Today s Speakers Andrew Bartolini Chief Research

More information

Payment Factories: different ways of achieving payment efficiency. Jonathan Jordan EMEA Payments Market Manager, Citi Transaction Services

Payment Factories: different ways of achieving payment efficiency. Jonathan Jordan EMEA Payments Market Manager, Citi Transaction Services Payment Factories: different ways of achieving payment efficiency Jonathan Jordan EMEA Payments Market Manager, Citi Transaction Services The term Payment Factory is becoming increasingly talked about

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

DVD Companion Learning Guide

DVD Companion Learning Guide DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Fraud and Identity Theft. Megan Stearns, Credit Counselor Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention

More information

Identity Theft Information

Identity Theft Information Identity Theft Information Houston Police Department Criminal Investigations Command Financial Crimes Unit 713-308-2500 The information contained on this page is intended to assist the citizens of Houston

More information

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal

More information

BECS Pre-Trade Analytics. An Overview

BECS Pre-Trade Analytics. An Overview BECS Pre-Trade Analytics An Overview January 2010 Citi s Pre-Trade Analytical Products and Services Citi has a long history of providing advanced analytical tools to our clients. Significant effort has

More information

Global Tax Initiatives The Evolving Regulatory Environment

Global Tax Initiatives The Evolving Regulatory Environment Treasury and Trade Solutions March 2016 Global Tax Initiatives The Evolving Regulatory Environment Global Tax Initiatives The Regulatory Environment Local Governments Governments are continuing to coordinate

More information

Client Delivery TAMPA

Client Delivery TAMPA Treasury and Trade Solutions April, 10 th 2015 Client Delivery TAMPA Patricia Pires Citi Service Center and Offshore Unit Head for Latin America Agenda Quién somos nosotros? Nuestra Estructura Nuestros

More information

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you Identity theft is a terrible problem in this Information Age. You have already taken the first important step by contacting ACNB Bank immediately. ACNB Bank will work with you every step of the way to

More information

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft, Fraud & You. Prepare. Protect. Prevent. Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain.

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain. Identity Theft Identity Theft Occurs when someone uses your personal information without your permission for personal gain. Someone uses your personal information to open a department store credit account

More information

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage. Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

Identity Protection Guide. The more you know, the better you can protect yourself.

Identity Protection Guide. The more you know, the better you can protect yourself. Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

Standard 9: The student will identify and explain consumer fraud and identity theft.

Standard 9: The student will identify and explain consumer fraud and identity theft. TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial

More information

IDENTITY THEFT RESOURCE KIT

IDENTITY THEFT RESOURCE KIT IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information

Information to Protect Our Customers From Identity Theft

Information to Protect Our Customers From Identity Theft Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns

More information

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

identity theft: How To Safeguard Your Privacy and Keep Your Good Name identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,

More information

Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.

Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft. Client Resources SAFEGUARDING YOUR IDENTITY Your personal and financial information is precious. Protect it by being savvy about identity theft. EVERYONE IS AT RISK FOR IDENTITY THEFT. It s an unfortunate

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center

More information

I dentity theft occurs

I dentity theft occurs 1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,

More information

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain. Common ID Theft TACTICS. HOW DOES IT HAPPEN? Identity What should I do if I m a Protection PROTECT YOURSELF: OLD-FASHIONED STEALING: Criminals steal your wallet or purse. > Never leave your wallet or purse

More information

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT

More information

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09 IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do

More information

IDENTITY THEFT: MINIMIZING YOUR RISK

IDENTITY THEFT: MINIMIZING YOUR RISK IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IDENTITY THEFT IT S POSSIBLE@ PROTECT YOUR IDENTITY protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IT S POSSIBLE @ What Is Identity Theft? According to the FBI, identity theft is the fastest

More information

Beware! Identity Theft

Beware! Identity Theft STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal

More information

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government

More information

Reclaiming your identity

Reclaiming your identity Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

What is Identity Theft?

What is Identity Theft? What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.

More information

RC284. Protect Yourself Against Identity Theft

RC284. Protect Yourself Against Identity Theft RC284 Protect Yourself Against Identity Theft Identity theft the unauthorized use of your information by third parties involves the collection and use of personal information such as your name, date of

More information

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft identity theft unit new york county district attorney s office Protecting Yourself from Identity Theft cyrus r. vance, jr. district attorney 5 / 2010 questions and answers Dear Friends, cyrus r. vance,

More information

Identity Theft. Protecting Your Credit Identity 1.3.1.G1

Identity Theft. Protecting Your Credit Identity 1.3.1.G1 Identity Theft Protecting Your Credit Identity Identity Theft The dollar loss suffered because of identity theft from consumers was 343 million in 2002. Federal Trade Commission The number of identity

More information

Agency Update: Hear the News from the Top

Agency Update: Hear the News from the Top Market insights on Community Development Agency Update February 18, 2014 Agency Update: Hear the News from the Top Woody Brewer from Fannie Mae and Kim Griffith from Freddie Mac Share Their Views Woody

More information

PROTECT YOUR FINANCIAL TRANSACTIONS

PROTECT YOUR FINANCIAL TRANSACTIONS PROTECT YOUR FINANCIAL TRANSACTIONS Caisses populaires acadiennes www.acadie.com/en It s a wealth of ways to strengthen the security of your financial transactions. By implementing simple measures to mitigate

More information

When Fraud Comes Knocking

When Fraud Comes Knocking When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.

More information

Identity Theft Simple ways to keep your sensitive information safe.

Identity Theft Simple ways to keep your sensitive information safe. Keep yourself safe from Identity Theft Simple ways to keep your sensitive information safe. Be Aware Identity theft is the number one consumer fraud perpetrated on unsuspecting citizens. In 2011, nearly

More information

Guide to Identity Theft

Guide to Identity Theft Guide to Identity Theft 1 Receive a free copy of your credit report. Visit www.annualcreditreport.com to get a copy of your credit report from all three credit reporting agencies. Review your credit report

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

Citi Identity Theft Solutions

Citi Identity Theft Solutions Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information

More information

How To Protect Yourself From Identity Theft

How To Protect Yourself From Identity Theft IDENTITY THEFT: PROTECTING YOUR CREDIT Free Credit Report A recent amendment to the federal Fair Credit Reporting Act requires each of the nationwide consumer reporting companies to provide you with a

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information