LEADER S GUIDE PROTECT YOUR PHONE RECORDS. A Consumer Action Publication
|
|
|
- Brett Little
- 10 years ago
- Views:
Transcription
1 LEADER S GUIDE PROTECT YOUR PHONE RECORDS A Consumer Action Publication
2 Contents Introduction Page 2 About Your Phone Records Page 3 How Phone Records Are Accessed Illegally Page 5 Protecting Your Phone Records Page 8 Information and Assistance for Victims Page 14 Introduction Keeping your doors and windows locked is no longer enough to protect yourself from thieves. A certain type of crook is not interested in your jewelry, stereo equipment, car or other personal property. These criminals are after something even more valuable your personal information. Armed with what is supposed to be confidential data about your identity, employment, accounts and activities, identity thieves and other scammers are able to do serious, sometimes irreparable, damage. Phone records are an important source of private information that someone might try to access without your consent for illegal or harmful purposes. Various laws and regulations are in place to keep your phone records private, but you must take an active role to protect your personal data. This guide can help you understand: Who would want to access your phone records; Why they might want to do it; How they try to access your private information, and What you can do to reduce the chances of becoming a victim. Consumer Action has also created these free companion pieces to this backgrounder guide: A multilingual consumer brochure explaining how to protect your phone records. This brochure is available in
3 bulk in Chinese, English, Korean, Spanish and Vietnamese. A training curriculum with exercises and activities. PowerPoint training slides. For more information about these materials, contact Consumer Action: Web site: [email protected] Phone: About Your Phone Records Why is it important to keep my phone records private? You might not realize it, but your phone records contain all sorts of personal information that someone could use to hurt you, steal from you, or commit some other crime using your identity. What information could someone get from my phone records? Your landline telephone records may include: Your billing address and, if different, your home address. Long distance and local toll numbers that were dialed from the phone. Calls billed to a calling card or credit card. Numbers from which collect calls were accepted. Dates and lengths of calls outside your local calling area. In addition, your wireless phone records may include: The numbers of all phone calls made or received by you and other family plan members. Your phone account online may also include: Alternate contact information you provided, such as home or office phone numbers. Bank or credit information you provided to pay your bills automatically, such as credit or debit card numbers and checking account numbers. Information the company keeps about you may also include:
4 Your birth date. Your Social Security number. All telephone and Internet services you subscribe to. Information about the phone that could be used to track the location of the person who has it. Who would want my phone records? Any number of people might want your phone records: Con artists trying to steal your assets. An estranged spouse, a jealous boyfriend or girlfriend, or a stalker. Identity thieves, who look for opportunities to steal personal information (such as a Social Security number) that enables them to open credit accounts, buy cars, set up phone and other services, and commit crimes using someone else s identity. Someone involved in a lawsuit with you. Spies, who use phone records to uncover scandals that can ruin private and political careers. A private investigator, bail bondsman, debt collector and anyone else who is paid to track you. Data brokers, who gather data on people with the purpose of selling it to anyone willing to pay for it. Criminals who want to intimidate or harm witnesses or law enforcement officers. How could someone use the information from my phone records? There are many ways that people who take your personal information without your knowledge or permission can use it to harm you. Here are some fictional examples of how phone account data could be used: A husband going through a messy divorce asks a female friend to call the phone company and pretend to be his wife. She requests copies of the wife s wireless phone bill, which the husband then uses in court to allege that his wife often called home late at night while he was out of town proof that she was frequently out rather than home with the children.
5 A coworker in competition for a big promotion hires a private investigator to get copies of her competitor s phone bills. On the bills are a number of calls to a local health facility that treats people with AIDS, a chronic and sometimes debilitating illness. This information is leaked to the hiring manager. A would-be identity thief hacks into your online phone account records and obtains your Social Security number, birth date, and checking account number (used for automatic bill payment) along with call records showing frequent calls to a particular bank. He uses this information to make a large withdrawal from your account. A witness testifying against the defendant in a trial gets a threatening phone call, even though her phone number is unlisted. After entering a witness protection program, she learns her number was purchased from an illegal data broker someone who sells information about others. How Phone Records Are Accessed Illegally How could someone access my phone records? There are numerous ways to access phone records illegally. These are two methods commonly used by data brokers and others: First, they could try to view phone accounts online. If, for example, you have not yet activated your online account access, someone could use personal information they already have about you to establish an online account. By pretending to be you, they can log on and set up a password before you do. Second, the most common method for obtaining someone s private phone records and call detail information is pretexting. What is pretexting? Pretexting (sometimes also referred to as social engineering ) is a method of obtaining someone else s personal information under false pretenses. Pretexting is done by impersonating the victim or telling lies that will convince a company employee,
6 organization member or other individual to divulge confidential data. When pretexters try to access another person s calling records and other account information, they might pretend to be the telephone service customer. In some cases, the pretexter already has the personal information needed to pretend to be you and access your records. For example, an ex-spouse or an employer may already have or know the required information used to establish your account. Pretexting became front-page news in 2006 when Hewlett- Packard admitted that its investigators had obtained the phone records of journalists and its own board members under false pretenses in order to uncover the source of boardroom leaks. Though the HP scandal was extremely well publicized, most cases of phone records pretexting occur without any media attention. If a pretexter doesn t already have my personal information, how could he get it? In some cases, the person trying to access your phone records might first need to get some key information before he or she can convincingly pose as you. Pretexters have been known to try to trick neighbors or coworkers into revealing information about their intended victim. They also sometimes try to fool the intended victim into revealing personal information. For example, while falsely claiming to be conducting a phone survey, the pretexter might ask seemingly innocent questions about such things as who your phone company is or what your pet s name is. (Consumers often use a pet s name as the password for online accounts). Public records are a legal source of certain types of personal information. If you have ever owned a home, filed bankruptcy, opened a business, or gotten married or divorced, there are public records about you.many states make court records available to the public at government archives or online databases and pretexters might use them to seek information about you.
7 Is pretexting legal? Using pretexting to obtain personal financial data from institutions or their customers has been illegal since 1999, when Congress passed the Gramm-Leach-Bliley Act. While this legislation was a step in the right direction, the law s language and reach was somewhat unclear, allowing room for lawyers to debate its application to pretexters who have obtained non-financial data, such as phone records. In early 2007, the Telephone Records and Privacy Protection Act of 2006 became law, making pretexting to buy, sell or obtain phone records a federal crime punishable by fines of up to $500,000 and prison sentences of up to 10 years. (Law enforcement officers and intelligence agents are, in most cases, exempt from punishment.) The law, which is enforced by the U.S. Department of Justice, also prohibits the sale or transfer of confidential phone records. Before the passage of this legislation, dozens of websites openly advertised personal phone records for sale for less than $100. Prior to 2007, some states had already outlawed telephone pretexting. Since the federal law does not preempt state standards, some states are considering strengthening their own measures against pretexting. In 2007, the Federal Communications Commission (FCC), which is responsible for regulating interstate and international radio, television, wire, satellite and cable communications, took action to provide further protection from pretexters. The Commission s new rules require telephone companies to put in place more stringent authentication measures (such as mandatory password protection to online accounts and mandatory passwords prior to the release of call detail records over the phone) and impose clearer customer notification guidelines in case of a breach. The FCC rules do not preempt stronger state laws.
8 Protecting Your Phone Records What can I do to keep my phone records private? Though the following measures are not a guarantee of privacy, they do make it more difficult for prying eyes to see your private data. Get a non-published number. Your number and address will not be listed in phone directories, on Internet search engines or with directory assistance. However, if you give your number to businesses or other entities, it may be sold or shared for marketing. If you are asked for your phone number, ask why it is needed and if you are required to provide it. Set up passwords. Place strong passwords on your phone accounts. Don t use easily guessed passwords. Never use your mother s maiden name, birth date, pet s name, phone number, street address or any part of your Social Security number as a password. Don t use obvious consecutive numbers, such as Choose password reminders that are impossible for a stranger to guess. Limit the information you share. Don t give out any personal or financial information unless you trust the person you are dealing with. The companies you do business with already have the information they need about you. Ask why information is needed. You have the right to question why stores or other companies request your phone number. Enlist family members. Speak to those close to you about the dangers of providing information to strangers. Tell family members not to reveal anything to callers asking for personal information. When in doubt, children should pass the call to you or another adult. What should I do with my phone bills so they don t fall into the wrong hands? Store phone bills and other paperwork containing personal information in a safe place under lock and key. Shred or tear up billing statements before throwing them away. Dumpster div-
9 ing searching through garbage to find statements and other documents that reveal personal information is a favorite trick of identity thieves and other crooks. In what specific ways can my phone company help protect my information? All phone companies must meet certain minimum requirements for protecting customer information, but some may place even stronger protections on accounts. For specifics about how your phone company protects your information, ask what measures it takes to prevent pretexting and other illegal access to customers phone records. In accordance with new security regulations imposed by the FCC in 2007, all telephone companies must: Require password protection for online account access. Also, customers must now provide a password when they request call detail information by phone. Without a password, the company can only release phone records by sending the information to the address of record or by calling the customer at the telephone number of record. Phone companies are allowed to provide account information to customers who show a valid photo ID in one of their stores or offices. Notify customers when a password, back-up password, online account, or address of record is created or changed. Obtain explicit consent from their customers before releasing customer data to joint venture partners, independent contractors or other third parties for the purpose of marketing communications-related services. Notify customers in the event of a breach of their confidential data. (This requirement includes some exceptions for law enforcement officers and agencies.) To ensure that your personal information is as well-protected as possible, you: Should ask your phone company to deactivate the online access feature if you don t manage your account online. (If this is not possible, set up a password before a pretexter or hacker beats you to it.)
10 Should call the company immediately if your statements don t arrive when they are supposed to. Might consider asking the company if it is possible to remove call details from your phone bills. Telephone companies take pretexting very seriously. To thwart impostors, some have changed internal procedures. For example, one company has stopped asking customers for their Social Security numbers as a chief way to establish identity, requesting instead a piece of information that is on their phone bill. This company is also training customer service representatives how to identify possible pretexters. Telephone companies have sued dozens of people who have allegedly obtained phone records without authorization using deceptive and fraudulent access methods. What duty does my phone company have to protect my records? Phone companies must operate within any and all applicable laws and abide by all rules set forth by the FCC. This includes fulfilling FCC requirements to: Keep a record of whether or not individual customers have granted permission to use their account information for marketing purposes. Keep accurate records of all instances when customer information was disclosed to third parties. Train employees in the appropriate use of customer information. Review marketing campaigns to ensure they meet customer information privacy requirements. Prepare and make publicly available annual compliance certificates certifying that the company has established operating procedures to ensure compliance with FCC rules. Inform the FCC of any actions taken against data brokers. Provide a summary of the complaints the company receives about the unauthorized disclosure of customer information. 10
11 What is CPNI? Customer proprietary network information (CPNI) is all your phone calling data, including the services you subscribe to, whom you call, when you call, how long your calls are, etc. Can my CPNI be used for marketing purposes without my permission? The Telecommunications Act of 1996, together with FCC regulations and rulings, generally prohibited the use of CPNI without customer permission. Until recently, however, customers who wanted to keep their information out of the hands of marketers were given the opportunity to use the opt-out process. The opt-out process gave the customer 30 days to contact the company as to whether or not to share their CPNI data with joint venture partners and outside contactors. The FCC now requires companies to obtain affirmative, or opt in, consumer consent before they are allowed to share CPNI with joint venture partners or independent contractors for the purpose of marketing communications-related services. The company must require third parties that have legitimate business reasons to access your phone records to keep shared customer information confidential. Your phone company is still allowed to use your customer information, without your approval, to market the same type or higher grade of service than you already subscribe to. These are called service enhancements. For example, if you purchase basic local telephone service from a company, it does not need your permission to use your customer information to try to sell you voice mail or caller ID services. However, if you only subscribe to local services, the company cannot try to market long distance or wireless services to you without your prior consent. Phone companies are also prohibited from using CPNI to lure back customers who have switched to another service provider. The CPNI rules do not prohibit companies from gathering and publishing aggregate customer data or using customer information for creating directories. 11
12 Customer information rules apply to all types of telephone companies: local, long distance, wireless and, now, voice over Internet Protocol (VoIP). To ensure you are taking advantage of all opportunities to keep your phone records private, ask your phone company if there is anything further you can do to limit the sharing or selling of your data. Do CPNI regulations apply to business phone customers? CPNI regulations for personal customer accounts do not necessarily apply to all business accounts. Individually negotiated CPNI protections may be placed on business accounts that are serviced by a dedicated account representative and based on a contract that specifically addresses the issue of CPNI protection. Who can obtain my phone records legally? Law enforcement agencies, such as the police or the FBI, can lawfully obtain your phone records. Phone companies will also turn over customer phone records to someone with a subpoena or a court order. Will I be informed if my personal account information is disclosed or accessed without my permission? Phone companies are required to notify customers in the event of a breach of their confidential data, but the timing of the notification depends on the circumstances of the breach and the instructions of law enforcement. According to FCC guidelines: The company must first notify law enforcement within seven days of the breach. The company may notify the customer directly or disclose the breach publicly after seven business days following notification of law enforcement, unless the FBI or U.S. Secret Service request that the notification be delayed. An FBI or U.S. Secret Service request can delay the disclosure even longer, perhaps indefinitely. The company may immediately disclose the breach if, after consulting the relevant law enforcement agency, the 12
13 company believes there is an urgent need to do so in order to avoid immediate and irreparable harm. While some argue that the built-in notification delays are necessary for law enforcement to conduct an effective investigation, many counter that the rule is needlessly overbroad, and that timely notification of a breach may be essential for certain victims to protect themselves. 13
14 Information & Assistance for Victims What can I do if my phone records have been stolen? If you believe that you have been a victim of phone records pretexting or that your personal account information has been obtained in some other way without your permission, consider closing your phone account and opening a new one. Set up passwords to prevent unauthorized access to your new account. Ask your local police if you can file an incident report. Having a police report may support your claim that someone stole your phone records in case you have to prove your innocence in a civil or criminal case. Who should I complain to if my phone information has been disclosed without my permission? If you think your customer information has been disclosed without your permission, start by calling your phone company to report your concern. If you are unsatisfied with the company s response, file a complaint with the FCC. If the agency finds that your company violated regulations aimed at protecting consumer information, it can fine the company or issue a citation. [email protected] Online: Phone (voice): 888-CALL-FCC ( ) Phone (TTY): 888-TELL-FCC ( ) Fax: Mail: Federal Communications Commission, Consumer & Governmental Affairs Bureau, Consumer Complaints, th Street, SW, Washington, DC Also submit a copy of your complaint to the Federal Trade Commission (FTC). (See contact information on page 15.) The FTC works with the FCC to prevent the unlawful sale of phone records by marketers, data collectors or websites. The agency has filed suits against several pretexters under laws barring unfair and deceptive practices. 14
15 Are there plans for additional legislation to protect the privacy of telephone service customers? Along with the new rules established in 2007, the FCC adopted a Further Notice of Proposed Rulemaking, soliciting input on what additional steps, if any, the commission should take to further protect the privacy of consumers. Some areas of protection that may warrant further attention are data encryption, data retention limits and audit trails. Where can I get more information about protecting my phone records? Government agencies Federal Communications Commission th Street, SW Washington, DC Phone: Website: [email protected] Federal Trade Commission Consumer Response Center, FTC 600 Pennsylvania Ave., NW Washington, DC Phone: Website: Non-profit consumer organizations Consumer Action 221 Main Street, Suite 480 San Francisco, CA Phone: (English, Spanish and Chinese spoken) Website: [email protected] National Consumers League (NCL) 1701 K Street, NW, Suite 1200 Washington DC Phone: Website: [email protected] 15
16 Consumer Action Main Street, Suite 480 San Francisco, CA Phone: English, Spanish and Chinese spoken Consumer Action and the National Consumers League created this publication with funding from Verizon. 2007
SUBSCRIBER PRIVACY NOTICE
PRIVACY AND SECURITY NewWave will provide you with a copy of its privacy notice at the time Service is installed, and annually afterwards, or as otherwise permitted by law. Customer can view the most current
I know what is identity theft but how do I know if mine has been stolen?
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
INTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with
ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, 10304 Complaints (2007) Updated November 30, 2008
ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, 10304 Complaints (2007) Updated November 30, 2008 Current Laws: A person commits the offense of identity theft
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
How To Get A Free Credit Report From A Credit Report Website
FACTS FOR OLDER CONSUMERS National Consumer Law Center Protect Yourself From Identity Theft Identity theft is one of the fastest growing crimes in the country. It can strike anyone, but elders may be particularly
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and
PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009
PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft
azag.gov PROTECT YOURSELF AGAINST IDENTITY THEFT Office of Arizona Attorney General TERRY GODDARD For more information, contact:
For more information, contact: Office of Arizona Attorney General Terry Goddard 1275 West Washington Street Phoenix, Arizona 85007 602-542-5763 400 West Congress, Suite 315 Tucson, Arizona 85701 520-628-6504
Corona Police Department
By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,
Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
HIPAA and Privacy Policy Training
HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training
Troy Cablevision, Inc. Subscriber Privacy Policy
Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. ( Troy Cable ) is committed to protecting and securely maintaining our customers privacy. The following privacy policy applies to
CUSTOMER PRIVACY STATEMENT
CUSTOMER PRIVACY STATEMENT For Cable Television, High-Speed Internet, and Phone Services Looking for our website privacy statement? Click here. Summary of this privacy notice This privacy notice applies
Citi Identity Theft Solutions
Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information
PUBLIC NOTICE FCC ENFORCEMENT ADVISORY
PUBLIC NOTICE Federal Communications Commission 445 12 th St., S.W. Washington, D.C. 20554 News Media Information 202 / 418-0500 Internet: http://www.fcc.gov TTY: 1-888-835-5322 FCC ENFORCEMENT ADVISORY
PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
Identity Theft Victim s Packet
Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso Police Department and obtained a police report number related to your identity
FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen
FTC Facts For Consumers Federal Trade Commission For The Consumer August 2005 Identity Crisis... What to Do If Your Identity is Stolen Maybe you never opened that account, but someone else did...someone
What is Identity Theft?
What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html
Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available
Do s & Don ts Reference website. www.farmersidentityshield.com
What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What
An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy
An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims
PRIVACY POLICY (Update 1) FOR ONLINE GIVING FOR THE UNITED METHODIST CHURCH
A. Overview PRIVACY POLICY (Update 1) FOR ONLINE GIVING FOR THE UNITED METHODIST CHURCH GENERAL COUNCIL ON FINANCE AND ADMINISTRATION OF THE UNITED METHODIST CHURCH, INC., an Illinois corporation 1 Music
EPIC Letter to Ethics Board Concerning Attorneys' Use of Pretexting
Page 1 of 5 Letter to Ethics Board Concerning Attorneys' Use of Pretexting February 21, 2006 Re: Ethical Concerns Regarding Attorneys' Use of Private Investigators and Pretexting Dear State Bar Ethics
Identity Theft. Officer Rob Romey IPD Crime Prevention Officer. [email protected]
Identity Theft Officer Rob Romey IPD Crime Prevention Officer 816-325 325-7643 [email protected] What Is Identity Theft? Identity theft occurs when someone possesses or uses your name, address,
Standard 9: The student will identify and explain consumer fraud and identity theft.
TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial
TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT
TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT Introduction 3 Immediate steps 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 ) In the matter of ) ) Implementation of the Telecommunications ) Act of 1996: ) CC Docket No. 96-115 ) RM Docket No. 11277 Petition
Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY. For additional and updated information, please visit our website at www.commzoom.com.
CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY YOUR PRIVACY AS A COMMZOOM CUSTOMER As a customer of commzoom, LLC, you are entitled to know what we do with personal information about you that we receive.
Get back your good name. Refuse to be a target of identity crime again.
Clear Your Good Name After Identity Crime You suspect that someone is using your name and personal identification information for unlawful purposes. This kit can help you resolve your identity crime case
FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft
FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity
Responding to New Identity Theft Laws
Responding to New Identity Theft Laws March 2011 Privacy Expectations Today, there is increasing recognition that an individual has a legitimate interest in controlling the collection, use and disclosure/dissemination
Debt Collection. Federal Trade Commission consumer.ftc.gov
Debt Collection Federal Trade Commission consumer.ftc.gov If you re behind in paying your bills, or a creditor s records mistakenly make it appear that you are, a debt collector may be contacting you.
How To Get A Credit Card From A Credit Union
Refuse to be a target of identity crime. Protecting the Real You and Only You. The International Association of Chiefs of Police 515 N. Washington Street, Alexandria, VA 22314 Telephone: 1.800.843.4227
HIPAA Privacy & Security Training for Clinicians
HIPAA Privacy & Security Training for Clinicians Agenda This training will cover the following information: Overview of Privacy Rule and Security Rules Using and disclosing Protected Health Information
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT
CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but
TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT
TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity
SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the
Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft About Medical Identity Theft and Health Information Breaches... 1 What is medical identity theft?... 1 What are the dangers of medical identity theft?... 1 How do
Refuse to be a target of identity crime.
Refuse to be a target of identity crime. Protecting the Real You and Only You. The International Association of Chiefs of Police 515 N. Washington Street, Alexandria, VA 22314 Telephone: 1.800.843.4227
IMMEDIATE STEPS 5 NEXT STEPS 13
INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity Theft Report 9 NEXT STEPS 13 Review Your Credit Reports 13 Dispute Errors with Credit Reporting
INFORMATION ABOUT FILING A WHISTLEBLOWER DISCLOSURE WITH THE OFFICE OF SPECIAL COUNSEL IMPORTANT
U.S. OFFICE OF SPECIAL COUNSEL Form OSC-12 (202) 254-3640 / (800) 572-2249 OMB Control No. 3255-0002 Exp. Date: 2/28/14 INFORMATION ABOUT FILING A WHISTLEBLOWER DISCLOSURE WITH THE OFFICE OF SPECIAL COUNSEL
ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer
ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING By: Jerry Jackson Compliance and Privacy Officer 1 1 Introduction Welcome to Privacy and Security Training course. This course will help you
Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
82-10-43 Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff
82-10-43 Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff Social engineering is the term that hackers use to describe attempts to obtain information about computer systems through
www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service
www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director PIERSON Technological advances of the
Identity Theft: Your Good Name Gone Bad!
Identity Theft: Your Good Name Gone Bad! What is Identity Theft? Identity theft is when someone illegally obtains a person's identifying information, such as name, address, date of birth, social security
APPLICATION FOR TELEPHONE SERVICE
APPLICATION FOR TELEPHONE SERVICE Attached is the application for new telephone service. It is extremely important that the application be filled out completely. Incomplete applications will be returned
15 Bad Things Identity Thieves Can Do With Your Identity
This free ebook is provided to help you protect yourself from fraud and identity theft by LeMay Mobile Shredding. LeMay Mobile Shredding offers mobile document shredding to help you destroy old tax forms,
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
Cash Deposit $ Connection Fees $ Monthly. Download Speed. Cost 3M $35.95 6M $39.95 12M $49.95 Higher speeds available in certain areas.
Northeast Missouri Rural Telephone Company 718 South West Street, PO Box 98, Green City, MO 63545 874-4111 www.nemr.net Application for Membership Customer/Business Name: Social Security #/Federal ID #:
Identity Theft Victim Checklist
CONSUMER INFORMATION SHEET 3 4/30//08 Identity Theft Victim Checklist This checklist can help identity theft victims clear up their records. It lists the actions most identity theft victims should take
Identity Theft Victim Guide
Becoming the victim of identity theft is an emotionally distressing event in anyone s life. This guide is intended to provide some help by suggesting steps you can take to stop the fraudulent use of your
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES
ONLINE CREDIT REPORTING S SUITE SOLUTIONS MEMBERSHIP GUIDELINES The following procedures are needed to establish your account in order to download three bureau credit reports into your bankruptcy software.
Beware! Identity Theft
STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal
Identity Theft. What it is and How to Protect Yourself
Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Identity Theft
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY
identity theft: How To Safeguard Your Privacy and Keep Your Good Name
identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,
When Fraud Comes Knocking
When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.
