Session 16 Fraud Alert: Avoiding Scholarship Scams, Phishing, and Identity Theft
|
|
|
- Emerald Griffith
- 10 years ago
- Views:
Transcription
1 Session 16 Fraud Alert: Avoiding Scholarship Scams, Phishing, and Identity Theft Cindy Forbes Cameron Steven Horn Natalie Forbort (San Diego) Steven Borders
2 We will answer: What are financial aid fraud, phishing, and identity theft? What has ED done to help prevent further instances? What can FAAs do to help their students avoid these crimes? 2
3 Scholarship Scams Cindy Forbes Cameron Federal Student Aid Awareness & Outreach 3
4 What types of questionable practices are out there? Older schemes: paid search services scholarships for profit Claims made: You can t get this info anywhere else We ll do all the work 4
5 What types of questionable practices are out there? More recent: financial aid seminars general, common-sense info to group, then one-on-one sales pitch claims include the process is too complicated; you need our help 5
6 What types of questionable practices are out there? More recent: payment for FAFSA submission or help not always fraudulent common claims are that student will miss out on maximum aid without help or that the FAFSA is too long and hard to tackle on your own 6
7 What types of questionable practices are out there? Most recent: the ED impostor offer of a grant of up to $8,000 processing fee of $249 can lead to identity theft 7
8 What has ED done about financial aid fraud? Warnings in publications and on Web sites: Student Guide Looking for Student Aid 8
9 What has ED done about financial aid fraud? Warnings at outreach events: counselor conferences college fairs 9
10 What has ED done about financial aid fraud? Report to Congress released annually on May 1 available at (click on Note to counselors and administrators ) 10
11 What has ED done about financial aid fraud? Response to ED impostor scam IFAP announcement, picked up by NASFAA, NACAC, many schools announcements on student and counselor Web sites and in Counselors Handbook script for CSRs at FED-AID warnings on listservs (FAA and counselor) warnings at outreach events ongoing investigation by OIG 11
12 What can FAAs do? Recognize the warning signs Distribute Don t get scammed on your way to college Display Don t get stung! poster Encourage students to talk to you before paying for any help or applications Encourage local high schools to do all of the above 12
13 Phishing Steve Horn Federal Student Aid Office of the Chief Information Officer 13
14 What is phishing? Use of social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials. Typical social engineering schemes use spoofed s to direct users to counterfeit Web sites. Use of spyware, key loggers to capture personal data. 14
15 Dear U.S. Bank Customer, J 6 rampant seventeen polynomial forfeiture weed Truth inflow Murray At U.S. Bank, we take security very seriously. As many customers already know, Microsoft Internet Explorer has significant 'holes' or vulnerabilities that virus creators can easily take advantage of. Good news At U.S. Bank, we maintain your personal information and data according to strict standards of security and confidentiality as described in the Terms and Conditions that govern your use of this site. Online access to your account portfolio is only possible through a secure web browser. Request In order to further protect your account, we have introduced some new important security standards and browser requirements. U.S. Bank security systems require that your computer system is compatible with our new standards. Threat This security update will be effective immediately. Please sign on to U.S. Bank Online Banking in order to verify security update installation. Failure to do so may result in your account being compromised. Anti-spam filter text rhubarb Nelson cord Sincerely, 8 D pawnshop dismal likewise The U.S.Bank Security Department Team. 15
16 What Can be Done? Be suspicious of any with urgent requests for personal financial information Unless is digitally signed, you can't be sure it wasn't forged or spoofed Phishers typically include upsetting or exciting (but false) statements in s to get people to react immediately 16
17 What Can be Done? (continued) They typically ask for info such as usernames, passwords, credit card numbers, Social Security numbers, etc. phisher s are typically NOT personalized, while valid messages from your bank or e-commerce company generally are 17
18 Phishing Prevention Don't use links in an to get to any Web page if you suspect the message might not be authentic instead, call the company on the telephone or log onto its Web site directly by typing in the Web address in your browser 18
19 Phishing Prevention (continued) Avoid filling out forms in messages that ask for personal financial information you should only communicate information such as credit card numbers or account information via a secure Web site or the telephone 19
20 Phishing Prevention Always ensure you're using a secure Web site when submitting credit card or other sensitive information via your Web browser to make sure you're on a secure Web server, check the beginning of the Web address in your browser s address bar - it should be " rather than just " 20
21 Phishing Prevention (continued) Consider installing a Web browser tool bar to help protect you from known phishing fraud Web sites 21
22 Phishing Prevention Regularly log into your online accounts don't leave it for as long as a month before you check each account Regularly check your bank, credit and debit card statements to ensure that all transactions are legitimate if anything is suspicious, contact your bank and all card issuers Ensure that your browser is up to date and security patches applied 22
23 Reporting Phishing Always report phishing or spoofed e- mails to the following groups: Forward the to Forward the to the Federal Trade Commission at 23
24 Reporting Phishing (continued) Forward the to the "abuse" address at the company that is being spoofed (e.g. FSA help desk) When forwarding spoofed messages, always include the entire original with its original header information intact Notify the Internet Fraud Complaint Center of the FBI by filing a complaint on their Web site: 24
25 Other Actions Spam filters Personal firewalls Trust tool bars Spoof protection software 25
26 Other Actions (continued) Always initiate the transaction even if a phishing message is delivered, verify by logging to the home page directly rather than clicking the URL in the When in doubt always first give a wrong password the legitimate URL will reject it; the phished one will accept it 26
27 What has ED done about phishing? The Department of Education is in the process of developing communications to address phishing and pharming. 27
28 Identity theft Natalie Forbort (San Diego) Steven Borders U.S. Department of Education Office of Inspector General 28
29 ED/OIG: Who we are; what we do IG Act, 5 USC, appendix 3 Organizational structure Audits Investigations Other activities Reporting requirements Department Congress every 6 months DOJ and state law enforcement agencies 29
30 Matters of interest to OIG Lying, cheating, and stealing INV: ED programs ID theft/beneficiary fraud Institutional fraud Financial aid consultant fraud Employee corruption An intentional distortion of the truth in an attempt to obtain something of value. Does not have to result in monetary loss. 30
31 Identity Theft What is it? When someone, without lawful authority, knowingly transfers or uses a means of identification of another person with the intent to commit, or aid or abet, any unlawful activity that violates federal law, or that constitutes a felony under any state or local law. Identity Theft and Assumption Deterrence Act of USC 1028a (7) 31
32 A review of the problem What is the problem? Fastest growing crime in the country 25 million victims, 10 million in 2004 Sheer numbers swamp law enforcement 32
33 Further thoughts on the problem What s the harm? 600 hours spent to restore identity and credit $1,400 out-of-pocket costs to victim $16,000 in lost productivity of victim $40,000-$92,000 business community losses per stolen identity Source: Identity Theft Resource Center 33
34 How do they get the information? Dumpster divers Mail thieves Burglary and personal theft Insider compromises Phishing Internet sources and hacking 34
35 How can I protect myself? Place passwords on credit card, bank, & phone accounts Don t use your mother s maiden name, birth date, last 4 digits of SSN, or phone number Secure personal info in your home Shred all documents containing your personal info 35
36 How can I protect myself? (continued) Drop outgoing mail in a USPS box, not your home mailbox Limit the number of credit cards you carry Don t carry your Social Security card 36
37 Web site links Web site provides links to federal and state resources for additional info on ID theft To opt out of prescreened credit card offers by phone, call toll-free OPT-OUT 37
38 Additional Web site links Information on state laws, forms, and prevention checklists for businesses For identity theft brochure re: banking industry 38
39 U.S. Department of Education Office of Inspector General 39
40 School responsibility Report fraud, waste, or abuse to the U.S. Department of Education, Office of Inspector General 40
41 School responsibility (Continued) 34 CFR Examples of this type of information are 2. (i) false claims of independent student status; (ii) false claims of citizenship; (iii) use of false identities; (iv) forgery of signatures or certifications; and (v) false statements of income; and 41
42 School responsibility (Continued) 3. Any credible information indicating that any employee, third-party servicer, or other agent of the institution that acts in a capacity that involves the administration of the Title IV, HEA programs, or the receipt of funds under those programs, may have engaged in fraud 42
43 20 U.S.C [Title IV, HEA] Any person who knowingly and willfully embezzles, misapplies, steals, obtains by fraud, false statement or forgery, or fails to refund any funds, assets, or property provided or insured under [Title IV, HEA] or attempts to so embezzle, misapply, steal, obtain by fraud, false statement or forgery, or fail to refund any funds, assets, or property, shall be fined or imprisoned 43
44 Tools used to commit identity theft of federal student aid funds computer online application process for FSA funds online enrollment identity of another person fake identification documents 44
45 Tools used to commit identity theft of federal student aid funds Selection of community colleges due to low tuition cost Bank accounts set up in name of identity to receive FSA funds Understanding of vulnerabilities of FSA programs 45
46 Identity theft FSA scheme recent cases How matter was referred to our office Importance of working with financial aid officials Receiving referrals Case information How scheme occurred and results 46
47 Lessons learned FSA programs are easily vulnerable to ID theft due to lack of in-person attendance or receipt of FSA Subjects have extensive criminal records for theft or violent crimes Community colleges susceptible due to low tuition and multiple locations Victims of FSA fraud do not find out immediately 47
48 Lessons learned Easier to identify extent of fraud scheme through search warrants subjects keep records of identities Need cooperation of FAAs and other agencies Ease of obtaining $ for multiple subjects at same address Individuals are often involved in credit card and other program fraud 48
49 Protecting others from identity theft Properly handle documents Shred sensitive info Use key identifiers instead of the SSN Password-protect sensitive info Audit access Review access privileges View info on computers in the same manner as paper documents is it secure? 49
50 Reducing risk We never know who is looking in our trash Shred sensitive documents Secure shred barrels and make sure that proper handling procedures are in place 50
51 OIG Misused Web site Protect your Social Security number and other personal information. Don t let identity thieves rob you of your educational future! Inspector General John P. Higgins, Jr. 51
52 Thank you We appreciate your feedback and comments. Cindy Forbes Cameron Srinivas Kankanahalli Phone: (202) Natalie Forbort Phone: (562) Steven Borders 52
OIG Fraud Alert Phishing
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a
Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
DVD Companion Learning Guide
DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
http://www.bankonline.com/checking PHISHING & PHARMING Helping Consumers Avoid Internet Fraud Federal Reserve Bank of Boston
http://www.bankonline.com/checking http://www.bankonline.com/checking http://www.bankonline.com/checking PHISHING & PHARMING Helping Consumers Avoid Internet Fraud Federal Reserve Bank of Boston http://www.bankonline.com
IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09
IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do
How To Get A Free Credit Report From A Credit Report Website
FACTS FOR OLDER CONSUMERS National Consumer Law Center Protect Yourself From Identity Theft Identity theft is one of the fastest growing crimes in the country. It can strike anyone, but elders may be particularly
Identity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
I dentity theft occurs
1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,
PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit
PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account
Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.
Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause
SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
E-MAIL & INTERNET FRAUD
FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud
INTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
When Fraud Comes Knocking
When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT
Avoid completing forms in email messages that ask for personal financial information.
INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus
Corona Police Department
By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,
Identity Theft. Emergency Repair Kit
Identity Theft Emergency Repair Kit 2012 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Any duplication or reproduction is strictly prohibited. Identity Theft Emergency Repair
Fraud Prevention Tips
Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
Cobblestone Capital Advisors. Identity Theft: What You Should Know
Cobblestone Capital Advisors Identity Theft: What You Should Know WHAT YOU SHOULD KNOW: Identity theft the stealing and fraudulent use of a person s personal or financial information has been a hot topic
Remote Deposit Quick Start Guide
Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you
Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT IT S POSSIBLE@ PROTECT YOUR IDENTITY protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IT S POSSIBLE @ What Is Identity Theft? According to the FBI, identity theft is the fastest
Credit Card Fraud Training
Credit Card Fraud Training Lesson Plan A Consumer Action Publication Consumer Action created this project in partnership with Chase 2009 Consumer Action Credit Card Fraud Training Lesson Plan (For the
Identity Theft Problem and Solutions
Identity Theft Problem and Solutions October 7, 2011 Michigan Cyber Summit 2011 Jon Miller Steiger Regional Director The views expressed are those of the speaker and not necessarily those of the FTC or
Protecting Yourself from Identity Theft
identity theft unit new york county district attorney s office Protecting Yourself from Identity Theft cyrus r. vance, jr. district attorney 5 / 2010 questions and answers Dear Friends, cyrus r. vance,
Refuse to be a target of identity crime.
Refuse to be a target of identity crime. Protecting the Real You and Only You. The International Association of Chiefs of Police 515 N. Washington Street, Alexandria, VA 22314 Telephone: 1.800.843.4227
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
Citi Identity Theft Solutions
Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
Identity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT
PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center
IDENTITY THEFT: MINIMIZING YOUR RISK
IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social
Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:
financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index
What is Identity Theft?
What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.
Protect Yourself Against Identity Theft
Protect Yourself Against Identity Theft Watch out for Phishing Attacks! A Message from District Attorney P. David Soares Dear Friends, In the age of the Internet, the information highway runs right into
ID THEFT: What It s All About
ID THEFT: What It s All About Federal Trade Commission June 2005 Dear Consumer: The Federal Trade Commission has published this booklet to help raise awareness of identity theft. We encourage you to share
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
Information to Protect Our Customers From Identity Theft
Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns
When visiting online banking's sign-on page, your browser establishes a secure session with our server.
The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption
How to Prevent It What to Do If You Are a Victim
How to Prevent It What to Do If You Are a Victim www.tn.gov/consumer www.tn.gov/safety Tennessee Division of Consumer Affairs Identity theft happens when someone steals your personal information and uses
Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank
Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of
Reclaiming your identity
Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Regions Identity Theft Kit
Regions Identity Theft Kit How to protect yourself from identity theft, and what to do if you suspect you may be a victim. 2015 Regions Bank. Member FDIC. Index Introduction... 2 What Is Identity Theft?...
Identity Theft, Fraud & You. Prepare. Protect. Prevent.
Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the
Fraud and Identity Theft. Megan Stearns, Credit Counselor
Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention
Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud
Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Marc Standig Enrolled Agent What is tax-related identity theft? Tax-related identity
Advice about online security
Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP
EL/Civics Lesson Plan
Program Name Staff Responsible for Lesson MVCTC EL/Civics Program Mary Ann Oatney Date(s) Used 11/2007 Civics Category Civics Objective Time Frame to Complete Lesson EFL(s) II. Civics Participation II.
the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you
Identity theft is a terrible problem in this Information Age. You have already taken the first important step by contacting ACNB Bank immediately. ACNB Bank will work with you every step of the way to
Dear Consumer, What's in this packet: Identity Theft Victim Checklist Identity Theft Victim Worksheet Sample Letters
Dear Consumer, Sometimes an identity thief can strike even if you ve been very careful about protecting your personal information. If you suspect that your personal information has been stolen and used
IRS & Partners Combat Tax-Related Identity Theft What s New for 2016
IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 General Scope of Identity Theft Identity theft costs U.S. victims more than all property crimes combined Identity theft remains number
How To Get Help From The Police Department
IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification
Protect Yourself From Identity Theft
Protect Yourself From Identity Theft Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social
Criminal Investigation
Criminal Investigation Stolen Identity Refund Fraud (SIRF) Nneka Sutherland Special Agent (267) 941 6281 [email protected] Joseph Carl Special Agent (267) 941 6117 [email protected] IRS
Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
Corporate Account Take Over (CATO) Guide
Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,
According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection
According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government
Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA
Taxpayer Guide to Identity Theft Protect yourself By Beatriz Landa-Sanchez, EA What is tax-related identity theft? Tax-related identity theft occurs when someone uses your stolen Social Security number
Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity
PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity Identity fraud occurs anytime your personal information is used without your authority and is more than just credit card
Identity Theft Grade Level 10-12
Identity Theft Grade Level 10-12 Take Charge of Your Finances Materials provided by: Karen Dawson, Family and Consumer Sciences Educator, Skyview High School, Billings, Montana Time to complete: 75 minutes
FINANCIAL CRIMES. Lesson Plan and Course Outline. INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts
FINANCIAL CRIMES Lesson Plan and Course Outline Instructor Detective Kelly Smith Method of Presentation Lecture Duration 8 Hours Trainee Equipment/Materials Note taking material INSTRUCTOR EQUIPMENT/MATERIALS
