San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX



Similar documents
ROCKWALL POLICE DEPARTMENT CRIMINAL INVESTIGATIONS DIVISION 205 W. Rusk St. Rockwall, Texas (972)

What follows are various form letters that can be adapted to your

York County Sheriff's Office Identity Theft Victim s Packet

Identity Theft Victim s Packet

Identity Theft Packet

Lake County Sheriff s Office Identity Theft/Fraud Packet

Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet

Selected Text of the Fair Credit Reporting Act (15 U.S.C v) With a special Focus on the Impact to Mortgage Lenders

Identity Theft Victim s Packet

West Palm Beach Police Department s Identity Theft Victim s Packet

Identity Theft Victim s Packet

Identity Theft Victim s Packet

BUSINESS AND COMMERCE CODE PERSONAL IDENTITY INFORMATION UNAUTHORIZED USE OF IDENTIFYING INFORMATION

How To Get A Credit Card From A Fraudulent Account

Investigation and Prosecution of Identity Theft

Plymouth Township Police Department s Identity Theft Victim s Packet

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ

IDENTITY THEFT VICTIM S PACKET

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

Section Fraud and related activity in connection with identification documents and information

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

Milford Police Department

Huron County Juvenile Court

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

UINTA COUNTY, WYOMING DATASHEET NSF/ACCOUNT CLOSED CHECK REPORTING PACKET

Chapter No. 911] PUBLIC ACTS, CHAPTER NO. 911 HOUSE BILL NO. 3403

HP0868, LD 1187, item 1, 123rd Maine State Legislature An Act To Recoup Health Care Funds through the Maine False Claims Act

How To Prevent Identity Theft

CALIFORNIA FALSE CLAIMS ACT GOVERNMENT CODE SECTION

MINNESOTA FALSE CLAIMS ACT

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

1611 E. PFENNIG LN., P.O. BOX 679 PFLUGERVILLE, TEXAS PFLUGERVILLE POLICE DEPARTMENT INSTRUCTIONS

BURNET COUNTY ATTORNEY S OFFICE Don't Get Burned By A Hot Check

McLEOD COUNTY DISHONORED CHECKS PACKET

SENATE FILE NO. SF0083. Senator(s) Peterson and Representative(s) Harvey A BILL. for. AN ACT relating to Medicaid; creating the Wyoming Medicaid

NOTICE TO GRANDPARENT

IDENTITY THEFT PACKET

BILL ANALYSIS. C.S.S.B By: Wentworth Civil Practices Committee Report (Substituted) BACKGROUND AND PURPOSE

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

Senate Bill No. 38 Committee on Transportation and Homeland Security

Appendix L: Nebraska s False Medicaid Claims Act Nebraska Statues Chapter 68 November 2013 Section Terms, defined.

3. The Check Writer must NOT have asked the acceptor to HOLD or DELAY DEPOSIT of the check, even for a very brief period of time.

STATE OF NEW JERSEY. SENATE, No th LEGISLATURE. Sponsored by: Senator JEFF VAN DREW District 1 (Cape May, Atlantic and Cumberland)

HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES

Instructions for Pistol Permit Applicants. If you have any questions call

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

Chapter No. 367] PUBLIC ACTS, CHAPTER NO. 367 HOUSE BILL NO By Representatives Briley, Hargett, Pleasant

Instructions. STOP: This form is NOT to be used for Credit/or Debit card

The Pima County Attorney s Office Bad Check Program Guidebook

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009

Federal & State Criminal Background Check. Consent to Fingerprint Background Check

(1) Claim means a written or electronically submitted request or demand that:

RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009

Minnesota False Claims Act

MINNESOTA FALSE CLAIMS ACT. Subdivision 1. Scope. --For purposes of this chapter, the terms in this section have the meanings given them.

Employment Application

Solicitor Permit Application

How to Clear an Arrest from Your Record in Texas (Expunction)

Diversion/Accountability Worthless Check Program RESTITUTION GUIDE FOR MERCHANTS AND RESIDENTS

Duncanville Police Department Identity Theft Information

Identity Theft Information and Affidavit

11 HB 87/CSFA A BILL TO BE ENTITLED AN ACT

Leander Police Department 705 Leander Dr Leander, Texas (512)

For the protection of your personal identifying information, we require you mail or deliver this completed packet and all supporting documentation to:

Grandparent s Power of Attorney Information and Forms

NEW YORK FALSE CLAIMS ACT

New York Finger Lakes Identity Theft Coalition. Identity Theft Kit. for Victims of Identity Theft

WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information

BILL ANALYSIS. Senate Research Center C.S.S.B By: Wentworth Jurisprudence 4/5/2007 Committee Report (Substituted)

Broward County False Claims Ordinance. (a) This article shall be known and may be cited as the Broward County False Claims Ordinance.

Senate Bill No. 86 Committee on Transportation and Homeland Security

INSTRUCTIONS PETITION FOR EXPUNGEMENT OF CRIMINAL RECORDS PROVIDED UNDER W.VA. CODE

POWER OF ATTORNEY., the parent(s), the undersigned, residing at, in the county of, state of, hereby appoint the child s

NAME CHANGES IN TEXAS

California s Alternative Sentencing Law for Veterans and Members of the U.S. Military

Representing Whistleblowers Nationwide

Certified Process Server APPLICANT CHECKLIST

REPORTING REQUIREMENTS

CHARTER SIGHTSEEING LICENSE APPLICATION

Resolving Consumer Identity Theft for Foster Youth 2013 Edition

Identity Theft Affidavit

A Bill Regular Session, 2015 SENATE BILL 830

VICTIM COMPENSATION APPLICATION

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor

ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, Complaints (2007) Updated November 30, 2008

GOVERNMENT PROSECUTIONS AND QUI TAM ACTIONS

Ohio Victims of Crime Compensation Program

Child Abduction Unit Request for Investigation Summary

Grandparent Power of Attorney (POA) Checklist

Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES

The Rosenthal Fair Debt Collection Practices Act California Civil Code 1788 et seq.

Instructions for Sealing a Criminal Record. (Expungement)

CITY OF SALINA MUNICIPAL COURT DIVERSION INFORMATION AND APPLICATION

New York Consolidated Law Service General Business Law Article 25 - Fair Credit Reporting Act

INFORMATION ABOUT THE RECOVERY FUND PROCESS

*****THIS FORM IS NOT A PROTECTIVE ORDER APPLICATION OR A PROTECTIVE ORDER*****

OFFICE OF THE DISTRICT ATTORNEY Third Judicial District Of Kansas Chadwick J. Taylor, District Attorney

St. George Police Department

Transcription:

San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX Identity Theft Packet SAPD case # Assigned Detective: The San Antonio Police Department Forgery Unit is the follow-up unit for Identity Theft. If you have not made a police report, you can make one over the phone or have an officer dispatched to your home by calling 210-207-7273. Specific documentation is needed in order to prosecute identity theft cases. This packet will guide you in gathering and submitting the required documentation so that your complaint can be reviewed and handled in the most efficient manner possible. The information requested herein is the minimum required for successful investigation and prosecution. More information may be required. It is important that all forms contained within this packet be completed and returned. Identity theft is a serious and time-consuming matter, demanding your full cooperation and patience. Once you have completed the attached packet, please send it to the Forgery Unit of the San Antonio Police Department. Your packet will be reviewed for solvability factors that will determine if the case will receive further investigation by the assigned detective. Texas law regarding identity theft and Fair Credit Reporting Act law related to gathering documentation are both included in this packet to aid you in understanding the criminal charge and gathering required documentation. Use the following Identity Theft Packet Checklist as a guide in completing your packet. Attach photocopies (no originals please) of all related reports, documents or other paperwork that may have bearing on this matter. If you have any questions, please call the Forgery Unit at the numbers listed above. Identity Theft Packet Checklist: SAPD Case Number Completed ID Theft Packet Full Credit Reports (unedited, do not delete or black out anything) Affidavit/Statement Fraudulent application and supporting documentation Page 1 of 8

Victim Affidavit/Statement STATE OF TEXAS COUNTY OF Page of My name is and I am years old. I was born on This affidavit is made voluntarily for the purpose of establishing that I did not use, nor did I authorize anyone else to possess, transfer or use my identifying information to harm, defraud, or obtain money, goods, services or other thing of value. I am providing the following statement of facts regarding this incident: List all fraudulent accounts and write a statement of what happened: Account Account No. Date Opened Estimated Balance I have read my statement and it is true and correct. I will appear in court and testify to the facts in this case if necessary. Signature Sworn to and subscribed before me this day of, 20. SEAL Notary Public (Statement Information Supplement must be included with this statement) Page 2 of 8

San Antonio Police Department Statement Information Supplement Note: This information is strictly confidential and only for Police and District Attorney s official records. Name: (Last, First, Middle) Home Address: (number, street, city, zip) Business Address: (number, street, city, zip) Home Phone: Work Phone: Cell Phone: Race: SEX: AGE: DOB: Married YES: NO: Name of Spouse: Drivers License # (state & number) NEAREST RELATIVE OTHER THAN SPOUSE: Name: Phone: Address: City: State: Place of Employment: Phone: Page 3 of 8

Page 4 of 8

Texas Law for Identity Theft Sec. 32.51. FRAUDULENT USE OR POSSESSION OF IDENTIFYING INFORMATION. (a) In this section: (1) "Identifying information" means information that alone or in conjunction with other information identifies a person, including a person's: (A) name and date of birth; (B) unique biometric data, including the person's fingerprint, voice print, or retina or iris image; (C) unique electronic identification number, address, routing code, or financial institution account number; (D) telecommunication identifying information or access device; and (E) social security number or other government-issued identification number. (2) "Telecommunication access device" means a card, plate, code, account number, personal identification number, electronic serial number, mobile identification number, or other telecommunications service, equipment, or instrument identifier or means of account access that alone or in conjunction with another telecommunication access device may be used to: (A) obtain money, goods, services, or other thing of value; or (B) initiate a transfer of funds other than a transfer originated solely by paper instrument. (b) A person commits an offense if the person, with the intent to harm or defraud another, obtains, possesses, transfers, or uses an item of: (1) identifying information of another person without the other person's consent; (2) information concerning a deceased natural person, including a stillborn infant or fetus, that would be identifying information of that person were that person alive, if the item of information is obtained, possessed, transferred, or used without legal authorization; or (3) identifying information of a child younger than 18 years of age. Page 5 of 8

(b-1) For the purposes of Subsection (b), the actor is presumed to have the intent to harm or defraud another if the actor possesses: (1) the identifying information of three or more other persons; (2) information described by Subsection (b)(2) concerning three or more deceased persons; or (3) information described by Subdivision (1) or (2) concerning three or more persons or deceased persons. (b-2) The presumption established under Subsection (b-1) does not apply to a business or other commercial entity or a government agency that is engaged in a business activity or governmental function that does not violate a penal law of this state. (c) An offense under this section is: (1) a state jail felony if the number of items obtained, possessed, transferred, or used is less than five; (2) a felony of the third degree if the number of items obtained, possessed, transferred, or used is five or more but less than 10; (3) a felony of the second degree if the number of items obtained, possessed, transferred, or used is 10 or more but less than 50; or (4) a felony of the first degree if the number of items obtained, possessed, transferred, or used is 50 or more. (c-1) An offense described for purposes of punishment by Subsections (c)(1)-(3) is increased to the next higher category of offense if it is shown on the trial of the offense that: (1) the offense was committed against an elderly individual as defined by Section 22.04; or (2) the actor fraudulently used identifying information with the intent to facilitate an offense under Article 62.102, Code of Criminal Procedure. (d) If a court orders a defendant convicted of an offense under this section to make restitution to the victim of the offense, the court may order the defendant to reimburse the victim for lost income or other expenses, other than attorney's fees, incurred as a result of the offense. Page 6 of 8

How to obtain fraudulent documentation FCRA 609(e) (15 U.S.C. 1681g(e)) DISCLOSURES TO CONSUMERS-INFORMATION AVAILABLE TO VICTIMS (e) Information available to victims (1) In general. For the purpose of documenting fraudulent transactions resulting from identity theft, not later than 30 days after the date of receipt of a request from a victim in accordance with paragraph (3), and subject to verification of the identity of the victim and the claim of identity theft in accordance with paragraph (2), a business entity that has provided credit to, provided for consideration products, goods, or services to, accepted payment from, or Otherwise entered into a commercial transaction for consideration with, a person who has allegedly made unauthorized use of the means of identification of the victim, shall provide a copy of application and business transaction records in the control of the business entity, whether maintained by the business entity or by another person on behalf of the business entity, evidencing any transaction alleged to be a result of identity theft to-- (A) the victim; (B) any Federal, State, or local government law enforcement agency or officer specified by the victim in such a request; or (C) any law enforcement agency investigating the identity theft and authorized by the victim to take receipt of records provided under this subsection. (2) Verification of identity and claim. Before a business entity provides any information under paragraph (1), unless the business entity, at its discretion, otherwise has a high degree of confidence that it knows the identity of the victim making a request under paragraph (1), the victim shall provide to the business entity (A) as proof of positive identification of the victim, at the election of the business entity-- (i) the presentation of a government-issued identification card; (ii) personally identifying information of the same type as was provided to the business entity by the unauthorized person; or (iii) personally identifying information that the business entity typically requests from new applicants or for new transactions, at the time of the victim s request for information, including any documentation described in clauses (i) and (ii); and (B) as proof of a claim of identity theft, at the election of the business entity-- (i) a copy of a police report evidencing the claim of the victim of identity theft; and (ii) a properly completed copy of a standardized affidavit of identity theft developed and made available by the Commission; or an [FN1] affidavit of fact that is acceptable to the business entity for that purpose. (3) Procedures. The request of a victim under paragraph (1) shall (A) be in writing; (B) be mailed to an address specified by the business entity, if any; and (C) if asked by the business entity, include relevant information about any transaction alleged to be a result of identity theft to facilitate compliance with this section including-- if known by the victim (or if readily obtainable by the victim), the date of the application or transaction; and if known by the victim (or if readily obtainable by the victim), any other identifying information such as an account or transaction number. Page 7 of 8

(4) No charge to victim. Information required to be provided under paragraph (1) shall be so provided without charge. (5) Authority to decline to provide information. A business entity may decline to provide information under paragraph (1) if, in the exercise of good faith, the business entity determines that-- (A) this subsection does not require disclosure of the information; (B) after reviewing the information provided pursuant to paragraph (2), the business entity does not have a high degree of confidence in knowing the true identity of the individual requesting the information; (C) the request for the information is based on a misrepresentation of fact by the individual requesting the information relevant to the request for information; or (D) the information requested is Internet navigational data or similar information about a person s visit to a website or online service. (6) Limitation on liability. Except as provided in section 1681s of this title, sections 1681n and 1681o of this title do not apply to any violation of this subsection. (7) Limitation on civil liability. No business entity may be held civilly liable under any provision of Federal, State, or other law for disclosure, made in good faith pursuant to this subsection. (8) No new recordkeeping obligation. Nothing in this subsection creates an obligation on the part of a business entity to obtain, retain, or maintain information or records that are not otherwise required to be obtained, retained, or maintained in the ordinary course of its business or under other applicable law. (9) Rule of construction (A) In general. No provision of subtitle A of title V of Public Law 106-102, prohibiting the disclosure of financial information by a business entity to third parties shall be used to deny disclosure of information to the victim under this subsection. (B) Limitation. Except as provided in subparagraph (A), nothing in this subsection permits a business entity to disclose information, including information to law enforcement under subparagraphs (B) and (C) of paragraph (1), that the business entity is otherwise prohibited from disclosing under any other applicable provision of Federal or State law. (10) Affirmative defense. In any civil action brought to enforce this subsection, it is an affirmative defense (which the defendant must establish by a preponderance of the evidence) for a business entity to file an affidavit or answer stating that-- (A) the business entity has made a reasonably diligent search of its available business records; and (B) the records requested under this subsection do not exist or are not reasonably available. (11) Definition of victim. For purposes of this subsection, the term victim means a consumer whose means of identification or financial information has been used or transferred (or has been alleged to have been used or transferred) without the authority of that consumer, with the intent to commit, or to aid or abet, an identity theft or a similar crime. Page 8 of 8