1 / 18

Identity Theft Solutions

Identity Theft Solutions. Introduction.

Download Presentation

Identity Theft Solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity Theft Solutions

  2. Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the top of the list since that time according to the Federal Trade Commission. As a result, many employers have taken action to limit the information they provide to others, both internal and external, regarding records they maintain on employees. The federal government and state governments are also legislating privacy laws and regulations on the use and display of important personal data, i.e., Social Security numbers, employee health information and the destruction of some forms of employee records in the face of escalating identity theft problems. This presentation provides an overview of the importance of maintaining the confidentiality of personal information. This is a sample presentation that must be customized to include and match the employer’s own policies and practices.

  3. Objective • To educate everyone to become “aware” as consumers • Help everyone understand the importance of maintaining “confidentiality” of their personal information • Identify resources available to assist in the event of ID theft

  4. Common Perils Data thieves are smart and resourceful • Dumpster diving • Accessing credit reports • Phishing/Skimming • Spying – PIN entry • Stealing/redirecting mail Scams leading to ID theft can be done anywhere, any time

  5. Typical Outcomes - $$$$$$$$$$$$$ • Charging to YOUR current accounts and opening new ones • Writing stolen or fake or altering checks • Siphoning checking/savings accounts • Borrowing for large ticket items

  6. Protecting Personal Information • Keep personal information safe • Use complex passwords (alpha-numeric) • Protect mail • Use extreme caution in sharing any personal information online and on phones • Promptly take action on reporting discrepancies • Never carry your Social Security Card unless absolutely necessary

  7. Protect Credit/Debit Card Information • Review statements received and shred statements at appropriate intervals and all unsolicited offers • Opt out of offers • Close unused accounts • Carry only cards to be used

  8. Checking Accounts • Keep check book/checks in secure locations • Check/balance statements • Don’t provide checking account info - online - over the phone

  9. Protect Computer • Update virus protection • Don’t open files from unknown sources • Look for lock icon and “https” before entering information • Use complex passwords • Use a firewall • Erase computer hard drive before disposing of computers and destroy peripheral storage devices before disposal

  10. Consumer Protection Laws • Fair Credit Reporting Act - provides limited access to credit reports - requires credit bureaus to accuracy • FACT Act - provides for free credit reports - ensures improved safeguards from ID theft and disclosure

  11. Credit Protection Services • Fee-based services or insurance can be valuable but be wary of scams • ID theft insurance services • Weigh cost v. benefit

  12. ID Theft Recovery Practices • Review statements • Promptly contact financial institution(s) to note errors/discrepancies • Close or cancel accounts • Stop payments on outstanding checks • Establish new account numbers and passwords

  13. ID Theft Recovery Practices (continued) • Report crime to local police • Get a copy of the police report • Notify postal service if mail was involved • Notify Social Security Administration if SSN was used • Notify DMV if driver’s license number was used

  14. ID Theft Recovery Practices (continued) • Obtain credit bureau reports • Place fraud alerts on reports • Check reports at least quarterly for a period of one year and later, annually • Promptly dispute any discrepancies

  15. ID Theft Recovery-Recordkeeping • Keep records/notes/copies of all contact information - names - dates - follow up notes • Maintain copies of all documentation

  16. Online Resources • Federal Trade Commission ID Theft Page http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/index.html • National Conference of State Legislatures (links to state laws) http://www.ncsl.org/IssuesResearch/BankingInsuranceFinancialServices/IdentityTheftStateStatutes/tabid/12538/Default.aspx • Privacy Rights Clearinghouse FAQ’s http://www.privacyrights.org/fs/fs17d-FAQ-IdTheft-070510.htm

  17. Questions? Comments?

  18. Course Evaluation Please be sure to complete and leave the evaluation sheet you received with your handouts. Thank you for your attention and interest!

More Related