Download
identity theft n.
Skip this Video
Loading SlideShow in 5 Seconds..
Identity Theft PowerPoint Presentation
Download Presentation
Identity Theft

Identity Theft

161 Views Download Presentation
Download Presentation

Identity Theft

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Identity Theft Geek Weight Lifter

  2. What is it? • Account Takeover • Application Fraud • Cell Phone Fraud • Criminal Identity Theft • Scams and Fraud Sources:http://www.privacyrights.org/fs/fs17-it.htm#crime

  3. What Happens to You? • Credit Cards - Often responsible for the first $50 of loss (Truth in Lending Act, Fair Credit Billing Act, 15 USC sec. 1601) • Debit card users have less protection. Your checking account can be wiped out and you may be liable for the entire. (Electronic Funds Transfer Act, 15 USC sec. 1693) • Criminal Identity Theft you get arrested and are responsible for insuring that criminal records are revised to restore your innocent status • For more about credit card and debit card laws, read the Federal Reserve's Consumer Handbook, www.federalreserve.gov/pubs/consumerhdbk. Source: http://www.privacyrights.org/fs/fs17-it.htm#crime

  4. How do they get it? • "Dumpster diving" in trash bins for unshredded credit card and loan applications and documents containing SSNs. • Stealing mail from unlocked mailboxes to obtain newly issued credit cards, bank and credit card statements, pre-approved credit offers, investment reports, insurance statements, benefits documents, or tax information. Unfortunately, even locked mailboxes may not stop the most determined thief. • Finding identifying information on Internet sources, via public records sites and fee-based information broker sites. • No help from corporations Source: http://www.privacyrights.org/fs/fs17-it.htm#crime

  5. Choicepoint • 19 billion records • Its customers include employers, debt collectors, loan officers, media organizations, law offices, law enforcement, among others. • ChoicePoint compiles data from many sources including public records (court records, property tax assessor files, professional licenses, vehicle registration, bankruptcy records, and so on), along with credit reports, and consumer demographic and lifestyle data. • tenant rental history includes landlord debt, criminal, eviction, registered sex offender and FBI searches. • Their employment background check report includes information on arrest and conviction history including fugitive files, state and county criminal record repositories, prison, parole and release files from state Department of Corrections, Administrative Office of Courts and other state agencies, in addition to credit history, employment verification, education verification, license credentials and certification verification, and business or personal reference verification. See what they have on you!

  6. How Much is There? As of September, 2007 166,021,210 Records stolen Because companies don’t protect your information

  7. Watch out for ATMsDon’t let anyone watch over your shoulder

  8. Phishing • Test your understanding • Get updates on the latest

  9. Reduce Access to your Personal Data • Do not carry anything with your social security number or extra credit cards, passport, or birth certificate around • Remove your name from marketing lists • Sign up on the Do Not Call Registry • Opt out of sharing of your financial information ( privacy notices) • Send bills in post office boxes, not outside your house

  10. Handle your Information Responsibly • Carefully review your financial and phone statements • Convert bill paying to automatic deductions • Shred pre-approved credit offers • Use gel pens when writing checks • Store your statements and other financial information in a locked space

  11. Passwords and PINs • Do not use any name or number central to your life (birthday, pet name) • Mix letters and numbers – better if they make no sense • Use reminder questions that no one would guess (elementary school) • Don’t let people see you type in your password

  12. Safeguards on Your Computer and the Internet • Use a firewall and a router on your home computer • Keep virus and spyware protection updated and use it regularly • Password protect financial files • Do not use file sharing programs • Don’t be a sucker to phishing or other scams

  13. Careful with your Social Security Numbers • This is required for tax forms, employment, and banking – otherwise “NO” • If the government asks, check for a privacy policy • Use alternative numbers on your driver’s license • Do not give to merchants for check verification • If it is on a health card, carry a copy and cut out the SS#

  14. Credit • Do not use debit cards online • Limit the number you have and do not carry them • Watch what waitstaff does with your card • Keep a list of all cc#, phone numbers and expiration dates • Never give out any numbers unless YOU initiated the transaction • Do not throw out receipts in a public trash can

  15. Are you at risk? IQ Test What is your Safety Score? What do you do?

  16. Credit Reporting Agencies PhoneOnline Equifax (888) 766-0008 www.equifax.com Experian (888) EXPERIAN (397-3742) www.experian.com TransUnion (800) 680-7289 www.transunion.com

  17. What to Do • Check your credit report 3 times a year • Remove your name from marketing lists • 888-5optout • Sign up on the National Do Not Call Registry • www.donotcall.gov or 888-382-1222 • Remove your name from state lists http://www.ftc.gov/bcp/conline/edcams/donotcall/statelist.html • Have your name removed from the phone book and reverse directories • Report any false charges to the police • File a Federal Affidavit