1 / 29

IDENTITY THEFT

IDENTITY THEFT. Presented By: Harry Kohal Past President Wisconsin Association Computer Crime Investigators www.wacci.org. WHAT IS IDENTITY THEFT?.

mara-peters
Download Presentation

IDENTITY THEFT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IDENTITY THEFT Presented By: Harry Kohal Past President Wisconsin Association Computer Crime Investigators www.wacci.org

  2. WHAT IS IDENTITY THEFT? • Illegally using another person’s name, Social Security number, driver’s license number, birth certificate, credit card, address, telephone number or any other form of identifying information to obtain credit, money, goods, services or anything else of value without that person’s consent.

  3. SCOPE OF THE PROBLEM • Fastest growing crime in America (300% yr.) • Perceived: low risk & high profit • Further facilitates other crimes • Increasing gang involvement • 750,000 victims per year • 80% goes unreported

  4. Your Company Has an Identity TOO! ChoicePoint --- 145,000 customers 11-9 -2/16/05 BofA --- 1,200,000 customers 2/25/05 University of Chicago -85 patients 2/20/05 Hospitals YOUR COMPANY TODAY ? TOMORROW?

  5. ARE YOU AT RISK FOR BECOMING AN IDENTITY THEFT VICTIM? • Test Your Identity Theft AwarenessSource: Privacy Rights Clearinghouse

  6. ARE YOU AT RISK….? • You receive several offers of pre-approved credit every week. 5 Points • Add 5 more points if you do not shred them before putting them in the trash. • You carry your Social Security card in your wallet. 5 Points • You do not have a PO Box or locked, secure mailbox. 5 Points

  7. ARE YOU AT RISK….? • You use an unlocked, open mailbox at work or at home to drop off outgoing mail. 10 Points • You carry your military ID in your wallet at all times. 10 Points • You do not shred or tear banking and credit information when you throw it in the trash. 10 Points

  8. ARE YOU AT RISK….? • You provide your Social Security Number whenever asked, without asking how that information will be used or safeguarded. 10 Points • Add 5 Points if you provide your SSN orally without checking to see who may be listening. • You are required to use your SSN at work as an employee or student ID number. 5 Points

  9. ARE YOU AT RISK….? • You have your SSN printed on your employee badge that you wear at work or in the public. 10 Points • You have your SSN or driver’s license number printed on your personal checks. 20 Points • You are listed in a “Who’s Who” guide. 5 Points

  10. ARE YOU AT RISK….? • You carry your insurance card in your wallet or purse and either your SSN or that of your spouse is the ID number. 20 Points • You have not ordered a copy of your credit report for at least two years. 10 Points • You do not believe that people would go through your trash looking for credit or financial information. 10 Points

  11. HOW YOU RATE • 100 Points – High Risk • 50 to 100 Points – Your odds of becoming a victim are about average. Higher if you have good credit. • 0 to 50 Points – Congratulations, you have a “High IQ.” Keep up the good work and don’t let your guard down.

  12. YOUR COMPANY HAS THE SAME RISKS • Identity Theft • Phone and Utility Theft • Bank Fraud • Employment Fraud • Pornography/Child Porn • Software Theft

  13. ELEMENTS OF THE CRIME • Whoever intentionally uses or attempts to use any personal identifying information or personal identification document of an individual to obtain credit, money, goods, services or anything else of value without the authorization or consent of the individual and by representing that he or she is the individual or is acting with the authorization or consent of the individual.

  14. PERSONAL IDENTIFYING INFORMATION….. • Individual’s social security number • Individual’s employer or place of employment • Identification number assigned to an individual by his/her employer • Maiden name of an individual’s mother • Identifying number of a depository account

  15. PENALTY • Class D felony • Fine not to exceed $10,000 or imprisonment not to exceed 10 years, or both

  16. HOW THIEVES OBTAIN PERSONAL INFORMATION • Theft of wallet or purse • “Dumpster Diving” • Inside sources • Mail theft • Online data • Submitting change of address forms • Finding personal information while inside your home • Shoulder surfing or eavesdropping

  17. HOW THIEVES OBTAINCORPORATE INFORMATION • Theft of checks or other instruments • “Dumpster Diving” • Inside sources • Mail theft • Online data • Submitting change of address forms • Finding corporate information while inside your company • Shoulder surfing or eavesdropping

  18. HOW THIEVES USE PERSONAL INFORMATION • Open credit card accounts (43%) • Start up phone and/or utility service (21%) • Bank fraud (14%) • Employment (illegal aliens) (8%) • Purchase vehicle w/ fictitious loan • Evade citation, arrest, criminal record • Illegal entry into U.S. • Sky is the limit! Limited only to the imagination & greed of the thief

  19. WHAT TO DO IF YOU BECOME A VICTIM • Contact the fraud department from each of the 3 credit bureaus: Experian, 888-397-3742 Equifax, 800-525-6285 Trans Union, 800-680-7289 • Obtain a free copy of your credit report and review it • Place fraud alert and a victim statement asking creditors to contact you

  20. WHAT TO DO IF YOUR COMPANY IS THE VICTIM • Contact Law Enforcement • Implement Your Disaster/Recovery Plan • Decide who will be informed and contacted • Media or Not? Work with Law Enforcement

  21. WHAT TO DO IF YOU BECOME A VICTIM….. • Contact local law enforcement to report crime • Contact creditors for any fraudulent accounts opened or tampered • Report crime to Postal Inspector if mail involved • Document and keep records of all correspondence

  22. VICTIM INFORMATION • Average age of victim – 40 yrs. • Average number of months between date ID theft occurred & date noticed – 12 ½ months • California highest number of ID Thefts (WI 22nd) • Washington D.C. highest per capita rate (WI 33rd)

  23. INTANGIBLE IMPACT • Devastating affect on consumers lives • Usually discovered when turned down for loan or receive letter/call from a collection agency • Denied credit & financial services, utility service, employment, wages garnished, tax refunds withheld, etc.

  24. INTANGIBLE IMPACT….. • Criminal record created resulting in failed background checks, DL’s revoked, arrested & detained on warrants • Average victim spends 1,000 hours and $1,000 or more (not incl. atty. fees) over 2 years to straighten out financial matters

  25. HOW TO PROTECT YOURSELF • Manage Personal Information Wisely • Determine how your information will be used before providing • Pay attention to billing cycles • Guard mail from theft • Put passwords on credit cards. Avoid using mother’s maiden name, DOB, last 4 digits of Social Security #, or series of consecutive numbers

  26. HOW TO PROTECT YOURSELF….. • Minimize the number of credit cards & ID you carry • Don’t give out personal information on telephone, mail or Internet unless you initiated contact or you are sure whom you are speaking with • Keep personal information in a safe place

  27. HOW TO PROTECT YOURSELF….. • Shred discarded personal records & documents • Verify that your employment records are kept in a secure location • Order copies of your credit report yearly from each of the credit reporting agencies

  28. AND -- DO THE SAME FOR YOUR COMPANY THANK YOU

  29. www.wacci.orgharry@customerconsultants.com

More Related