Idt Jc 02 09


Published on

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Idt Jc 02 09

  1. 2. <ul><li>Presented by Joe Nollet </li></ul><ul><li>Certified Identity Theft Risk Management Specialist </li></ul><ul><li>Independent Associate, Pre-Paid Legal Services, Inc.,and Identity Theft Shield </li></ul>
  2. 3. <ul><li>Question… </li></ul><ul><li>What is the Nation’s </li></ul><ul><li>Fastest Growing Crime? </li></ul>
  3. 4. Identity Theft is not just about Credit Cards! ID Theft is an international crime and access to an attorney may be critical What is Identity Theft? <ul><li>Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. Identity Theft includes: </li></ul>
  4. 5. Identity Theft is not just about Credit Cards! ID Theft is an international crime and access to an attorney may be critical Five Common Types of Identity Theft What is Identity Theft? Drivers License Identity Theft Medical Identity Theft Financial Identity Theft Social Security Identity Theft Character / Criminal Identity Theft
  5. 6. Driver’s License Identity Theft <ul><ul><li>Thieves use your information to acquire a driver’s license in your name or claim to be you during a traffic stop </li></ul></ul><ul><li>You could receive DWI, DUI, and other driving-related charges </li></ul><ul><li>Your driving privileges could be suspended or revoked </li></ul><ul><li>You could be arrested during a routine traffic stop for crimes you did not commit </li></ul>What is Identity Theft?
  6. 7. What is Identity Theft? AARP Bulletin, February 2004 “ An 82-year-old grandmother, quit driving during the Truman administration.” In 2001 she “suddenly found herself in what she describes as a ‘ living hell ’ after one of her neighbors, arrested on drunk-driving charges … pretended to be her. ‘I was told there were warrants for my arrest … I was afraid to answer the phone’.”
  7. 8. Social Security (SSN) Identity Theft <ul><ul><li>Thieves use your SSN Identity to gain employment or to report income under your name </li></ul></ul>What is Identity Theft? Your SIN in Canada <ul><li>Thieves take the income, but don’t pay the taxes, leaving you with the bill </li></ul><ul><li>Wanted criminals use your SSN Identity so they can get employment without being found </li></ul><ul><li>Illegal immigrants use your SSN Identity to gain employment. </li></ul><ul><li>Thieves and criminals use your SSN for employment, medical, financial, criminal, school, and other purposes. </li></ul>
  8. 9. What is Identity Theft? MSNBC, January 29, 2005 A Chicago woman “ applied for a job at a local Target department store and was denied . The reason? She already worked there – or rather, her Social Security number already worked there. Follow-up investigation revealed the same Social Security Number … used to obtain work at 37 other employers.” “ People need to wake up to this problem. They are destroying people’s credit, Social Security benefits, and everything else.”
  9. 10. Medical Identity Theft What is Identity Theft?
  10. 11. Medical Identity Theft <ul><ul><li>Thieves use your information for insurance benefits, R x , Medicare, Medicaid benefits, or for medical tests </li></ul></ul>What is Identity Theft? <ul><li>Your rates could go up or your coverage could be cancelled or used up </li></ul><ul><li>You could owe thousands of dollars for a procedure you never had </li></ul><ul><li>You could be unable to obtain medical or life insurance, other coverage, and/or employment because of conditions that you do not have (AIDS, Diabetes etc…) </li></ul>
  11. 12. Character / Criminal Identity Theft What is Identity Theft?
  12. 13. Character / Criminal Identity Theft <ul><li>You could be arrested </li></ul><ul><li>You could be denied employment because of fraudulent criminal records found during routine background checks </li></ul><ul><li>Security checkpoints at airports could become a nightmare for you </li></ul><ul><li>You could be denied a passport and be barred from leaving the country </li></ul><ul><ul><li>Thieves mask their criminal activity behind your identity </li></ul></ul>What is Identity Theft?
  13. 14. Character / Criminal Identity Theft <ul><ul><li>Thieves mask their criminal activity behind your identity </li></ul></ul>What is Identity Theft? after the September 11th terrorist attacks, it was determined that the attacks were funded in large part through fraudulently obtained credit cards, and nine of the terrorist operatives reportedly entered the United States using falsified visas and stolen or fraudulent identities.
  14. 16. What is Identity Theft? Character / Criminal Identity Theft A woman who identified herself as Alianiss Nunez Morales, 23, of Minnesota failed to stop at a stop sign before hitting a bus carrying 28 students from Lakeview School Four students were killed &quot;THE ONLY NAME WE HAVE FOR HER IS THE NAME SHE GAVE US WHEN SHE WAS BOOKED,&quot; Officer Arnold said. -Minnesota Herald, February 22, 2008 -
  15. 17. Financial Identity Theft <ul><li>Thieves rob your accounts </li></ul><ul><li>They rack up outrageous charges on credit cards, take out new loans, and more </li></ul><ul><li>They destroy your credit, forcing you to pay higher rates </li></ul><ul><li>You could be held responsible for the debts incurred by the thieves in your name </li></ul><ul><ul><li>Thieves use your information to open new accounts or to gain access to existing accounts </li></ul></ul>What is Identity Theft?
  16. 18. Financial Identity Theft What is Identity Theft?
  17. 19. What is Identity Theft? Character / Criminal Identity Theft What if they took… … a name out of a phone book in Iowa … a Driver’s License number out of a DMV data base … and YOUR Social Security number and CREATED a new person? -
  18. 20. What is Identity Theft? Character / Criminal Identity Theft It’s called SYNTHETIC or MOZAIC IDENTITY THEFT and it is becoming a nightmare! -
  19. 21. “ Thieves are so bold that they held a conference in Kiev, Ukraine, for people interested in breaking into this Growth Industry” How do they get your information? - USA Today
  20. 22. How do they get your information? Phishing Facts 886 – The average dollar loss per Phishing Victim (Gartner, Dec 17, 2007) 3.6 Billion – The total dollar loss of all phishing victims over a 1 year period (Gartner, Dec 17, 2007) 3.2 Million – The number of people who fell victims to phishing scams over that same 1 year period (Gartner, Dec 17, 2007) 8.5 Billion – The estimated number of phishing e-mails sent world-wide each month (SonicWALL, 2008) 32,414 – The number of phishing web sites that were operational in May 2008 (Anti-Phishing Working Group) New attack is now called Spear Phishing!
  21. 23. <ul><li>“Residents with mailboxes should pick up </li></ul><ul><li>their mail as soon as it has been </li></ul><ul><li>delivered.”- Officer Kingman, SLT Police Department </li></ul><ul><li>Tahoe Daily Tribune, February 21, 2008 Photo by Jim Grant </li></ul>Mail Theft
  22. 26. How do they get your information? The DataBased You Meet The DataBased You ™ ™
  23. 27. How do they get your information? Your Name 1000’s of aggregators Your Fingerprints and DNA FBI, State, and Local DBS Your Insurance Claims C.L.U.E. DBS, etc... Your Military Record DOD DBS Your Criminal History NCIC DBS Your Real Estate Deeds Clerks of Court DBS Your Legal History State and Federal Court DBS Your Credit History Credit Repositories’ DBS Your Birth Certificate Choice Point DBS, State, etc … Your Phone Number and Tracking Info 1000’s of aggregators Your Social Security Number SSA DBS Your Address 1000’s of DBS The DataBased You ™ Your Driver’s License # and Record – DMV DBS Your Medical Records MIB DBS, etc … Your Car Registration & Info DMV, Local Treasurer, On Star, etc … DBS
  24. 28. Are you in their data base? <ul><li>United Blood Services </li></ul><ul><li>The Veterans Administration </li></ul><ul><li>Choice Point </li></ul><ul><li>AOL </li></ul><ul><li>DSW Shoe Warehouse </li></ul><ul><li>Lexis Nexis </li></ul><ul><li>IRS </li></ul>
  25. 29. What is Identity Theft? The Cost of Identity Theft (ITRC) In 2008, there were 656 data breaches with over 35.5 million personal records compromised
  26. 30. What is Identity Theft? The Cost of Identity Theft In 2009, there has already been 45 data breaches with over 33,144 personal records compromised (ITRC, 02/03/09)
  27. 31. What is Identity Theft? On Average it takes 44 months and over 600 hours of work to restore your identity (AIG, 2008) The Cost of Identity Theft
  28. 32. 37% of victims reported experiencing problems other than out-of-pocket expenses or loss of time -FTC 2006 IDT Survey Report The Cost of Identity Theft
  29. 33. The Cost of Identity Theft <ul><li>Problems include: </li></ul><ul><li>Harassment by collection agents </li></ul><ul><li>Having utilities shut off </li></ul><ul><li>Being subjected to criminal Investigation or civil suit </li></ul><ul><li>Emotional problems </li></ul>
  30. 35. To put it in Perspective <ul><li>Last Year in the United States </li></ul><ul><li>15,000 Murders </li></ul><ul><li>500,000 Armed Robberies </li></ul><ul><li>15 Million Identity Thefts </li></ul><ul><li>Less than 3% of Identity Thieves were prosecuted </li></ul>The Cost of Identity Theft
  31. 36. Identity Theft Resource Center Statistics <ul><li>There will be a NEW Identity Theft victim every 2-3 seconds This Year! </li></ul><ul><li>Average length of time before you find out you are a victim is 12-18 months (FTC) </li></ul><ul><li>Over 53 BILLION dollars lost per year </li></ul>
  32. 37. The cost of Identity Theft MSNBC, February 2004 ID Theft Victims Face Tough Bank Fights* <ul><li>In 2003, The Korinke family was sued by Homecoming Financial Network INC., a division of GMAC, for $75,000 , plus attorney fees. </li></ul><ul><li>In 2001, an imposter got hold of a line of credit, switched the address, and the Korinkes never received the outstanding bills. </li></ul><ul><li>Homecomings … claimed the Korinkes had been negligent. “The Korinkes were slow to discover and report the identity theft … as such, Korinke is liable for any and all sums attributed to his negligence .”** </li></ul>*2/18/04 ** Pg.2 *** Pg. 3 NOTE: The FACTA law states clearly that the Korinke family must assume the liability in this case
  33. 38. The cost of Identity Theft *Pg. 19 <ul><li>An excerpt from the report: </li></ul><ul><li>“ The Fair Credit Billing Act establishes procedures for resolving billing errors on your credit … accounts … To take advantage of the law’s consumer protection, you must: ” </li></ul><ul><ul><li>send your letter so that it reaches the creditor within 60 days . If an identity thief changes the address on your account and you didn’t receive the bill, your dispute letter still must reach the creditor within 60 days of when the creditor would have mailed the bill .”* … or you could owe the money. </li></ul></ul>See page 13 for additional information
  34. 39. The Cost to Individuals <ul><li>The average dollar amount charged in Identity Theft: $92,893 </li></ul><ul><li>The average number of checks written in Identity Theft: 74.6 </li></ul><ul><li>The average number of credit card applications approved through Identity Theft: 8.4 </li></ul>Laws hold victims partially responsible for fraudulent debt after 48 hours, and can hold them fully responsible if not reported within 60 days… The Cost of Identity Theft
  35. 40. The Cost to Businesses <ul><li>Employees can take up to 600 hours to restore their identities </li></ul><ul><li>Must spend regular business hours to resolve </li></ul><ul><li>Not as productive or focused </li></ul><ul><li>Take more sick leave </li></ul><ul><li>Safety problems…workers comp claims increase </li></ul>The Cost of Identity Theft *CIO Magazine, The Coming Pandemic , Michael Freidenberg, May 15 th , 2006
  36. 41. The Cost to Businesses <ul><ul><li>According to the National Computer Security Survey, 32,000 businesses were asked to participate in a survey about cybercrime. </li></ul></ul><ul><ul><li>Of the 7,818 businesses that responded, 67% detected at least one cybercrime in 2005. The monetary loss for these businesses totaled $867 million. </li></ul></ul>The Cost of Identity Theft
  37. 42. The Cost to Businesses <ul><ul><li>Surveys indicate that personal issues account for 68% of employee absenteeism. Many which are legal issues. </li></ul></ul><ul><ul><li>Studies also show that employees with legal problems usually: </li></ul></ul><ul><ul><li>Are absent 5 times more than average </li></ul></ul><ul><ul><li>Use their medical benefits 4 times more than average </li></ul></ul><ul><ul><li>Use sick leave 2 times as often as the average employee </li></ul></ul><ul><ul><li>Experience a substantial reduction in their productivity </li></ul></ul>The Cost of Identity Theft
  38. 43. Think you’re not at risk? <ul><li>The top States for victims have been </li></ul><ul><li>New York </li></ul><ul><li>California </li></ul><ul><ul><li>Sacramento ranks second in the state </li></ul></ul><ul><li>Nevada </li></ul><ul><li>- Reno ranks first in the state </li></ul><ul><li>Arizona </li></ul><ul><li>Washington </li></ul><ul><li>Texas </li></ul>
  39. 44. What can you do? <ul><li>Shred everything and dispose of </li></ul><ul><li>carefully! </li></ul><ul><li>ASK! Why do you need my Social </li></ul><ul><li>Security number, driver’s license, etc.? </li></ul>
  40. 45. What if someone calls… <ul><li>…and says you missed jury duty, they are your banker, can lower interest rates, or they are from the IRS or FBI </li></ul><ul><li>Never give info over the phone unless you are positive of the person to whom you are speaking! Mom might be ok ! </li></ul>
  41. 46. Be aware! <ul><li>Monitor Your: </li></ul><ul><li>Mail </li></ul><ul><li>Credit cards </li></ul><ul><li>Social Security card </li></ul><ul><li>Driver’s license </li></ul><ul><li>Passport </li></ul><ul><li>Access to your home, car, etc. </li></ul><ul><li>Computer, cell phone, Blackberry, etc. </li></ul>
  42. 47. Understand what you are getting when you buy identity theft protection products
  43. 48. The 3 “ MUST HAVES” in any Policy or Service <ul><li>Continuous Credit Monitoring </li></ul><ul><li>Total Restoration </li></ul><ul><li>Access to legal counsel </li></ul>Identity Theft Prevention
  44. 49. Even if you are careful, consider… <ul><li>A service to monitor your information for you on a daily basis </li></ul><ul><li>A service that will do the work for you if you need to restore your credit, clear up a criminal record, or correct medical records </li></ul>Identity Theft Prevention
  45. 50. We all pay! <ul><li>Multi-billion dollar international business </li></ul><ul><li>Costs are passed to consumers </li></ul><ul><li>You or your employees take time off work to deal with identity theft </li></ul>
  46. 51. <ul><li>F.A.C.T.A. </li></ul><ul><li>HIPAA Security Rule </li></ul><ul><li>Gramm, Leach, Bliley Safeguard Rule </li></ul><ul><li>Individual State Laws </li></ul>Important Legislation… Important Legislation
  47. 52. <ul><li>“ We’re not looking for a perfect system,’ Broder says. ‘But we need to see that you’ve taken reasonable steps to protect your customers’ information.’” </li></ul>- “Stolen Lives”, ABA Journal , March 2006
  48. 53. ‘ Someone, Is Watching You’ No One is Immune, You Must be Diligent to Protect Your Family & Your Good Name!
  49. 55. Free Business Risk Assessment <ul><li>I am offering a FREE Business Risk Assessment to you and or your office staff. </li></ul><ul><li>The assessment will show how your business is exposed to potential penalties, fines and lawsuits as a result of not being compliant with FACTA, OSHA, FCRA, GLB, HIPAA & ADA. A series of simple multiple-choice questions are answered by you that leads to the creation of a report based on those answers. </li></ul><ul><li>This Assessment covers five areas of risk: </li></ul><ul><ul><li>facilities, </li></ul></ul><ul><ul><li>labor, </li></ul></ul><ul><ul><li>identity theft, </li></ul></ul><ul><ul><li>financial and </li></ul></ul><ul><ul><li>business entity. </li></ul></ul><ul><li>The Business Risk Assessment is accessed over the Internet. </li></ul>Identity Theft Prevention
  50. 56. Give the thief some grief! <ul><li>Schedule an identity theft seminar for your employees or organization today! </li></ul><ul><li>Joe Nollet, Certified Identity Theft Risk Management Specialist, </li></ul><ul><li>Pre-Paid Legal Services, Inc. Identity Theft Shield by Kroll Risk Management International, Independent Associate </li></ul>