SlideShare a Scribd company logo
1 of 35
Protecting Families, Finances, and Your FutureProtecting Families, Finances, and Your Future
The Federal Trade
Commission reports
that identity theft has
been the NUMBER
ONE consumer
complaint for ELEVEN
consecutive years!
Identity Theft FactsIdentity Theft Facts
• Over 512 million Americans’ Identities have been
reported lost or stolen since January 2005. www.privacyrights.org
• Over 400,000 dead people opened bank accounts last
year.
• The revenue from trafficking financial data has
surpassed that of drug trafficking. – US Secret Service
• Over 3.5 million children have already fallen victim to
identity theft in the US.
Identity Theft FactsIdentity Theft Facts
• “Identity Theft is poised to increase by a factor of 20
over the next two years. The criminals are still trying
to figure out what to do with all the data.”
• There are currently over 31,000 NEW identity theft
victims EVERY DAY! 1 in every 3 seconds!
• You are THREE times more likely to have your
identity stolen than you are to have your house or
car broken into.
Identity Theft FactsIdentity Theft Facts
• The average dollar amount
charged in Identity Theft:
$96,800
• The average time taken by a
victim to restore their identity
is 600 hours.
• Most identity theft issues are non-
credit related.
Identity Theft FactsIdentity Theft Facts
Unexpected Secondary Effects:
•Denied Credit
•Higher Insurance Rates
•Credit Card Rate Increases
•Battling Collection Agencies
•Ability To Get A Job
•Criminal Record
Identity Theft EffectsIdentity Theft Effects
Identity Theft EffectsIdentity Theft Effects
We have found that identity theft
can lead to many legal issues
including:
• Criminal Charges
• Arrests
• Lawsuits
• Garnishments
• Civil Litigations
• IRS Audits
Discovery:
•85% of victims were unaware of theft until they needed
to verify their identity.
•Moment of discovery typically occurs in one of three
ways:
• A critical point in their lives – buying a home, car or applying for a job
• Via a negative notification – denial of credit, employment or law
enforcement notification.
• Pro-Active efforts from business or individual consumer.
Identity Theft DiscoveryIdentity Theft Discovery
Identity Theft ImpactIdentity Theft Impact
Identity Theft impacts
On Small Business
• Does it start with your
employees?
• How do you handle
records?
• 32% of data Breaches are a
result of Human Error
Data Breaches
Identity Theft ImpactIdentity Theft Impact
For the fifth year in a row, data breach costs have continued toFor the fifth year in a row, data breach costs have continued to
riserise
• The average organizational cost of a data breach this year isThe average organizational cost of a data breach this year is
7% from last year!7% from last year!
• Total breach costs an average ofTotal breach costs an average of $314$314 per compromisedper compromised
record. (RED FLAGS RULES)record. (RED FLAGS RULES)
• 1 in 4 data breach notification recipient became a victim.1 in 4 data breach notification recipient became a victim.
Are the Businesses You Frequent or Work for ExposingAre the Businesses You Frequent or Work for Exposing
You to an Identity Thief?You to an Identity Thief?
Data Breaches
Identity Theft ImpactIdentity Theft Impact
Who are Identity ThievesWho are Identity Thieves
Protecting Families, Finances, and Your FutureProtecting Families, Finances, and Your Future
Who are Identity Thieves?Who are Identity Thieves?
Organize crimeOrganize crime
GangsGangs
Employees (Business and Government)Employees (Business and Government)
Family Member or FriendsFamily Member or Friends
And thieves of course.And thieves of course.
Drivers
License
Medical FinancialEmployment
SSA & IRS
Character &
Criminal
Minor
Children
Types of Identity TheftTypes of Identity Theft
• Credit card fraud accounts for
less than 17% of identity theft.
• A thief can destroy your good
credit in a matter of hours.
• Financial and media groups
have done a great job telling
people that identity theft is
mostly “credit monitoring.”
Types of Identity TheftTypes of Identity Theft
Types of Identity TheftTypes of Identity Theft
“I owe $16,000 on my
credit cards, my
condo’s in foreclosure
and I turn seven on
Friday.”
Types of Identity TheftTypes of Identity Theft
• Over 3.5 million children have already been victims ofOver 3.5 million children have already been victims of
Identity Theft. Of course, this is the number ofIdentity Theft. Of course, this is the number of
discovered cases; the actual number may be muchdiscovered cases; the actual number may be much
higher.higher.
• Unfortunately many cases of Child Identity Theft are
not linked to credit. Criminals are using children's
identities to commit crimes, apply for Social Security
benefits, obtain a driver’s license, and even get medical
treatment.
Stealing
RFID
Data
Breaches
Methods of Identity TheftMethods of Identity Theft
Conclusion:
Our Current Privilege
Authorization Systems
Are
BROKEN
Identity TheftIdentity Theft
Protecting Families, Finances, and Your FutureProtecting Families, Finances, and Your Future
Identity Theft Protection TipsIdentity Theft Protection Tips
1. Review a current copy of your credit report.
2. Make sure you shred “junk mail” and unwanted credit card offers!
3. Opt out when you receive Privacy Statements – You must write them to
stop companies from sharing your information.
4. Do not carry your Social Security Card – Keep it safe at home.
5. Do not carry extra credit cards.
6. Copy the contents of your wallet and store in a secure place.
Identity Theft Protection TipsIdentity Theft Protection Tips
7. Do not mail bill payments and checks from home. Use locked
mailboxes.
8. Do not print your Social Security number or drivers license number
on your checks.
9. Order your Social Security Earnings and Benefits statement and check
it for accuracy.
10. Examine charges on your credit card statements each month.
11. Never give your credit card number or personal information over the
phone unless you initiated the call.
12. Invest in an identity theft protection plan that provides restoration
services.
TMTM
• Unfortunately Child Identity Theft is impossible to prevent.
Children should not have a credit report, and fraud alerts can
not be placed on a report that does not exist.
• Parents/Legal Guardians can contact the three credit bureaus
and request a credit report. If the response from the credit
bureau is “A report does not exist”, then the child does not
have a credit file.
• All correspondence must be sent certified/return receipt
requested to prove you sent the information.
Experian
PO Box 9532
Allen, TX 75013
Be sure to include:
• A copy of the child’s birth certificate listing the parent as a parent, or documentation
showing legal guardianship
• A copy of the child's Social Security card
• A Cover Letter including the full name of the child, the child’s date of birth, previous
addresses for the last five years, and the parent’s name and address
• A copy of the parent’s own ID card, such as driver’s license or state/military issued
photo id card.
• Request the child’s credit report by SSN. Remember thieves may use a different name.
Transunion
PO Box 6790
Fullerton, CA 92834
Equifax
Office of Consumer AffairsOffice of Consumer Affairs
P.O. Box 105139P.O. Box 105139
Atlanta, GA 30348Atlanta, GA 30348
It Takes about
60 seconds
to find out that
you are a
victim of
identity theft
= PANIC
Do it Your Self Plan
It is an average of
600 hours
= 40hrs x 3.75
months
to restore a
person’s identity
Identity Theft PlansIdentity Theft Plans
Identity Theft PlansIdentity Theft Plans
• SSN Statement
• MIB Group - Medical
• Drivers Record Report
• Court Records
• Credit Reports
Identity Theft PlansIdentity Theft Plans
• Monitoring Plans
• Reimbursement Plans
• Fraud Alert Services
• Restoration Plans
Identity Theft PlansIdentity Theft Plans
• NO PLAN CAN PREVENT ID THEFT. FLAG-FLAG-FLAG
• Monitoring plans are that! Monitors - Smoke Alarm
• Some provide for all three Credit Bureaus (Equifax, Experian and TransUnion)
• Most only covers financial and not other areas of ID theft
• Black Market Surveillance/scanning – monitor known criminal websites – REALLY!!
• Reimbursements/1 Million Insurance Plans- not restoration
• Must follow explicit instructions to receive – Still have to do the leg work
COMPARINGCOMPARING IDID
PLANSPLANS
Identity Theft PlansIdentity Theft Plans
Restoration Services:
• Some restoration sites indicate “ Professional assistance, advocate
or specialists”
• Meaning Step-by-step instruction
• Not Licensed Investigators
• Not all offer limited power of attorney
COMPARINGCOMPARING IDID
PLANSPLANS
Identity Theft BlogsIdentity Theft Blogs
• ITAC
• FTC
• IRS
• robtaylorhrm.wordpress.com
“Do you Know Where Your Identity Is Today!”
• robtaylorid.blogspot.com
Protecting Families, Finances, and Your FutureProtecting Families, Finances, and Your Future

More Related Content

What's hot

Writing Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft NoteWriting Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft NoteChris Sleeper
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition- Mark - Fullbright
 
Internet Scams, Fraud, And Hoaxes
Internet Scams, Fraud, And HoaxesInternet Scams, Fraud, And Hoaxes
Internet Scams, Fraud, And Hoaxeschartwick
 
Background Screening Webinar 1.0
Background Screening Webinar 1.0Background Screening Webinar 1.0
Background Screening Webinar 1.0Jmschwietz1
 
Scams 0710
Scams 0710Scams 0710
Scams 0710KEIRO2
 
Scammin Elderly PP
Scammin Elderly PPScammin Elderly PP
Scammin Elderly PPKatelyn Lutz
 
HCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALHCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALGina Leymeister
 
What makes white collar crimes different from others
What makes white collar crimes different from othersWhat makes white collar crimes different from others
What makes white collar crimes different from othersAdam Quirk
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineKristi Valentini
 
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crBrady Allen
 
AARP Fraud Fighter 2009
AARP Fraud Fighter 2009AARP Fraud Fighter 2009
AARP Fraud Fighter 2009Mary Volmer
 
Payroll fraud - Australia's quietest crime
Payroll fraud - Australia's quietest crimePayroll fraud - Australia's quietest crime
Payroll fraud - Australia's quietest crimeTracy Angwin
 
cian A lottery scam
cian A lottery scamcian A lottery scam
cian A lottery scampussyclaat
 
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014Audrius Sapola
 
5 Types of Identity Theft - Canada
5 Types of Identity Theft - Canada5 Types of Identity Theft - Canada
5 Types of Identity Theft - Canada- Mark - Fullbright
 

What's hot (20)

Writing Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft NoteWriting Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft Note
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
 
Internet Scams, Fraud, And Hoaxes
Internet Scams, Fraud, And HoaxesInternet Scams, Fraud, And Hoaxes
Internet Scams, Fraud, And Hoaxes
 
Identity theft protection company keepmy id.org
Identity theft protection company   keepmy id.orgIdentity theft protection company   keepmy id.org
Identity theft protection company keepmy id.org
 
Background Screening Webinar 1.0
Background Screening Webinar 1.0Background Screening Webinar 1.0
Background Screening Webinar 1.0
 
Scams 0710
Scams 0710Scams 0710
Scams 0710
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Scammin Elderly PP
Scammin Elderly PPScammin Elderly PP
Scammin Elderly PP
 
HCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALHCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINAL
 
What makes white collar crimes different from others
What makes white collar crimes different from othersWhat makes white collar crimes different from others
What makes white collar crimes different from others
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
 
Top 10 Scams Targeting Seniors
Top 10 Scams Targeting SeniorsTop 10 Scams Targeting Seniors
Top 10 Scams Targeting Seniors
 
Introduction to Email Fraud
Introduction to Email FraudIntroduction to Email Fraud
Introduction to Email Fraud
 
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
 
AARP Fraud Fighter 2009
AARP Fraud Fighter 2009AARP Fraud Fighter 2009
AARP Fraud Fighter 2009
 
Payroll fraud - Australia's quietest crime
Payroll fraud - Australia's quietest crimePayroll fraud - Australia's quietest crime
Payroll fraud - Australia's quietest crime
 
cian A lottery scam
cian A lottery scamcian A lottery scam
cian A lottery scam
 
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
 
Do You Trust a Resume
Do You Trust a ResumeDo You Trust a Resume
Do You Trust a Resume
 
5 Types of Identity Theft - Canada
5 Types of Identity Theft - Canada5 Types of Identity Theft - Canada
5 Types of Identity Theft - Canada
 

Viewers also liked

Identity Theft Protection From Legalshield
Identity Theft Protection From LegalshieldIdentity Theft Protection From Legalshield
Identity Theft Protection From LegalshieldRob Taylor
 
Rena Eichler - Those Devilish Details:P4P Design and Implementation Considera...
Rena Eichler - Those Devilish Details:P4P Design and Implementation Considera...Rena Eichler - Those Devilish Details:P4P Design and Implementation Considera...
Rena Eichler - Those Devilish Details:P4P Design and Implementation Considera...RikuE
 
My Mini Toolbar
My Mini ToolbarMy Mini Toolbar
My Mini ToolbarArchicon
 
K1 t4-st4-p6 rpp tema 4 kelas 1 sub tema 1 (3)
K1 t4-st4-p6 rpp tema 4 kelas 1 sub tema 1 (3)K1 t4-st4-p6 rpp tema 4 kelas 1 sub tema 1 (3)
K1 t4-st4-p6 rpp tema 4 kelas 1 sub tema 1 (3)eli priyatna laidan
 
Legal Shield Slideshow
Legal Shield SlideshowLegal Shield Slideshow
Legal Shield SlideshowLamar Morgan
 

Viewers also liked (6)

Identity Theft Protection From Legalshield
Identity Theft Protection From LegalshieldIdentity Theft Protection From Legalshield
Identity Theft Protection From Legalshield
 
Rena Eichler - Those Devilish Details:P4P Design and Implementation Considera...
Rena Eichler - Those Devilish Details:P4P Design and Implementation Considera...Rena Eichler - Those Devilish Details:P4P Design and Implementation Considera...
Rena Eichler - Those Devilish Details:P4P Design and Implementation Considera...
 
Legalshield Flip Chart
Legalshield Flip Chart Legalshield Flip Chart
Legalshield Flip Chart
 
My Mini Toolbar
My Mini ToolbarMy Mini Toolbar
My Mini Toolbar
 
K1 t4-st4-p6 rpp tema 4 kelas 1 sub tema 1 (3)
K1 t4-st4-p6 rpp tema 4 kelas 1 sub tema 1 (3)K1 t4-st4-p6 rpp tema 4 kelas 1 sub tema 1 (3)
K1 t4-st4-p6 rpp tema 4 kelas 1 sub tema 1 (3)
 
Legal Shield Slideshow
Legal Shield SlideshowLegal Shield Slideshow
Legal Shield Slideshow
 

Similar to Identity Theft It's Devasting Impact

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftmjbush42
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theftnewsusa01
 
Identity Theft
Identity TheftIdentity Theft
Identity TheftBlinsink
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 

Similar to Identity Theft It's Devasting Impact (20)

Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Idt workshop group benefits
Idt workshop group benefitsIdt workshop group benefits
Idt workshop group benefits
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 

Recently uploaded

Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 

Recently uploaded (20)

Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 

Identity Theft It's Devasting Impact

  • 1. Protecting Families, Finances, and Your FutureProtecting Families, Finances, and Your Future
  • 2.
  • 3. The Federal Trade Commission reports that identity theft has been the NUMBER ONE consumer complaint for ELEVEN consecutive years! Identity Theft FactsIdentity Theft Facts
  • 4. • Over 512 million Americans’ Identities have been reported lost or stolen since January 2005. www.privacyrights.org • Over 400,000 dead people opened bank accounts last year. • The revenue from trafficking financial data has surpassed that of drug trafficking. – US Secret Service • Over 3.5 million children have already fallen victim to identity theft in the US. Identity Theft FactsIdentity Theft Facts
  • 5. • “Identity Theft is poised to increase by a factor of 20 over the next two years. The criminals are still trying to figure out what to do with all the data.” • There are currently over 31,000 NEW identity theft victims EVERY DAY! 1 in every 3 seconds! • You are THREE times more likely to have your identity stolen than you are to have your house or car broken into. Identity Theft FactsIdentity Theft Facts
  • 6. • The average dollar amount charged in Identity Theft: $96,800 • The average time taken by a victim to restore their identity is 600 hours. • Most identity theft issues are non- credit related. Identity Theft FactsIdentity Theft Facts
  • 7. Unexpected Secondary Effects: •Denied Credit •Higher Insurance Rates •Credit Card Rate Increases •Battling Collection Agencies •Ability To Get A Job •Criminal Record Identity Theft EffectsIdentity Theft Effects
  • 8. Identity Theft EffectsIdentity Theft Effects We have found that identity theft can lead to many legal issues including: • Criminal Charges • Arrests • Lawsuits • Garnishments • Civil Litigations • IRS Audits
  • 9. Discovery: •85% of victims were unaware of theft until they needed to verify their identity. •Moment of discovery typically occurs in one of three ways: • A critical point in their lives – buying a home, car or applying for a job • Via a negative notification – denial of credit, employment or law enforcement notification. • Pro-Active efforts from business or individual consumer. Identity Theft DiscoveryIdentity Theft Discovery
  • 10. Identity Theft ImpactIdentity Theft Impact Identity Theft impacts On Small Business
  • 11. • Does it start with your employees? • How do you handle records? • 32% of data Breaches are a result of Human Error Data Breaches Identity Theft ImpactIdentity Theft Impact
  • 12. For the fifth year in a row, data breach costs have continued toFor the fifth year in a row, data breach costs have continued to riserise • The average organizational cost of a data breach this year isThe average organizational cost of a data breach this year is 7% from last year!7% from last year! • Total breach costs an average ofTotal breach costs an average of $314$314 per compromisedper compromised record. (RED FLAGS RULES)record. (RED FLAGS RULES) • 1 in 4 data breach notification recipient became a victim.1 in 4 data breach notification recipient became a victim. Are the Businesses You Frequent or Work for ExposingAre the Businesses You Frequent or Work for Exposing You to an Identity Thief?You to an Identity Thief? Data Breaches Identity Theft ImpactIdentity Theft Impact
  • 13. Who are Identity ThievesWho are Identity Thieves Protecting Families, Finances, and Your FutureProtecting Families, Finances, and Your Future Who are Identity Thieves?Who are Identity Thieves? Organize crimeOrganize crime GangsGangs Employees (Business and Government)Employees (Business and Government) Family Member or FriendsFamily Member or Friends And thieves of course.And thieves of course.
  • 14.
  • 15. Drivers License Medical FinancialEmployment SSA & IRS Character & Criminal Minor Children Types of Identity TheftTypes of Identity Theft
  • 16. • Credit card fraud accounts for less than 17% of identity theft. • A thief can destroy your good credit in a matter of hours. • Financial and media groups have done a great job telling people that identity theft is mostly “credit monitoring.” Types of Identity TheftTypes of Identity Theft
  • 17. Types of Identity TheftTypes of Identity Theft “I owe $16,000 on my credit cards, my condo’s in foreclosure and I turn seven on Friday.”
  • 18. Types of Identity TheftTypes of Identity Theft • Over 3.5 million children have already been victims ofOver 3.5 million children have already been victims of Identity Theft. Of course, this is the number ofIdentity Theft. Of course, this is the number of discovered cases; the actual number may be muchdiscovered cases; the actual number may be much higher.higher. • Unfortunately many cases of Child Identity Theft are not linked to credit. Criminals are using children's identities to commit crimes, apply for Social Security benefits, obtain a driver’s license, and even get medical treatment.
  • 19. Stealing RFID Data Breaches Methods of Identity TheftMethods of Identity Theft
  • 20. Conclusion: Our Current Privilege Authorization Systems Are BROKEN Identity TheftIdentity Theft
  • 21.
  • 22. Protecting Families, Finances, and Your FutureProtecting Families, Finances, and Your Future
  • 23. Identity Theft Protection TipsIdentity Theft Protection Tips 1. Review a current copy of your credit report. 2. Make sure you shred “junk mail” and unwanted credit card offers! 3. Opt out when you receive Privacy Statements – You must write them to stop companies from sharing your information. 4. Do not carry your Social Security Card – Keep it safe at home. 5. Do not carry extra credit cards. 6. Copy the contents of your wallet and store in a secure place.
  • 24. Identity Theft Protection TipsIdentity Theft Protection Tips 7. Do not mail bill payments and checks from home. Use locked mailboxes. 8. Do not print your Social Security number or drivers license number on your checks. 9. Order your Social Security Earnings and Benefits statement and check it for accuracy. 10. Examine charges on your credit card statements each month. 11. Never give your credit card number or personal information over the phone unless you initiated the call. 12. Invest in an identity theft protection plan that provides restoration services.
  • 25. TMTM
  • 26. • Unfortunately Child Identity Theft is impossible to prevent. Children should not have a credit report, and fraud alerts can not be placed on a report that does not exist. • Parents/Legal Guardians can contact the three credit bureaus and request a credit report. If the response from the credit bureau is “A report does not exist”, then the child does not have a credit file. • All correspondence must be sent certified/return receipt requested to prove you sent the information.
  • 27. Experian PO Box 9532 Allen, TX 75013 Be sure to include: • A copy of the child’s birth certificate listing the parent as a parent, or documentation showing legal guardianship • A copy of the child's Social Security card • A Cover Letter including the full name of the child, the child’s date of birth, previous addresses for the last five years, and the parent’s name and address • A copy of the parent’s own ID card, such as driver’s license or state/military issued photo id card. • Request the child’s credit report by SSN. Remember thieves may use a different name. Transunion PO Box 6790 Fullerton, CA 92834 Equifax Office of Consumer AffairsOffice of Consumer Affairs P.O. Box 105139P.O. Box 105139 Atlanta, GA 30348Atlanta, GA 30348
  • 28.
  • 29. It Takes about 60 seconds to find out that you are a victim of identity theft = PANIC Do it Your Self Plan It is an average of 600 hours = 40hrs x 3.75 months to restore a person’s identity Identity Theft PlansIdentity Theft Plans
  • 30. Identity Theft PlansIdentity Theft Plans • SSN Statement • MIB Group - Medical • Drivers Record Report • Court Records • Credit Reports
  • 31. Identity Theft PlansIdentity Theft Plans • Monitoring Plans • Reimbursement Plans • Fraud Alert Services • Restoration Plans
  • 32. Identity Theft PlansIdentity Theft Plans • NO PLAN CAN PREVENT ID THEFT. FLAG-FLAG-FLAG • Monitoring plans are that! Monitors - Smoke Alarm • Some provide for all three Credit Bureaus (Equifax, Experian and TransUnion) • Most only covers financial and not other areas of ID theft • Black Market Surveillance/scanning – monitor known criminal websites – REALLY!! • Reimbursements/1 Million Insurance Plans- not restoration • Must follow explicit instructions to receive – Still have to do the leg work COMPARINGCOMPARING IDID PLANSPLANS
  • 33. Identity Theft PlansIdentity Theft Plans Restoration Services: • Some restoration sites indicate “ Professional assistance, advocate or specialists” • Meaning Step-by-step instruction • Not Licensed Investigators • Not all offer limited power of attorney COMPARINGCOMPARING IDID PLANSPLANS
  • 34. Identity Theft BlogsIdentity Theft Blogs • ITAC • FTC • IRS • robtaylorhrm.wordpress.com “Do you Know Where Your Identity Is Today!” • robtaylorid.blogspot.com
  • 35. Protecting Families, Finances, and Your FutureProtecting Families, Finances, and Your Future

Editor's Notes

  1. 1. Your friend/neighbor hit you up for money, but you would not give him your credit card 2. Friendly companion, only crime is barking but did not steal your identity 3. Your sister might use your SS number as a password but she is no Identity thief. 4. Wanted for ID Theft , forgery, and theft. She allegedly used the stolen identities to commit her crimes. The real identity of this female identity thief is unknown.
  2. 26-32% of victims spend a period of 4 to 6 months dealing with their cases and 11/23% report dealing with their cases for 7 months to a year.