SlideShare a Scribd company logo
1 of 2
Download to read offline
22 LINKED CHOCTAW HARRAH NOVEMBER 2014
Wait...Another Data Breach?
TIPS FOR DEALING WITH CREDIT CARD FRAUD
W
hat do Home Depot,
Target, Jimmy John’s,
Michaels, and Sally
Beauty have in
common? All are retail stores with a
presence in the Oklahoma City metro
area that experienced a data breach
compromising customer credit card
numbers.
According to the Identity Theft
Resource Center, 579 data breaches
have occurred this year alone. We are
seeing an increase in data breaches
because “the United States is the last large
country to adopt cards with computer
chip technology,” says Karen Clay,
Vice President of Risk Management
at WEOKIE Credit Union, “making
this country an easy target.” With
each data breach, financial institutions
incur a considerable expense to reissue
cards that may fall into the hands of
criminals. The impact on cardholders is
the inconvenience of getting a new card,
the anxiety created by worrying about
fraudulent charges, and the time it takes
to update automatic payment such as
utilities and gym memberships.
If you are like me and do not carry
cash, everything is paid for with a debit
or credit card. My wife and I budget,
track our spending, and pay credit cards
off each month, but we swipe a card each
time we make a purchase. I personally
have had four card reissues so far in
2014 – two VISA check cards from one
financial institution (because of Target
and The Home Depot), one VISA check
card from another (due to the breach at
Albertsons/Acme grocery stores from
out-of-state) and a MasterCard credit
card (also compromised by The Home
Depot) – four cards fallen victim to data
breaches. According to my credit union’s
fraud department, the same VISA check
card compromised by Albertsons/Acme
was also compromised by The Home
Depot.
Does this mean we should stop using
cards and only use cash? According
to Elaine Dodd, Vice President of the
Fraud Division at the Oklahoma Banker’s
Association, “it is not necessary to
stop using credit cards. There is a risk
using only cash as well as criminals are
producing pretty convincing counterfeit
currency.” With all the data breaches,
here is what cardholders should know and
what they can do to protect themselves.
•	 Financial institutions and credit card
companies actively monitor accounts
for suspicious activity. If fraudulent
activity is suspected, a cardholder
will likely receive a phone call from
the card issuer asking about certain
charges.
•	 Credit card companies provide
financial institutions with a list of
compromised accounts each time
LINKED CHOCTAW HARRAH 23WWW.LINKEDOK.COM
?
a security breach occurs. When a
cardholder’s credit or debit card is on
a list of compromised accounts, he or
she will receive a letter from the card
issuer with a notification that a new
card will be issued.
•	 As always, cardholders should
monitor their accounts through
online access and monthly
statements. Dodd says “it is good to
check your account online at least
once a week. I check mine at least
every other day.”
•	 Be on the lookout for small dollar
transactions from places you haven’t
been. “Do not ignore small purchases
on your monthly statements, these
could be test transactions” states
Clay. Dodd adds, “Once criminals
purchase credit card numbers on
the black market, they want to make
sure the card still works, so will run a
transaction for $0.99 or $1.99, hoping
you won’t notice before they try a
larger dollar amount.”
•	 If a cardholder wants to dispute a
charge, he or she has 60 days from the
statement date to report the charge
to the card issuer. Dodd says that
“cardholders should report suspected
fraudulent activity immediately to
their financial institution. Some
financial institutions require a police
report and since this is theft, your
local law enforcement authority will
take your report.”
•	 Once reported, the card issuer has
10 business days to investigate the
disputed charge. If the charge is
indeed fraudulent, the card issuer
should refund the charge within that
time frame. Clay notes the additional
inconvenience to
cardholders in the
notification process
and completion
of forms for
reimbursement.
•	 A new and more
secure credit/debit
card is in the works!
Currently available
in over 80 other
countries, credit/
debit cards with an
embedded chip will
make an appearance
in the United States in
2015. “The computer chip embedded
in the card creates a dynamic code
that is unique to each transaction,”
says Clay, “therefore, significantly
reducing the risk of a counterfeit card
being used at a merchant.” Dodd
also expects a drop off in credit card
fraud after the introduction of chip
technology.
BY BRENT REMPE, DIRECTOR OF EDUCATION,
WEOKIE CREDIT UNION. MORE INFORMATION
ON CONSUMER NEWS IS AVAILABLE AT HTTP://
MONEYMATTERS.WEOKIE.ORG/

More Related Content

What's hot

10 Interesting Facts On Credit Cards
10 Interesting Facts On Credit Cards10 Interesting Facts On Credit Cards
10 Interesting Facts On Credit CardsFSBT
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97alessio d
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensicswhbrown5
 
Understanding Your Credit Report and Score
Understanding Your Credit Report and ScoreUnderstanding Your Credit Report and Score
Understanding Your Credit Report and ScoreSpringboard
 
TJ Maxx Credit Card Benefits
TJ Maxx Credit Card BenefitsTJ Maxx Credit Card Benefits
TJ Maxx Credit Card BenefitsBarbara Vaughn
 
A psychological approah in "credit card fraud risk management"
A psychological approah in "credit card fraud risk management"A psychological approah in "credit card fraud risk management"
A psychological approah in "credit card fraud risk management"Sameh Hassan
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionanthonytaylor01
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Personal Money Management
Personal Money ManagementPersonal Money Management
Personal Money ManagementKevin Ray
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention- Mark - Fullbright
 

What's hot (20)

10 Interesting Facts On Credit Cards
10 Interesting Facts On Credit Cards10 Interesting Facts On Credit Cards
10 Interesting Facts On Credit Cards
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Credito whitepaper
Credito whitepaperCredito whitepaper
Credito whitepaper
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
 
Understanding Your Credit Report and Score
Understanding Your Credit Report and ScoreUnderstanding Your Credit Report and Score
Understanding Your Credit Report and Score
 
TJ Maxx Credit Card Benefits
TJ Maxx Credit Card BenefitsTJ Maxx Credit Card Benefits
TJ Maxx Credit Card Benefits
 
A psychological approah in "credit card fraud risk management"
A psychological approah in "credit card fraud risk management"A psychological approah in "credit card fraud risk management"
A psychological approah in "credit card fraud risk management"
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Credit Reporting
Credit ReportingCredit Reporting
Credit Reporting
 
credit card theft
credit card theftcredit card theft
credit card theft
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Credit Card Usage Study
Credit Card Usage StudyCredit Card Usage Study
Credit Card Usage Study
 
Rebuild Credit Fast
Rebuild Credit FastRebuild Credit Fast
Rebuild Credit Fast
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Personal Money Management
Personal Money ManagementPersonal Money Management
Personal Money Management
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 

Similar to Data Breach Article

Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca- Mark - Fullbright
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineKristi Valentini
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 
Identity Theft
Identity TheftIdentity Theft
Identity TheftBlinsink
 
A guideline of visa chargeback policy changes
A guideline of visa chargeback policy changesA guideline of visa chargeback policy changes
A guideline of visa chargeback policy changeschargebackprevent
 
Understanding Chargebacks
Understanding ChargebacksUnderstanding Chargebacks
Understanding ChargebacksHRMA-LLC
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theftnewsusa01
 
Everything You Need to Know About Taking Plastic
Everything You Need to Know About Taking PlasticEverything You Need to Know About Taking Plastic
Everything You Need to Know About Taking PlasticBusiness.com
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTesth9gfhypx97
 
Credit Cards and Swiping Information
Credit Cards and Swiping InformationCredit Cards and Swiping Information
Credit Cards and Swiping InformationCody Mims
 
How Do I Replace The Compromised Current Credit Card With My New Card.pdf
How Do I Replace The Compromised Current Credit Card With My New Card.pdfHow Do I Replace The Compromised Current Credit Card With My New Card.pdf
How Do I Replace The Compromised Current Credit Card With My New Card.pdfDecs- We kill Debt
 
Credit Card Industry Data Sheet
Credit Card Industry Data SheetCredit Card Industry Data Sheet
Credit Card Industry Data SheetMahesh Vallampati
 
New Kmart Data Breach lawsuit spotlights PCI DSS
 New Kmart Data Breach lawsuit spotlights PCI DSS New Kmart Data Breach lawsuit spotlights PCI DSS
New Kmart Data Breach lawsuit spotlights PCI DSSDavid Sweigert
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Donald E. Hester
 

Similar to Data Breach Article (20)

Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
Money Management
Money ManagementMoney Management
Money Management
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
A guideline of visa chargeback policy changes
A guideline of visa chargeback policy changesA guideline of visa chargeback policy changes
A guideline of visa chargeback policy changes
 
Understanding Credit Card Chargebacks
Understanding Credit Card ChargebacksUnderstanding Credit Card Chargebacks
Understanding Credit Card Chargebacks
 
Understanding Chargebacks
Understanding ChargebacksUnderstanding Chargebacks
Understanding Chargebacks
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Everything You Need to Know About Taking Plastic
Everything You Need to Know About Taking PlasticEverything You Need to Know About Taking Plastic
Everything You Need to Know About Taking Plastic
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
 
Credit Cards and Swiping Information
Credit Cards and Swiping InformationCredit Cards and Swiping Information
Credit Cards and Swiping Information
 
How Do I Replace The Compromised Current Credit Card With My New Card.pdf
How Do I Replace The Compromised Current Credit Card With My New Card.pdfHow Do I Replace The Compromised Current Credit Card With My New Card.pdf
How Do I Replace The Compromised Current Credit Card With My New Card.pdf
 
Credit Card Industry Data Sheet
Credit Card Industry Data SheetCredit Card Industry Data Sheet
Credit Card Industry Data Sheet
 
New Kmart Data Breach lawsuit spotlights PCI DSS
 New Kmart Data Breach lawsuit spotlights PCI DSS New Kmart Data Breach lawsuit spotlights PCI DSS
New Kmart Data Breach lawsuit spotlights PCI DSS
 
Credit Card Business Plan
Credit Card Business PlanCredit Card Business Plan
Credit Card Business Plan
 
Show me the debit
Show me the debitShow me the debit
Show me the debit
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 

Data Breach Article

  • 1. 22 LINKED CHOCTAW HARRAH NOVEMBER 2014 Wait...Another Data Breach? TIPS FOR DEALING WITH CREDIT CARD FRAUD W hat do Home Depot, Target, Jimmy John’s, Michaels, and Sally Beauty have in common? All are retail stores with a presence in the Oklahoma City metro area that experienced a data breach compromising customer credit card numbers. According to the Identity Theft Resource Center, 579 data breaches have occurred this year alone. We are seeing an increase in data breaches because “the United States is the last large country to adopt cards with computer chip technology,” says Karen Clay, Vice President of Risk Management at WEOKIE Credit Union, “making this country an easy target.” With each data breach, financial institutions incur a considerable expense to reissue cards that may fall into the hands of criminals. The impact on cardholders is the inconvenience of getting a new card, the anxiety created by worrying about fraudulent charges, and the time it takes to update automatic payment such as utilities and gym memberships. If you are like me and do not carry cash, everything is paid for with a debit or credit card. My wife and I budget, track our spending, and pay credit cards off each month, but we swipe a card each time we make a purchase. I personally have had four card reissues so far in 2014 – two VISA check cards from one financial institution (because of Target and The Home Depot), one VISA check card from another (due to the breach at Albertsons/Acme grocery stores from out-of-state) and a MasterCard credit card (also compromised by The Home Depot) – four cards fallen victim to data breaches. According to my credit union’s fraud department, the same VISA check card compromised by Albertsons/Acme was also compromised by The Home Depot. Does this mean we should stop using cards and only use cash? According to Elaine Dodd, Vice President of the Fraud Division at the Oklahoma Banker’s Association, “it is not necessary to stop using credit cards. There is a risk using only cash as well as criminals are producing pretty convincing counterfeit currency.” With all the data breaches, here is what cardholders should know and what they can do to protect themselves. • Financial institutions and credit card companies actively monitor accounts for suspicious activity. If fraudulent activity is suspected, a cardholder will likely receive a phone call from the card issuer asking about certain charges. • Credit card companies provide financial institutions with a list of compromised accounts each time
  • 2. LINKED CHOCTAW HARRAH 23WWW.LINKEDOK.COM ? a security breach occurs. When a cardholder’s credit or debit card is on a list of compromised accounts, he or she will receive a letter from the card issuer with a notification that a new card will be issued. • As always, cardholders should monitor their accounts through online access and monthly statements. Dodd says “it is good to check your account online at least once a week. I check mine at least every other day.” • Be on the lookout for small dollar transactions from places you haven’t been. “Do not ignore small purchases on your monthly statements, these could be test transactions” states Clay. Dodd adds, “Once criminals purchase credit card numbers on the black market, they want to make sure the card still works, so will run a transaction for $0.99 or $1.99, hoping you won’t notice before they try a larger dollar amount.” • If a cardholder wants to dispute a charge, he or she has 60 days from the statement date to report the charge to the card issuer. Dodd says that “cardholders should report suspected fraudulent activity immediately to their financial institution. Some financial institutions require a police report and since this is theft, your local law enforcement authority will take your report.” • Once reported, the card issuer has 10 business days to investigate the disputed charge. If the charge is indeed fraudulent, the card issuer should refund the charge within that time frame. Clay notes the additional inconvenience to cardholders in the notification process and completion of forms for reimbursement. • A new and more secure credit/debit card is in the works! Currently available in over 80 other countries, credit/ debit cards with an embedded chip will make an appearance in the United States in 2015. “The computer chip embedded in the card creates a dynamic code that is unique to each transaction,” says Clay, “therefore, significantly reducing the risk of a counterfeit card being used at a merchant.” Dodd also expects a drop off in credit card fraud after the introduction of chip technology. BY BRENT REMPE, DIRECTOR OF EDUCATION, WEOKIE CREDIT UNION. MORE INFORMATION ON CONSUMER NEWS IS AVAILABLE AT HTTP:// MONEYMATTERS.WEOKIE.ORG/