SlideShare a Scribd company logo
1 of 43
Download to read offline
 
Juliana Harris,
Senior Communications Coordinator
South Carolina Department of Consumer Affairs
 The State’s Consumer
Protection Agency
 6 Divisions
Commission on
Consumer Affairs
Administrator
Council of Advisors
Consumer Services
& Education
Administration
Advocacy
Legal
Public Information
Identity Theft Unit
• Organizational Structure
 Attempts to resolve consumer complaints against
businesses. DCA fields complaints from consumers, if they
have a problem with a household product or service a
business has sold them.
 Receives approximately 400-500 written complaints and
about 4,000 phone calls each month.
 The Division has consistently resolved about 85% of the
complaints in a satisfactory manner.
SCDCA
 provides support for the other Divisions including
personnel, accounting, data processing and purchasing.
 Processes regulatory filings for:
o Maximum Rate—creditors charging in excess of 18%
o Credit Grantor Notification—creditors grossing over $150,000 annual
o Motor Vehicle Dealer Closing Costs– Dealers charging a doc fee
SCDCA
 Represents the public at large by intervening in insurance
rate cases/ filings. Includes workers’ compensation, auto,
home, etc.
 Administers & enforces the following regulatory programs:
o Continuing Care Retirement Communities
o Discount Medical Plan Organizations
o Professional Employer Organizations
SCDCA
 Helps the Administrator to administer and enforce the Consumer
Protection Code and various other laws that have been assigned to the
Department for Regulation.
 Can investigate and bring enforcement actions, both administratively
and in court, for violations of the Consumer Protection Code.
 Some industries the Department regulates:
• Mortgage Brokers
• Pawn Brokers
• Prepaid Legal
• Preneed Funeral
SCDCA
 Serves as the main consumer education portal for
consumers, business and media.
 Launched SCDCA-TV on YouTube and uses Twitter.
 Make presentations and sponsor webinars on ID Theft, debt
collection, foreclosures, credit and other popular topics.
 The Division also disseminates press releases and
consumer education brochures.
SCDCA
 Celebrated Second Anniversary October 1, 2015!
 Takes scam reports, ID Theft reports and conducts
outreach.
 Education. Guidance. Enforcement.
 Receives security breach notices.
• FTC’s #1 complaint in 2014 was ID Theft. (13%)
• SC ranks #30 in nation for volume of ID Theft Complaints.
• Billions in financial losses each year.
SC Stats: ID Theft Complaints:
2014 – 30th
2013 – 17th
2012 – 17th
2011 – 20th
2010- 29th
2009- 28th
2008- 29th
2007- 30th
 35% Government Documents/Benefits Fraud
 Unlawful use or counterfeit of gov’t issued documents
 14% Phone or Utilities Fraud
 Obtaining these services with false info
 13% Credit Card Fraud
 Opening a line of credit with false info
* From FTC Consumer Sentinel 2014 Report
 Friends & Family
 Pretexting
 Phishing
 Skimming
 Pre-Approval Offers
 Unscrupulous employees @ businesses with which you have
a relationship
 Dumpster Diving
 Hacking/Security Breach
 Scams
 The copying of electronically transmitted data on
the magnetic strip of a credit card, to enable valid
electronic payment authorization to occur between
a merchant and the issuing financial institution.
 ID thieves steal credit/debit card numbers by using
a special storage device when processing your
card.
Cameras to view password entry
Card electronic strip readers
Keystroke Capturers
SKIMMING - Electronic card strip readers
Sending authentic-looking but fraudulent e-mail designed
to trick a person into giving out personal information.
 “Spear phishing”
 scam artists have some inside information, such as the
consumer’s name or knowledge of who the consumer
does business with, which they use to seem more
legitimate in their request for personal data.
 E-mails that appear to be from American Airlines claiming to:
 have an e-ticket attached; or
 that the consumer needs to change an account password.
• Similar to phishing, but uses text messages on
cellphones and smartphones
• 2 common types:
1. Receive an urgent text that appears to be from a
trusted source (bank, credit card company): “card
stolen” or “account frozen”; instructed to call
number or go to particular website to “verify
account” = thieves steal info
2. Same as above, but message contains
attachment: virus or malware
Fraud Alert
Security Freeze
Monitor your financial
and personal
statements
 Lasts 90 days.
 Alerts businesses that may be viewing your
report to take extra steps to verify your identity.
 Entitles you to another free credit report from
each of the three CRAs.
 ONE call that’s all!
 Free for SC residents to place OR lift.
 Stops anyone from accessing your credit report.
o No new lines of credit in your name
 Thaw when you want to apply for new credit.
 Place with EACH of the three credit reporting
agencies (CRAs).
 Equifax: 800-685-1111 or www.freeze.equifax.com
 800-680-7289 or http://freeze.transunion.com
 You will have to make an account to place the freeze with
TransUnion online.
888-397-3742 or
www.experian.com/freeze
To apply for new lines of credit or ANY
good/service that requires the business to
run a credit check:
o YOU WILL NEED YOUR PINS.
Keep them together and in a secure place.
 www.annualcreditreport.com
 1-877-322-8228
 Review it at least once a year!
 Dispute errors or old information.
 May offer to “lock”, “flag”, or freeze your credit.
 Place fraud alert.
 Troll black market internet sites that traffic PII.
 Research before you buy.
 Remember, state and federal law allows you to do many of
these things for free!

Account balance falls below X amount.
o Charge of more than X amount.
 Banks and credit unions often offer these for free.
o Get texts, e-mail or calls.
Contact your financial institution for more
info.
 Transcripts are free:
o outline most of information included on a tax return
submitted with the requestor’s information.
o review the document for signs that someone is
• reporting earnings
• filing taxes, in their name.
 To request a transcript, visit www.irs.gov/uac/Tax-Return-
Transcripts, call 800-908-9946 or use the IRS2Go mobile
app.
 Eligible to sign up whether retired or still working
o review benefit and payment information;
o address and phone number on record; and
o Establish direct deposit accounts.
 Review regularly to catch possible identity theft
quickly.
 For more information on this program, visit
www.ssa.gov/myaccount.
 Your SSN can be used to get:
o Medical benefits
o Government benefits
o Tax refund
o Credit
o Jobs
 That’s why you must monitor your:
o credit reports
o bank statements
o credit card statements
o explanation of benefits from insurance
provider
 Mistakes on your financial statements.
 Bills don’t arrive on time.
 Bills or collection notices for things you never purchased.
 Unexpectedly denied a loan.
 You don’t get your tax refund and end up owing the IRS.
 Dispose of sensitive materials appropriately.
 Don’t disclose personal info to someone you don’t
know.
o On the phone
o Online
o Through the mail
 Be cautious when shopping online.
 Don’t carry things like your SS card, birth certificate.
 Monitor your credit reports! 877-322-8228
 Opt out of pre-screened credit offers. Call: 1-888-5-
OPTOUT (1-888-567- 8688).
 http://www.ftc.gov/idtheft
 You can order publications
for free from the FTC.
 www.consumer.sc.gov or 800.922.1594
Check out our YouTube channel.
Youtube.com/scdcatv
Look to Twitter for recent scam
alerts and the latest consumer
news. @SCDCA
Visit Facebook for updates and
educational materials.
Facebook.com/scdca
To receive news releases and
other publications contact:
Juliana Harris
Senior Communications Coordinator
jharris@scconsumer.gov
803.734.4296
ID Theft: What You Need to Know - Juliana Harris

More Related Content

What's hot

Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition- Mark - Fullbright
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps - Mark - Fullbright
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims - Mark - Fullbright
 
Medical Identity Theft and Its Serious Offshoots
Medical Identity Theft and Its Serious OffshootsMedical Identity Theft and Its Serious Offshoots
Medical Identity Theft and Its Serious Offshootsmosmedicalreview
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthemamason04
 
Writing Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft NoteWriting Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft NoteChris Sleeper
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationpaulgundersen9
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect youIdentity Theft Protection
 
SOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax Relief
SOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax ReliefSOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax Relief
SOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax ReliefNOAH DANIELS EA
 

What's hot (20)

Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims
 
Medical Identity Theft and Its Serious Offshoots
Medical Identity Theft and Its Serious OffshootsMedical Identity Theft and Its Serious Offshoots
Medical Identity Theft and Its Serious Offshoots
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthem
 
Writing Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft NoteWriting Sample - Tax Identity Theft Note
Writing Sample - Tax Identity Theft Note
 
Phishers
PhishersPhishers
Phishers
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Ten things to know about identity theft
Ten things to know about identity theftTen things to know about identity theft
Ten things to know about identity theft
 
SOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax Relief
SOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax ReliefSOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax Relief
SOME FACTS ABOUT IDENTITY THEFT AND TAXES - Advance Tax Relief
 

Viewers also liked

Viewers also liked (18)

In the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim SalterIn the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim Salter
 
День Влюбленных
 День Влюбленных День Влюбленных
День Влюбленных
 
Додаток 9
Додаток 9Додаток 9
Додаток 9
 
Curriculum_Vitae_Mark_Ebbert-modern
Curriculum_Vitae_Mark_Ebbert-modernCurriculum_Vitae_Mark_Ebbert-modern
Curriculum_Vitae_Mark_Ebbert-modern
 
Урок 17
Урок 17Урок 17
Урок 17
 
presentation
presentationpresentation
presentation
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7
 
Kim lynchresume july2016
Kim lynchresume july2016Kim lynchresume july2016
Kim lynchresume july2016
 
Présentation ESS
Présentation ESSPrésentation ESS
Présentation ESS
 
Конспекти уроків
Конспекти уроківКонспекти уроків
Конспекти уроків
 
ทันตกรรมจัดฟัน
ทันตกรรมจัดฟัน ทันตกรรมจัดฟัน
ทันตกรรมจัดฟัน
 
Biffy clyro magazine advertisment analysis
Biffy clyro magazine advertisment analysisBiffy clyro magazine advertisment analysis
Biffy clyro magazine advertisment analysis
 
Досвід роботи вчителя Нечипоренка Г.М.
Досвід роботи вчителя Нечипоренка Г.М.Досвід роботи вчителя Нечипоренка Г.М.
Досвід роботи вчителя Нечипоренка Г.М.
 
National Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael KaiserNational Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael Kaiser
 
Electronic comunication sysytem
Electronic comunication sysytemElectronic comunication sysytem
Electronic comunication sysytem
 
ДЕНЬ РIДНОЇ МОВИ
 ДЕНЬ РIДНОЇ МОВИ ДЕНЬ РIДНОЇ МОВИ
ДЕНЬ РIДНОЇ МОВИ
 
Praticas clinicas doc final
Praticas clinicas doc finalPraticas clinicas doc final
Praticas clinicas doc final
 
Prisão de luxo!
Prisão de luxo!Prisão de luxo!
Prisão de luxo!
 

Similar to ID Theft: What You Need to Know - Juliana Harris

Fraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFairfax County
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SINEmilyMoar
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca- Mark - Fullbright
 
Id theft avoiding and detecting
Id theft avoiding and detectingId theft avoiding and detecting
Id theft avoiding and detectingscstatelibrary
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Identity Theft
Identity TheftIdentity Theft
Identity TheftBlinsink
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudEvan Francen
 
Fair Credit Report Act
Fair Credit Report ActFair Credit Report Act
Fair Credit Report ActMark Clayborne
 
Labor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Labor and Employment Roundtable Privacy Rights and Other Onboarding IssuesLabor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Labor and Employment Roundtable Privacy Rights and Other Onboarding IssuesPolsinelli PC
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
What You Should Know About Your Credit Report
What You Should Know About Your Credit ReportWhat You Should Know About Your Credit Report
What You Should Know About Your Credit Report- Mark - Fullbright
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do listSandy Kleinhenz
 

Similar to ID Theft: What You Need to Know - Juliana Harris (20)

Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
 
Fraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying Information
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SIN
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
Id theft avoiding and detecting
Id theft avoiding and detectingId theft avoiding and detecting
Id theft avoiding and detecting
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
 
Revised Credit
Revised CreditRevised Credit
Revised Credit
 
Revised Credit
Revised CreditRevised Credit
Revised Credit
 
Building a Better Credit Report
Building a Better Credit ReportBuilding a Better Credit Report
Building a Better Credit Report
 
Fair Credit Report Act
Fair Credit Report ActFair Credit Report Act
Fair Credit Report Act
 
Labor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Labor and Employment Roundtable Privacy Rights and Other Onboarding IssuesLabor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Labor and Employment Roundtable Privacy Rights and Other Onboarding Issues
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
What You Should Know About Your Credit Report
What You Should Know About Your Credit ReportWhat You Should Know About Your Credit Report
What You Should Know About Your Credit Report
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 

More from IT-oLogy

Low Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De BlockLow Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De BlockIT-oLogy
 
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...IT-oLogy
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserIT-oLogy
 
Cyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoCyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoIT-oLogy
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerIT-oLogy
 
Open Security - Chad Cravens
Open Security - Chad CravensOpen Security - Chad Cravens
Open Security - Chad CravensIT-oLogy
 
Live Exploit - Chad Cravens
Live Exploit - Chad CravensLive Exploit - Chad Cravens
Live Exploit - Chad CravensIT-oLogy
 
Software Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsSoftware Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsIT-oLogy
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterIT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy
 
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt GardnerIT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt GardnerIT-oLogy
 

More from IT-oLogy (18)

Low Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De BlockLow Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De Block
 
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
 
Cyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoCyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett Coco
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les Eisner
 
Open Security - Chad Cravens
Open Security - Chad CravensOpen Security - Chad Cravens
Open Security - Chad Cravens
 
Live Exploit - Chad Cravens
Live Exploit - Chad CravensLive Exploit - Chad Cravens
Live Exploit - Chad Cravens
 
Software Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsSoftware Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce Jenkins
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
 
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt GardnerIT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

ID Theft: What You Need to Know - Juliana Harris

  • 1.   Juliana Harris, Senior Communications Coordinator South Carolina Department of Consumer Affairs
  • 2.  The State’s Consumer Protection Agency  6 Divisions
  • 3. Commission on Consumer Affairs Administrator Council of Advisors Consumer Services & Education Administration Advocacy Legal Public Information Identity Theft Unit • Organizational Structure
  • 4.  Attempts to resolve consumer complaints against businesses. DCA fields complaints from consumers, if they have a problem with a household product or service a business has sold them.  Receives approximately 400-500 written complaints and about 4,000 phone calls each month.  The Division has consistently resolved about 85% of the complaints in a satisfactory manner. SCDCA
  • 5.  provides support for the other Divisions including personnel, accounting, data processing and purchasing.  Processes regulatory filings for: o Maximum Rate—creditors charging in excess of 18% o Credit Grantor Notification—creditors grossing over $150,000 annual o Motor Vehicle Dealer Closing Costs– Dealers charging a doc fee SCDCA
  • 6.  Represents the public at large by intervening in insurance rate cases/ filings. Includes workers’ compensation, auto, home, etc.  Administers & enforces the following regulatory programs: o Continuing Care Retirement Communities o Discount Medical Plan Organizations o Professional Employer Organizations SCDCA
  • 7.  Helps the Administrator to administer and enforce the Consumer Protection Code and various other laws that have been assigned to the Department for Regulation.  Can investigate and bring enforcement actions, both administratively and in court, for violations of the Consumer Protection Code.  Some industries the Department regulates: • Mortgage Brokers • Pawn Brokers • Prepaid Legal • Preneed Funeral SCDCA
  • 8.  Serves as the main consumer education portal for consumers, business and media.  Launched SCDCA-TV on YouTube and uses Twitter.  Make presentations and sponsor webinars on ID Theft, debt collection, foreclosures, credit and other popular topics.  The Division also disseminates press releases and consumer education brochures. SCDCA
  • 9.  Celebrated Second Anniversary October 1, 2015!  Takes scam reports, ID Theft reports and conducts outreach.  Education. Guidance. Enforcement.  Receives security breach notices.
  • 10. • FTC’s #1 complaint in 2014 was ID Theft. (13%) • SC ranks #30 in nation for volume of ID Theft Complaints. • Billions in financial losses each year.
  • 11. SC Stats: ID Theft Complaints: 2014 – 30th 2013 – 17th 2012 – 17th 2011 – 20th 2010- 29th 2009- 28th 2008- 29th 2007- 30th
  • 12.  35% Government Documents/Benefits Fraud  Unlawful use or counterfeit of gov’t issued documents  14% Phone or Utilities Fraud  Obtaining these services with false info  13% Credit Card Fraud  Opening a line of credit with false info * From FTC Consumer Sentinel 2014 Report
  • 13.  Friends & Family  Pretexting  Phishing  Skimming  Pre-Approval Offers  Unscrupulous employees @ businesses with which you have a relationship  Dumpster Diving  Hacking/Security Breach  Scams
  • 14.  The copying of electronically transmitted data on the magnetic strip of a credit card, to enable valid electronic payment authorization to occur between a merchant and the issuing financial institution.  ID thieves steal credit/debit card numbers by using a special storage device when processing your card.
  • 15. Cameras to view password entry Card electronic strip readers Keystroke Capturers SKIMMING - Electronic card strip readers
  • 16.
  • 17. Sending authentic-looking but fraudulent e-mail designed to trick a person into giving out personal information.
  • 18.  “Spear phishing”  scam artists have some inside information, such as the consumer’s name or knowledge of who the consumer does business with, which they use to seem more legitimate in their request for personal data.  E-mails that appear to be from American Airlines claiming to:  have an e-ticket attached; or  that the consumer needs to change an account password.
  • 19.
  • 20. • Similar to phishing, but uses text messages on cellphones and smartphones • 2 common types: 1. Receive an urgent text that appears to be from a trusted source (bank, credit card company): “card stolen” or “account frozen”; instructed to call number or go to particular website to “verify account” = thieves steal info 2. Same as above, but message contains attachment: virus or malware
  • 21.
  • 22. Fraud Alert Security Freeze Monitor your financial and personal statements
  • 23.  Lasts 90 days.  Alerts businesses that may be viewing your report to take extra steps to verify your identity.  Entitles you to another free credit report from each of the three CRAs.  ONE call that’s all!
  • 24.  Free for SC residents to place OR lift.  Stops anyone from accessing your credit report. o No new lines of credit in your name  Thaw when you want to apply for new credit.  Place with EACH of the three credit reporting agencies (CRAs).
  • 25.  Equifax: 800-685-1111 or www.freeze.equifax.com
  • 26.  800-680-7289 or http://freeze.transunion.com  You will have to make an account to place the freeze with TransUnion online.
  • 28. To apply for new lines of credit or ANY good/service that requires the business to run a credit check: o YOU WILL NEED YOUR PINS. Keep them together and in a secure place.
  • 29.  www.annualcreditreport.com  1-877-322-8228  Review it at least once a year!  Dispute errors or old information.
  • 30.  May offer to “lock”, “flag”, or freeze your credit.  Place fraud alert.  Troll black market internet sites that traffic PII.  Research before you buy.  Remember, state and federal law allows you to do many of these things for free!
  • 32. Account balance falls below X amount. o Charge of more than X amount.  Banks and credit unions often offer these for free. o Get texts, e-mail or calls. Contact your financial institution for more info.
  • 33.  Transcripts are free: o outline most of information included on a tax return submitted with the requestor’s information. o review the document for signs that someone is • reporting earnings • filing taxes, in their name.  To request a transcript, visit www.irs.gov/uac/Tax-Return- Transcripts, call 800-908-9946 or use the IRS2Go mobile app.
  • 34.  Eligible to sign up whether retired or still working o review benefit and payment information; o address and phone number on record; and o Establish direct deposit accounts.  Review regularly to catch possible identity theft quickly.  For more information on this program, visit www.ssa.gov/myaccount.
  • 35.  Your SSN can be used to get: o Medical benefits o Government benefits o Tax refund o Credit o Jobs
  • 36.  That’s why you must monitor your: o credit reports o bank statements o credit card statements o explanation of benefits from insurance provider
  • 37.  Mistakes on your financial statements.  Bills don’t arrive on time.  Bills or collection notices for things you never purchased.  Unexpectedly denied a loan.  You don’t get your tax refund and end up owing the IRS.
  • 38.  Dispose of sensitive materials appropriately.  Don’t disclose personal info to someone you don’t know. o On the phone o Online o Through the mail  Be cautious when shopping online.  Don’t carry things like your SS card, birth certificate.  Monitor your credit reports! 877-322-8228  Opt out of pre-screened credit offers. Call: 1-888-5- OPTOUT (1-888-567- 8688).
  • 39.  http://www.ftc.gov/idtheft  You can order publications for free from the FTC.
  • 41. Check out our YouTube channel. Youtube.com/scdcatv Look to Twitter for recent scam alerts and the latest consumer news. @SCDCA Visit Facebook for updates and educational materials. Facebook.com/scdca
  • 42. To receive news releases and other publications contact: Juliana Harris Senior Communications Coordinator jharris@scconsumer.gov 803.734.4296