SlideShare a Scribd company logo
1 of 1
Download to read offline
Child Identity
Theft 101
n	Don’t share personal information, especially your child’s social security 	
	 number, unless required; always ask why it is requested
n	Explain to children the need to protect personal information online and on 	
	 electronic devices; instruct them about secure passwords
n	Encourage teens to activate privacy settings on all social media accounts, 	
	 friend only people they know, and avoid posting birth date, phone number 	
	 and address
n	Teach children to identify phishing and other scams; instruct them not to 	
	 open emails or download attachments from anyone they don’t know
n	Keep your children’s birth certificates, social security numbers and tax 	
	 documents safely stored and locked
n	Consider opting out of your child’s student directory if you are concerned 	
	 about how this personal information is shared
n	Shred documents with your child’s personal information before tossing or 	
	recycling
n	Freeze your child’s credit to prohibit anyone, including your child, from 	
	 opening credit accounts; lift the freeze when the child turns 18
n	Check whether your child has a credit report when he or she turns 16, 	
	 and correct any fraudulent entries before the child applies for a job or a 	
	 college loan
	 *Source: https://www.cnbc.com/2018/04/24/child-identity-theft-is-a-growing-and-expensive-problem.html
More than 1 million children were victims of identity theft or fraud
in 2017. Two-thirds of those affected were age 7 or younger.*
While fraudsters steal the identities of adults to dig into their account balances,
they seek out children and teens in order to open new lines of credit and act
upon them before anyone catches on.
What Puts Our Children and Teens at Risk?
n	The lack of a current credit report tied to most children’s social
	 security numbers
n	Randomized assignment of social security numbers since 2011 means 		
	 that a newborn’s SSN might already have a false credit history
n	Children and teens are susceptible to fraud by people they know well, 		
	 including a close family friend or your partner/spouse
What Are Common Signs of Identity Theft?
n	Your child receives pre-approved credit card offers in the mail
n	Your child receives collection letters regarding unpaid bills
n	You or your child are turned down for government benefits
n	You are notified by the IRS that the child didn’t pay income taxes
n	You learn that your child’s SSN was used on another tax return
What Can You Do About Child Identity Theft?
www.nyccrimelawyer.com

More Related Content

Similar to Child identity-theft-101

Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...Ken Fishkin, CISSP, CIPP/US, CIPT
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overviewgaby350
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
 

Similar to Child identity-theft-101 (20)

Minors & ID Theft
Minors & ID TheftMinors & ID Theft
Minors & ID Theft
 
Child ID Theft Report 2012
Child ID Theft Report 2012Child ID Theft Report 2012
Child ID Theft Report 2012
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
ID Theft
ID TheftID Theft
ID Theft
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 

Recently uploaded

A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreelreely ones
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoUXDXConf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxEasyPrinterHelp
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 

Recently uploaded (20)

A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 

Child identity-theft-101

  • 1. Child Identity Theft 101 n Don’t share personal information, especially your child’s social security number, unless required; always ask why it is requested n Explain to children the need to protect personal information online and on electronic devices; instruct them about secure passwords n Encourage teens to activate privacy settings on all social media accounts, friend only people they know, and avoid posting birth date, phone number and address n Teach children to identify phishing and other scams; instruct them not to open emails or download attachments from anyone they don’t know n Keep your children’s birth certificates, social security numbers and tax documents safely stored and locked n Consider opting out of your child’s student directory if you are concerned about how this personal information is shared n Shred documents with your child’s personal information before tossing or recycling n Freeze your child’s credit to prohibit anyone, including your child, from opening credit accounts; lift the freeze when the child turns 18 n Check whether your child has a credit report when he or she turns 16, and correct any fraudulent entries before the child applies for a job or a college loan *Source: https://www.cnbc.com/2018/04/24/child-identity-theft-is-a-growing-and-expensive-problem.html More than 1 million children were victims of identity theft or fraud in 2017. Two-thirds of those affected were age 7 or younger.* While fraudsters steal the identities of adults to dig into their account balances, they seek out children and teens in order to open new lines of credit and act upon them before anyone catches on. What Puts Our Children and Teens at Risk? n The lack of a current credit report tied to most children’s social security numbers n Randomized assignment of social security numbers since 2011 means that a newborn’s SSN might already have a false credit history n Children and teens are susceptible to fraud by people they know well, including a close family friend or your partner/spouse What Are Common Signs of Identity Theft? n Your child receives pre-approved credit card offers in the mail n Your child receives collection letters regarding unpaid bills n You or your child are turned down for government benefits n You are notified by the IRS that the child didn’t pay income taxes n You learn that your child’s SSN was used on another tax return What Can You Do About Child Identity Theft? www.nyccrimelawyer.com