SlideShare a Scribd company logo
1 of 10
ftc.gov/PassItOn
Identity Theft
What is identity theft, and
how can it hurt you?
Someone uses your personal or financial information
without your permission
 to buy things with your credit cards
 open new accounts (credit cards, loans)
 to get medical care using your benefits
How to protect against identity theft
Protect your Social Security number
Shred documents before discarding
Use strong passwords online
How to spot identity theft
Read account statements and bills
Read explanations of medical benefits
Keep track of bills and mail
How to spot identity theft
Get and review your credit reports
 Go to AnnualCreditReport.com
 Or call 1-877-322-8228
What to do if identity theft happens
Contact business where charges were made
or accounts were opened.
Place a fraud alert on your credit reports
Get your credit reports
Report at IdentityTheft.gov and get a personalized
recovery plan.
Start a conversation
Share what you know, your strategies and ideas
Get more information at ftc.gov/PassItOn
ReportFraud.ftc.gov
1-877-FTC-HELP
Report it
Questions?
Thank you!

More Related Content

Similar to IdentityTheft by federal trade comission

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameSpringboard
 
Scams 0710
Scams 0710Scams 0710
Scams 0710KEIRO2
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisIT-oLogy
 
Fraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFairfax County
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 

Similar to IdentityTheft by federal trade comission (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
Idt
IdtIdt
Idt
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 
Protecting Vanderbilt Information
Protecting Vanderbilt InformationProtecting Vanderbilt Information
Protecting Vanderbilt Information
 
Guarding Vanderbilt information
Guarding Vanderbilt informationGuarding Vanderbilt information
Guarding Vanderbilt information
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Scams 0710
Scams 0710Scams 0710
Scams 0710
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
Fraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying Information
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 

More from VivekanandaGN1

Cybercrime Mobile and Wireless Devices.pptx
Cybercrime Mobile and  Wireless Devices.pptxCybercrime Mobile and  Wireless Devices.pptx
Cybercrime Mobile and Wireless Devices.pptxVivekanandaGN1
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesVivekanandaGN1
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
GANS Project for Image idetification.pdf
GANS Project for Image idetification.pdfGANS Project for Image idetification.pdf
GANS Project for Image idetification.pdfVivekanandaGN1
 
Cheat sheet SQL commands with examples and easy understanding
Cheat sheet SQL commands with examples and easy understandingCheat sheet SQL commands with examples and easy understanding
Cheat sheet SQL commands with examples and easy understandingVivekanandaGN1
 
Master the arrays and algorithms using Algotutor
Master the arrays and algorithms using AlgotutorMaster the arrays and algorithms using Algotutor
Master the arrays and algorithms using AlgotutorVivekanandaGN1
 

More from VivekanandaGN1 (6)

Cybercrime Mobile and Wireless Devices.pptx
Cybercrime Mobile and  Wireless Devices.pptxCybercrime Mobile and  Wireless Devices.pptx
Cybercrime Mobile and Wireless Devices.pptx
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
GANS Project for Image idetification.pdf
GANS Project for Image idetification.pdfGANS Project for Image idetification.pdf
GANS Project for Image idetification.pdf
 
Cheat sheet SQL commands with examples and easy understanding
Cheat sheet SQL commands with examples and easy understandingCheat sheet SQL commands with examples and easy understanding
Cheat sheet SQL commands with examples and easy understanding
 
Master the arrays and algorithms using Algotutor
Master the arrays and algorithms using AlgotutorMaster the arrays and algorithms using Algotutor
Master the arrays and algorithms using Algotutor
 

Recently uploaded

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 

Recently uploaded (20)

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 

IdentityTheft by federal trade comission

  • 3. What is identity theft, and how can it hurt you? Someone uses your personal or financial information without your permission  to buy things with your credit cards  open new accounts (credit cards, loans)  to get medical care using your benefits
  • 4. How to protect against identity theft Protect your Social Security number Shred documents before discarding Use strong passwords online
  • 5. How to spot identity theft Read account statements and bills Read explanations of medical benefits Keep track of bills and mail
  • 6. How to spot identity theft Get and review your credit reports  Go to AnnualCreditReport.com  Or call 1-877-322-8228
  • 7. What to do if identity theft happens Contact business where charges were made or accounts were opened. Place a fraud alert on your credit reports Get your credit reports Report at IdentityTheft.gov and get a personalized recovery plan.
  • 8. Start a conversation Share what you know, your strategies and ideas Get more information at ftc.gov/PassItOn

Editor's Notes

  1. Welcome, introductions. Hand out materials if you have some. Just by being alive, we’ve all been exposed to a certain number of scams. Each of us probably has some strategies for dealing with them, ways to spot them, and ideas for avoiding them. I hope we can share some of those experiences today, because together, we can be stronger than the scammers.
  2. Today we’ll talk about identity theft, something we’ve all probably heard about, and some people here might have experienced. The Federal Trade Commission gets more consumer reports about identity theft than any other issue. Identity theft happens any time someone uses your personal or financial information without your permission. The person could be someone you know or an unknown scammer. The information they steal might include your: name and address credit card or bank account numbers Social Security number, or medical insurance account numbers They could use this information to run up charges on your existing credit cards or take money from your bank account. Or, they could use your Social Security number, license, or other identifying information to open new credit card accounts, apply for loans, or even take out a mortgage in your name. A thief who gets your Medicare or health insurance number can get medical care in your name and file a claim with your name and number. An identity thief can even file a tax return in your name and get your refund. DISCUSSION Has anyone here experienced identity theft, or know someone who has?
  3. Here are a few things you can do — or may be doing already — to protect your information from identity thieves. Safeguard your Social Security number. Ask why someone is asking for it and give it out only when you must. Never give your personal information to someone who calls, emails, or texts you — especially someone who contacts you out of the blue. It could be a scammer trying to steal your information. Scammers call and send email and text messages pretending to be a government agency or business you know. They make up stories — like saying you’re eligible for a refund, or there’s a problem with your account — to try to trick you into giving your Social Security number or account number. But the government doesn’t reach out and ask people for their Social Security numbers or account information. And if you think there’s a problem with your accounts, use a number you find yourself to contact the bank or business. Shred your bills, account statements, credit card offers, and other documents that list personal information before you throw them away. Take your outgoing mail to a locked mailbox so a thief can’t grab your bills and personal checks. And when you set up an online account, create a password that is long and strong. Usually that means a password that has at least 12 characters including letters, numbers, and symbols. Avoid using common words in your password. And use different passwords for different accounts; don’t re-use the same password on multiple sites. That way, if a hacker gets your password for one account, they can’t get into your other accounts. DISCUSSION Does anyone here have other ideas for protecting personal information?
  4. Despite our best efforts to protect our information, sometimes identity theft can happen. To check for signs that someone is mis-using your information, start by regularly reading your account statements and bills. Look for withdrawals from your bank account that you didn’t make or statements from accounts you didn’t open. Review your bills to see if they show purchases you don’t recognize. If your statement shows a charge for three big screen TVs last month, you’ll know if that’s right or not. If you get a notice or explanation of benefits from your health insurance provider, check for medical services you don’t recognize. You know when you go to the doctor and which procedures you’ve had. If your medical statement says you got an MRI, you know if that’s right or not. Take note of when you usually get monthly bills and statements in the mail. If you don’t get mail when you expect it, it could mean an identity thief has taken over your accounts, forwarded your statement to a different address, and is running up charges you don’t see. DISCUSSION Has anyone spotted a sign of identity theft on a statement or bill?
  5. It’s also a good idea to check your credit reports. Your credit report will give you a good idea of what’s happening in your name. It shows any mortgages, loans, or credit you have. Mistakes on your credit report might be signs of identity theft. To get a free copy of your credit report from each of the three big credit reporting companies, visit AnnualCreditReport.com. Under federal law, you can get a free copy of your credit report from each company every 12 months. The three nationwide credit bureaus — Equifax, Experian, and TransUnion — have a centralized website, toll-free telephone number, and mailing address so you can order your free annual reports in one place. Don’t contact the three credit bureaus individually. Use this information to get your free annual credit reports: Go to AnnualCreditReport.com Call 1-877-322-8228 Check your credit report for signs that someone is misusing your information. Look for changes like a new loan or credit card account; changes to your address, phone number or other personal information; or public records that show you filed for bankruptcy. Discussion Has anyone ordered their free credit reports recently? Did you order online or by phone?
  6. If you find out that someone is using your information, act quickly. The sooner you stop the thief, the better. If you know where the thief used your information, contact that company directly. For example, if your credit card is being misused, contact your credit card company. If you find fraudulent withdrawals from your bank account, contact your bank immediately. Next, contact one of the three credit bureaus and place a one-year fraud alert on your credit reports. Find the contact information for the credit bureaus at IdentityTheft.gov. While you’re at IdentityTheft.gov, file an identity theft report with the Federal Trade Commission. IdentityTheft.gov is the government’s one-stop resource for anyone who’s experienced identity theft. At IdentityTheft.gov, you can get a personalized, step-by-step recovery plan based on the type of identity theft that occurred. It has plans to address more than 30 types of identity theft and will walk you through what to do to resolve the problems that identity theft causes.
  7. These are exactly the kinds of conversations we hope will happen as you connect with your friends and family. Because you have this life experience, and you know a lot about a lot of things — including spotting and avoiding these kinds of scams. I’ll bet you have someone in your life who might benefit from a little extra help or information. So pass it on. Talk with them. Share your experience. Give them a flyer or a bookmark to help remind them. Let them know where they can find more information on the FTC’s website — at ftc.gov/PassItOn.
  8. If you or anyone you know spots a scam, the Federal Trade Commission would like to hear about it. Please go online to ReportFraud.ftc.gov or call 1-877-FTC-HELP to report. By reporting fraud, you can help the FTC’s investigators identify scammers and stop them before they get someone’s hard-earned money. It really makes a difference.
  9. Thank you for taking the time to talk with me today, and for sharing your stories with the group. I hope it’s been useful. Are there any other questions? If you’re meeting in person: Remind people to take extra materials for themselves, friends, and family. Thanks!