SlideShare a Scribd company logo
1 of 2
Download to read offline
 

  Business Identity Theft Fact Sheet

 
 

 

What is Business Identity Theft? 
Business  identity  theft  is  a  relatively  new  type  of  crime  that  is  on  the  rise  and 
spreading quickly throughout the U.S.  According to Dun & Bradstreet, a leading 
provider of business credit information in the U.S., business identity theft cases 
have been reported in at least 22 states. 

Business Identity Theft  


New and rapidly spreading type of ID theft  



Criminals hijack a legit business identity 



Criminals open accounts/steal using the legit 
business ID, often going unnoticed  



The victimized business is left holding the 
debts and credit damages from the crime 

Instead of targeting individuals for identity theft, criminals look for ways to steal 
a  legitimate  business  identity  by  gaining  access  to  its  bank  accounts  and  credit 
cards, as well as other sensitive company information.  Thieves then secure lines 
of credit with banks and retailers at the expense of the victim entity.  Once the 
scheme is uncovered, businesses may need to spend valuable time and resources 
to repair the damage to their credit and reputation, and banks and retailers may 
be left with significant financial losses.    

How Do Criminals Steal Business Identities?  
Examples  of  business  identity  theft  include  a  variety  of  schemes  involving 
fraudulent use of a company’s information, including:  


 

Use of Business Records 




Criminals looking to gain access to online 
business records 





Attempting to exploit state business 



registration websites  


Thieves altering data to open accounts 

 

Impact of Business Identity Theft  


Tarnished business credit history 



Costly and time consuming to fix 

Clever  criminals  are  using  the  economic  downturn  to  their  advantage  by 
targeting inactive companies, or companies that can be re‐instated for business.  

Difficulty obtaining future credit  



Establishing  temporary  office  space  and/or  merchant  accounts  in  your 
company’s name 
Ordering merchandise or services with stolen credit card information, or 
with bogus account details in the name of your company 
Scams  and  phishing  attacks  designed  to  get  access  to  your  company’s 
banking or credit information, including rummaging through your trash 
Filing  bogus  reports  with  state  business  filing  offices,  or  manipulating 
online  business  records,  in  order  to  change  your  registered  address  or 
appoint new officers/change your registered agent information (to then 
establish lines of credit with banks and retailers) 

 

State and National Efforts 


Outreach to the business community, 
particularly small and medium‐sized entities 



Information‐sharing between the States 



How Can Businesses Prevent Business Identity Theft? 
One of the most effective ways to protect your business from identity theft is by 
regularly checking your records with the Secretary of State’s office (or the state 
agency responsible for housing such information).  These offices provide online 
search features that make it easy to check and verify that business registration 
information  is  accurate.    Businesses  should  notify  the  Secretary  of  State of  any 
unauthorized changes.  Other prevention steps include:  

Establishment of National Association of 
Secretaries of State Identity Theft Task Force 

 



Sign up for email notification of business record changes, if available 



Monitor credit reports and sign up for a credit monitoring service 

 
National Association of Secretaries of State   

                                                                                          June 2011 
 
 

(Continued)  How Can Businesses Prevent Business 
Identity Theft? 


Monitor  business  accounts,  bills,  credit  card  statements,  etcetera,  and 
reconcile your statements on a regular basis 



Sign  up  for  email  notifications  from  banks  and  other  creditors,  if 
available 



File  all  reports  and  renewals  with  state  filing  offices  in  a  timely  and 
thorough  manner,  and  remain  aware  of  who  has  access  to  this 
information within your company 

Tips to Shield Yourself from Business 



Identity Theft 



Continue checking business records, even if your business is dissolved or 
inactive 
Safeguard your company’s sensitive information, including account 
numbers and passwords, being sure to shred any trash that contains this 
information 
Ensure that your computers are secure, and train employees to avoid 
phishing scams and emails that may contain malicious viruses  



Prevent:  Check business records regularly 



Protect:  Sign up for email alerts available & 



monitor credit reports on a regular basis 


Preserve:  Report any irregularities or 
problems immediately  

 

If You Suspect a Problem 


Contact law enforcement  and credit agencies 



Contact the Secretary of State’s office 



If you suspect that your company has become a victim of business identity theft, 
it is important to take quick action to minimize the potential damage.  Steps you 
should take in this situation include: 

Notify banks and creditors right away 



What to Do if Business Identity Theft Occurs? 

Correct any altered business records  




Place a fraud alert on business/merchant accounts 



Notify local and/or state law enforcement officials 



Request  copies  of  documentation  used  to  fraudulently  open  or  access 
accounts 



 

Report the issue to the credit reporting agencies (e.g. Dun & Bradstreet, 
Equifax, Experian, TransUnion) 


 

Contact  banks,  credit  card  providers,  and  other  relevant  creditors  to 
notify them of the fraud 

If  the  theft  involves  unauthorized  changes  to  business  information  on 
file with the state, correct the records and notify the Secretary of State’s 
Office (or the state agency responsible for housing such information)  

 
 
 
 
 

 

 

 

 

Additional State and National Resources 
 
State Website Page Here: www.ProtectYourBusiness.us  
 
The National Association of Secretaries of State: www.nass.org  
 
National Federation of Independent Small Business: www.nfib.org  
 
U.S. Secret Service Field Offices: www.secretservice.gov/field_offices.shtml 
 

 

National Association of Secretaries of State   

                                                                                          June 2011 

More Related Content

More from - Mark - Fullbright

Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 

More from - Mark - Fullbright (20)

Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

Business Identity Theft Fact Sheet

  • 1.     Business Identity Theft Fact Sheet       What is Business Identity Theft?  Business  identity  theft  is  a  relatively  new  type  of  crime  that  is  on  the  rise  and  spreading quickly throughout the U.S.  According to Dun & Bradstreet, a leading  provider of business credit information in the U.S., business identity theft cases  have been reported in at least 22 states.  Business Identity Theft    New and rapidly spreading type of ID theft    Criminals hijack a legit business identity   Criminals open accounts/steal using the legit  business ID, often going unnoticed    The victimized business is left holding the  debts and credit damages from the crime  Instead of targeting individuals for identity theft, criminals look for ways to steal  a  legitimate  business  identity  by  gaining  access  to  its  bank  accounts  and  credit  cards, as well as other sensitive company information.  Thieves then secure lines  of credit with banks and retailers at the expense of the victim entity.  Once the  scheme is uncovered, businesses may need to spend valuable time and resources  to repair the damage to their credit and reputation, and banks and retailers may  be left with significant financial losses.     How Do Criminals Steal Business Identities?   Examples  of  business  identity  theft  include  a  variety  of  schemes  involving  fraudulent use of a company’s information, including:      Use of Business Records    Criminals looking to gain access to online  business records    Attempting to exploit state business   registration websites    Thieves altering data to open accounts    Impact of Business Identity Theft    Tarnished business credit history   Costly and time consuming to fix  Clever  criminals  are  using  the  economic  downturn  to  their  advantage  by  targeting inactive companies, or companies that can be re‐instated for business.   Difficulty obtaining future credit    Establishing  temporary  office  space  and/or  merchant  accounts  in  your  company’s name  Ordering merchandise or services with stolen credit card information, or  with bogus account details in the name of your company  Scams  and  phishing  attacks  designed  to  get  access  to  your  company’s  banking or credit information, including rummaging through your trash  Filing  bogus  reports  with  state  business  filing  offices,  or  manipulating  online  business  records,  in  order  to  change  your  registered  address  or  appoint new officers/change your registered agent information (to then  establish lines of credit with banks and retailers)    State and National Efforts   Outreach to the business community,  particularly small and medium‐sized entities   Information‐sharing between the States   How Can Businesses Prevent Business Identity Theft?  One of the most effective ways to protect your business from identity theft is by  regularly checking your records with the Secretary of State’s office (or the state  agency responsible for housing such information).  These offices provide online  search features that make it easy to check and verify that business registration  information  is  accurate.    Businesses  should  notify  the  Secretary  of  State of  any  unauthorized changes.  Other prevention steps include:   Establishment of National Association of  Secretaries of State Identity Theft Task Force     Sign up for email notification of business record changes, if available   Monitor credit reports and sign up for a credit monitoring service    National Association of Secretaries of State                                                                                              June 2011 
  • 2.     (Continued)  How Can Businesses Prevent Business  Identity Theft?   Monitor  business  accounts,  bills,  credit  card  statements,  etcetera,  and  reconcile your statements on a regular basis   Sign  up  for  email  notifications  from  banks  and  other  creditors,  if  available   File  all  reports  and  renewals  with  state  filing  offices  in  a  timely  and  thorough  manner,  and  remain  aware  of  who  has  access  to  this  information within your company  Tips to Shield Yourself from Business   Identity Theft   Continue checking business records, even if your business is dissolved or  inactive  Safeguard your company’s sensitive information, including account  numbers and passwords, being sure to shred any trash that contains this  information  Ensure that your computers are secure, and train employees to avoid  phishing scams and emails that may contain malicious viruses    Prevent:  Check business records regularly   Protect:  Sign up for email alerts available &   monitor credit reports on a regular basis   Preserve:  Report any irregularities or  problems immediately     If You Suspect a Problem   Contact law enforcement  and credit agencies   Contact the Secretary of State’s office   If you suspect that your company has become a victim of business identity theft,  it is important to take quick action to minimize the potential damage.  Steps you  should take in this situation include:  Notify banks and creditors right away   What to Do if Business Identity Theft Occurs?  Correct any altered business records     Place a fraud alert on business/merchant accounts   Notify local and/or state law enforcement officials   Request  copies  of  documentation  used  to  fraudulently  open  or  access  accounts     Report the issue to the credit reporting agencies (e.g. Dun & Bradstreet,  Equifax, Experian, TransUnion)     Contact  banks,  credit  card  providers,  and  other  relevant  creditors  to  notify them of the fraud  If  the  theft  involves  unauthorized  changes  to  business  information  on  file with the state, correct the records and notify the Secretary of State’s  Office (or the state agency responsible for housing such information)                     Additional State and National Resources    State Website Page Here: www.ProtectYourBusiness.us     The National Association of Secretaries of State: www.nass.org     National Federation of Independent Small Business: www.nfib.org     U.S. Secret Service Field Offices: www.secretservice.gov/field_offices.shtml      National Association of Secretaries of State                                                                                              June 2011