SlideShare a Scribd company logo
1 of 10
Download to read offline
IDENTITY
How to Protect Yourself From
T H E F T
w w w .c o n s u m e r l a w c h i c a g o .c o m
W H A T I S
A person or entity using your
information in a fraudulent manner
Purposeful deception to gain private
information
Creating schemes to earn another's
money, benefits, etc.
I D E N T I T Y T H E F T ?
DIGITAL IDENTITY
THEFT
Through email schemes,
hacking, and other online
plans, thieves steal
confidential information
for their own use.
INSURANCE
IDENTITY THEFT
Thieves use your medical
insurance information to
get medical care,
prescriptions, and more.
TAX IDENTITY
THEFT
Using falsified tax return
information, thieves collect
hundreds of thousands of
dollars from others' tax
returns.
T Y P E S O F
I D E N T I T Y T H E F T :
P R O T E C T Y O U R S E L F :
Never give out your passwords
Only visit trusted websites
Never reveal imperative information like
account numbers, social security
numbers, your mother's maiden name,
etc.
Don't open unverified emails
D I G I T A L I D E N T I T Y T H E F T ?
P R O T E C T Y O U R S E L F :
Never give benefit information to
untrusted person or site
Regularly check your medical benefits to
ensure charges make sense and were
from you or your family members
Visit trusted locations for medical care
and to purchase prescriptions
I N S U R A N C E I D E N T I T Y T H E F T ?
P R O T E C T Y O U R S E L F :
Submit your tax returns to a verified
source
Never give out your social security
number to untrusted entities
Shred all documentation that contains
personal information
T A X I D E N T I T Y T H E F T ?
HELP YOU!
Our Lawyers Can
A F T E R I D E N T I T Y T H E F T
STOP FUTURE
FRAUDULENT CHARGES
We will help you put a stop
on all of your breached
information to ensure
further fraud isn't
committed.
INVESTIGATE HOW
FRAUD OCCURRED
Find out how your
information was stolen,
how/where/when it was
used, and by whom.
SEEK FINANCIAL
COMPENSATION
We will seek compensation
for your losses plus interest
and seek retribution against
the identity thief or thieves.
H E L P F R O M O U R
L A W Y E R S :
ATTORNEYS
Markoff Leinberger
S E R V I N G C H I C A G O
CONTACT
(877) 905-5161
F r e e C o n s u m e r R i g h t s C o n s u l t a t i o n !

More Related Content

What's hot

The Power of Email
The Power of EmailThe Power of Email
The Power of EmailGranicus
 
How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac JackMathew4
 
2016_WM_Skimmer_Brochure
2016_WM_Skimmer_Brochure2016_WM_Skimmer_Brochure
2016_WM_Skimmer_BrochureJames Marshall
 
Power & Governance of the Internet - Surveillance & Privacy
Power & Governance of the Internet - Surveillance & PrivacyPower & Governance of the Internet - Surveillance & Privacy
Power & Governance of the Internet - Surveillance & PrivacyAndrew Smalley
 

What's hot (7)

The Power of Email
The Power of EmailThe Power of Email
The Power of Email
 
Scams will never stop
Scams will never stopScams will never stop
Scams will never stop
 
IRS says be Alert for Tax Scams
IRS says be Alert for Tax ScamsIRS says be Alert for Tax Scams
IRS says be Alert for Tax Scams
 
How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac
 
Frauds and Seniors
Frauds and SeniorsFrauds and Seniors
Frauds and Seniors
 
2016_WM_Skimmer_Brochure
2016_WM_Skimmer_Brochure2016_WM_Skimmer_Brochure
2016_WM_Skimmer_Brochure
 
Power & Governance of the Internet - Surveillance & Privacy
Power & Governance of the Internet - Surveillance & PrivacyPower & Governance of the Internet - Surveillance & Privacy
Power & Governance of the Internet - Surveillance & Privacy
 

Similar to How to Protect Yourself From Identity Theft

Understanding identity theft
Understanding identity theftUnderstanding identity theft
Understanding identity theftPage-1-Solutions
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 
Ftc Avoid Id Theft
Ftc Avoid Id TheftFtc Avoid Id Theft
Ftc Avoid Id TheftCharles Seay
 
Avoid ID Theft
Avoid ID TheftAvoid ID Theft
Avoid ID Theftksiers1
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pntjessmc1
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Identity theft- Horowitz Law
Identity theft- Horowitz LawIdentity theft- Horowitz Law
Identity theft- Horowitz LawSanford Horowitz
 
Faisal Abidi’s suggestions to avoid voice phishing fraud | Voice Phishing Scams
Faisal Abidi’s suggestions to avoid voice phishing fraud | Voice Phishing ScamsFaisal Abidi’s suggestions to avoid voice phishing fraud | Voice Phishing Scams
Faisal Abidi’s suggestions to avoid voice phishing fraud | Voice Phishing ScamsFaisal Abidi
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 

Similar to How to Protect Yourself From Identity Theft (20)

Understanding identity theft
Understanding identity theftUnderstanding identity theft
Understanding identity theft
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Consumer fraud - Just Say No!
Consumer fraud - Just Say No!Consumer fraud - Just Say No!
Consumer fraud - Just Say No!
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Avoiding ID Theft
Avoiding ID TheftAvoiding ID Theft
Avoiding ID Theft
 
Ftc Avoid Id Theft
Ftc Avoid Id TheftFtc Avoid Id Theft
Ftc Avoid Id Theft
 
Avoid ID Theft
Avoid ID TheftAvoid ID Theft
Avoid ID Theft
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft- Horowitz Law
Identity theft- Horowitz LawIdentity theft- Horowitz Law
Identity theft- Horowitz Law
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Phishing
PhishingPhishing
Phishing
 
Faisal Abidi’s suggestions to avoid voice phishing fraud | Voice Phishing Scams
Faisal Abidi’s suggestions to avoid voice phishing fraud | Voice Phishing ScamsFaisal Abidi’s suggestions to avoid voice phishing fraud | Voice Phishing Scams
Faisal Abidi’s suggestions to avoid voice phishing fraud | Voice Phishing Scams
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 

Recently uploaded

Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 

Recently uploaded (20)

Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 

How to Protect Yourself From Identity Theft

  • 1. IDENTITY How to Protect Yourself From T H E F T w w w .c o n s u m e r l a w c h i c a g o .c o m
  • 2. W H A T I S A person or entity using your information in a fraudulent manner Purposeful deception to gain private information Creating schemes to earn another's money, benefits, etc. I D E N T I T Y T H E F T ?
  • 3. DIGITAL IDENTITY THEFT Through email schemes, hacking, and other online plans, thieves steal confidential information for their own use. INSURANCE IDENTITY THEFT Thieves use your medical insurance information to get medical care, prescriptions, and more. TAX IDENTITY THEFT Using falsified tax return information, thieves collect hundreds of thousands of dollars from others' tax returns. T Y P E S O F I D E N T I T Y T H E F T :
  • 4. P R O T E C T Y O U R S E L F : Never give out your passwords Only visit trusted websites Never reveal imperative information like account numbers, social security numbers, your mother's maiden name, etc. Don't open unverified emails D I G I T A L I D E N T I T Y T H E F T ?
  • 5. P R O T E C T Y O U R S E L F : Never give benefit information to untrusted person or site Regularly check your medical benefits to ensure charges make sense and were from you or your family members Visit trusted locations for medical care and to purchase prescriptions I N S U R A N C E I D E N T I T Y T H E F T ?
  • 6. P R O T E C T Y O U R S E L F : Submit your tax returns to a verified source Never give out your social security number to untrusted entities Shred all documentation that contains personal information T A X I D E N T I T Y T H E F T ?
  • 7. HELP YOU! Our Lawyers Can A F T E R I D E N T I T Y T H E F T
  • 8. STOP FUTURE FRAUDULENT CHARGES We will help you put a stop on all of your breached information to ensure further fraud isn't committed. INVESTIGATE HOW FRAUD OCCURRED Find out how your information was stolen, how/where/when it was used, and by whom. SEEK FINANCIAL COMPENSATION We will seek compensation for your losses plus interest and seek retribution against the identity thief or thieves. H E L P F R O M O U R L A W Y E R S :
  • 9. ATTORNEYS Markoff Leinberger S E R V I N G C H I C A G O
  • 10. CONTACT (877) 905-5161 F r e e C o n s u m e r R i g h t s C o n s u l t a t i o n !