SlideShare a Scribd company logo
1 of 62
* 2003 FTC Report America’s fastest growing white collar crime * you Could be at risk? you Could be at risk?
What is Identity Theft? Jan. 29, 2005 A Chicago woman “applied for a job at a local Target department store and was denied.  The reason?  She already worked there – or rather, her Social Security number already worked there.  Follow-up investigation revealed the same Social Security Number … used to obtain work at 37 other employers.” The Secret List of ID Theft Victims “ People need to wake up to this problem.  They are destroying people’s credit, Social Security benefits, and everything else.”
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Facts   What is Identity Theft? ID entity T heft
Identity Theft is not just about Credit Cards! ID Theft is an international crime and access to an attorney may be critical  Five Common Types of Identity Theft What is Identity Theft? Drivers License Identity Theft Medical Identity Theft Financial Identity Theft Social Security Identity Theft Character / Criminal  Identity Theft
Driver’s License Identity Theft ,[object Object],[object Object],[object Object],[object Object],What is Identity Theft?
What is Identity Theft? “the Department has discovered that identification information in your file is inconsistent with corresponding records at the Federal  Social Security Administration  …  Before your document can be renewed, any inconsistencies will need to be corrected.  You will need to present legal documents that certify your current legal name, social security number and date of birth.”
What is Identity Theft? February 2004 “ An 82-year-old grandmother, quit driving during the Truman administration.” In 2001 she “suddenly found herself in what she describes as a ‘living hell’ after one of her neighbors, arrested on drunk-driving charges … pretended to be her.  ‘I was told there were warrants for my arrest … I was afraid to answer the phone’.”
Social Security (SSN) Identity Theft ,[object Object],What is Identity Theft? Your SIN in Canada ,[object Object],[object Object],[object Object],[object Object]
Medical Identity Theft ,[object Object],What is Identity Theft? ,[object Object],[object Object],[object Object]
“If the person who steals your health identity has allergies or specific medical conditions that collide with yours for instance … when you go in for care, you may experience a dangerous drug interaction or unknowingly be denied potentially lifesaving medications or treatments because they will assume the thief’s medical information is yours.*” What is Identity Theft? Sept. 2005 *Carole Pennington 9/7/2005 “As the health care system transitions from paper-based to electronic, this crime may become easier to commit and harder to trace. Victims may find it more difficult to recover from medical identity theft as medical errors are disseminated and redisseminated through computer networks and other medical information-sharing pathways.*” May 2006 *Pam Dixon, Pg 3.,5/3/2006 Medical Identity Theft: The information crime that can kill you
Character / Criminal Identity Theft ,[object Object],[object Object],[object Object],[object Object],[object Object],What is Identity Theft?
* Cover, Kiplinger, October, 2005 What is Identity Theft? The October 2005 issue of Kiplinger’s Personal Finance portrayed a different side of Identity Theft when they devoted an entire section to character/criminal identity theft.  “ Identity Theft Update: Could losing your wallet land you in jail?*” October 2005
Financial Identity Theft ,[object Object],[object Object],[object Object],[object Object],[object Object],What is Identity Theft?
Order the Federal Trade Commission  free report Take Charge: Fighting Back Against Identity Theft Phone: 877.IDTHEFT Web: http://www.consumer.gov/idtheft When you read this, it will become crystal clear why it is good for the company and the employee to have an ID Theft service that offers Legal Access, Monitoring, and Restoration versus resolution or reimbursement. What is Identity Theft?
What is Identity Theft? *Pg. 19 ,[object Object],[object Object],See page 13 for additional information
What is Identity Theft? February 2004 ID Theft Victims Face Tough Bank Fights* ,[object Object],[object Object],[object Object],[object Object],*2/18/04 ** Pg.2  *** Pg. 3
“ Each year, 7 to 10 million Americans fall prey to Identity Theft… From massive data-brokerage firms to tiny local banks, your identity is irretrievably  ‘ out there. ’  ” What is Identity Theft?
What is Identity Theft? The DataBased You Meet The DataBased You ™ ™
What is Identity Theft? Your Name 1000’s of aggregators Your Fingerprints and DNA FBI, State, and Local DBS Your Insurance Claims C.L.U.E. DBS, etc... Your Military Record DOD DBS Your Criminal History NCIC DBS Your Real Estate Deeds Clerks of Court DBS Your Legal History State and Federal Court DBS Your Credit History Credit Repositories’ DBS Your Birth Certificate Choice Point DBS, State, etc … Your Phone Number and Tracking Info 1000’s of aggregators Your Social Security Number SSA DBS Your Address 1000’s of DBS The DataBased You ™ Your Driver’s License # and Record   – DMV DBS Your Medical Records MIB DBS, etc … Your Car Registration & Info DMV, Local Treasurer, On Star, etc … DBS
Whether it was hacking, lost computers or lost data tapes, there were 84,797,096*   records lost due to computer  data breeches from major companies.  Between Feb. 15 th  2005 and June 2 nd , 2006: The DataBased You ™ ™ What is Identity Theft? privacyrights.org
Lost, Hacked, or Stolen…  Notables You can’t control The DataBased You ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],™ What is Identity Theft? So many laptops … we lost count i.e. Hotels.com (Ernst & Young)
What is Identity Theft? October 2005 “ Identity thieves are increasingly finding their jackpot is not in your mailbox or kitchen trash bag, but the computer files stored at your chiropractor, accountant or doctor … the future is not burglaries of your home, but of dentists, CPA’s, insurers  etc …*” ID Fraudsters Stay One Step Ahead * MarketWatch, October 2cd, 2005
The Facts   The Cost of Identity Theft ID entity T heft
The Cost to Individuals ,[object Object],[object Object],[object Object],Laws hold victims partially responsible for fraudulent debt after 48 hours, and hold them fully responsible if not reported within 60 days… The Cost of Identity Theft
The Cost to Businesses ,[object Object],[object Object],[object Object],The Cost of Identity Theft * CIO Magazine,  The Coming Pandemic , Michael Freidenberg, May 15 th , 2006
“ People whose identities have been stolen can spend months or years and thousands of dollars cleaning up the mess the thieves have made of their good name and credit record” “ When Bad Things Happen to Your Good Name ”  —  September 2002 The Cost of Identity Theft FEDERAL TRADE COMMISSION
According to the USA Today, Identity Theft is the number one criminal concern for law enforcement over the next decade. The Cost of Identity Theft
“ Thieves are so bold that they held a conference in Kiev, Ukraine, for people interested in breaking into this Growth Industry” The Cost of Identity Theft
The Trends   Important Legislation ID entity T heft
Disclaimer ,[object Object],[object Object],Important Legislation Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
[object Object],[object Object],[object Object],[object Object],Important Legislation… Important Legislation Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You Fair and Accurate Credit Transactions Act (FACTA) Important Legislation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You Gramm, Leach, Bliley Safeguard Rule Important Legislation
Important Legislation Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You Gramm, Leach, Bliley Safeguard Rule Any Organization Includes: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],*The FTC categorizes an impressive list of businesses as FI and these so-called “non-bank” businesses comprise a huge array of firms that may be unaware they are subject to GLB.
HIPAA Security Rule ,[object Object],[object Object],[object Object],[object Object],[object Object],Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You Important Legislation
[object Object],[object Object],[object Object],[object Object],Important Legislation Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You The Safeguard and The Security Rule
* Pg 81, Alberta Venture, Display Until November 11, 2005 “ They’re not after your money, your equipment, or your inventory.  A new breed of criminal wants the personal information you keep on customers, suppliers and employees.  And if you lose it, you’ll wish they went for the cash. ” The October 2005 issue of the Alberta Venture (business journal) talked about a new breed of criminal. Important Legislation
The Facts   Industry Response ID entity T heft
Reimbursement Policies ,[object Object],[object Object],[object Object],[object Object],These policies play a part, but they only help  after  you become aware of the theft… Reimbursement policies do not pay for the fraudulent losses, yet many  think  they do… Industry Response
Monitoring Services ,[object Object],[object Object],[object Object],Monitoring credit activity is the  single best method  to detect identity theft, but … Industry Response * USA Today Estimate, January 2005
Resolution Services ,[object Object],[object Object],Resolution Services provide phone consultation for you,  which is vital , but it is not enough… Professionals steal identities. Doesn’t it just make sense to have professionals restore those identities? Industry Response
Restoration Services ,[object Object],[object Object],Restoration Services provide tremendous relief to you Industry Response Restoration Services provide incredible support, but they do not include monitoring services or legal help, particularly 24-hour legal access in the event you are being arrested …
The Facts   The Best Answer ID entity T heft
Monitoring Services Life Events Legal Plan Restoration Services You The Best Answer … The Complete Wall of Protection The Best Answer
Pre-Paid Legal Services ® , Inc. is the only company with a suite of products that provides help in every area of  Identity Theft  – before, during, and after the crime occurs… The Best Answer
[object Object],[object Object],[object Object],Important Legislation… ,[object Object],[object Object],The Best Answer Responsive Strategy…
 
The Best Answer Five Areas of Coverage – Life Events Legal Plan Preventive  Legal Services Motor Vehicle Legal Services Trial Defense Services Federal Tax Audit Legal Service Other Legal Services 25%
The Legal Shield service will not apply if the member is alleged to be under the influence of or impaired by alcohol, intoxicants, controlled substances, chemicals or medicines, whether prescribed or not; the member is alleged to be involved with domestic violence or stalking; and/or the member is being detained for outstanding warrants. Check benefit availability in your state. Legal Shield  The Legal Shield gives you and your family  24-hour access  to legal consultation if you are detained, for only $1 a month - as an additional benefit to your Family Plan membership. To contact your Provider Law Firm, simply call the  toll-free number on your Legal Shield card. You will  reach the Pre-Paid Legal offices, who will then put  you in contact with your Provider Law Firm, so you  can consult with an attorney about your detainment.  It’s that easy. The Best Answer
Pre-Paid Legal Services ® , Inc.    and   Kroll   Background   America    provide The Best Answer: Harland C. Stonecipher CEO and Founder, Pre-Paid Legal Services, Inc. The Best Answer SHIELD ID entity   T heft TM with the Pre-Paid Legal Plan
Three Areas of Coverage for ID Theft The Best Answer Access to Counsel Restoration Services Continuous Monitoring
[object Object],Why and How We Help You… The plan has Full Restoration*, which means the majority of the time in restoring an employee’s identity is covered by the membership and not done on company time and/or company expense.  Also, use of our Life Events Legal Plan provides help* that addresses 100% of the problem.  * Subject To Terms And Conditions The Best Answer
[object Object],If a number of your employees get notified of improper usage of their identities, this may act as an early warning system to your company of a possible internal breach.  Why and How We Help You… The Best Answer
[object Object],Why and How We Help You… “ One solution that provides an affirmative defense against potential fines, fees, and lawsuits is to offer some sort of identity theft protection as an employee benefit. An employer can choose whether or not to pay for this benefit. The key is to make the protection available, and have a mandatory employee meeting on identity theft and the protection you are making available, similar to what most employers do for health insurance …  Greg Roderick, CEO of Frontier Management, says that his employees "feel like the company's valuing them more, and it's very personal."  Business and Legal Reports 1/19/2006 The Best Answer
[object Object],Why and How We Help You… ,[object Object],[object Object],To protect yourself, you could have all employees sign this document… Be Sure To Check With Your Attorney Before Using A Form Such As This The Best Answer Use of Confidential Information by Employee
Be Sure To Check With Your Attorney Before Using A Form Such As This The Best Answer
[object Object],Be Sure To Check With Your Attorney Before Using A Form Such As This According to Betsy Broder of the FTC, “We will act against businesses that fail to protect their data … She understands that most small businesses cannot be expected to hire a full time privacy specialists but adds that all businesses  must  be able to show they have a security plan in place. “We’re not looking for a perfect system .. But we need to see that you’ve taken reasonable steps to protect your customers’ information”. March 2006 – “Stolen Lives” Employee Confidentiality Document The Best Answer Use of Confidential Information by Employee
The Facts Action Steps ID entity T heft
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Action Steps Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
Action Steps ,[object Object],[object Object],[object Object],Be Sure To Check With Your Attorney On  How This Law May Specifically Apply To You
Pre-Paid Legal  Services ® , Inc. and subsidiaries Thank You! Pre-Paid Legal Services, Inc.

More Related Content

What's hot

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionBayo Cary
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca- Mark - Fullbright
 

What's hot (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
IDShield
IDShieldIDShield
IDShield
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protection
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 

Viewers also liked

R3L+ project material: Reviving Limerick CDB City of Learning Strategy, Janua...
R3L+ project material: Reviving Limerick CDB City of Learning Strategy, Janua...R3L+ project material: Reviving Limerick CDB City of Learning Strategy, Janua...
R3L+ project material: Reviving Limerick CDB City of Learning Strategy, Janua...Randolph Preisinger-Kleine
 
Aug. 7, 2009 - Signature
Aug. 7, 2009 - SignatureAug. 7, 2009 - Signature
Aug. 7, 2009 - Signaturethesig
 
12th June Meeting Summary
12th June Meeting Summary12th June Meeting Summary
12th June Meeting SummaryAlan Bassett
 
Simple SEO - SEO Made Simple - Do It Yourself SEO
Simple SEO - SEO Made Simple - Do It Yourself SEOSimple SEO - SEO Made Simple - Do It Yourself SEO
Simple SEO - SEO Made Simple - Do It Yourself SEOThe JAR Group
 
Presentacion Guillemi
Presentacion GuillemiPresentacion Guillemi
Presentacion GuillemiDavid Encina
 
Back to School 2014
Back to School 2014Back to School 2014
Back to School 2014Laura Rieben
 
Present สื่อการสอน พรพรหม
Present สื่อการสอน พรพรหมPresent สื่อการสอน พรพรหม
Present สื่อการสอน พรพรหมguest8ec15d
 
Resume Laurent COURBET
Resume Laurent COURBETResume Laurent COURBET
Resume Laurent COURBETguest4e5bf
 
Kogeneracja - efektywne wykorzystanie energii cieplnej
Kogeneracja - efektywne wykorzystanie energii cieplnejKogeneracja - efektywne wykorzystanie energii cieplnej
Kogeneracja - efektywne wykorzystanie energii cieplnejEkokonsultacje
 
Propozycja przebudowy układu drogowego w rejonie Karolina i Koziegłów
Propozycja przebudowy układu drogowego w rejonie Karolina i KoziegłówPropozycja przebudowy układu drogowego w rejonie Karolina i Koziegłów
Propozycja przebudowy układu drogowego w rejonie Karolina i KoziegłówEkokonsultacje
 
Wtl firework safety - issue 1 - october 2013
Wtl   firework safety - issue 1 - october 2013Wtl   firework safety - issue 1 - october 2013
Wtl firework safety - issue 1 - october 2013Alan Bassett
 
Revitalize Your Career And Job Search
Revitalize Your Career And Job SearchRevitalize Your Career And Job Search
Revitalize Your Career And Job SearchKatDiDio
 
Beyond the Course: Making more of e-learning.
Beyond the Course: Making more of e-learning.Beyond the Course: Making more of e-learning.
Beyond the Course: Making more of e-learning.Brightwave Group
 
94 Crane Overturns
94   Crane Overturns94   Crane Overturns
94 Crane OverturnsAlan Bassett
 
kasina: Costs of Compensation - Sales & National Accounts 2009
kasina: Costs of Compensation - Sales & National Accounts 2009kasina: Costs of Compensation - Sales & National Accounts 2009
kasina: Costs of Compensation - Sales & National Accounts 2009kasina
 
Ideavirus Readand Share
Ideavirus Readand ShareIdeavirus Readand Share
Ideavirus Readand ShareManuel Fal
 

Viewers also liked (20)

Cyber Nasism
Cyber NasismCyber Nasism
Cyber Nasism
 
R3L+ project material: Reviving Limerick CDB City of Learning Strategy, Janua...
R3L+ project material: Reviving Limerick CDB City of Learning Strategy, Janua...R3L+ project material: Reviving Limerick CDB City of Learning Strategy, Janua...
R3L+ project material: Reviving Limerick CDB City of Learning Strategy, Janua...
 
Aug. 7, 2009 - Signature
Aug. 7, 2009 - SignatureAug. 7, 2009 - Signature
Aug. 7, 2009 - Signature
 
12th June Meeting Summary
12th June Meeting Summary12th June Meeting Summary
12th June Meeting Summary
 
Simple SEO - SEO Made Simple - Do It Yourself SEO
Simple SEO - SEO Made Simple - Do It Yourself SEOSimple SEO - SEO Made Simple - Do It Yourself SEO
Simple SEO - SEO Made Simple - Do It Yourself SEO
 
Presentacion Guillemi
Presentacion GuillemiPresentacion Guillemi
Presentacion Guillemi
 
Back to School 2014
Back to School 2014Back to School 2014
Back to School 2014
 
Present สื่อการสอน พรพรหม
Present สื่อการสอน พรพรหมPresent สื่อการสอน พรพรหม
Present สื่อการสอน พรพรหม
 
Serving the Difference
Serving the DifferenceServing the Difference
Serving the Difference
 
Resume Laurent COURBET
Resume Laurent COURBETResume Laurent COURBET
Resume Laurent COURBET
 
Kogeneracja - efektywne wykorzystanie energii cieplnej
Kogeneracja - efektywne wykorzystanie energii cieplnejKogeneracja - efektywne wykorzystanie energii cieplnej
Kogeneracja - efektywne wykorzystanie energii cieplnej
 
NLUG LinuxCon09 Presentation
NLUG LinuxCon09 PresentationNLUG LinuxCon09 Presentation
NLUG LinuxCon09 Presentation
 
Propozycja przebudowy układu drogowego w rejonie Karolina i Koziegłów
Propozycja przebudowy układu drogowego w rejonie Karolina i KoziegłówPropozycja przebudowy układu drogowego w rejonie Karolina i Koziegłów
Propozycja przebudowy układu drogowego w rejonie Karolina i Koziegłów
 
Wtl firework safety - issue 1 - october 2013
Wtl   firework safety - issue 1 - october 2013Wtl   firework safety - issue 1 - october 2013
Wtl firework safety - issue 1 - october 2013
 
Revitalize Your Career And Job Search
Revitalize Your Career And Job SearchRevitalize Your Career And Job Search
Revitalize Your Career And Job Search
 
Beyond the Course: Making more of e-learning.
Beyond the Course: Making more of e-learning.Beyond the Course: Making more of e-learning.
Beyond the Course: Making more of e-learning.
 
Kelly C.Ruggles
Kelly C.RugglesKelly C.Ruggles
Kelly C.Ruggles
 
94 Crane Overturns
94   Crane Overturns94   Crane Overturns
94 Crane Overturns
 
kasina: Costs of Compensation - Sales & National Accounts 2009
kasina: Costs of Compensation - Sales & National Accounts 2009kasina: Costs of Compensation - Sales & National Accounts 2009
kasina: Costs of Compensation - Sales & National Accounts 2009
 
Ideavirus Readand Share
Ideavirus Readand ShareIdeavirus Readand Share
Ideavirus Readand Share
 

Similar to Risk Managers Presentation

Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Group Presentation
Group PresentationGroup Presentation
Group Presentationdkmarshall
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Group Presentation
Group PresentationGroup Presentation
Group Presentationabethune
 
Group Presentation
Group PresentationGroup Presentation
Group PresentationWrennEvents
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 

Similar to Risk Managers Presentation (19)

Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 

Risk Managers Presentation

  • 1. * 2003 FTC Report America’s fastest growing white collar crime * you Could be at risk? you Could be at risk?
  • 2. What is Identity Theft? Jan. 29, 2005 A Chicago woman “applied for a job at a local Target department store and was denied. The reason? She already worked there – or rather, her Social Security number already worked there. Follow-up investigation revealed the same Social Security Number … used to obtain work at 37 other employers.” The Secret List of ID Theft Victims “ People need to wake up to this problem. They are destroying people’s credit, Social Security benefits, and everything else.”
  • 3.
  • 4. The Facts What is Identity Theft? ID entity T heft
  • 5. Identity Theft is not just about Credit Cards! ID Theft is an international crime and access to an attorney may be critical Five Common Types of Identity Theft What is Identity Theft? Drivers License Identity Theft Medical Identity Theft Financial Identity Theft Social Security Identity Theft Character / Criminal Identity Theft
  • 6.
  • 7. What is Identity Theft? “the Department has discovered that identification information in your file is inconsistent with corresponding records at the Federal Social Security Administration … Before your document can be renewed, any inconsistencies will need to be corrected. You will need to present legal documents that certify your current legal name, social security number and date of birth.”
  • 8. What is Identity Theft? February 2004 “ An 82-year-old grandmother, quit driving during the Truman administration.” In 2001 she “suddenly found herself in what she describes as a ‘living hell’ after one of her neighbors, arrested on drunk-driving charges … pretended to be her. ‘I was told there were warrants for my arrest … I was afraid to answer the phone’.”
  • 9.
  • 10.
  • 11. “If the person who steals your health identity has allergies or specific medical conditions that collide with yours for instance … when you go in for care, you may experience a dangerous drug interaction or unknowingly be denied potentially lifesaving medications or treatments because they will assume the thief’s medical information is yours.*” What is Identity Theft? Sept. 2005 *Carole Pennington 9/7/2005 “As the health care system transitions from paper-based to electronic, this crime may become easier to commit and harder to trace. Victims may find it more difficult to recover from medical identity theft as medical errors are disseminated and redisseminated through computer networks and other medical information-sharing pathways.*” May 2006 *Pam Dixon, Pg 3.,5/3/2006 Medical Identity Theft: The information crime that can kill you
  • 12.
  • 13. * Cover, Kiplinger, October, 2005 What is Identity Theft? The October 2005 issue of Kiplinger’s Personal Finance portrayed a different side of Identity Theft when they devoted an entire section to character/criminal identity theft. “ Identity Theft Update: Could losing your wallet land you in jail?*” October 2005
  • 14.
  • 15. Order the Federal Trade Commission free report Take Charge: Fighting Back Against Identity Theft Phone: 877.IDTHEFT Web: http://www.consumer.gov/idtheft When you read this, it will become crystal clear why it is good for the company and the employee to have an ID Theft service that offers Legal Access, Monitoring, and Restoration versus resolution or reimbursement. What is Identity Theft?
  • 16.
  • 17.
  • 18. “ Each year, 7 to 10 million Americans fall prey to Identity Theft… From massive data-brokerage firms to tiny local banks, your identity is irretrievably ‘ out there. ’ ” What is Identity Theft?
  • 19. What is Identity Theft? The DataBased You Meet The DataBased You ™ ™
  • 20. What is Identity Theft? Your Name 1000’s of aggregators Your Fingerprints and DNA FBI, State, and Local DBS Your Insurance Claims C.L.U.E. DBS, etc... Your Military Record DOD DBS Your Criminal History NCIC DBS Your Real Estate Deeds Clerks of Court DBS Your Legal History State and Federal Court DBS Your Credit History Credit Repositories’ DBS Your Birth Certificate Choice Point DBS, State, etc … Your Phone Number and Tracking Info 1000’s of aggregators Your Social Security Number SSA DBS Your Address 1000’s of DBS The DataBased You ™ Your Driver’s License # and Record – DMV DBS Your Medical Records MIB DBS, etc … Your Car Registration & Info DMV, Local Treasurer, On Star, etc … DBS
  • 21. Whether it was hacking, lost computers or lost data tapes, there were 84,797,096* records lost due to computer data breeches from major companies. Between Feb. 15 th 2005 and June 2 nd , 2006: The DataBased You ™ ™ What is Identity Theft? privacyrights.org
  • 22.
  • 23. What is Identity Theft? October 2005 “ Identity thieves are increasingly finding their jackpot is not in your mailbox or kitchen trash bag, but the computer files stored at your chiropractor, accountant or doctor … the future is not burglaries of your home, but of dentists, CPA’s, insurers etc …*” ID Fraudsters Stay One Step Ahead * MarketWatch, October 2cd, 2005
  • 24. The Facts The Cost of Identity Theft ID entity T heft
  • 25.
  • 26.
  • 27. “ People whose identities have been stolen can spend months or years and thousands of dollars cleaning up the mess the thieves have made of their good name and credit record” “ When Bad Things Happen to Your Good Name ” — September 2002 The Cost of Identity Theft FEDERAL TRADE COMMISSION
  • 28. According to the USA Today, Identity Theft is the number one criminal concern for law enforcement over the next decade. The Cost of Identity Theft
  • 29. “ Thieves are so bold that they held a conference in Kiev, Ukraine, for people interested in breaking into this Growth Industry” The Cost of Identity Theft
  • 30. The Trends Important Legislation ID entity T heft
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. * Pg 81, Alberta Venture, Display Until November 11, 2005 “ They’re not after your money, your equipment, or your inventory. A new breed of criminal wants the personal information you keep on customers, suppliers and employees. And if you lose it, you’ll wish they went for the cash. ” The October 2005 issue of the Alberta Venture (business journal) talked about a new breed of criminal. Important Legislation
  • 39. The Facts Industry Response ID entity T heft
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. The Facts The Best Answer ID entity T heft
  • 45. Monitoring Services Life Events Legal Plan Restoration Services You The Best Answer … The Complete Wall of Protection The Best Answer
  • 46. Pre-Paid Legal Services ® , Inc. is the only company with a suite of products that provides help in every area of Identity Theft – before, during, and after the crime occurs… The Best Answer
  • 47.
  • 48.  
  • 49. The Best Answer Five Areas of Coverage – Life Events Legal Plan Preventive Legal Services Motor Vehicle Legal Services Trial Defense Services Federal Tax Audit Legal Service Other Legal Services 25%
  • 50. The Legal Shield service will not apply if the member is alleged to be under the influence of or impaired by alcohol, intoxicants, controlled substances, chemicals or medicines, whether prescribed or not; the member is alleged to be involved with domestic violence or stalking; and/or the member is being detained for outstanding warrants. Check benefit availability in your state. Legal Shield The Legal Shield gives you and your family 24-hour access to legal consultation if you are detained, for only $1 a month - as an additional benefit to your Family Plan membership. To contact your Provider Law Firm, simply call the toll-free number on your Legal Shield card. You will reach the Pre-Paid Legal offices, who will then put you in contact with your Provider Law Firm, so you can consult with an attorney about your detainment. It’s that easy. The Best Answer
  • 51. Pre-Paid Legal Services ® , Inc. and Kroll Background America provide The Best Answer: Harland C. Stonecipher CEO and Founder, Pre-Paid Legal Services, Inc. The Best Answer SHIELD ID entity T heft TM with the Pre-Paid Legal Plan
  • 52. Three Areas of Coverage for ID Theft The Best Answer Access to Counsel Restoration Services Continuous Monitoring
  • 53.
  • 54.
  • 55.
  • 56.
  • 57. Be Sure To Check With Your Attorney Before Using A Form Such As This The Best Answer
  • 58.
  • 59. The Facts Action Steps ID entity T heft
  • 60.
  • 61.
  • 62. Pre-Paid Legal Services ® , Inc. and subsidiaries Thank You! Pre-Paid Legal Services, Inc.

Editor's Notes

  1. This disclaimer is given to protect the instructor and will last about 2 minutes .