SlideShare a Scribd company logo
Five Common Types Of Identity Theft

Driver’s
License

Social
Insurance

Medical

Character/
Criminal

Financial

Identity Theft is not just about Credit Cards! Identity Theft is an
international crime and access to an attorney may be critical.

Are You At Risk?
Identity theft has hit one out of every six adult Canadians—more than 4.2 million people—either directly or within their
immediate households; 17 per cent of Canadians aged 18 or older have either been victimized themselves or had an
incident affect someone in their homes.	
—Strategic Counsel for the Competition Bureau of Canada, 2007
Identity theft is committed in every place associated with daily life. Simply by doing things that are part of everyday
routines—for example, charging dinner at a restaurant, using payment cards to purchase gasoline or rent a car, buying or
selling your home, or submitting personal information to employers and various levels of government—individuals expose
their personal data where identity thieves can access and use it without the victim’s knowledge or permission. The victim
may not discover the effects of the fraud until weeks, months or even years later.	
	

—The Ministry of Public Safety, Canada, 2008

“More than half (51 percent) of all identity thefts occur in the workplace, according to a recent study”
	

—Human Resource Executive – May 2007

Two Most COMMON MISCONCEPTIONS about Identity Theft
1.	 Damages are mostly financial related.
	
Looking at Financial Identity Theft alone is a mistake. That does not take into account the other significant forms
such as Social Insurance, Drivers License, Medical and Character/Criminal. In fact: the second most prevalent form
of identity theft is having a crime committed in your name.
2.	 “I’m safe because I don’t do much online, I use a shredder, and I am careful about who I give my information to.”
Identity Theft has become the #1 crime worldwide, and most often it does not matter how careful you are. You can
help minimize your risk by knowing how Identity Theft happens. To learn more, attend an Identity Theft Seminar in
your area.

The last thing you need to worry about is Identity Theft!

www.CrimeReductionCanada.com
Have you been a victim of Identity Theft?
DRIVER’S LICENSE: The car that Jason Young has never owned, a 2001 Audi A4, can be found today under lock-and-chain
in an OPP compound north of Toronto, having been seized following its abandonment in a still unsolved hit-and-run. The last
name and address on the ownership, however, is Jason Young’s name and his Mississauga address. And therein lies the problem.
Identify theft is too easy. Det. Bruce Lemcke of the Peel Regional Police fraud squad was convinced Jason Young fell victim to
a sophisticated fraud. So, too, was the Scotiabank, who had a lien on the now-impounded car due to unpaid financing obtained
with a photocopy of Jason’s driver’s license.	
—Toronto Sun, May 18, 2008
SOCIAL INSURANCE: Audra Schmierer’s social insurance number has been used by at least 81 people across North
America. The federal government took years to discover the number was being used illegally but took little action once it was
discovered. Ms. Schmierer has had erroneous tax bills, has been denied jobs and has been detained because of felony arrest
warrants that all belonged to other people that are using her social insurance number.	
—CBS News, August, 2006
MEDICAL: Anndorie Sachs, 28, a biomedical engineering student who lives in Salt Lake City with her family, received a call
from the Utah Child and Family Services. “Your newborn,” the investigator said, “tested positive for drugs.” “What do you
mean?” Sachs recalls saying. “I didn’t just have a baby.” The agent’s response: “Don’t try to pull that with me!” She notified
Sachs that DCFS was ready to put through paperwork to take custody of Sachs’s four children, then ages 2 to 7. Dorothy Bell
Moran, a troubled 28-year-old stole Sachs identity and had a baby in her name. The baby tested positive for methamphetamine.
But doctors couldn’t talk to Moran—at some point, she had walked out of the hospital, leaving her newborn behind. Sachs was
left with a $10,000 bill and a nightmare with social services. Sachs’s medical records had been altered to include the blood type
and general health record of a complete stranger. 	
—Good Housekeeping, August, 2007
CRIMINAL: David Joe Hernandez served four years in the Air Force at bases in New Mexico and Japan. So it came as a
shock when he returned home and discovered he was a victim of financial identity theft in Chicago and that his personal
records became entangled with those of a convicted felon in Mesa, Ariz. He learned that he was associated with an arrest
warrant in Arizona for driving on a revoked license and that a David Hernandez had a record there for auto theft, evading law
enforcement, making wrongful statements to law enforcement, wrongful use of a weapon and driving on the wrong side of the
road. A week after Hernandez started working at Best Buy, his manager informed him he was being let go because a criminal
record check came back showing a felony drug conviction. Later he received notice that Illinois was garnishing 60% of his
reservist’s pay to pay child support to a woman he’d never met who was using information that had been on several fraudulent
accounts. 	
—USA Today, June 3, 2007
FINANCIAL: Susan Lawrence discovered that the 100-year-old Victorian home she had been living in for 30 years had been
stolen by identity thieves The North York widow had been blissfully unaware the thieves had used her forged signature to
purchase the house from her and discharge a mortgage she had put on the property. They had then put a new mortgage on the
property for almost $300,000, pocketed the money, defaulted on the mortgage, faded out of sight, and left her facing eviction.
Toronto lawyer Robert Aaron, who has written numerous columns on mortgage fraud for the Star, says it is “extremely simple”
for anyone familiar with Ontario’s real estate system to pull off a mortgage fraud. “People can make themselves look like the
real owner or can make a legitimate purchase with phony ID and phony employment letters,” 	—Toronto Star, August 13, 2006
A Peterborough resident was a victim of identity theft. A visitor staying in her home stole her driver’s licence and social
insurance number. Armed with this information, the thief applied for, and was granted, a line of credit and three credit cards
using the stolen identification. She then proceeded to go on a spending spree to rent vehicles, vacation in the USA, buy clothes,
food and other items costing the victim more than $20,000.	
—The Peterborough Examiner, August, 2007
The Milletts had subscribed to credit-monitoring services from all three major credit reporting bureaus: Experian, Equifax and
TransUnion. The Milletts found out that the Credit-monitoring services are not all they’re cracked up to be. A major weakness
in the credit-monitoring system that these services don’t bother to mention is that the services don’t work if someone uses your
Social Insurance number to get credit in his or her name. All three failed to alert them when an imposter used one of their
Social Insurance numbers to apply for 26 credit cards, finance several cars and take out a home mortgage. The problem arises
because of the mismatch between the Social and the wrongdoer’s name. The credit reporting bureaus route the loan request
to another file, so even if it has your Social on it, it won’t show up in your file for purposes of notifying you. Someone who has
credit monitoring may falsely believe they are safe when in fact they well may not be.	
—CBS, December, 2006
Over 120 residents in Ajax, Ontario found their mail had been stolen by their postal worker. 150 pieces of mail involving
over 120 victims were not delivered to the intended addresses in 2007. These pieces of mail included cheques issued by
the Government of Canada, insurance companies and other businesses. The cheques were fraudulently cashed at numerous
financial institutions in the Greater Toronto Area. This fraudulent activity has lead to a loss of over $477,000 involving multiple
incidents of identity theft. Durham Regional Police investigators believe that the majority of victims were unaware of the fact
their mail was stolen. 	
—The Toronto Star, February 26, 2008

More Related Content

What's hot

Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
poojakalra10
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
mullarkea
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
robinlgray
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
pat7777
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Randall Chesnutt
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
milfamln
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
Cut 2 Shreds
 
Identity theft
Identity theftIdentity theft
Identity theft
Eqhball Ghazizadeh
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
vcrisafulli
 
IDShield
IDShieldIDShield
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
- Mark - Fullbright
 
online shopping
online shoppingonline shopping
online shopping
Obger Mercier , MBA
 
Identity theft protection company keepmy id.org
Identity theft protection company   keepmy id.orgIdentity theft protection company   keepmy id.org
Identity theft protection company keepmy id.org
keepmyID.org - Identity Enterprises, LLC.
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
- Mark - Fullbright
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
jessmc1
 
Data theft
Data theftData theft
Data theft
Laura
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
Greg Ewers
 
Consumer Fraud
Consumer FraudConsumer Fraud
Consumer Fraud
Bill Taylor
 

What's hot (20)

Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Identity theft
Identity theftIdentity theft
Identity theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
IDShield
IDShieldIDShield
IDShield
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
online shopping
online shoppingonline shopping
online shopping
 
Identity theft protection company keepmy id.org
Identity theft protection company   keepmy id.orgIdentity theft protection company   keepmy id.org
Identity theft protection company keepmy id.org
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Data theft
Data theftData theft
Data theft
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
 
Consumer Fraud
Consumer FraudConsumer Fraud
Consumer Fraud
 

Viewers also liked

Practical Action's faecal sludge management experience in South Asia
Practical Action's faecal sludge management experience in South AsiaPractical Action's faecal sludge management experience in South Asia
Practical Action's faecal sludge management experience in South Asia
Practical Action
 
LTE-EPC
LTE-EPCLTE-EPC
LTE-EPC
Faw Yas
 
Week 2 - Assignment - Christian van t Hof
Week 2 - Assignment - Christian van t HofWeek 2 - Assignment - Christian van t Hof
Week 2 - Assignment - Christian van t Hof
Christian van 't Hof
 
Trabajo en equipo
Trabajo en equipoTrabajo en equipo
Trabajo en equipo
mohamedsaynez
 
Orlogiin grap 12
Orlogiin grap 12Orlogiin grap 12
Orlogiin grap 12
Ukhnaa Tungalag
 
A View From Regulatory Agencies (Tinjauan dari Badan Hukum)
A View From Regulatory Agencies (Tinjauan dari Badan Hukum)A View From Regulatory Agencies (Tinjauan dari Badan Hukum)
A View From Regulatory Agencies (Tinjauan dari Badan Hukum)
Meta Emilia Surya Dharma
 
Fedex infographics
Fedex infographicsFedex infographics
Fedex infographics
Kunal Das
 
Opthalmic drug delivery
Opthalmic drug deliveryOpthalmic drug delivery
Opthalmic drug delivery
Paul James Alava
 
70619174 ecologia
70619174 ecologia70619174 ecologia
70619174 ecologia
TUMAN
 
Comparing Photosynthesis & Cellular Respiration
Comparing Photosynthesis & Cellular RespirationComparing Photosynthesis & Cellular Respiration
Comparing Photosynthesis & Cellular Respiration
Lorraine Stratton
 
genre theory
genre theory genre theory
genre theory
shaniceA
 
Agro Processing & Agricultural Waste Products
Agro Processing & Agricultural Waste ProductsAgro Processing & Agricultural Waste Products
Agro Processing & Agricultural Waste Products
Ajjay Kumar Gupta
 
Apple google
Apple googleApple google
Apple google
Sachin Kharatmol
 

Viewers also liked (14)

Practical Action's faecal sludge management experience in South Asia
Practical Action's faecal sludge management experience in South AsiaPractical Action's faecal sludge management experience in South Asia
Practical Action's faecal sludge management experience in South Asia
 
LTE-EPC
LTE-EPCLTE-EPC
LTE-EPC
 
Week 2 - Assignment - Christian van t Hof
Week 2 - Assignment - Christian van t HofWeek 2 - Assignment - Christian van t Hof
Week 2 - Assignment - Christian van t Hof
 
Trabajo en equipo
Trabajo en equipoTrabajo en equipo
Trabajo en equipo
 
Orlogiin grap 12
Orlogiin grap 12Orlogiin grap 12
Orlogiin grap 12
 
Cînd...
Cînd...Cînd...
Cînd...
 
A View From Regulatory Agencies (Tinjauan dari Badan Hukum)
A View From Regulatory Agencies (Tinjauan dari Badan Hukum)A View From Regulatory Agencies (Tinjauan dari Badan Hukum)
A View From Regulatory Agencies (Tinjauan dari Badan Hukum)
 
Fedex infographics
Fedex infographicsFedex infographics
Fedex infographics
 
Opthalmic drug delivery
Opthalmic drug deliveryOpthalmic drug delivery
Opthalmic drug delivery
 
70619174 ecologia
70619174 ecologia70619174 ecologia
70619174 ecologia
 
Comparing Photosynthesis & Cellular Respiration
Comparing Photosynthesis & Cellular RespirationComparing Photosynthesis & Cellular Respiration
Comparing Photosynthesis & Cellular Respiration
 
genre theory
genre theory genre theory
genre theory
 
Agro Processing & Agricultural Waste Products
Agro Processing & Agricultural Waste ProductsAgro Processing & Agricultural Waste Products
Agro Processing & Agricultural Waste Products
 
Apple google
Apple googleApple google
Apple google
 

Similar to 5 Types of Identity Theft - Canada

Hundreds of Utah children at center of identity theft
Hundreds of Utah children at center of identity theftHundreds of Utah children at center of identity theft
Hundreds of Utah children at center of identity theft
Torin Koos
 
Why Do We Crave Horror Movies Essay
Why Do We Crave Horror Movies EssayWhy Do We Crave Horror Movies Essay
Why Do We Crave Horror Movies Essay
Tameka Howard
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
Identity Theft Protection
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
swalton4
 
Identity Theft - If you are me, then who am I
Identity Theft - If you are me, then who am IIdentity Theft - If you are me, then who am I
Identity Theft - If you are me, then who am I
"Apolonio \"Apps\"" Garcia
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
- Mark - Fullbright
 
Identity theft
Identity theftIdentity theft
Identity theft
chrispaul8676
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
National Crime Prevention Council
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
- Mark - Fullbright
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
- Mark - Fullbright
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
Rob Taylor
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
dkmarshall
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
marybethwrenn
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
WrennEvents
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
- Mark - Fullbright
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
abethune
 

Similar to 5 Types of Identity Theft - Canada (16)

Hundreds of Utah children at center of identity theft
Hundreds of Utah children at center of identity theftHundreds of Utah children at center of identity theft
Hundreds of Utah children at center of identity theft
 
Why Do We Crave Horror Movies Essay
Why Do We Crave Horror Movies EssayWhy Do We Crave Horror Movies Essay
Why Do We Crave Horror Movies Essay
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Identity Theft - If you are me, then who am I
Identity Theft - If you are me, then who am IIdentity Theft - If you are me, then who am I
Identity Theft - If you are me, then who am I
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
- Mark - Fullbright
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
- Mark - Fullbright
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
- Mark - Fullbright
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
- Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 

Recently uploaded (20)

S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 

5 Types of Identity Theft - Canada

  • 1. Five Common Types Of Identity Theft Driver’s License Social Insurance Medical Character/ Criminal Financial Identity Theft is not just about Credit Cards! Identity Theft is an international crime and access to an attorney may be critical. Are You At Risk? Identity theft has hit one out of every six adult Canadians—more than 4.2 million people—either directly or within their immediate households; 17 per cent of Canadians aged 18 or older have either been victimized themselves or had an incident affect someone in their homes. —Strategic Counsel for the Competition Bureau of Canada, 2007 Identity theft is committed in every place associated with daily life. Simply by doing things that are part of everyday routines—for example, charging dinner at a restaurant, using payment cards to purchase gasoline or rent a car, buying or selling your home, or submitting personal information to employers and various levels of government—individuals expose their personal data where identity thieves can access and use it without the victim’s knowledge or permission. The victim may not discover the effects of the fraud until weeks, months or even years later. —The Ministry of Public Safety, Canada, 2008 “More than half (51 percent) of all identity thefts occur in the workplace, according to a recent study” —Human Resource Executive – May 2007 Two Most COMMON MISCONCEPTIONS about Identity Theft 1. Damages are mostly financial related. Looking at Financial Identity Theft alone is a mistake. That does not take into account the other significant forms such as Social Insurance, Drivers License, Medical and Character/Criminal. In fact: the second most prevalent form of identity theft is having a crime committed in your name. 2. “I’m safe because I don’t do much online, I use a shredder, and I am careful about who I give my information to.” Identity Theft has become the #1 crime worldwide, and most often it does not matter how careful you are. You can help minimize your risk by knowing how Identity Theft happens. To learn more, attend an Identity Theft Seminar in your area. The last thing you need to worry about is Identity Theft! www.CrimeReductionCanada.com
  • 2. Have you been a victim of Identity Theft? DRIVER’S LICENSE: The car that Jason Young has never owned, a 2001 Audi A4, can be found today under lock-and-chain in an OPP compound north of Toronto, having been seized following its abandonment in a still unsolved hit-and-run. The last name and address on the ownership, however, is Jason Young’s name and his Mississauga address. And therein lies the problem. Identify theft is too easy. Det. Bruce Lemcke of the Peel Regional Police fraud squad was convinced Jason Young fell victim to a sophisticated fraud. So, too, was the Scotiabank, who had a lien on the now-impounded car due to unpaid financing obtained with a photocopy of Jason’s driver’s license. —Toronto Sun, May 18, 2008 SOCIAL INSURANCE: Audra Schmierer’s social insurance number has been used by at least 81 people across North America. The federal government took years to discover the number was being used illegally but took little action once it was discovered. Ms. Schmierer has had erroneous tax bills, has been denied jobs and has been detained because of felony arrest warrants that all belonged to other people that are using her social insurance number. —CBS News, August, 2006 MEDICAL: Anndorie Sachs, 28, a biomedical engineering student who lives in Salt Lake City with her family, received a call from the Utah Child and Family Services. “Your newborn,” the investigator said, “tested positive for drugs.” “What do you mean?” Sachs recalls saying. “I didn’t just have a baby.” The agent’s response: “Don’t try to pull that with me!” She notified Sachs that DCFS was ready to put through paperwork to take custody of Sachs’s four children, then ages 2 to 7. Dorothy Bell Moran, a troubled 28-year-old stole Sachs identity and had a baby in her name. The baby tested positive for methamphetamine. But doctors couldn’t talk to Moran—at some point, she had walked out of the hospital, leaving her newborn behind. Sachs was left with a $10,000 bill and a nightmare with social services. Sachs’s medical records had been altered to include the blood type and general health record of a complete stranger. —Good Housekeeping, August, 2007 CRIMINAL: David Joe Hernandez served four years in the Air Force at bases in New Mexico and Japan. So it came as a shock when he returned home and discovered he was a victim of financial identity theft in Chicago and that his personal records became entangled with those of a convicted felon in Mesa, Ariz. He learned that he was associated with an arrest warrant in Arizona for driving on a revoked license and that a David Hernandez had a record there for auto theft, evading law enforcement, making wrongful statements to law enforcement, wrongful use of a weapon and driving on the wrong side of the road. A week after Hernandez started working at Best Buy, his manager informed him he was being let go because a criminal record check came back showing a felony drug conviction. Later he received notice that Illinois was garnishing 60% of his reservist’s pay to pay child support to a woman he’d never met who was using information that had been on several fraudulent accounts. —USA Today, June 3, 2007 FINANCIAL: Susan Lawrence discovered that the 100-year-old Victorian home she had been living in for 30 years had been stolen by identity thieves The North York widow had been blissfully unaware the thieves had used her forged signature to purchase the house from her and discharge a mortgage she had put on the property. They had then put a new mortgage on the property for almost $300,000, pocketed the money, defaulted on the mortgage, faded out of sight, and left her facing eviction. Toronto lawyer Robert Aaron, who has written numerous columns on mortgage fraud for the Star, says it is “extremely simple” for anyone familiar with Ontario’s real estate system to pull off a mortgage fraud. “People can make themselves look like the real owner or can make a legitimate purchase with phony ID and phony employment letters,” —Toronto Star, August 13, 2006 A Peterborough resident was a victim of identity theft. A visitor staying in her home stole her driver’s licence and social insurance number. Armed with this information, the thief applied for, and was granted, a line of credit and three credit cards using the stolen identification. She then proceeded to go on a spending spree to rent vehicles, vacation in the USA, buy clothes, food and other items costing the victim more than $20,000. —The Peterborough Examiner, August, 2007 The Milletts had subscribed to credit-monitoring services from all three major credit reporting bureaus: Experian, Equifax and TransUnion. The Milletts found out that the Credit-monitoring services are not all they’re cracked up to be. A major weakness in the credit-monitoring system that these services don’t bother to mention is that the services don’t work if someone uses your Social Insurance number to get credit in his or her name. All three failed to alert them when an imposter used one of their Social Insurance numbers to apply for 26 credit cards, finance several cars and take out a home mortgage. The problem arises because of the mismatch between the Social and the wrongdoer’s name. The credit reporting bureaus route the loan request to another file, so even if it has your Social on it, it won’t show up in your file for purposes of notifying you. Someone who has credit monitoring may falsely believe they are safe when in fact they well may not be. —CBS, December, 2006 Over 120 residents in Ajax, Ontario found their mail had been stolen by their postal worker. 150 pieces of mail involving over 120 victims were not delivered to the intended addresses in 2007. These pieces of mail included cheques issued by the Government of Canada, insurance companies and other businesses. The cheques were fraudulently cashed at numerous financial institutions in the Greater Toronto Area. This fraudulent activity has lead to a loss of over $477,000 involving multiple incidents of identity theft. Durham Regional Police investigators believe that the majority of victims were unaware of the fact their mail was stolen. —The Toronto Star, February 26, 2008