This document provides information about identity theft risks and prevention strategies. It defines identity theft, describes common forms like credit card and loan fraud, and explains how thieves obtain personal information through stolen mail, online scams, or workplace theft. Key recommendations include limiting available information, monitoring accounts, and immediately reporting any suspected identity theft. The document also discusses free credit reports and identity theft protection practices like shredding documents and strong passwords.
During this workshop, Mr. Taylor will be discussing
how this growing crime is affecting individuals, families and small businesses.
Never before has there been a greater need for understanding identity theft and its impact.
In the workshop you will:
• Learn what ID Theft is and how to minimize the devastating effects
• Be introduced to the major types of identity theft
• Learn how to better protect personal and small business information
• Learn about restoration services and credit monitoring plans
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
During this workshop, Mr. Taylor will be discussing
how this growing crime is affecting individuals, families and small businesses.
Never before has there been a greater need for understanding identity theft and its impact.
In the workshop you will:
• Learn what ID Theft is and how to minimize the devastating effects
• Be introduced to the major types of identity theft
• Learn how to better protect personal and small business information
• Learn about restoration services and credit monitoring plans
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
Identity theft is the #1 consumer complaint filed with the Federal Trade Commission for 14 consecutive years. All age and socio-economic groups are affected by Identity theft. This problem is affecting a younger demographic, affecting the workplace productivity of their parents.
Watch this presentation, get educated, and find out how you can avoid identity theft.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
17 U.S. Code § 107 - Limitations on exclusive rights: Fair use
Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
How to Protect Yourself From Identity TheftExperian_US
Join our #CreditChat every Wednesday at 3 p.m. ET on Twitter and YouTube. This week, we discussed the very important topic of identity theft and learned tips about how we can protect ourselves. This deck features highlights from our chat with tips from: @LeslieHTayneEsq, @NatlJumpStart, @Frostbe, @DebbiKing, @RAHomes, @SouthStateBank, @BahiyahShabazz, @WelshKristy, @yesiamcheap and @FacingFinances.
Company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
In the no so distant past, individuals didn't stress much when they lost a charge card or discarded a bill. They knew they could contact their loan bosses and rectify it before long. In any case, today, you might be a casualty of Identity theft fraud and not know it. This pernicious wrongdoing is likewise difficult to indict on the grounds that it's hard to distinguish and find the culprit.
Identity theft is the #1 consumer complaint filed with the Federal Trade Commission for 14 consecutive years. All age and socio-economic groups are affected by Identity theft. This problem is affecting a younger demographic, affecting the workplace productivity of their parents.
Watch this presentation, get educated, and find out how you can avoid identity theft.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
17 U.S. Code § 107 - Limitations on exclusive rights: Fair use
Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
How to Protect Yourself From Identity TheftExperian_US
Join our #CreditChat every Wednesday at 3 p.m. ET on Twitter and YouTube. This week, we discussed the very important topic of identity theft and learned tips about how we can protect ourselves. This deck features highlights from our chat with tips from: @LeslieHTayneEsq, @NatlJumpStart, @Frostbe, @DebbiKing, @RAHomes, @SouthStateBank, @BahiyahShabazz, @WelshKristy, @yesiamcheap and @FacingFinances.
Company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
In the no so distant past, individuals didn't stress much when they lost a charge card or discarded a bill. They knew they could contact their loan bosses and rectify it before long. In any case, today, you might be a casualty of Identity theft fraud and not know it. This pernicious wrongdoing is likewise difficult to indict on the grounds that it's hard to distinguish and find the culprit.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
Mr. Jamshed Masood who is a telecom sector executive provided information about how to identity thefts and how to prevent them in the digital age. He discussed the real definition of identity theft, its impact. Not only limited to this, respected speaker also gave the complete information of different types of identity thefts and their methods such as hacking, shoulder surfing. While discussing these thefts, light on prevention methodology to treat these kind of thefts was also given to the audience.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
This was a presentation by Hewie Poplock on Tuesday, November 15th, 2016 in the Goodwill Manasota (FL) Ranch Lake Community Room, "How to Avoid Identity Theft".
A victim of identity theft himself, Hewie will provide examples of how ID theft can happen as well as suggestions and precautions on how to prevent you and your family from becoming victims of identity theft yourselves. Topics covered included:
• What is Identity Theft
• How ID Theft Happens
• How to Protect Yourself
• Phishing
• Data Breaches
• Facebook Spoofing
• Skimmers
• Security Freeze
• On Line Shopping Safety
• Credit Card Chips
• What to Do If You are a Victim
Hewie is a former teacher, college instructor, business owner and manager, IT Manager, and web designer. He is currently semi-retired, but is active in technology user groups and frequently speaks to and teaches groups who are mostly seniors. He holds a monthly Windows Special Interest Group for a group in Orlando and has several videos on YouTube. He is an active member of The Sarasota Technology User Group.
Protecting your privacy, identity and financial information online is critically important in today’s Internet economy. Last year, 13.1 million Americans were victims of identity theft. I have no plans on joining this group, which is what inspired us to create our latest Zing blog guide – Identity 101.
Common Consumer Frauds & How to Avoid Themmilfamln
Dr. Barbara O'Neill of Rutgers University and Carol Kando-Pineda of the Federal Trade Commission will present this 90-minute session on behalf of the Military Families Learning Network on March 20 at 11 a.m. ET. More info: https://learn.extension.org/events/1500/
Identity Theft and Phishing - Canadian Resource Centre for Victims- Mark - Fullbright
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdfcoingabbar
Introducing BONKMILLON - The Most Bonkers Meme Coin Yet
Let's be real for a second – the world of meme coins can feel like a bit of a circus at times. Every other day, there's a new token promising to take you "to the moon" or offering some groundbreaking utility that'll change the game forever. But how many of them actually deliver on that hype?
^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Duba...mayaclinic18
Whatsapp (+971581248768) Buy Abortion Pills In Dubai/ Qatar/Kuwait/Doha/Abu Dhabi/Alain/RAK City/Satwa/Al Ain/Abortion Pills For Sale In Qatar, Doha. Abu az Zuluf. Abu Thaylah. Ad Dawhah al Jadidah. Al Arish, Al Bida ash Sharqiyah, Al Ghanim, Al Ghuwariyah, Qatari, Abu Dhabi, Dubai.. WHATSAPP +971)581248768 Abortion Pills / Cytotec Tablets Available in Dubai, Sharjah, Abudhabi, Ajman, Alain, Fujeira, Ras Al Khaima, Umm Al Quwain., UAE, buy cytotec in Dubai– Where I can buy abortion pills in Dubai,+971582071918where I can buy abortion pills in Abudhabi +971)581248768 , where I can buy abortion pills in Sharjah,+97158207191 8where I can buy abortion pills in Ajman, +971)581248768 where I can buy abortion pills in Umm al Quwain +971)581248768 , where I can buy abortion pills in Fujairah +971)581248768 , where I can buy abortion pills in Ras al Khaimah +971)581248768 , where I can buy abortion pills in Alain+971)581248768 , where I can buy abortion pills in UAE +971)581248768 we are providing cytotec 200mg abortion pill in dubai, uae.Medication abortion offers an alternative to Surgical Abortion for women in the early weeks of pregnancy. Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman Fujairah Ras Al Khaimah%^^%$Zone1:+971)581248768’][* Legit & Safe #Abortion #Pills #For #Sale In #Dubai Abu Dhabi Sharjah Deira Ajman
BYD SWOT Analysis and In-Depth Insights 2024.pptxmikemetalprod
Indepth analysis of the BYD 2024
BYD (Build Your Dreams) is a Chinese automaker and battery manufacturer that has snowballed over the past two decades to become a significant player in electric vehicles and global clean energy technology.
This SWOT analysis examines BYD's strengths, weaknesses, opportunities, and threats as it competes in the fast-changing automotive and energy storage industries.
Founded in 1995 and headquartered in Shenzhen, BYD started as a battery company before expanding into automobiles in the early 2000s.
Initially manufacturing gasoline-powered vehicles, BYD focused on plug-in hybrid and fully electric vehicles, leveraging its expertise in battery technology.
Today, BYD is the world’s largest electric vehicle manufacturer, delivering over 1.2 million electric cars globally. The company also produces electric buses, trucks, forklifts, and rail transit.
On the energy side, BYD is a major supplier of rechargeable batteries for cell phones, laptops, electric vehicles, and energy storage systems.
how to sell pi coins in South Korea profitably.DOT TECH
Yes. You can sell your pi network coins in South Korea or any other country, by finding a verified pi merchant
What is a verified pi merchant?
Since pi network is not launched yet on any exchange, the only way you can sell pi coins is by selling to a verified pi merchant, and this is because pi network is not launched yet on any exchange and no pre-sale or ico offerings Is done on pi.
Since there is no pre-sale, the only way exchanges can get pi is by buying from miners. So a pi merchant facilitates these transactions by acting as a bridge for both transactions.
How can i find a pi vendor/merchant?
Well for those who haven't traded with a pi merchant or who don't already have one. I will leave the what'sapp number of my personal pi merchant who i trade pi with.
Message: +12349014282 VIA Whatsapp.
#pi #sell #nigeria #pinetwork #picoins #sellpi #Nigerian #tradepi #pinetworkcoins #sellmypi
how to swap pi coins to foreign currency withdrawable.DOT TECH
As of my last update, Pi is still in the testing phase and is not tradable on any exchanges.
However, Pi Network has announced plans to launch its Testnet and Mainnet in the future, which may include listing Pi on exchanges.
The current method for selling pi coins involves exchanging them with a pi vendor who purchases pi coins for investment reasons.
If you want to sell your pi coins, reach out to a pi vendor and sell them to anyone looking to sell pi coins from any country around the globe.
Below is the what'sapp information for my personal pi vendor.
+12349014282
Understanding how timely GST payments influence a lender's decision to approve loans, this topic explores the correlation between GST compliance and creditworthiness. It highlights how consistent GST payments can enhance a business's financial credibility, potentially leading to higher chances of loan approval.
5 Tips for Creating Standard Financial ReportsEasyReports
Well-crafted financial reports serve as vital tools for decision-making and transparency within an organization. By following the undermentioned tips, you can create standardized financial reports that effectively communicate your company's financial health and performance to stakeholders.
Lecture slide titled Fraud Risk Mitigation, Webinar Lecture Delivered at the Society for West African Internal Audit Practitioners (SWAIAP) on Wednesday, November 8, 2023.
3. 3
Assess Your Identity Theft Risk
Answer the 20 questions
Total your score
What are your greatest risk exposures?
4. 4
Identity Theft
Identity theft is a crime of stealing key pieces of
someone’s identifying information, such as:
name,
address,
Social Security number,
birth date, and
mother’s maiden name
5. 5
Common Forms of Identity Theft
Credit card fraud
Communications services fraud
Bank fraud
Fraudulent loans
Internet fraud
6. 6
How Identity Theft Occurs
Identity thieves…
steal wallets and purses containing your ID
steal your mail
complete false “change of address” forms
rummage through trash (“dumpster diving”)
pose fraudulently as someone else to get
your information
7. 7
More Ways Identity Theft Occurs
Identity thieves…
steal business or personnel records at your
workplace.
find personal info in your home.
use info you put on the Internet.
buy personal info from “inside sources.”
“shoulder surf” at ATMs and telephones.
9. 9
Look-Alike (Fake) Web Sites
Spoof e-mail messages sent to “verify” or
“update” account info
Appears to come from reputable company
• Example: eBay, Best Buy, banks, merchants
Looks “legitimate”
Scam is called “phishing”
• Get people to disclose sensitive data
• Data used to commit identity theft
10. 10
Red Flags of a Phishing Scam
E-mails that direct users to a Web site to
“validate” or “update” info
E-mails warning accounts will be closed
Grammatical errors and typos
References to 9-11, the Patriot Act, etc.
Return addresses at yahoo.com, juno.com
Words Like “Urgent” and “Important”
11. 11
Steps To Avoid Phishing
Be cautious: African refugees with $10
million, suspended FDIC insurance, etc.
Realize that banks never ask for account info,
especially in an e-mail
Don’t click on any links in suspicious e-mails
Report suspicious e-mails to companies
D-E-L-E-T-E
12. 12
Newest Scam: Medicare-
Approved Drug Discount Cards
Helpful callers or e-mails or door-to-door
fraudsters offer to help seniors get a
Medicare-approved drug discount card
Fraudsters request SS # for ID
Victims’ personal info used for:
• Identity theft crimes
• Medicare fraud crimes
13. 13
Recommended Technology Fraud
Risk-Reduction Practices
NEVER click on unsolicited pop-up ads
Avoid putting your e-mail address on public
Web pages (can be harvested by spammers)
Don’t use “good” e-mail address in chat rooms
Avoid short addresses like “John101”
Keep virus software & patches up to date
Never forward chain letters & virus warnings
14. 14
Interesting Fact
58% of e-mail messages in
2003 were spam
Source: Kiplinger’s Personal
Finance, March 2004
15. 15
How Identity Thieves
Use Your Information
Change mailing addresses on credit card accounts.
Open new credit card accounts.
Establish phone or wireless service in your name.
Open new bank accounts and write bad checks.
File for bankruptcy under your name.
Counterfeit checks or debit cards.
Buy and take out car loans in your name.
16. 16
Reducing the Risk of Identity
Theft
Destroy credit card applications, receipts,
bank, and billing statements.
Avoid giving your SSN unless it’s
absolutely necessary -- use other
identifiers.
Pay attention to billing cycles.
Guard your mail from theft.
Put passwords on credit card, bank, and
phone accounts.
17. 17
More Ways to
Reduce the Risk of Identity Theft
Carry as little identification information as
possible.
Limit the number of credit cards you carry.
Don’t give personal identification on the phone
unless you initiate the call.
Be cautious with personal info in your home.
Check on who has access to your personal info
at work.
18. 18
Still More Ways to
Reduce the Risk of Identity Theft
Don’t carry your SS card.
Save ATM and credit card receipts to check
against statements.
Alert family members to dangers of pretexting.
Be informed about your financial institutions’
policies of sharing information.
Make sure your credit reports are accurate.
19. 19
How to Get Your Credit Reports
Equifax -- www.equifax.com
To order: 800-685-1111
To report fraud: 800-525-6285
Experian -- www.experian.com
To order: 888-EXPERIAN
To report fraud: 888-EXPERIAN
Trans Union -- www.tuc.com
To order: 800-916-8800
To report fraud: 800-680-7289
New Jersey residents can receive one free credit report
per year from each credit reporting agency
20. 20
If You’re a Victim...
1. Contact the fraud departments of the three major
credit bureaus.
2. Contact creditors or financial institutions for any
accounts that have been tampered with.
3. File a report with local police or police where the
theft took place.
21. 21
Summary
Minimize the amount of information that can be
stolen from you.
Reduce the amount of personal information
“out there.”
Add extra security protection to your account.
Identity theft is a crime that must be reported.
Act immediately to stop further use of your
identity.
22. 22
ID Theft Study
Purpose
• To understand what actions consumers are taking to reduce
the risk of identity theft
Data collected from an online self-assessment tool
(sample bias)
20 questions; 1 (never) to 5 (always)
Higher score: more frequent use of risk reduction
practices
Data from 287 respondents in 2003
23. 23
Web Site Address For The
Online Identity Theft Quiz
www.rce.rutgers.edu/money/identitytheft/default.asp
The online quiz provides both
personalized feedback to users and
a database for ongoing research
24. 24
Findings
Mean scores range from 2.1 to 4.4
Three least frequently reported practices:
• Checking credit report annually from 3 bureaus
• Post office box or locked mailbox-incoming mail
• Carrying SS card or ID card with SS number
25. 25
Checking Credit Reports
Least frequently performed risk reduction
practice (score of 2.1)
Almost a third of sample had respondents
from the six states that mandate free reports
• CO, GA, MD, MA, NJ, and VT
Two groups of respondents compared
No difference found between groups
Cost may not be a primary barrier
26. 26
Summary
Majority of sample used many risk
reduction practices
Indication of consciousness-raising
• From government and non-profit agency info
• From media reports about identity theft
• From knowing a crime victim (1 in 50 people)
Not giving out SS and bank account # and
having mail held: most frequently done
Editor's Notes
In the course of an ordinary, busy day, you may write a check at the dry cleaner, charge tickets to a concert, reserve a hotel room, mail your bills, call your doctor on your cell phone, order new checks, or apply for a bank loan. Chances are you don’t give these everyday transactions a second thought. But others may.
In the 1990s, a new variety of crime called identity theft became rampant and it involves everyday transactions. Each transaction requires you to share personal information: your bank and credit card account numbers; your Social Security number (SSN); and your name, address, and phone numbers. An identity thief steals some piece of your personal information and uses it without your knowledge to commit fraud or theft. An all-too-common example is the act of using your personal information to open a credit card account in your name.
The FBI says identity theft is the nation’s fastest-growing white-collar crime. An estimated 500,000 Americans have their identities stolen each year. A sign of the times: at least four insurance companies now offer ID-theft policies. The Privacy Rights Clearinghouse, which works with identity theft victims, says it takes an average victim of identity theft two years to clear his or her credit rating.
Can you completely prevent identity theft from occurring? Generally no, especially if someone is determined to commit the crime. But you can minimize your risk of being ripped off by managing your personal information with a greater awareness and with heightened sensitivity.
Identity theft happens when someone steals your personal identifying information in order to open new charge accounts, order merchandise, or borrow money. Review list of identifying information in the slide.
A person targeted by an identity thief usually doesn’t know he or she has been victimized until the thief fails to pay the bills or repay the loans, and collection agencies begin hounding the person (whose identity has been stolen) for payment of accounts that he/she didn’t even know he had.
Other fraudulent activities that identity thieves perpetrate are:
taking over the victim’s financial accounts,
opening new bank accounts,
applying for Social Security benefits,
renting apartments, and
establishing services with utility and phone companies.
According to the Federal Trade Commission (FTC), the most common forms of identity theft are:
Credit Card Fraud. These are situations where a new credit card account is opened with a victim’s name and address or an existing credit card account is “taken over” by a fraudster, who charges items using a victim’s name and account number with no intention of paying the bill.
Communications Services Fraud. This is where identity theft starts telephone, cellular, or other utility service in the victim’s name.
Bank Fraud. This is where a fraudster opens a checking or savings account in a victim’s name, and/or writes fraudulent checks.
Fraudulent Loans. These cases involve the identity thief procuring a loan, such as a car loan, in a victim’s name.
Internet Fraud. Here an identity thief uses Web sites, e-mail and off-line methods to try to steal someone’s identity and make off with their assets. Once an ID theft is in the works, the Internet can make the job considerably easier.
Despite your best efforts to take precautions with accessibility to your personal information or to keep it private, skilled fraudsters may use a variety of methods -- low- and high-tech -- to gain access to your data and your life.
According to the FTC, this is how identity thieves get your personal information:
They steal wallets and purses containing your identification and credit cards, and ATM cards.
They steal mail from your mailbox, including your bank and credit card statements, bills from retail stores, pre-approved credit offers, telephone calling cards, as well as tax information.
They fill out a “change of address forms” to divert your mail to another location.
They rummage through garbage cans or the refuse of businesses for personal data that has been discarded in a practice known as “dumpster diving.”
They commit fraud to obtain your credit report by posing as a landlord, employer, or someone else who may have a legitimate need for and legal right to -- the information.
Here are several more ways you can have your identity stolen by fraudsters:
They get your business or personnel records at work. This is usually an “inside job,” done sometimes by a disgruntled employee.
They find personal information in your home -- perhaps they are sharing an apartment with you.
They use personal information you share on the Internet.
Web sites, particularly e-commerce sites, collect a lot of data from visitors. If you buy a book or a CD at a bookstore and pay cash, there will be no record linking you to the purchase. But the books, magazines, music, and movies you buy online are all linked to you by name. Web retailers are collecting a sizable database of information on individual purchases (e.g., who’s buying certain prescription drugs or books).
E-commerce sites routinely share your information, or sell it. If an e-commerce site you bought from goes bankrupt, it could be legally required to sell your data to the highest bidder as a company asset. Also, sites routinely sell or exchange your personal information. Privacy advocates are seeking federal legislation requiring Web sites to let users “opt out” of sharing data, as has recently happened in financial services.
Sometimes identity thieves buy your personal information from “inside” sources. For example, an identity thief may pay a store employee for information about you that appears on an application for goods, services or credit.
Identity thieves also do some of their best work just by looking over your shoulder (a.k.a., “shoulder surfing”) as you dial your telephone calling card number or punch in your account number or PIN at an automated teller machine (ATM). To avoid having account data stolen in this manner, shield the key pads with your hand whenever you use a public phone or ATM.
Once identity thieves have secured a piece of your personal identification, it is relatively easy to use it to wreak havoc on your life. They may use it for a number of illegal activities such as:
Calling your credit card issuer and pretending to be you. They then ask to change the mailing address on your credit card account. Next, they run up charges on your account. Because your bills are being sent to the new address, it make take some time before you realize there’s a problem.
Opening a new credit card account using your name, date of birth, and Social Security number. When they use the credit card and don’t pay the bills, the account now in default is reported on your credit report.
Establishing phone, cable, or wireless service in your name. Again, these bills go unpaid until service providers contact the victim looking for payment.
Opening a bank checking account in your name and writing bad checks on it.
Filing for bankruptcy under your name to avoid paying debts they’ve run up under your name, or to avoid eviction from their apartment.
Counterfeiting checks or debit cards, and draining your bank account.
Getting access to a PIN number and draining your retirement account.
Buying cars by taking out auto loans in your name.
Buying other big ticket items and charging them on store accounts, then never making a payment.
The Federal Trade Commission acknowledges that, while you probably can’t prevent identity theft entirely, you can lessen your risk. By managing your personal information wisely, cautiously, and with an awareness of the dangers, you can help protect against identity theft.
Here are the best ways to minimize your risk:
Store items with personal information in a safe place. To foil an identity thief who may pick through your trash to retrieve personal information, tear up charge receipts, copies of credit applications, insurance forms, physicians’ statements, and bank checks and statements that you are discarding, as well as expired charge cards and credit offers you get in the mail. Better still, purchase an inexpensive shredder.
Give your Social Security number (SSN) only when absolutely necessary. Ask to use other types of identifiers when possible.
Pay attention to your billing cycles. Call your creditors if your bills don’t arrive on time. A missing credit card bill could mean a fraudster has taken over your credit card account and changed your billing address to cover his tracks.
Guard your mail from theft. Deposit outgoing mail in post office collection boxes or at your local post office. Don’t leave mail unattended at your residence mail box to be picked up. Promptly remove mail from your mailbox after is has been delivered. If you’re planning to be away from home and can’t pick up your mail, call your local post office to request a vacation hold. The Postal Service will hold your mail at your local post office until you can pick it up.
Ask to establish passwords on your credit card, bank and phone accounts. Avoid using easily available information like your mother’s maiden name, your birth date or your spouse’s, the last four digits of your SSN or your phone number, or a series of consecutive numbers, like 1, 2, 3, 4.
Here are some additional identity theft precautions:
Carry as little identification information and as few credit cards on your person as possible. Carry only what you’ll actually need and leave the rest at home.
Do not give out personal information on the phone, through the mail, or over the Internet unless you have initiated the contact or know who you’re dealing with. Identity thieves often pose as representatives of banks, Internet service providers, and even government agencies, to persuade you to reveal your Social Security number, financial account number, and other identifying information. Legitimate organizations with whom you do business already have the information they need and will not ask you for it.
Be cautious about where you leave personal information in your home, especially if you share an apartment with roommates, employ housekeeping or outside help, or are having service work done in your home.
Be aware of who has access to your personal information at work and verify that the records are kept in a secure location. This is particularly important if you are in a position where you may have dealings with disgruntled employees.
Here are several more ways to protect your personal information:
Don’t carry your SSN card in your wallet; leave it in a secure place at home.
Save your ATM and credit card receipts to check against your bank and credit statements. Review them carefully and promptly.
Alert family members to the dangers of pretexting. Tell them that only you, or someone you authorize, should provide personal information to others.
Before you reveal any personally identifying information, find out how it will be used and whether it will be shared with others. Ask for their specific policies about sharing information. Can you choose to have it kept confidential?
Order a copy of your credit report from each of the three major credit reporting agencies every year. Make sure that it’s accurate and includes only those accounts and credit transactions that you’ve authorized. One credit report per year is free from each of the major credit bureaus for New Jersey residents.
A credit file request form is available on the Rutgers Cooperative Extension MONEY 2000 Web site at www.rce.rutgers.edu/money2000.
By law, in New Jersey, you are able to receive one free copy of your credit report from each of the three major credit reporting agencies every year. Free reports are also available for identity fraud victims, persons on welfare, and the unemployed. Otherwise, the law allows credit bureaus to charge you up to $8.50 for a copy of your credit report.
Your credit report contains information on where you work and live, the credit accounts that have been opened in your name, how you pay your bills , who has made inquiries about you over the past two years, and whether you’ve been sued, arrested or you have filed for bankruptcy. Checking your report on a regular basis can help you catch mistakes and fraud before they destroy your credit rating.
Take advantage of your rights as a consumer and order by mail, phone, or Internet your free credit report from each of the three major credit bureaus -- Equifax, Experian (formerly TRW), and Trans Union.
Equifax -- www.equifax.com -- To order your report, call: 800-685-1111or write: PO Box 740241, Atlanta, GA 30374-0241. To report fraud, call: 800-525-6285 and write: PO Box 740241, Atlanta, GA 30364-0241
Experian -- www.experian.com -- To order your report call: 888-EXPERIAN (397-3742) or write: PO Box 2104, Allen TX 75013. To report fraud, call 888-EXPERIAN (397-3742) and write: PO Box 9532, Allen TX 75013
Trans Union -- www.tuc.com -- To order your report, call: 800-916-8800 or write: PO Box 1000, Chester, PA 19022. To report fraud, call: 800-680-7289 and write Fraud Victim Assistance Division, PO Box 6790, Fullerton, CA 92634
It is possible that an identity thief can strike even though you’ve been very careful about keeping your personal information protected. If you suspect that your personal information has been stolen and used to commit fraud or theft, take action immediately, and keep a record of your conversations and correspondence. The steps you should take to protect yourself will depend on your situation and how your identity has been misused. However, the Federal Trade Commission (FTC) states that three basic actions are appropriate in almost every case:
First, contact the fraud departments of each of the three major credit bureaus. -- Tell them that you’re an identity theft victim. Ask them to place a “fraud alert” in your file, as well as a victim’s statement asking that all creditors call you before opening any new accounts or changing your existing accounts. This can hinder an identity thief from opening more accounts in your name.
At the same time, order copies of your credit reports from the three credit bureaus. Credit bureaus must give you a free copy of your report if your report is inaccurate because of fraud, and you ask for it in writing. Go over your reports with a fine tooth comb to make sure no additional illegal accounts have been opened in your name or unauthorized changes made to your existing accounts. Also, check the section of your report that lists “inquiries.” Where these “inquiries” appear from the company(ies) that opened the fraudulent account(s), ask that these “inquiries” be removed from your report. In a few months, order new copies of your reports to verify your corrections and changes, and to make sure no new fraudulent activity has occurred.
Second, contact creditors for any accounts that have unauthorized fraudulent activity or have been opened illegally, both by telephone and in writing. Close accounts that have been tampered with and open new ones with new Personal Identification Numbers (PINs) and passwords.
Third, file a report with your local police or police in the community where the identity theft took place. Secure a copy of the police report in case the bank, credit card company, or others need proof of the crime. Even if the police can’t prosecute the identity thief in your case, having a copy of the police report can assist you when dealing with creditors.
To minimize the amount of information a thief can steal, do not carry extra credit cards, your Social Security card, a birth certificate or a passport in your wallet or purse, except when needed.
To reduce the amount of personal information that is “out there,” consider removing your name from the marketing lists of the three credit reporting bureaus. This will limit the number of pre-approved offers of credit that your receive.
* Sign up for the Direct marketing Association’s Mail Preference Service and the Telephone
Preference Service. Your name is added to computerized name deletion lists used by nationwide
marketers.
* Have your name and address removed from the phone book and reverse directories (i.e., directories that list people by their addresses rather than their names).
* Don’t put your Social Security number on checks.
Ask your financial institution to add extra security protection to your account. Most will allow you to use an additional code (a number or word) when accessing our account.
If you become a victim of identity theft, report the crime to the police immediately. Give them as much documented evidence as possible, and get a copy of the police report. Credit card issuers, banks, and the insurance company may require you to show the report in order to verify the crime. Then report your case to the federal authorities. The Federal Trade Commission has a special identity theft hotline to provide information to consumers and take complaints from victims by phone (1-877-438-4338) or online (www.consumer.gov/idtheft).
As soon as possible, call the fraud units of the three major credit bureaus. Ask to have a fraud alert placed on your credit report -- this will let companies know that someone else has been using your information and that you wish to be informed by phone before any new credit is granted. Close the accounts and get replacement cards with new account numbers.