SlideShare a Scribd company logo
Identity
Theft

Canada
The Crime
 The perpetrators of identity crimes range from petty
criminals to international organized crime syndicates and
terrorist organizations seeking to elude watch-lists and stay
one step ahead of law enforcement.
 Identity theft and fraud include a range of crimes such as
credit card information theft, financial and personal
document theft, and data breeches to name a few. Thieves
strike indiscriminately, leaving individuals, businesses,
governments and organizations of all sizes vulnerable to
their attacks.
 The impact on victims can be devastating – impacting their
personal finances, credit ratings, criminal records and
worse. Far too often, victims are left without the
appropriate institutional support and have to try on their
own to navigate the complex maze of redress options.
The Impact
 The impact on organizations and the private sector is
equally destructive, dramatically affecting customers and
client trust, increasing corporate liability, ruining
reputations and significantly affecting the bottom line.
 • $7.2B – the cost of identity theft in Canada in 2008
 • In 2008, approximately 2.25 million people in Canada
(representing 9.1% of the population) were affected by
identity theft/fraud
 • 75% of Canadians say that they are concerned about
becoming victims of identity theft/ fraud.
What is Identity Theft?
 The term "identity theft" can refer to the preliminary
steps of collecting, possessing, and trafficking in identity
information for the purpose of eventual use in existing
crimes such as personation, fraud, or misuse of debit
card or credit card data.
 Identity theft in this sense is different from "identity
fraud", i.e., the subsequent actual deceptive use of the
identity information of another person in connection with
various crimes.
 Identity theft takes place in advance of, and in
preparation for, identity fraud.
Statistics
 Identity theft is a serious criminal activity that is
becoming increasingly lucrative and easily crosses
borders.
 In 2007, more than 10,000 Canadian victims reported
losses of more than $6M to PhoneBusters, the Canadian
anti-fraud call centre.
 Between January 1, 2008 and October 31, 2008, more
than 9000 Canadian victims of identity theft reported
losses of more than $8M to PhoneBusters.
 The Canadian Council of Better Business Bureaus has
estimated that identity theft may cost Canadian
consumers, banks and credit card firms, stores and
other businesses more than $2B annually.
Laws
Bill S-4, An Act to amend the Criminal
Code (identity theft and related
misconduct)
 The actual fraudulent and deceptive uses of other people's
identities are already subject to strict criminal prohibitions.
Bill S-4 creates three new "core" identity theft offences
targeting the early stages of identity-related crime, all
subject to 5-year maximum prison sentences:
 Obtaining and possessing identity information with the
intent to use the information deceptively, dishonestly or
fraudulently in the commission of a crime;

 Trafficking in identity information, an offence that targets
those who transfer or sell information to another person
with knowledge of or recklessness as to the possible
criminal use of the information; and,
 Unlawfully possessing or trafficking in government-issued
identity documents that contain information of another
person.
In addition to existing laws
 Complementing existing mail offences with two new offences of
fraudulently redirecting or causing redirection of a person's mail and
possessing a counterfeit Canada Post mail key;
 Creating complementary forgery offences such as trafficking in
forged documents, or possessing forged documents with the intent
to use them; and
 Clarifying that certain acts in relation to PIN numbers and the
possession of skimming devices (used to extract and copy debit
card information) are prohibited.
 Moreover, a new power now permits the court to order, as part of a
sentence, that an offender be required to pay restitution to a victim
of identity theft or identity fraud for costs associated with their
efforts to rehabilitate their identity, e.g., the cost of replacement
cards, documents and correcting their credit history. This provision
complements existing provisions which permit restitution to be
ordered for actual economic or other property losses.
Exemptions

 The legislation includes two exemptions to address
potential negative impacts on the undercover work of
law enforcement.
 The exemptions ensure that those who make false
documents for covert government operations can do
so without fear of prosecution for forgery
 And that public officers (i.e., law enforcement
personnel) can create and use covert identities in
furtherance of their duties.
Useful Tips on Identity Theft
for Canadians
 Office of the Privacy Commissioner of Canada
 Royal Canadian Mounted Police
 PhoneBusters
 Canada's Office of Consumer Affairs
 http://idtheftsupportcentre.org/
RESOURCES
Legal Rights and Remedies:
http://idtheftsupportcentre.org/wpcontent/uploads/2012/03/LegalRights-Remedies_MAR2011.pdf

Criminal Code Offences:
http://idtheftsupportcentre.org/wpcontent/uploads/2012/03/RelevantLegislation.pdf
Report it
 Equifax Canada Toll free: 1-800-465-7166
 TransUnion Canada Toll free: 1-877-525-3823
 Contact your local police force and file a report.
 Contact your bank/financial institution and credit card
company
 Always report identity theft and fraud. Contact the Canadian
Anti-Fraud Centre 1-888-495-8501
https://www.antifraudcentre-centreantifraude.ca
Department of Justice
2013 Canadian Identity Theft Support Centre
Canadian Council of Better Business Bureaus
Compiled by Mark Fullbright, Certified Identity Theft Risk Management Specialist™
as a free consumer guideline for identity theft victims in Canada 2014
Company names mentioned herein are the property of, and may be trademarks
of, their respective owners.

More Related Content

What's hot

Idt
IdtIdt
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
IT-oLogy
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
swalton4
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
Rob Taylor
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
MindMake - Parenting & Education
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
Herring Consulting & Financial Group
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
English Online Inc.
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
danc752
 
Consumer financial protections
Consumer financial protectionsConsumer financial protections
Consumer financial protections
A.W. Berry
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
- Mark - Fullbright
 
What Is the General Process of Issuing Private Activity Bonds in Arizona?
What Is the General Process of Issuing Private Activity Bonds in Arizona?What Is the General Process of Issuing Private Activity Bonds in Arizona?
What Is the General Process of Issuing Private Activity Bonds in Arizona?
Charles Lotzar
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity TheftIDT911
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
- Mark - Fullbright
 
Legal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionLegal Ethics for a Changing Profession
Legal Ethics for a Changing Profession
Downey Law Group LLC
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
Identity Theft Protection
 
Ten Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IITen Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part II
Ryan K. Hew
 

What's hot (20)

Idt
IdtIdt
Idt
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
 
Consumer financial protections
Consumer financial protectionsConsumer financial protections
Consumer financial protections
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
What Is the General Process of Issuing Private Activity Bonds in Arizona?
What Is the General Process of Issuing Private Activity Bonds in Arizona?What Is the General Process of Issuing Private Activity Bonds in Arizona?
What Is the General Process of Issuing Private Activity Bonds in Arizona?
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
Legal Ethics for a Changing Profession
Legal Ethics for a Changing ProfessionLegal Ethics for a Changing Profession
Legal Ethics for a Changing Profession
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Ten Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IITen Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part II
 

Similar to Identity Theft * Canada

Money Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods IndustryMoney Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods Industry
BrandonRuse1
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Springboard
 
Understand The Types Of Fraud To Help Protect Your Business.pdf
Understand The Types Of Fraud To Help Protect Your Business.pdfUnderstand The Types Of Fraud To Help Protect Your Business.pdf
Understand The Types Of Fraud To Help Protect Your Business.pdf
PROF. PAUL ALLIEU KAMARA
 
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docxSheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
maoanderton
 
Reviewing the Updated Canadian Money Laundering Regulations - Gene DiMira
Reviewing the Updated Canadian Money Laundering Regulations  - Gene DiMiraReviewing the Updated Canadian Money Laundering Regulations  - Gene DiMira
Reviewing the Updated Canadian Money Laundering Regulations - Gene DiMira
IdentityNorthEvents
 
Understand The Types Of Fraud To Help Protect Your Business 12.pdf
Understand The Types Of Fraud To Help Protect Your Business 12.pdfUnderstand The Types Of Fraud To Help Protect Your Business 12.pdf
Understand The Types Of Fraud To Help Protect Your Business 12.pdf
PROF. PAUL ALLIEU KAMARA
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
pat7777
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
Bucacci Business Solutions
 
Employer 0409
Employer 0409Employer 0409
Employer 0409
dgade
 
An overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions forAn overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions for
eSAT Publishing House
 
An overview of plastic card frauds and solutions for avoiding fraudster trans...
An overview of plastic card frauds and solutions for avoiding fraudster trans...An overview of plastic card frauds and solutions for avoiding fraudster trans...
An overview of plastic card frauds and solutions for avoiding fraudster trans...
eSAT Journals
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protection
Bayo Cary
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
- Mark - Fullbright
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
Elizabeth Dimit
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Servicegorsline
 
Frequent White Collar Crimes And Their Causes.pdf
Frequent White Collar Crimes And Their Causes.pdfFrequent White Collar Crimes And Their Causes.pdf
Frequent White Collar Crimes And Their Causes.pdf
Free Law - by De Jure
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
Martha Brown
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Donald E. Hester
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
- Mark - Fullbright
 

Similar to Identity Theft * Canada (20)

Money Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods IndustryMoney Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods Industry
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Understand The Types Of Fraud To Help Protect Your Business.pdf
Understand The Types Of Fraud To Help Protect Your Business.pdfUnderstand The Types Of Fraud To Help Protect Your Business.pdf
Understand The Types Of Fraud To Help Protect Your Business.pdf
 
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docxSheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
 
Reviewing the Updated Canadian Money Laundering Regulations - Gene DiMira
Reviewing the Updated Canadian Money Laundering Regulations  - Gene DiMiraReviewing the Updated Canadian Money Laundering Regulations  - Gene DiMira
Reviewing the Updated Canadian Money Laundering Regulations - Gene DiMira
 
Understand The Types Of Fraud To Help Protect Your Business 12.pdf
Understand The Types Of Fraud To Help Protect Your Business 12.pdfUnderstand The Types Of Fraud To Help Protect Your Business 12.pdf
Understand The Types Of Fraud To Help Protect Your Business 12.pdf
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Employer 0409
Employer 0409Employer 0409
Employer 0409
 
An overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions forAn overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions for
 
An overview of plastic card frauds and solutions for avoiding fraudster trans...
An overview of plastic card frauds and solutions for avoiding fraudster trans...An overview of plastic card frauds and solutions for avoiding fraudster trans...
An overview of plastic card frauds and solutions for avoiding fraudster trans...
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protection
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 
Frequent White Collar Crimes And Their Causes.pdf
Frequent White Collar Crimes And Their Causes.pdfFrequent White Collar Crimes And Their Causes.pdf
Frequent White Collar Crimes And Their Causes.pdf
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
- Mark - Fullbright
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
- Mark - Fullbright
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
- Mark - Fullbright
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
- Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Identity Theft * Canada

  • 2. The Crime  The perpetrators of identity crimes range from petty criminals to international organized crime syndicates and terrorist organizations seeking to elude watch-lists and stay one step ahead of law enforcement.  Identity theft and fraud include a range of crimes such as credit card information theft, financial and personal document theft, and data breeches to name a few. Thieves strike indiscriminately, leaving individuals, businesses, governments and organizations of all sizes vulnerable to their attacks.  The impact on victims can be devastating – impacting their personal finances, credit ratings, criminal records and worse. Far too often, victims are left without the appropriate institutional support and have to try on their own to navigate the complex maze of redress options.
  • 3. The Impact  The impact on organizations and the private sector is equally destructive, dramatically affecting customers and client trust, increasing corporate liability, ruining reputations and significantly affecting the bottom line.  • $7.2B – the cost of identity theft in Canada in 2008  • In 2008, approximately 2.25 million people in Canada (representing 9.1% of the population) were affected by identity theft/fraud  • 75% of Canadians say that they are concerned about becoming victims of identity theft/ fraud.
  • 4. What is Identity Theft?  The term "identity theft" can refer to the preliminary steps of collecting, possessing, and trafficking in identity information for the purpose of eventual use in existing crimes such as personation, fraud, or misuse of debit card or credit card data.  Identity theft in this sense is different from "identity fraud", i.e., the subsequent actual deceptive use of the identity information of another person in connection with various crimes.  Identity theft takes place in advance of, and in preparation for, identity fraud.
  • 5. Statistics  Identity theft is a serious criminal activity that is becoming increasingly lucrative and easily crosses borders.  In 2007, more than 10,000 Canadian victims reported losses of more than $6M to PhoneBusters, the Canadian anti-fraud call centre.  Between January 1, 2008 and October 31, 2008, more than 9000 Canadian victims of identity theft reported losses of more than $8M to PhoneBusters.  The Canadian Council of Better Business Bureaus has estimated that identity theft may cost Canadian consumers, banks and credit card firms, stores and other businesses more than $2B annually.
  • 7. Bill S-4, An Act to amend the Criminal Code (identity theft and related misconduct)  The actual fraudulent and deceptive uses of other people's identities are already subject to strict criminal prohibitions. Bill S-4 creates three new "core" identity theft offences targeting the early stages of identity-related crime, all subject to 5-year maximum prison sentences:  Obtaining and possessing identity information with the intent to use the information deceptively, dishonestly or fraudulently in the commission of a crime;  Trafficking in identity information, an offence that targets those who transfer or sell information to another person with knowledge of or recklessness as to the possible criminal use of the information; and,  Unlawfully possessing or trafficking in government-issued identity documents that contain information of another person.
  • 8. In addition to existing laws  Complementing existing mail offences with two new offences of fraudulently redirecting or causing redirection of a person's mail and possessing a counterfeit Canada Post mail key;  Creating complementary forgery offences such as trafficking in forged documents, or possessing forged documents with the intent to use them; and  Clarifying that certain acts in relation to PIN numbers and the possession of skimming devices (used to extract and copy debit card information) are prohibited.  Moreover, a new power now permits the court to order, as part of a sentence, that an offender be required to pay restitution to a victim of identity theft or identity fraud for costs associated with their efforts to rehabilitate their identity, e.g., the cost of replacement cards, documents and correcting their credit history. This provision complements existing provisions which permit restitution to be ordered for actual economic or other property losses.
  • 9. Exemptions  The legislation includes two exemptions to address potential negative impacts on the undercover work of law enforcement.  The exemptions ensure that those who make false documents for covert government operations can do so without fear of prosecution for forgery  And that public officers (i.e., law enforcement personnel) can create and use covert identities in furtherance of their duties.
  • 10. Useful Tips on Identity Theft for Canadians  Office of the Privacy Commissioner of Canada  Royal Canadian Mounted Police  PhoneBusters  Canada's Office of Consumer Affairs  http://idtheftsupportcentre.org/
  • 11. RESOURCES Legal Rights and Remedies: http://idtheftsupportcentre.org/wpcontent/uploads/2012/03/LegalRights-Remedies_MAR2011.pdf Criminal Code Offences: http://idtheftsupportcentre.org/wpcontent/uploads/2012/03/RelevantLegislation.pdf
  • 12. Report it  Equifax Canada Toll free: 1-800-465-7166  TransUnion Canada Toll free: 1-877-525-3823  Contact your local police force and file a report.  Contact your bank/financial institution and credit card company  Always report identity theft and fraud. Contact the Canadian Anti-Fraud Centre 1-888-495-8501 https://www.antifraudcentre-centreantifraude.ca
  • 13. Department of Justice 2013 Canadian Identity Theft Support Centre Canadian Council of Better Business Bureaus Compiled by Mark Fullbright, Certified Identity Theft Risk Management Specialist™ as a free consumer guideline for identity theft victims in Canada 2014 Company names mentioned herein are the property of, and may be trademarks of, their respective owners.