SlideShare a Scribd company logo
1 of 2
HOW THIEVES GET
YOUR IDENTITY:
• Dumpster Diving—Going through your trash.
• Skimming—Storing your credit card number in a special storage device when processing
  your card.
• Phishing—Pretending to be a financial institution and sending scam alerts to get your
  personal information.
• Changing Your Address—Completing a change of address form to get
  your mail and personal statements.
• Stealing—Taking your purse, wallet, mail, pre-approved credit cards, new checks,
  personnel files from work, or tax information.



TIPS TO AVOID IDENTITY THEFT:                                     (See Page 2 for definitions & details)

1.    Shred Financial Documents
2.    Never Click on Links in Unsolicited E-mails
3.    Do Not Use Obvious Passwords
4.    Do Not Give Out Personal Information
5.    Protect Your Social Security Number
6.    Keep Your Personal Information in a Secure Place
7.    Be Alert to Bills that Do Not Arrive when They Should
8.    Be Proactive about Unexpected Credit Cards or Account Statements
9.    Be Alert for Credit Being Denied Unexpectedly
10.   Respond Immediately to Calls or Letters about Purchases You Never Made
11.   Check Your Credit Report
12.   Regularly Review Your Financial Statements
13.   Close Any Accounts that have been Tampered With or Established Fraudulently
14.   Go Paperless
15.   Store Your Financial and Personal Information in a Storage Box by Year
16.   Be Alert when Responding to E-mails
17.   When Contacted by an Institution by Phone, Tell Them You will Call Them Right Back
18.   Opt Out of Pre-Approved Credit Offers
19.   Get a Locking Mailbox
20.   Copy All of Your Credit Cards and Save Them in a File at Home
21.   Carry Only One or Two Cards at a Time
TIPS TO AVOID                                      often denied for a variety of reasons, one of       it came directly from a financial institution.
                                                   which is when too much credit is opened in a        If you respond to the e-mail, you encour-
IDENTITY THEFT:                                    short period of time. Being denied credit may       age them to continue trying to get personal
                                                   mean that someone else has opened accounts          information from you. Simply add the address
1. SHRED FINANCIAL                                 in your name.                                       to your spam list to keep them from contact-
DOCUMENTS: Any paperwork with                                                                          ing you in the future. Visit the addresses you
personal information should be put through a
                                                   10. RESPOND IMMEDIATELY TO                          know if you are concerned the notice is valid.
shredder before being thrown away.                 CALLS OR LETTERS ABOUT PUR-
                                                   CHASES MADE: Credit card companies                  17. WHEN CONTACTED BY AN
2. NEVER CLICK ON LINKS IN                         create a profile of their clients detailing out     INSTITUTION BY PHONE, TELL
UNSOLICITED E-MAILS: Since                         the most common places a customer shops             THEM YOU WILL CALL THEM
“phishing” is becoming a common problem,           and the items that they frequently buy. If          RIGHT BACK: Let them give you their
 use up-to-date firewalls, anti-spyware, and       something is purchased that does not suit           name and number, but do not call that num-
 anti-virus software to protect your home          your profile, they will contact you for verifica-   ber back. Instead, call the number on the back
 computer. Good anti-spam software is a must.      tion. Respond to the notice right away to head      of your card and ask to speak to a representa-
 Plus, never click on links in e-mails. Instead,   off potential theft and damage to your credit.      tive about your account. Let them know that
 open a new window and go to the website                                                               you were contacted and ask them to verify any
 address you know in order to enter informa-       11. CHECK YOUR CREDIT
                                                                                                       problems. All account managers have access
 tion. (Fake PayPal e-mails are becoming more      REPORT: Any credit opened in your name              to the same information, so they will be able
 common, so be extra wary when dealing with        will show up on your credit report. By staying      to see if there is a problem with your account
 these.) You might also want to avoid e-mail       on top of this, you will be able to stop identity   or not.
 archiving in the event that someone hacks         theft before too much damage occurs.
 into your account.                                                                                    18. OPT OUT OF PRE-APPROVED
                                                   12. REGULARLY REVIEW YOUR
                                                                                                       CREDIT OFFERS: Although I do not
3. DO NOT USE OBVIOUS                              FINANCIAL STATEMENTS: Look for                      personally believe that people can get your
PASSWORDS: These include your birth                any charges that you did not make. Also not         identity through pre-approved credit card
date, mother’s maiden name, or the last four       that consumers usually have only 30 days to         applications without your social security
digits of your Social Security number.             dispute items they did not authorize.               information, it never hurts to opt-out of
                                                   13. CLOSE ANY ACCOUNTS THAT                         credit card offers. By doing so, you lessen the
4. DO NOT GIVE OUT PERSONAL
                                                                                                       amount of mail that comes to your mailbox,
INFORMATION: Whether over the                      HAVE BEEN TAMPERED WITH OR
                                                                                                       and you will still be able to apply for credit
phone, through the mail, or over the Internet,     ESTABLISHED FRAUDULENTLY:                           online. Check out the FTC’s Consumer Alert
don’t share your information unless you know       Get a new card with a new number and close          webpage to see all the ways you can opt out.
who you are dealing with.                          the old card, since this alone may stop a thief
                                                   in possession of your information.                  19. GET A LOCKING MAILBOX:
5. PROTECT YOUR SOCIAL                                                                                 This is an especially good idea for anyone in
SECURITY NUMBER: Never carry your                  14. GO PAPERLESS: You can receive                   a nice area. The nicer the area you live in, the
social security number in your wallet or write     many of your bills through your e-mail/on-          more ideal a target you make to an identity
your social security number on a check.            line banking instead of having them mailed.         thief because they assume you have more
                                                   By requesting this benefit, you keep account        money for them to steal.
6. KEEP YOUR PERSONAL IN-                          numbers and personal information private.
FORMATION IN A SECURE PLACE:                       You are also able to save hard copies directly      20. COPY ALL OF YOUR CREDIT
This is especially important with roommates,       to your hard drive, which allows you to find        CARDS AND SAVE THEM IN A FILE
outside help, or if you are having work done       the information quickly and easily when             AT HOME: By having a copy of the card
in your home.                                      needed.                                             (front and back) in a locked filing cabinet or
7. BE ALERT TO BILLS THAT                          15. STORE YOUR FINANCIAL AND                        other safe place, you will be able to quickly
DO NOT ARRIVE WHEN THEY                                                                                and easily contact your creditors should your
                                                   PERSONAL INFORMATION IN
                                                                                                       purse or wallet ever be stolen.
SHOULD: If they do not arrive, they may            A STORAGE BOX BY YEAR: This is
have been routed somewhere else.                   especially important when dealing with taxes        21. CARRY ONLY ONE OR TWO
                                                   since the IRS can demand to see evidential          CARDS AT A TIME: Lock away all the
8. BE PROACTIVE ABOUT UN                           proof of deductions for as long as eleven           other cards in a safe place and carry as few
EXPECTED CREDIT CARDS OR                           years after you file. By keeping it in a storage    cards as possible. This way, if someone ever
ACCOUNT STATEMENTS: If an                          box, you can shred the contents when the            gets into your wallet or purse, you will notice
account or credit card arrives that you did        time period is up. Note: this does not include      immediately if a card is stolen and be able to
not open/activate, someone else did. Call          social security numbers.                            report it right away.
the company immediately and have it closed/
canceled.                                          16. BE ALERT WHEN RESPONDING
                                                   TO E-MAILS: E-mails are now commonly
9. BE ALERT FOR CREDIT BEING                       used to steal or “phish” information out of
DENIED UNEXPECTEDLY: Credit is                     consumers by making the e-mail look as if

More Related Content

Similar to TIPS TO AVOID IDENTITY THEFT

Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineKristi Valentini
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
Protect Yourself Against Identity Theft
Protect Yourself Against Identity TheftProtect Yourself Against Identity Theft
Protect Yourself Against Identity Theftpmass
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims- Mark - Fullbright
 
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...Ken Fishkin, CISSP, CIPP/US, CIPT
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theftnewsusa01
 
Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
How to prevent identity fraud
How to prevent identity fraudHow to prevent identity fraud
How to prevent identity fraudscamtools
 
Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 

Similar to TIPS TO AVOID IDENTITY THEFT (20)

Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Protect Yourself Against Identity Theft
Protect Yourself Against Identity TheftProtect Yourself Against Identity Theft
Protect Yourself Against Identity Theft
 
Monitor Your Credit Report
Monitor Your Credit  ReportMonitor Your Credit  Report
Monitor Your Credit Report
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
How to prevent identity fraud
How to prevent identity fraudHow to prevent identity fraud
How to prevent identity fraud
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

TIPS TO AVOID IDENTITY THEFT

  • 1. HOW THIEVES GET YOUR IDENTITY: • Dumpster Diving—Going through your trash. • Skimming—Storing your credit card number in a special storage device when processing your card. • Phishing—Pretending to be a financial institution and sending scam alerts to get your personal information. • Changing Your Address—Completing a change of address form to get your mail and personal statements. • Stealing—Taking your purse, wallet, mail, pre-approved credit cards, new checks, personnel files from work, or tax information. TIPS TO AVOID IDENTITY THEFT: (See Page 2 for definitions & details) 1. Shred Financial Documents 2. Never Click on Links in Unsolicited E-mails 3. Do Not Use Obvious Passwords 4. Do Not Give Out Personal Information 5. Protect Your Social Security Number 6. Keep Your Personal Information in a Secure Place 7. Be Alert to Bills that Do Not Arrive when They Should 8. Be Proactive about Unexpected Credit Cards or Account Statements 9. Be Alert for Credit Being Denied Unexpectedly 10. Respond Immediately to Calls or Letters about Purchases You Never Made 11. Check Your Credit Report 12. Regularly Review Your Financial Statements 13. Close Any Accounts that have been Tampered With or Established Fraudulently 14. Go Paperless 15. Store Your Financial and Personal Information in a Storage Box by Year 16. Be Alert when Responding to E-mails 17. When Contacted by an Institution by Phone, Tell Them You will Call Them Right Back 18. Opt Out of Pre-Approved Credit Offers 19. Get a Locking Mailbox 20. Copy All of Your Credit Cards and Save Them in a File at Home 21. Carry Only One or Two Cards at a Time
  • 2. TIPS TO AVOID often denied for a variety of reasons, one of it came directly from a financial institution. which is when too much credit is opened in a If you respond to the e-mail, you encour- IDENTITY THEFT: short period of time. Being denied credit may age them to continue trying to get personal mean that someone else has opened accounts information from you. Simply add the address 1. SHRED FINANCIAL in your name. to your spam list to keep them from contact- DOCUMENTS: Any paperwork with ing you in the future. Visit the addresses you personal information should be put through a 10. RESPOND IMMEDIATELY TO know if you are concerned the notice is valid. shredder before being thrown away. CALLS OR LETTERS ABOUT PUR- CHASES MADE: Credit card companies 17. WHEN CONTACTED BY AN 2. NEVER CLICK ON LINKS IN create a profile of their clients detailing out INSTITUTION BY PHONE, TELL UNSOLICITED E-MAILS: Since the most common places a customer shops THEM YOU WILL CALL THEM “phishing” is becoming a common problem, and the items that they frequently buy. If RIGHT BACK: Let them give you their use up-to-date firewalls, anti-spyware, and something is purchased that does not suit name and number, but do not call that num- anti-virus software to protect your home your profile, they will contact you for verifica- ber back. Instead, call the number on the back computer. Good anti-spam software is a must. tion. Respond to the notice right away to head of your card and ask to speak to a representa- Plus, never click on links in e-mails. Instead, off potential theft and damage to your credit. tive about your account. Let them know that open a new window and go to the website you were contacted and ask them to verify any address you know in order to enter informa- 11. CHECK YOUR CREDIT problems. All account managers have access tion. (Fake PayPal e-mails are becoming more REPORT: Any credit opened in your name to the same information, so they will be able common, so be extra wary when dealing with will show up on your credit report. By staying to see if there is a problem with your account these.) You might also want to avoid e-mail on top of this, you will be able to stop identity or not. archiving in the event that someone hacks theft before too much damage occurs. into your account. 18. OPT OUT OF PRE-APPROVED 12. REGULARLY REVIEW YOUR CREDIT OFFERS: Although I do not 3. DO NOT USE OBVIOUS FINANCIAL STATEMENTS: Look for personally believe that people can get your PASSWORDS: These include your birth any charges that you did not make. Also not identity through pre-approved credit card date, mother’s maiden name, or the last four that consumers usually have only 30 days to applications without your social security digits of your Social Security number. dispute items they did not authorize. information, it never hurts to opt-out of 13. CLOSE ANY ACCOUNTS THAT credit card offers. By doing so, you lessen the 4. DO NOT GIVE OUT PERSONAL amount of mail that comes to your mailbox, INFORMATION: Whether over the HAVE BEEN TAMPERED WITH OR and you will still be able to apply for credit phone, through the mail, or over the Internet, ESTABLISHED FRAUDULENTLY: online. Check out the FTC’s Consumer Alert don’t share your information unless you know Get a new card with a new number and close webpage to see all the ways you can opt out. who you are dealing with. the old card, since this alone may stop a thief in possession of your information. 19. GET A LOCKING MAILBOX: 5. PROTECT YOUR SOCIAL This is an especially good idea for anyone in SECURITY NUMBER: Never carry your 14. GO PAPERLESS: You can receive a nice area. The nicer the area you live in, the social security number in your wallet or write many of your bills through your e-mail/on- more ideal a target you make to an identity your social security number on a check. line banking instead of having them mailed. thief because they assume you have more By requesting this benefit, you keep account money for them to steal. 6. KEEP YOUR PERSONAL IN- numbers and personal information private. FORMATION IN A SECURE PLACE: You are also able to save hard copies directly 20. COPY ALL OF YOUR CREDIT This is especially important with roommates, to your hard drive, which allows you to find CARDS AND SAVE THEM IN A FILE outside help, or if you are having work done the information quickly and easily when AT HOME: By having a copy of the card in your home. needed. (front and back) in a locked filing cabinet or 7. BE ALERT TO BILLS THAT 15. STORE YOUR FINANCIAL AND other safe place, you will be able to quickly DO NOT ARRIVE WHEN THEY and easily contact your creditors should your PERSONAL INFORMATION IN purse or wallet ever be stolen. SHOULD: If they do not arrive, they may A STORAGE BOX BY YEAR: This is have been routed somewhere else. especially important when dealing with taxes 21. CARRY ONLY ONE OR TWO since the IRS can demand to see evidential CARDS AT A TIME: Lock away all the 8. BE PROACTIVE ABOUT UN proof of deductions for as long as eleven other cards in a safe place and carry as few EXPECTED CREDIT CARDS OR years after you file. By keeping it in a storage cards as possible. This way, if someone ever ACCOUNT STATEMENTS: If an box, you can shred the contents when the gets into your wallet or purse, you will notice account or credit card arrives that you did time period is up. Note: this does not include immediately if a card is stolen and be able to not open/activate, someone else did. Call social security numbers. report it right away. the company immediately and have it closed/ canceled. 16. BE ALERT WHEN RESPONDING TO E-MAILS: E-mails are now commonly 9. BE ALERT FOR CREDIT BEING used to steal or “phish” information out of DENIED UNEXPECTEDLY: Credit is consumers by making the e-mail look as if