All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Protecting your privacy, identity and financial information online is critically important in today’s Internet economy. Last year, 13.1 million Americans were victims of identity theft. I have no plans on joining this group, which is what inspired us to create our latest Zing blog guide – Identity 101.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Protecting your privacy, identity and financial information online is critically important in today’s Internet economy. Last year, 13.1 million Americans were victims of identity theft. I have no plans on joining this group, which is what inspired us to create our latest Zing blog guide – Identity 101.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Identity theft happens whenever someone uses your personal identification to commit fraud or other types of crimes. They may use your name, credit card number, or your Social Security number (or other identifying information).
According to the Federal Trade Commission (FTC) in the United States, some 9 million Americans have their identities stolen every year. They also state that identity theft is likely to affect most people in some way. The thief may rent an apartment using someone else's name. He/She may open a line of credit or use your own line of credit for his/her buying needs. He/She may apply for a job using your identification.
here's a video that will help you: https://oke.io/BwCr4LGX
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
Mr. Jamshed Masood who is a telecom sector executive provided information about how to identity thefts and how to prevent them in the digital age. He discussed the real definition of identity theft, its impact. Not only limited to this, respected speaker also gave the complete information of different types of identity thefts and their methods such as hacking, shoulder surfing. While discussing these thefts, light on prevention methodology to treat these kind of thefts was also given to the audience.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Identity theft happens whenever someone uses your personal identification to commit fraud or other types of crimes. They may use your name, credit card number, or your Social Security number (or other identifying information).
According to the Federal Trade Commission (FTC) in the United States, some 9 million Americans have their identities stolen every year. They also state that identity theft is likely to affect most people in some way. The thief may rent an apartment using someone else's name. He/She may open a line of credit or use your own line of credit for his/her buying needs. He/She may apply for a job using your identification.
here's a video that will help you: https://oke.io/BwCr4LGX
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
Mr. Jamshed Masood who is a telecom sector executive provided information about how to identity thefts and how to prevent them in the digital age. He discussed the real definition of identity theft, its impact. Not only limited to this, respected speaker also gave the complete information of different types of identity thefts and their methods such as hacking, shoulder surfing. While discussing these thefts, light on prevention methodology to treat these kind of thefts was also given to the audience.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Helpful information about what identity theft is, how to help prevent it and protect yourself from it. Designed for readers with limited knowledge. Easy to understand and share with audiences starting at age 13.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
This was a presentation by Hewie Poplock on Tuesday, November 15th, 2016 in the Goodwill Manasota (FL) Ranch Lake Community Room, "How to Avoid Identity Theft".
A victim of identity theft himself, Hewie will provide examples of how ID theft can happen as well as suggestions and precautions on how to prevent you and your family from becoming victims of identity theft yourselves. Topics covered included:
• What is Identity Theft
• How ID Theft Happens
• How to Protect Yourself
• Phishing
• Data Breaches
• Facebook Spoofing
• Skimmers
• Security Freeze
• On Line Shopping Safety
• Credit Card Chips
• What to Do If You are a Victim
Hewie is a former teacher, college instructor, business owner and manager, IT Manager, and web designer. He is currently semi-retired, but is active in technology user groups and frequently speaks to and teaches groups who are mostly seniors. He holds a monthly Windows Special Interest Group for a group in Orlando and has several videos on YouTube. He is an active member of The Sarasota Technology User Group.
Similar to The Identity Theft Checklist – Guidance for the general public.nz (14)
This report solely belongs to Symantec. Credit is due to all original authors and no financial gain was made from the report, Simply sharing for educational purposes,
The FBI is the lead federal agency for investigating malicious cyber activity by criminals, nation-state adversaries, and terrorists. To fulfill this mission, the FBI often develops resources to enhance operations and collaboration. One such resource is the FBI’s Internet Crime Complaint Center (IC3) which provides the public with a trustworthy and convenient mechanism for reporting information concerning suspected Internet-facilitated criminal activity. At the end of every year, the IC3 collates information collected into an annual report.
Credit is due to all original authors and no financial gain was made from the blog, Simply sharing an interesting story for educational purposes,
This guide aims to help journalists understand their rights at protests and avoid arrest when reporting on these events. It summarizes the legal landscape and provides strategies and tools to help journalists avoid incidents with police and navigate them successfully should they arise. Credit RCFP.Org
Credit is due to all original authors and no financial gain was made from the blog, Simply sharing an interesting story for educational purposes,
Verizon Publishes 2020 Data Breach Investigation Report (DBIR) With Insights From Thousands of Confirmed Breaches. Verizon's 2020 Data Breach Investigations Report (DBIR) is the most extensive yet, with 81 contributing organizations, and more than 32,000 incidents analyzed (of which 3,950 were confirmed breaches). Credit:Verizon
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
A Resource Guide to theU.S. Foreign Corrupt Practices Act
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
The FTC takes in reports from consumers about problems they experience in the marketplace. The reportsare stored in the Consumer Sentinel Network (Sentinel), a secure online database available only to lawenforcement. While the FTC does not intervene in individual consumer disputes, its law enforcementpartners – whether they are down the street, across the nation, or around the world – can use informationin the database to spot trends, identify questionable business practices and targets, and enforce the law.
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
Below is a list of consumer reporting companies updated for 2019.1 Consumer reporting companies collect information and provide reports to other companies about you. These companies use these reports to inform decisions about providing you with credit, employment, residential rental housing, insurance, and in other decision making situations. The list below includes the three nationwide consumer reporting companies and several other reporting companies that focus on certain market areas and consumer segments. The list gives you tips so you can determine which of these companies may be important to you. It also makes it easier for you to take advantage of your legal rights to (1) obtain the information in your consumer reports, and (2) dispute suspected inaccuracies in your reports with companies as needed.
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
Transnational criminal organizations (TCOs), foreign fentanyl suppliers, and Internet purchasers located in the United States engage in the trafficking of fentanyl, fentanyl analogues, and other synthetic opioids and the subsequent laundering of the proceeds from such illegal sales.
The mission of the IC3 is to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity, and to develop effective alliances with industry partners. Information is analyzed and disseminated for investigative and intelligence purposes, for law enforcement, and for public awareness.
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
This report is built upon analysis of 41,686 security incidents, of which 2,013 were confirmed data breaches. We will take a look at how results are changing (or not) over the years as well as digging into the overall threat landscape and the actors, actions, and assets that are present in breaches. Windows into the most common pairs of threat actions and affected assets also are provided.
The Federal Trade Commission (FTC or Commission) is an independent U.S. law enforcement agency charged with protecting consumers and enhancing competition across broad sectors of the economy. The FTC’s primary legal authority comes from Section 5 of the Federal Trade Commission Act, which prohibits unfair or deceptive practices in the marketplace. The FTC also has authority to enforce a variety of sector specific laws, including the Truth in Lending Act, the CAN-SPAM Act, the Children’s Online Privacy Protection Act, the Equal Credit Opportunity Act, the Fair Credit Reporting Act, the Fair Debt Collection Practices Act, and the Telemarketing and Consumer Fraud and Abuse Prevention Act. This broad authority allows the Commission
to address a wide array of practices affecting consumers, including those that emerge with the development of new technologies and business models.
Sentinel sorts consumer reports into 29 top categories. Appendices B1 – B3 describe the categories,providing details, and three year figures. To reflect marketplace changes, new categories or subcategories are created or deleted over time.The Consumer Sentinel Network Data Book excludes the National Do Not Call Registry. A separate report about these complaint statistics is available at: https://www.ftc.gov/reports/national-do-not-call-registry-data-book-fiscal-year-2018. The Sentinel Data Book also excludes reports about unsolicited commercial email.Consumers can report as much or as little detail as they wish when they file a report. For the Sentinel Data Book graphics, percentages are based on the total number of Sentinel fraud, identity theft, and other report types in 2018 in which consumers provided the information displayed on each chart.Reports to Sentinel sometimes indicate money was lost, and sometimes indicate no money was lost.Often, people make these reports after they experience something problematic in the marketplace,avoid losing any money, and wish to alert others. Except where otherwise stated, numbers are based on reports both from people who indicated a loss and people who did not.Calculations of dollar amounts lost are based on reports in which consumers indicated they lost between $1 and $999,999. Prior to 2017, reported “amount paid” included values of $0 to $999,999.States and Metropolitan Areas are ranked based on the number of reports per 100,000 population.State rankings are based on 2017 U.S. Census population estimates (Annual Estimates of the Resident Population: April 1, 2010 to July 1, 2017). Metropolitan Area rankings are based on 2016 U.S. Census population estimates (Annual Estimates of the Resident Population: April 1, 2010 to July 1, 2016).This Sentinel Data Book identifies Metropolitan Areas (Metropolitan and Micropolitan Statistical Areas)with a population of 100,000 or more except where otherwise noted. Metropolitan areas are defined by Office of Management and Budget Bulletin No. 15-01, “Revised Delineations of Metropolitan Statistical Areas, Micropolitan Statistical Areas, and Combined Statistical Areas, and Guidance on Uses of the Delineations of These Areas” (July 15, 2015). Numbers change over time. The Sentinel Data Book sorts consumer reports by year, based on the date of the consumer’s report. Some data contributors transfer their complaints to Sentinel after the end of the calendar year, and new data providers often contribute reports from prior years. As a result, the total number of reports for 2018 will likely change during the next few months, and totals from previous years may differ from prior Consumer Sentinel Network Data Books. The most up to date information can be found online at ftc.gov/data
A credit score is a three -digit number that predicts how likely you are to pay back a loan on time, based on information from your credit reports.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only. - Medical identity theft has existed in various forms for decades, but it was in 2006 that World Privacy Forum published the first major report about the crime. The report called for medical data breach notification laws and more research about medical identity theft and its impacts. Since that time, medical data breach notification laws have been enacted, and other progress has been made, particularly in the quality of consumer complaint datasets gathered around identity theft, including medical forms of the crime. This report uses new data arising from consumer medical identity theft complaint reporting and medical data breach reporting to analyze and document the geography of medical identity theft and its growth patterns. The report also discusses new aspects of consumer harm resulting from the crime that the data has brought to light
The FTC takes in reports from consumers about problems they experience in the marketplace. The reports are stored in the Consumer Sentinel Network (Sentinel), a secure online database available only to law enforcement. While the FTC does not intervene in individual consumer disputes, its law enforcement partners – whether they are down the street, across the nation, or around the world – can use information in the database to spot trends, identify questionable business practices and targets, and enforce the law.
Since 1997, Sentinel has collected tens of millions of reports from consumers about fraud, identity theft, and other consumer protection topics. During 2017, Sentinel received nearly 2.7 million consumer reports, which the FTC has sorted into 30 top categories. The 2017 Consumer Sentinel Network Data Book (Sentinel Data Book) has a vibrant new look, and a lot more information about what consumers told us last year. You'll know more about how much money people lost in the aggregate, the median amount they paid, and what frauds were most costly. And you'll know much more about complaints of identity theft, fraud, and other types of problems in each state, too. The Sentinel Data Book is based on unverified reports filed by consumers. The data is not based on a consumer survey. Sentinel has a five-year data retention policy, with reports older than five years purged biannually.
This guide addresses the steps to take once a
breach has occured. For advice on implementing a
plan to protect consumers’ personal information, to
prevent breaches and unauthorized access, check
out the FTC’s Protecting Personal Information: A
Guide for Business and Start with Security: A Guide
for Business.
*Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
FTC Consumer Sentinel Network Law enforcement's source for consumer complaints.
All information, data, and material contained, presented, or provided on is for educational purposes only.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners.
It is not to be construed or intended as providing legal advice.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
3. Contents
1.0 Introduction............................................................................................................................................................... 2
2.0 Case studies............................................................................................................................................................... 3
3.0 Methods for committing identity theft........................................................................................................ 4
Traditional ways to access personal information for identity theft........................................4
Online methods for stealing personal information................................................................4
4.0 How to prevent identity theft........................................................................................................................... 5
5.0
What to do if you are a victim. ......................................................................................................................... 6
Lost or stolen documents.......................................................................................................6
Stolen or misdirected mail...................................................................................................11
Suspicious mail or phone calls.............................................................................................12
Strange transactions or other concerns...............................................................................14
4. 1.0
Introduction
What is your identity? Who are you?
Your identity is made up of facts about
yourself. This can include your name, lifeevent information like your date and place
of birth, physiological attributes (e.g.
your height and eye colour), and unique
information used by a specific agency
or organisation (e.g. customer number,
passport number).
Identity information is all the facts you have given
to government agencies, and organisations, as
well as the information you create about yourself
(e.g. information shared on social networking
websites). It is fact-based information that may or
may not change over time. Identity information
is often something we take for granted but is the
information that enables us to do many day-to-day
activities. Without identity information, you would
not be able to open a bank account or get a driver
licence or a passport.
Identity theft occurs when someone uses your
identity information. Often, it is not until someone
causes damage to your identity that you become
aware that the theft has occurred. With your
identity information, a fraudster can commit a
number of different crimes including taking out
loans or accumulating speeding tickets in your
name. Identity theft can damage your personal
and financial reputation.
2
Identity Assurance Framework
To help combat identity crime, the Government
is improving systems and processes that involve
identity data. Agencies will also intervene in
cases of identity theft when they have the legal
power to so.
Identity theft can seem minor, such as borrowing
someone’s ID to gain access to services you may
not be otherwise entitled to (e.g. the purchase of
alcohol at licensed and unlicensed premises),
but it can escalate into more serious crimes
(e.g. gaining access to money from financial
institutions). There are serious consequences for
committing identity crime. Individuals found guilty
of fraud in New Zealand face large fines, and may
find themselves behind bars.
Agencies are actively working to help you
protect your identity, but you need to do your
part. The Government’s current focus is on
prevention of identity crime by raising people’s
awareness of the issue and providing advice about
how to reduce the chance of becoming a victim.
This document includes information on what you
can do to protect yourself from identity theft, and
also information on what to do should it happen
to you. There are also some real-life examples of
how identity theft has affected individuals.
5. 2.0
Case studies
While she was away
Convicted of someone else’s crime
Jane Campbell* is changing her name to
escape her identity theft problems. After a
brief holiday in 2007, she had no mail waiting
for her on her return. Thinking there was a
problem with a post office redirection, she
ignored it. But four weeks later, $31,000 had
disappeared from her account after fraudsters
stole her mail and created fake IDs using her
full name and date of birth.
In 2009, fraudsters struck again. It is unknown
if it was the same set of fraudsters, or if her
details had been sold on.
In 2008, 18-year-old John Smith* appeared
in the Gore District Court and was convicted
of drink driving. However, the real John Smith
was actually living in Papakura at the time,
and was not in Gore when the offence
occurred. The real John Smith was left to deal
with Police, get affidavits to prove that he was
in Auckland at the time of the offence and
could not have committed the crime. As traffic
offences do not always result in an arrest,
fingerprinting did not take place, so proving
identity was more difficult.
What could be done to stop it?
How did this happen?
An alert can be placed on your credit file; if
someone tries to take out a loan in your name,
the bank will receive the alert when they do a
credit check.
The real John Smith suspects that he shared
his full name and date of birth with an
individual he had met on a trip to Southland,
and they used his details.
* Name was changed for privacy reasons.
identity theft checklist
3
6. 3.0
Methods for committing
identity theft
Traditional ways to access personal
information for identity theft
Online methods for stealing
personal information
Dumpster diving: fraudsters go through bins
to collect ‘trash’ or discarded items to obtain
copies of individuals’ cheques, credit card or bank
statements, or other records that contain their
personal information.
Malware: a software code or programme
inserted into an information system in order
to cause harm to that system, or to other systems
or to subvert them for use other than that
intended by their own users. Viruses, worms,
trojan horses, backdoors, keystroke loggers, screen
scrapers, rootkits, and spyware are all different
kinds of malware.
Pretexting: criminals contact a financial
institution or telephone company, impersonating
a legitimate customer, and request account
information. In other cases, the pretext is
accomplished by an insider at the financial
institution, or by fraudulently opening an
online account in a customer’s name.
Shoulder surfing: looking over someone’s
shoulder or from a nearby location as the victim
enters a PIN at an ATM or EFTPOS machine, or
enters a password online.
Skimming: capturing personal data from
the magnetic stripes on the back of credit or
debit cards. The data is transmitted to another
location where it is re-encoded onto
fraudulent credit cards.
Business record theft: someone steals data
from a business or bribes insiders to obtain the
information from the business or organisation.
Spam: unsolicited, unwanted or harmful
electronic messages are increasingly being used
as a method for delivering malware and criminal
phishing scams.
Phishing: obtaining unsuspecting Internet users’
personal identifying information through emails
and mirror-websites that look like legitimate
businesses, such as financial institutions or
government agencies. Typically, a phishing attack is
composed of the following steps:
• the phisher sends its potential victim an email
that appears to be from an existing company.
The email uses the colours, graphics, logos and
wording of the company;
• the potential victim reads the email and
provides the phisher with personal information
by either responding to the email or clicking
on a link and providing the information via a
form on a website that appears to be from the
company; and
• through this, the victim’s personal information
is directly transmitted to the scammer.
Hacking: exploiting vulnerabilities in
electronic systems or computer software
to steal personal data.
4
Identity Assurance Framework
7. 4.0
How to prevent
identity theft
Identity theft is more likely to occur if
you make it easy for someone to take and
use your identity information. There are
a number of things you can do to protect
your identity information:
• Be careful with your identity information, how
much you give out and who you share it with.
• If someone asks for your identity information,
ask why the organisation or individual needs it,
and what they intend to do with it.
• Do not write down PIN numbers or passwords.
Netsafe (www.netsafe.org.nz) provide tips
about managing passwords. Your bank
should be able to provide some information
about choosing and managing your Personal
Identification Numbers (PIN).
• Keep key documents that are used to establish
your identity (e.g. birth certificate and passport)
in a safe and secure place.
• If you use Internet banking, do not log on from
a shared or public computer, such as an Internet
café, to make any sensitive transactions.
• Remove all personal information from
computers before you dispose of them.
• Be suspicious of any unexpected events (e.g.
letters from creditors, bank transactions you can
not remember making) that could be the result
of identity crime.
• If you move, ensure all your mail forwarded to
your new address.
• If you believe you are the victim of an identity
crime, contact the Police.
• Keep an eye out for the igovt logo on
government websites. igovt is a secure
government logon service, which can be used
on multiple websites.
• Make sure you properly dispose (shred or burn)
of bank statements, electricity bills and any
piece of correspondence with your name and
address on it. These documents should never
be put in public or recycling bins. Consider
getting your statements provided online – it is
good for you and the environment too.
• Be cautious, identity crime does not always
result from information that is stolen; people
often give it away by publishing it in public
places (e.g. date of birth posted on a social
networking website).
identity theft checklist
5
8. 5.0
What to do if you
are a victim
Lost or stolen documents
What has happened and
what could happen:
What you need to do:
Your Eftpos card, credit
card or cheque book have
been lost or stolen
It is important to contact your bank immediately if your cards
or cheque book are lost or stolen. If you fail to notify the bank
immediately, they may not be able to reimburse you for any losses
that may occur.
What could happen:
A thief could make fraudulent
transactions from your
accounts, and you could be
liable for the money.
You have lost your
New Zealand Passport or
believe it is being misused
What could happen:
A thief could apply for false
documents in your name,
travel on your Passport or sell
it to a criminal organisation.
Once reported lost, your cards are likely to be cancelled, and
reissued to you.
Contact: Your bank, Police
Further information: Scamwatch - Bank Details
Go to your nearest police station and report the passport as lost/
stolen, you should obtain a copy of the police report for applying
for a new passport. You also need to report this to your nearest
Department of Internal Affairs Office so that the Passport can be
cancelled (New Zealand, Sydney or London).
To apply for a new passport:
• Obtain a Passport application form (available online).
• Complete the declaration or loss or theft page.
• Post this application in with any required documents and
the appropriate fee.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Department of Internal Affairs, Police
Further information: Safe Travel and Passports
6
Identity Assurance Framework
9. Lost or stolen documents
What has happened and
what could happen:
What you need to do:
You suspect someone has
obtained a New Zealand
Passport in your name
Contact the Department of Internal Affairs with your details
and suspicions.
What could happen:
A thief could be using your
name to commit other
crimes, such as travelling
illegally or obtaining loans in
your name.
You have lost your nonNew Zealand Passport or
believe it is being misused
What could happen:
A thief could be using your
name to commit international
crime, to obtain false
documents or work illegally
in New Zealand.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Department of Internal Affairs, Police
Further information: Department of Internal Affairs - Passport
Contact Details
Go to your nearest police station and report the passport
as lost/stolen.
You should then alert Immigration New Zealand if your passport
included a valid Immigration New Zealand visa. You will most likely
need to include a copy of the police report when you apply for a new
passport either from your nearest diplomatic mission or passport
issuance location.
Contact: Police, your nearest diplomatic mission and Immigration
New Zealand
Further information: New Zealand Police Identity Theft Information
You suspect someone
has obtained a nonNew Zealand Passport
in your name
Contact the nearest embassy or Passport office for the country
concerned. You will need to provide your personal and contact
details as well as details of your suspicions.
What could happen:
Further information: Scamwatch - Scams,
A thief could be using your
name to commit other crimes
such as travel illegally or
obtain loans in your name.
Ministry of Foreign Affairs and Trade – Diplomatic Missions in
New Zealand
Contact: Your nearest diplomatic mission
identity theft checklist
7
10. Lost or stolen documents
What has happened and
what could happen:
What you need to do:
Your New Zealand
Driver Licence has been
lost or stolen
Go to your nearest police station and report the licence as
lost/stolen.
What could happen:
A thief could be using your
licence to take out loans in
your name, to drive when
they are not entitled to
or to obtain other false
documentation.
You should replace your driver licence as soon as possible. The
issuing of a replacement licence will automatically cancel your
previous licence.
To replace your lost licence:
• Visit any New Zealand Transport Agency (NZTA) driver
licensing agent.
• Present evidence of your identity and address.
• Submit a completed application (form DL2).
• Pay the replacement licence fee.
Your replacement licence will have the same expiry date as your
previous licence. Alternatively, you can apply to renew your licence
for up to 10 years.
If you can not get to a driver licensing agent to replace (or renew)
your driver licence, you should contact NZTA to have your driver
licence card cancelled.
Contact the NZTA:
Email: info@nzta.govt.nz
Phone: 0800 822 422
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: NZTA, Police
Further information: NZTA Stolen/Lost Licences
8
Identity Assurance Framework
11. Lost or stolen documents
What has happened and
what could happen:
What you need to do:
You suspect someone
has obtained a
New Zealand driver
licence in your name
Contact the NZTA:
What could happen:
Email: info@nzta.govt.nz
Phone: 0800 822 422
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
A thief could be using your
licence to take out loans in
your name, to drive when
they are not entitled to
or to obtain other false
documentation.
Contact: NZTA, Police
You think your
New Zealand Immigration
visa or permit is being
misused
Contact Immigration New Zealand with your personal and contact
details and suspicions.
What could happen:
Contact: Immigration New Zealand, Police
Someone who is not
entitled to be in New Zealand
could be obtaining benefits
in your name.
Further information: Immigration New Zealand
You suspect someone
has used your details to
commit immigration fraud
Contact Immigration New Zealand with your personal and contact
details and suspicions. You may be referred to report the suspicions
to the Police.
What could happen:
Contact: Immigration New Zealand, Police
Someone could be using
your details to avoid
deportation or gain a different
tier of residency. This may
impact on your ability to live
in New Zealand.
Further information: NZTA Contact Us
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Further information: Immigration New Zealand - Complaints Process
identity theft checklist
9
12. Lost or stolen documents
What has happened and
what could happen:
What you need to do:
You have lost your
Citizenship Certificate or
believe it is being misused
You should contact the New Zealand Citizenship office to report the
loss and receive confirmation of your citizenship.
What could happen:
• Complete the relevant form, available on the Citizenship website.
A thief could be using your
name to commit international
crime, to obtain false
documents or work illegally
in New Zealand.
• Include the appropriate fee.
To receive confirmation of your citizenship you will need to:
• Post your application to Citizenship.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Police, Department of Internal Affairs
Further information: Department of Internal Affairs Confirmation of New Zealand Citizenship
You suspect someone has
obtained New Zealand
Citizenship in your name
What could happen:
Someone could use your
details to gain New Zealand
Citizenship and a
New Zealand passport.
With this they can obtain
loans, licences etc and
steal your identity.
10
Identity Assurance Framework
Contact the Department of Internal Affairs with your details
and suspicions.
If you have evidence of your identity being fraudulently used
by another person, you should report this to the Police.
Contact: Police, Department of Internal Affairs
Further information: Department of Internal Affairs Citizenship information
13. Stolen or misdirected mail
What has happened and
what could happen:
What you need to do:
You have not received
mail that you expected
to receive
Follow up with the person or organisation that should have sent the
item to ensure that mail is still being sent and the address details
are up to date. You can also contact New Zealand Post to ensure that
there is not a hold or redirection in place for your mail.
What could happen:
Someone could be
intercepting your mail
to obtain credit cards or
other documents that they
have fraudulently applied
for in your name. They
could also be trying to collate
data in order to commit
identity fraud.
An identity thief has
falsified change of address
forms, stolen your mail or
committed another type
of mail fraud to get your
personal information
Contact: Your account provider, New Zealand Post
Further information: Neighbourhood Support Identity
Theft Information
Contact your account providers and New Zealand Post to update
your contact details.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Police, Your account provider, New Zealand Post
Further information: New Zealand Police Identity Theft Information
What could happen:
You could be sent fines,
incur debts or lose money
because someone is
impersonating you.
identity theft checklist
11
14. Suspicious mail or phone calls
What has happened and
what could happen:
What you need to do:
You have received mail for
a bank account you did not
open or credit card you did
not request
Keep all of the mail, and contact the applicable bank about the
account or credit card.
What could happen:
Contact: Your bank, Police
An identity thief may have
applied for a number of credit
cards in your name.
Further information: New Zealand Bankers’ Association
A finance company
contacts you trying to
collect on a loan you did
not take out
Contact the finance company with all of the information to put a
hold on the account.
What could happen:
Contact: The finance company
A thief may have applied for
loans in your name, which
you may be liable for.
Further information: Scamwatch - Bank Details
You receive a fine in the
mail or notification of court
proceedings that you know
nothing about
Go to your nearest court and report the issue. Take proof of your
own identity, and any information that you have to prove that you
were not involved in the crime.
What could happen:
Further information: Ministry of Justice - Common Questions
An identity thief may have
used your name to avoid
prosecution under their
own identity.
12
Identity Assurance Framework
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Ministry of Justice
15. Suspicious mail or phone calls
What has happened and
what could happen:
What you need to do:
You receive a phone call
from your bank asking
for your internet banking
details or PIN number
Your bank will never ask you to disclose your PIN number or give out
your internet banking details password to a person.
What could happen:
An identity thief may be
trying to steal your savings
and investments.
You should never respond to an unprompted request for these
details. Note down as much as you can about the call, without
disclosing your details and let your bank know about the scam.
Contact: Your bank
Further information: Scamwatch – Bank Details
identity theft checklist
13
16. Strange transactions or other concerns
What has happened and
what could happen:
What you need to do:
You find that any of your
bank accounts have been
tampered with
Contact your bank straight away and discuss specifically the
transactions that appear to be fraudulent.
What could happen:
An identity thief may
be trying to gain access
to your finances.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: your bank, Police
Further information: Scamwatch - Bank Details
You think an identity
thief has interfered with
your investments or
brokerage account
Contact your investment provider straight away and discuss the
specific transactions that appear to be fraudulent.
What could happen:
Contact: your investment provider, Police
An identity thief may
be trying to gain access to
your finances.
Further information: Scamwatch - Bank Details
You are being billed for an
account you did not open
Contact the bank or utility company straight away and discuss
specifically the account in dispute.
What could happen:
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
An identity thief may be using
your identity to take out
money and loans which they
intend to default on.
You believe someone
has filed for bankruptcy
in your name
What could happen:
An identity thief may have
filed for bankruptcy in your
name to hide financial
offending against you.
14
Identity Assurance Framework
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: bank or utility company, Police
Further information: New Zealand Bankers’ Association Identity
Fraud Information
You can contact the Insolvency and Trustee Service for assistance on
finding out if someone has filed in your name. The service will also
be able to help you work with the Ministry of Justice to clear the
legal proceedings against you.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Insolvency and Trustee Service (Ministry of Economic
Development), Ministry of Justice, Police
Further information: Insolvency and Trustee Service
17. Strange transactions or other concerns
What has happened and
what could happen:
What you need to do:
You find that a utility
account has been
tampered with
Contact your utility company with the details that have been
changed, or the account that has been incorrectly charged. Any
evidence you have to support your claim may be helpful.
What could happen:
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
An identity thief may be
trying to bill you for their
account, or steal your mail for
use as proof of identity.
You find enquiries on
your credit report that you
did not know about
What could happen:
An identity thief may have
applied for loans or bank
accounts in your name.
Contact: Your utility company, Police
Further information: Neighbourhood Support Identity Theft
Information
Discuss the enquiries with your bank as you are likely to discover
the enquiries when taking out a loan. You can also contact New
Zealand’s two credit agencies, Veda Advantage or Dun & Bradstreet,
to query your credit report and get more information. You may need
to follow up with the enquirer to determine if a loan or account has
been issued in your name.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Your bank, Veda Advantage or Dun & Bradstreet, Police
Further information: Veda Advantage - Identity Theft,
Dun & Bradstreet
You find inaccurate
information on your
credit report
What could happen:
An identity thief may have
applied for loans or bank
accounts in your name.
Discuss the inaccuracies with your bank as you are likely to discover
these when taking out a loan. You can also contact New Zealand’s
two credit agencies, Veda Advantage or Dun & Bradstreet to query
your credit report and get more information. You may need to follow
up with the enquirer to determine if a loan or account has been
issued in your name.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Your bank, Veda Advantage or Dun & Bradstreet, Police
Further information: Veda Advantage - Updating Your Details,
Dun & Bradstreet
identity theft checklist
15
18. Strange transactions or other concerns
What has happened and
what could happen:
What you need to do:
You have reason to
believe your IRD number
has been misused
You can contact Inland Revenue to determine if there is tax, income,
or due payments against your number that you can not account for.
Inland Revenue should be able to assist in determining where these
payments are being made from (the source is on your tax record).
What could happen:
An identity thief may be using
your identity as they do not
have the right to work in
New Zealand, to obtain a
benefit or tax credit, to avoid
paying tax or to interact with
another government agency.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Inland Revenue, Police
Further information: Inland Revenue Complaints Service
You become aware that
someone is wrongfully
using your identity to
commit a crime, what
should you do?
Go to your nearest police station and report the issue. Take proof
of your own identity, and any information that you have to prove
that you are not involved in the crime.
What could happen:
Note: Prior to a conviction the Police are the point of contact;
however after receiving a conviction the Ministry of Justice will
be the first point of contact.
A thief may be using your
name to the Police and may
incur fines and criminal
charges in your name, which
may leave you in breach of
the court if you do not clear
your name.
16
Identity Assurance Framework
Contact: Police
Further information: New Zealand Police Identity Theft Information
19. For any identity theft situation you may also wish
to report the incident to the Police, if not already
contacted, as someone may be using your identity
in multiple places that you are unaware of.
If you feel that you privacy has been breached,
contact the agency concerned in the first instance.
If you are not satisfied with their response you can
contact the Privacy Commissioner’s enquiries line:
Phone: 0800 803 909
Email: enquiries@privacy.org.nz
For more information: www.privacy.org.nz
identity theft checklist
17