Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identity Theft Presented by Lawrence County Sheriffs Office and Lawrence County Information Systems & Technology.

Similar presentations


Presentation on theme: "Identity Theft Presented by Lawrence County Sheriffs Office and Lawrence County Information Systems & Technology."— Presentation transcript:

1 Identity Theft Presented by Lawrence County Sheriffs Office and Lawrence County Information Systems & Technology

2 Identity Theft Before We Begin Class Length: 1 hour Class Length: 1 hour Sign Training Log Sign Training Log Restrooms & Exits Restrooms & Exits Questions Questions Handouts Handouts Feedback Feedback

3 Identity Theft Learning Objectives

4 Identity Theft Learning Objectives Learn what Identity Theft is and some of the different types of Identity Theft. Learn what Identity Theft is and some of the different types of Identity Theft. Learn some of the steps you can take to prevent your identity from being stolen. Learn some of the steps you can take to prevent your identity from being stolen. Learn what to do if you believe your identity has been stolen. Learn what to do if you believe your identity has been stolen. Not intended to make everyone an expert. Not intended to make everyone an expert.

5 Identity Theft What is Identity Theft?

6 Identity Theft What is Identity Theft? Identity Theft is when someone uses your personally identifiable information, such as your name, Social Security number, or credit card number, without your consent, to commit fraud or other crimes. Identity Theft is #1 Crime in America today.

7 Identity Theft Identity Theft Statistics 13+ million Americans have had their identities stolen this year to date. 13+ million Americans have had their identities stolen this year to date. Business losses are upwards of $50 billion annually, and $5 billion is spent by victims each year recovering from identity theft. Business losses are upwards of $50 billion annually, and $5 billion is spent by victims each year recovering from identity theft. 7% of all adults have their identities misused each year, with an average $3,500 lost per instance. 7% of all adults have their identities misused each year, with an average $3,500 lost per instance.

8 Identity Theft Identity Theft Statistics 80% of large organizations surveyed indicate they had experienced one or more data breaches over the previous 12 months. 80% of large organizations surveyed indicate they had experienced one or more data breaches over the previous 12 months. 49% of the business security breaches involved the loss or theft of paper documents. 49% of the business security breaches involved the loss or theft of paper documents. The average business security breach recovery cost was $6.75 million! The average business security breach recovery cost was $6.75 million!

9 Identity Theft Identity Theft Types

10 Identity Theft Identity Theft Types Financial. Financial. Credit Card, Bank Account, Investment, Mortgage & Tax Fraud. Credit Card, Bank Account, Investment, Mortgage & Tax Fraud. Medical. Medical. Assuming your identity for medical care. Assuming your identity for medical care. Criminal. Criminal. Commit crimes while assuming your identity. Commit crimes while assuming your identity. You can be arrested and jailed for a crime you didnt commit and know nothing about. You can be arrested and jailed for a crime you didnt commit and know nothing about.

11 Identity Theft Identity Theft Types Child. Child. Stealing the identity of a child. Stealing the identity of a child. Often goes undetected for years because no one has been monitoring their credit. Often goes undetected for years because no one has been monitoring their credit. Senior Citizens. Senior Citizens. Targeting senior citizens via a variety of methods to obtain personal information. Targeting senior citizens via a variety of methods to obtain personal information. Elderly people under the care nursing facilities are at higher risk. Elderly people under the care nursing facilities are at higher risk.

12 Identity Theft Identity Theft Types Social Security Number (SSN). Social Security Number (SSN). Common denominator in most types of identity theft. Common denominator in most types of identity theft. Easily commit crimes and financial fraud in your good name. Easily commit crimes and financial fraud in your good name. Create a different identity using your SSN – also called Synthetic Identity Theft. Create a different identity using your SSN – also called Synthetic Identity Theft.

13 Identity Theft How Personal Information Is Obtained

14 Identity Theft How Personal Information Is Obtained Workplace. Absconding personnel records, financial reports, messages, etc. Workplace. Absconding personnel records, financial reports, messages, etc. Old-Fashioned Stealing. Stealing wallets and purses, mail, etc. Old-Fashioned Stealing. Stealing wallets and purses, mail, etc. Dumpster Diving. Rummaging through trash looking for documents with your personal information on it. Dumpster Diving. Rummaging through trash looking for documents with your personal information on it. Skimming. Scanning credit/debit card numbers by using a special storage device when processing your card. Skimming. Scanning credit/debit card numbers by using a special storage device when processing your card.

15 Identity Theft How Personal Information Is Obtained Phishing. Spam s from supposed reputable companies to get you to link to malicious sites to reveal your personal information. Phishing. Spam s from supposed reputable companies to get you to link to malicious sites to reveal your personal information. Changing Your Address. Diverting your billing statements to another location by completing a change of address form. Changing Your Address. Diverting your billing statements to another location by completing a change of address form. Pretexting. Using false pretenses to get you to divulge personal information. Pretexting. Using false pretenses to get you to divulge personal information.

16

17 Identity Theft How Personal Information Is Obtained Social Networking. Searching the Internet for information people make publicly available on sites such as Facebook, Myspace, Twitter, etc. Social Networking. Searching the Internet for information people make publicly available on sites such as Facebook, Myspace, Twitter, etc. Malware. Malicious software such as Spyware, Trojan Horses, Rootkits to gain/maintain control of your computer or obtain information like account logins and passwords. Malware. Malicious software such as Spyware, Trojan Horses, Rootkits to gain/maintain control of your computer or obtain information like account logins and passwords.

18 Identity Theft Example forms of Identity Theft

19 Identity Theft Example forms of Identity Theft Credit Card Fraud: Credit Card Fraud: Make unauthorized purchases with your credit card account(s). Make unauthorized purchases with your credit card account(s). Open new credit card accounts in your name, and rack up charges on those accounts as well. Open new credit card accounts in your name, and rack up charges on those accounts as well. Usually use different billing address so you dont have any idea its happening. Usually use different billing address so you dont have any idea its happening. Can severely damage your credit. Can severely damage your credit.

20 Identity Theft Government Documents Fraud: Government Documents Fraud: Obtain a driver's license or official ID card issued in your name but with their picture. Obtain a driver's license or official ID card issued in your name but with their picture. Use your name and Social Security number to get government benefits. Use your name and Social Security number to get government benefits. File a fraudulent tax return using your information. File a fraudulent tax return using your information. Example forms of Identity Theft

21 Identity Theft Medical Identity Fraud: Medical Identity Fraud: Receive medical care or medication in your name. Receive medical care or medication in your name. Health insurance claims filed with your insurance carrier. Health insurance claims filed with your insurance carrier. False medical records and health information created that could place you at great personal risk. False medical records and health information created that could place you at great personal risk. Phone or Utilities Fraud: Phone or Utilities Fraud: Open a new phone or wireless account in your name, or run up charges on your existing account. Open a new phone or wireless account in your name, or run up charges on your existing account. Example forms of Identity Theft

22 Identity Theft Preventative Measures

23 Identity Theft Preventative Measures Place a Freeze on your credit: Place a Freeze on your credit: #1 way to protect your credit. #1 way to protect your credit. Accomplished through the 3 major credit reporting agencies (TransUnion, Equifax or Experian). Accomplished through the 3 major credit reporting agencies (TransUnion, Equifax or Experian). No new accounts (credit card, banking, brokerage, loans, rental agreements, etc.) may be be attached to your name/social security number without your approval. No new accounts (credit card, banking, brokerage, loans, rental agreements, etc.) may be be attached to your name/social security number without your approval. $10 fee (per agency) to freeze, or temporarily unfreeze, your credit report in order to create a new account. $10 fee (per agency) to freeze, or temporarily unfreeze, your credit report in order to create a new account.

24 Identity Theft Preventative Measures Monitor your credit reports regularly. Monitor your credit reports regularly. At least annually. At least annually. Everyone is entitled to at least one free report per year. Everyone is entitled to at least one free report per year. Go ONLY to Annual Credit Report to get your free report Go ONLY to Annual Credit Report to get your free report Ensure all activity is accounted for; clarify with the credit bureau in question if you dont understand report contents, or suspect fraudulent activity. Ensure all activity is accounted for; clarify with the credit bureau in question if you dont understand report contents, or suspect fraudulent activity.

25 Identity Theft Preventative Measures Opt out of pre-approved credit offers (i.e. Financial Junk Main) with the three major credit reporting agencies. Opt out of pre-approved credit offers (i.e. Financial Junk Main) with the three major credit reporting agencies. No cost. No cost. Significantly reduces the number of organizations receiving your credit information. Significantly reduces the number of organizations receiving your credit information. Reduces the amount of documents you need to shred prior to discarding. Reduces the amount of documents you need to shred prior to discarding.

26 Identity Theft Preventative Measures Shred all documents containing important personally identifiable information on it before discarding. Shred all documents containing important personally identifiable information on it before discarding. Carry only necessary identification and credit/debit cards in your wallet/purse. Carry only necessary identification and credit/debit cards in your wallet/purse. Be aware if youre using contact-less credit cards: Be aware if youre using contact-less credit cards: Can be scanned without your knowledge. Can be scanned without your knowledge. Use a scan-proof wallet. Use a scan-proof wallet. Dont carry anything with your SSN on it. Dont carry anything with your SSN on it.

27 Identity Theft Preventative Measures Use a pre-paid credit card for certain purchases. Use a pre-paid credit card for certain purchases. Never provide your personal information to anyone unless: Never provide your personal information to anyone unless: Its absolutely necessary. Its absolutely necessary. You initiate it (be very suspicious if you didnt). You initiate it (be very suspicious if you didnt). You can confirm the validity of the person and/or company receiving it. You can confirm the validity of the person and/or company receiving it. Purchase a USPS-approved locking mailbox. Purchase a USPS-approved locking mailbox.

28 Identity Theft Preventative Measures Be vigilant when using the Internet: Be vigilant when using the Internet: Be on the alert for unsolicited messages and links in s. These links very often lead to malicious websites that may look legitimate, or install malware on your computer. Be on the alert for unsolicited messages and links in s. These links very often lead to malicious websites that may look legitimate, or install malware on your computer. When using the Internet, be watchful of the actual address of the site youre on. Ensure youre actually on the website you intend to be be: When using the Internet, be watchful of the actual address of the site youre on. Ensure youre actually on the website you intend to be be:

29 Identity Theft Preventative Measures Search Engines. Search Engines. Using a search engine (i.e. Google) is a useful and widely used tool for locating information and items on the Internet. Using a search engine (i.e. Google) is a useful and widely used tool for locating information and items on the Internet. Be very selective of links you go to when searching. Be very selective of links you go to when searching.

30 Identity Theft Preventative Measures When making purchases over the Internet, limit your business to places that are reputable and legitimate. When making purchases over the Internet, limit your business to places that are reputable and legitimate. You may find items advertised for less, but dont trust unknown sites. You may find items advertised for less, but dont trust unknown sites. Be suspicious any site unless you know it to be reputable. Be suspicious any site unless you know it to be reputable. Check the Better Business Bureau if you are uncertain: Check the Better Business Bureau if you are uncertain:

31 Identity Theft Preventative Measures Whenever possible, pay for on-line purchases through PayPal. Whenever possible, pay for on-line purchases through PayPal. The recipient of the funds does not have access to your financial account information. The recipient of the funds does not have access to your financial account information. More and more companies are accepting PayPal as an allowed payment method. More and more companies are accepting PayPal as an allowed payment method.

32 Identity Theft Social Networking: Social Networking: Restrict access to your page(s) to only those you have authorized (Friends or allowed Followers). Restrict access to your page(s) to only those you have authorized (Friends or allowed Followers). Communicate with only those persons you personally know, and dont accept requests to be Friends with anyone else. Communicate with only those persons you personally know, and dont accept requests to be Friends with anyone else. Be guarded about what you publish on your pages. Be guarded about what you publish on your pages. Vigilance on social networking sites goes beyond identity theft. There are always people hunting for victims to exploit, be they adults or children. Vigilance on social networking sites goes beyond identity theft. There are always people hunting for victims to exploit, be they adults or children. Anything you share can be used against you. Anything you share can be used against you. Preventative Measures

33 Identity Theft Preventative Measures Protect Usernames & Passwords: Protect Usernames & Passwords: Never reveal to anyone. Never reveal to anyone. If absolutely necessary to write them down, keep them in a locked, safe place. If absolutely necessary to write them down, keep them in a locked, safe place. Never place on your computer or electronic device unless under a high level of encryption. Never place on your computer or electronic device unless under a high level of encryption. Dont use the same password for multiple accounts. Dont use the same password for multiple accounts.

34 Identity Theft What to Do If Your Identity Has Been Stolen

35 Identity Theft What to Do If Your Identity Has Been Stolen Contact the 3 credit reporting agencies and have them place a Fraud Alert on your file. Contact the 3 credit reporting agencies and have them place a Fraud Alert on your file. Contact financial institutions where your credit has been misused and formally dispute any charges and close compromised accounts. Contact financial institutions where your credit has been misused and formally dispute any charges and close compromised accounts. File a complaint with the Federal Trade Commission (FTC) (get copy of the report). File a complaint with the Federal Trade Commission (FTC) (get copy of the report).

36 Identity Theft What to Do If Your Identity Has Been Stolen File a report with the Attorney Generals Office (get copy of the report). File a report with the Attorney Generals Office (get copy of the report). File a report with your local law enforcement office, or the appropriate law enforcement agency in the community where the identity theft took place (get copy of the report). File a report with your local law enforcement office, or the appropriate law enforcement agency in the community where the identity theft took place (get copy of the report). File a report with the Social Security Administration (get copy of the report). File a report with the Social Security Administration (get copy of the report).

37 Identity Theft Video

38 Video Short 10-minute video on ID Theft from the Federal Trade Commission (FTC). Short 10-minute video on ID Theft from the Federal Trade Commission (FTC).

39 Identity Theft Resources

40 Resources Federal Trade Commission (FTC): Federal Trade Commission (FTC): ID Theft Resources: ID Theft Resources: Online Complaint Form: https://www.ftccomplaintassistant.gov Online Complaint Form: https://www.ftccomplaintassistant.gov https://www.ftccomplaintassistant.gov Telephone: ID-THEFT Telephone: ID-THEFT Identity Theft Resource Center (IDRC): Identity Theft Resource Center (IDRC): SD Attorney Generals Office: SD Attorney Generals Office: Online Complaint Form: Online Complaint Form: Telephone: Telephone:

41 Identity Theft Resources TransUnion: ; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA TransUnion: ; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA www.transunion.com Equifax: ; P.O. Box , Atlanta, GA Equifax: ; P.O. Box , Atlanta, GA www.equifax.com Experian: EXPERIAN ( ); P.O. Box 9554, Allen, TX Experian: EXPERIAN ( ); P.O. Box 9554, Allen, TX

42 Identity Theft Resources Free Annual Credit Report: Free Annual Credit Report: Opt Out Prescreen: Opt Out Prescreen: Telephone: Telephone: Social Security Administration: Social Security Administration: https://www.socialsecurity.gov/fraudreport/oig/public_frau d_reporting/form.htm https://www.socialsecurity.gov/fraudreport/oig/public_frau d_reporting/form.htm https://www.socialsecurity.gov/fraudreport/oig/public_frau d_reporting/form.htm https://www.socialsecurity.gov/fraudreport/oig/public_frau d_reporting/form.htm

43 Identity Theft Summary

44 Summary Identity Theft is a serious crime that can significantly and negatively affect your life. Identity Theft is a serious crime that can significantly and negatively affect your life. Safeguard your personal information, and never provide it to anyone unless its absolutely necessary, and when you do ensure it is for valid purposes. Safeguard your personal information, and never provide it to anyone unless its absolutely necessary, and when you do ensure it is for valid purposes. Be wary of scams to obtain your personal information, whether they be via the Internet or other means. Be wary of scams to obtain your personal information, whether they be via the Internet or other means. Carefully monitor your credit report and monthly financial account statements for unusual activity. Carefully monitor your credit report and monthly financial account statements for unusual activity. Take appropriate steps in the event you believe your identity has been compromised. Take appropriate steps in the event you believe your identity has been compromised.

45 Identity Theft Questions?

46 Questions? What is the most effective method for protecting yourself from becoming an Identity Theft victim? Placing a Freeze on your credit reports with the 3 credit reporting agencies (TransUnion, Equifax or Experian). Placing a Freeze on your credit reports with the 3 credit reporting agencies (TransUnion, Equifax or Experian). What is the first thing you should do when you believe your identity has been stolen? Contact one of the 3 credit reporting agencies and file a Fraud Alert. Contact one of the 3 credit reporting agencies and file a Fraud Alert.

47 Identity Theft Please fill out survey, take a resource handout & Thank you for attending!


Download ppt "Identity Theft Presented by Lawrence County Sheriffs Office and Lawrence County Information Systems & Technology."

Similar presentations


Ads by Google