We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJaylene Malin
Modified over 2 years ago
IDENTITY THEFT Protect Yourself and Your Good Name ITT Employees Federal Credit Union
How Theft Occurs Stolen Wallet or Purse Stolen Mail Going through your trash Buy your information from inside sources
How Theft Occurs (cont..) Fraudulently obtain your credit report They complete a change of address form to divert your mail to another location
How They Use The Information Call the credit card company and ask to change the address. Establish a phone or wireless service under your name.
How They Use…. (cont..) Open a bank account under your name and write bad checks on it. Counterfeit checks or debit cards and drain your account.
Protect Yourself Never reveal personal information Pay attention to billing cycles Deposit outgoing mail in post office collection boxes. Put passwords on our credit card, bank and phone accounts.
Protect Yourself (cont..) Minimize the personal information you carry on you. Destroy your receipts Order a copy of your credit report every year.
Credit Bureaus There are three major credit reporting agencies. You should verify your information with them once a year to help identify any fraud.
Free Yearly Credit Report Go On line to: annualcreditreport.com Or call OR mail your request to: Annual Credit Report Request Service P O Box Atlanta, GA
They have…. 30 days to investigate and respond to you in writing as to whether the information was confirmed, has been updated, or has been removed from your report.
If You Are A Victim Contact the Three Credit Bureaus Contact Creditors Involved
If You Are A Victim (cont..) File a report with local police If someone is using your Social Security number to apply for a job, contact SSA at
Thank you for joining us for Identity Theft: Protect Yourself and Your Good Name A presentation from ITT Credit Union (260) (260)
Presented (insert date) By (insert organizations name)
Avoid Identity Theft TCU Technology Resources Information Security Services.
CONSUMER ACTION - Credit Card Fraud Training Credit Card Fraud An Educational Partnership of Consumer Action and Chase ©2009.
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
IDENTITY THEFT Awareness and Prevention. What is Identity Theft? IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumers personal.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
1 Identity Theft Prevention Practical, simple precautions for you and your business.
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Protecting Your Identity Identity Theft. What is identify theft? To get credit To get credit Open fraudulent accounts Open fraudulent accounts Write checks.
Information Security Office The University of Arizona Security Awareness Brown Bag Series Identity Theft and Telephone Fraud.
Identity Theft What You Need to Know. Learning Goals Define Identity Theft Learn how your identity is stolen Learn how you become a victim Learn what.
Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.
Identity Theft Presented by Lawrence County Sheriffs Office and Lawrence County Information Systems & Technology.
Identity Theft A consumers guide to protecting your personal identity and finances Offered by the Michigan State Police.
Identity Theft If you are a victim of identity theft, take the following four steps as soon as possible!
Identity Theft Don't Be a Victim Revision II. Course Data Author: Lynne Presley, Staff Organization & Development, Oklahoma Dept. of Corrections Course.
Charge It Right. Charge It Right 2 1. Agenda 2. Ground Rules 3. Introductions Welcome.
Preventing Its More Than Just Your Wallet…. Identity Theft One New Identity Theft Victim Every 3 Seconds in 2012 (Javelin Strategy & Researchs 2012 Identity.
Objective 7.03 Understand ways to avoid identity theft. Identity Theft.
PERSONAL FINANCES 101. AGENDA Creating and Managing a Budget Power of Compounding Pros and Cons of Credit Cards Smart Borrowing: Student Loan Programs.
Identity Theft Deter, Detect, and Defend At Home & At Work.
Your Name – Your Company Helping People Improve & Protect Their Credit Credit Concepts II.
Identity Theft Ta’Mar Boyd Adam Devin. What is Identity Theft Identity theft occurs when someone uses your personally identifying information, like.
Compliance with Federal Trade Commission’s “Red Flag Rule”
What To Do If Someone Steals Your Identity 4 Immediate Actions: 1.Close all accounts accessed 2.Place a fraud alert on credit reports 3.File a police report.
Company LOGO Data Protection Fundamentals Sensitisation MQA By : Mrs. Pravina DODAH Mr. Hemrajsingh BHUGOWON Date : 09 Nov 2012.
San Bernardino County on Identity Theft September 13, 2005 Presented by: Larry Walker Auditor/Controller-Recorder.
Consumer Action Protect Your Phone Records Protect Your Phone Records.
ING Fraud Collection GPCE Credit Union has arranged a collection of scams, outlining the most prevalent financial scams. We want our members to be aware,
BARBADOS 2013 RESPONSE OF INTERNATIONAL COMMERCIAL BANKS TO CARD PAYMENT FRAUD Presenter: Denver Frater Regional Director & Chief Security Officer Eastern.
© 2016 SlidePlayer.com Inc. All rights reserved.