We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMuriel Gardner
Modified about 1 year ago
Identity Theft Solutions
©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the top of the list since that time according to the Federal Trade Commission. As a result, many employers have taken action to limit the information they provide to others, both internal and external, regarding records they maintain on employees. The federal government and state governments are also legislating privacy laws and regulations on the use and display of important personal data, i.e., Social Security numbers, employee health information and the destruction of some forms of employee records in the face of escalating identity theft problems. This presentation provides an overview of the importance of maintaining the confidentiality of personal information. This is a sample presentation that must be customized to include and match the employer’s own policies and practices.
©SHRM Objective To educate everyone to become “aware” as consumers Help everyone understand the importance of maintaining “confidentiality” of their personal information Identify resources available to assist in the event of ID theft
©SHRM Common Perils Data thieves are smart and resourceful Dumpster diving Accessing credit reports Phishing/Skimming Spying – PIN entry Stealing/redirecting mail Scams leading to ID theft can be done anywhere, any time
©SHRM Typical Outcomes - $$$$$$$$$$$$$ Charging to YOUR current accounts and opening new ones Writing stolen or fake or altering checks Siphoning checking/savings accounts Borrowing for large ticket items
©SHRM Protecting Personal Information Keep personal information safe Use complex passwords (alpha-numeric) Protect mail Use extreme caution in sharing any personal information online and on phones Promptly take action on reporting discrepancies Never carry your Social Security Card unless absolutely necessary
©SHRM Protect Credit/Debit Card Information Review statements received and shred statements at appropriate intervals and all unsolicited offers Opt out of offers Close unused accounts Carry only cards to be used
©SHRM Checking Accounts Keep check book/checks in secure locations Check/balance statements Don’t provide checking account info - online - over the phone
©SHRM Protect Computer Update virus protection Don’t open files from unknown sources Look for lock icon and “https” before entering information Use complex passwords Use a firewall Erase computer hard drive before disposing of computers and destroy peripheral storage devices before disposal
©SHRM Consumer Protection Laws Fair Credit Reporting Act - provides limited access to credit reports - requires credit bureaus to accuracy FACT Act - provides for free credit reports - ensures improved safeguards from ID theft and disclosure
©SHRM Credit Protection Services Fee-based services or insurance can be valuable but be wary of scams ID theft insurance services Weigh cost v. benefit
©SHRM ID Theft Recovery Practices Review statements Promptly contact financial institution(s) to note errors/discrepancies Close or cancel accounts Stop payments on outstanding checks Establish new account numbers and passwords
©SHRM ID Theft Recovery Practices (continued) Report crime to local police Get a copy of the police report Notify postal service if mail was involved Notify Social Security Administration if SSN was used Notify DMV if driver’s license number was used
©SHRM ID Theft Recovery Practices (continued) Obtain credit bureau reports Place fraud alerts on reports Check reports at least quarterly for a period of one year and later, annually Promptly dispute any discrepancies
©SHRM ID Theft Recovery-Recordkeeping Keep records/notes/copies of all contact information - names - dates - follow up notes Maintain copies of all documentation
©SHRM Online Resources Federal Trade Commission ID Theft Page dex.html dex.html National Conference of State Legislatures (links to state laws) ncialServices/IdentityTheftStateStatutes/tabid/12538/Defaul t.aspx Privacy Rights Clearinghouse FAQ’s htm
©SHRM Course Evaluation Please be sure to complete and leave the evaluation sheet you received with your handouts. Thank you for your attention and interest!
Identity Theft IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Identity theft: Real or Virtual? By: Alex Metzler.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Jeff loses his identity! Lesson 5: Identity Theft.
Identity Theft How bad people get good credit. Lindsey Bertugli.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined: the crime of obtaining the personal or financial information of another.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Jeff loses his identity! Lesson 8: Identity Theft.
Presented By Drexel and FMFCU.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Identity Theft The fastest growing type of fraud..
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
Identity Theft. What is it? How is it perpetrated? Can you avoid it? What if you become a victim?
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Identity Theft How it happens and how to avoid it.
Presented (insert date) By (insert organizations name)
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
Managing Your Credit 2014/2015 Office of Student Financial Assistance.
Identity Theft. Identity Theft is when someone uses your personal information to commit fraud. About 9 million Americans have their identities stolen.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
© 2017 SlidePlayer.com Inc. All rights reserved.