Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identity Theft Solutions. ©SHRM 20082 Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.

Similar presentations


Presentation on theme: "Identity Theft Solutions. ©SHRM 20082 Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the."— Presentation transcript:

1 Identity Theft Solutions

2 ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the top of the list since that time according to the Federal Trade Commission. As a result, many employers have taken action to limit the information they provide to others, both internal and external, regarding records they maintain on employees. The federal government and state governments are also legislating privacy laws and regulations on the use and display of important personal data, i.e., Social Security numbers, employee health information and the destruction of some forms of employee records in the face of escalating identity theft problems. This presentation provides an overview of the importance of maintaining the confidentiality of personal information. This is a sample presentation that must be customized to include and match the employer’s own policies and practices.

3 ©SHRM Objective To educate everyone to become “aware” as consumers Help everyone understand the importance of maintaining “confidentiality” of their personal information Identify resources available to assist in the event of ID theft

4 ©SHRM Common Perils Data thieves are smart and resourceful Dumpster diving Accessing credit reports Phishing/Skimming Spying – PIN entry Stealing/redirecting mail Scams leading to ID theft can be done anywhere, any time

5 ©SHRM Typical Outcomes - $$$$$$$$$$$$$ Charging to YOUR current accounts and opening new ones Writing stolen or fake or altering checks Siphoning checking/savings accounts Borrowing for large ticket items

6 ©SHRM Protecting Personal Information Keep personal information safe Use complex passwords (alpha-numeric) Protect mail Use extreme caution in sharing any personal information online and on phones Promptly take action on reporting discrepancies Never carry your Social Security Card unless absolutely necessary

7 ©SHRM Protect Credit/Debit Card Information Review statements received and shred statements at appropriate intervals and all unsolicited offers Opt out of offers Close unused accounts Carry only cards to be used

8 ©SHRM Checking Accounts Keep check book/checks in secure locations Check/balance statements Don’t provide checking account info - online - over the phone

9 ©SHRM Protect Computer Update virus protection Don’t open files from unknown sources Look for lock icon and “https” before entering information Use complex passwords Use a firewall Erase computer hard drive before disposing of computers and destroy peripheral storage devices before disposal

10 ©SHRM Consumer Protection Laws Fair Credit Reporting Act - provides limited access to credit reports - requires credit bureaus to accuracy FACT Act - provides for free credit reports - ensures improved safeguards from ID theft and disclosure

11 ©SHRM Credit Protection Services Fee-based services or insurance can be valuable but be wary of scams ID theft insurance services Weigh cost v. benefit

12 ©SHRM ID Theft Recovery Practices Review statements Promptly contact financial institution(s) to note errors/discrepancies Close or cancel accounts Stop payments on outstanding checks Establish new account numbers and passwords

13 ©SHRM ID Theft Recovery Practices (continued) Report crime to local police Get a copy of the police report Notify postal service if mail was involved Notify Social Security Administration if SSN was used Notify DMV if driver’s license number was used

14 ©SHRM ID Theft Recovery Practices (continued) Obtain credit bureau reports Place fraud alerts on reports Check reports at least quarterly for a period of one year and later, annually Promptly dispute any discrepancies

15 ©SHRM ID Theft Recovery-Recordkeeping Keep records/notes/copies of all contact information - names - dates - follow up notes Maintain copies of all documentation

16 ©SHRM Online Resources Federal Trade Commission ID Theft Page dex.html dex.html National Conference of State Legislatures (links to state laws) ncialServices/IdentityTheftStateStatutes/tabid/12538/Defaul t.aspx Privacy Rights Clearinghouse FAQ’s htm

17 ©SHRM Questions?Comments?

18 ©SHRM Course Evaluation Please be sure to complete and leave the evaluation sheet you received with your handouts. Thank you for your attention and interest!


Download ppt "Identity Theft Solutions. ©SHRM 20082 Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the."

Similar presentations


Ads by Google