We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTiffany Kennedy
Modified about 1 year ago
MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to prevent n What if it happens n US Laws on Identity Theft and Privacy n Organization that help
MIS Training Institute, Inc.Section X - Slide 3CS1 053 ©Network Security Services, LLC What is Identity Theft n Fastest growing crime in America n Affect everyone regardless of age, gender race, or status n Almost 10 million American victimized last year u 41% increase over the last year u Cost to the economy $53 Billion
MIS Training Institute, Inc.Section X - Slide 4CS1 053 ©Network Security Services, LLC What is Identity Theft (Cont.) Two classes of crime related to identify theft 1. Account takeover l Thief acquires person’s existing credit l Used to purchase products and services l Victim discovers on monthly statement 2. Identity theft (Application fraud / true name fraud) l Thief uses SSN etc. to open new accounts l Used to purchase products and services l Victim unaware for extended periods of time
MIS Training Institute, Inc.Section X - Slide 5CS1 053 ©Network Security Services, LLC Methods Used n Dumpster diving n Stealing mail n Fraudulent access of credit files n Work place access n Shoulder surfing at ATM, phone booths n Personal data from online sources
MIS Training Institute, Inc.Section X - Slide 6CS1 053 ©Network Security Services, LLC Three most important things 1. Carefully check your credit report twice a year 2. Sign-up for credit monitoring service 3. Regularly check your public records Government Records Google search
MIS Training Institute, Inc.Section X - Slide 7CS1 053 ©Network Security Services, LLC Sources of Risk n Know your personal information u Personal Identification y Number (e.g., USA SSN) u Driver’s license u Credit cards u Bank account u Mothers maiden name u Address and phone number u Anything else that helps impersonate you
MIS Training Institute, Inc.Section X - Slide 8CS1 053 ©Network Security Services, LLC Key Elements n Personal Identifier (SSN) is the key to many accounts u Release SSN only when necessary u Do not carry SSN card in your wallet u Avoid putting SSN on checks and drivers license u Don’t allow merchants to add it to checks by hand u If asked for SSN, ask if there is an alternative u If government asks, look for privacy notice u Don’t use it for PINs and Passwords
MIS Training Institute, Inc.Section X - Slide 9CS1 053 ©Network Security Services, LLC Things You Can Do 1. Remove your name from marketing lists of the three main credit bureaus Equifax, Experian, Trans Union by calling (800) 5- OPTOUT Limit pre-approved credit offers If tossed into garbage – gold mine for ID theft 2.Install a locked mailbox at your home Limit postal theft
MIS Training Institute, Inc.Section X - Slide 10CS1 053 ©Network Security Services, LLC Things You Can Do (Cont.) 3. Use SSL or other encryption when shopping on-line (www) 4. Phone calls Never give SSN, Credit card number, personal data over the phone. Scams - Today is your lucky day 5. Document Storage Store personal information security in your home (safe)
MIS Training Institute, Inc.Section X - Slide 11CS1 053 ©Network Security Services, LLC Make Your Data Secure n Encrypt electronic data when possible n Shred or otherwise destroy paper copies n When shopping – take credit card receipts u Never toss them in public trash cans u Carry receipts in wallet not the bag u Avoid business that are careless with your data n Avoid using credit cards where the risk is high u Some web sites
MIS Training Institute, Inc.Section X - Slide 12CS1 053 ©Network Security Services, LLC If It Happens n Act quickly n Assess the situation n Trace the problem n Call the credit card company or credit bureau u They will have a fraud department to advise you
MIS Training Institute, Inc.Section X - Slide 13CS1 053 ©Network Security Services, LLC If It Happens (Cont.) n Log all conversations u Credit card companies u Law enforcement n Include dates, names and phone number n Note time spent and expenses incurred n Send critical correspondence by certified mail with return receipt requested.
MIS Training Institute, Inc.Section X - Slide 14CS1 053 ©Network Security Services, LLC If It Happens (Cont.) n Ask credit bureaus for names of credit grantors of fraudulent accounts n Ask, in writing, to remove inquiries generated due to fraud n Get copy of credit report every few months for the next year n Contact, in writing and via phone, all creditors involved in fraud n Get replacement credit cards
MIS Training Institute, Inc.Section X - Slide 15CS1 053 ©Network Security Services, LLC If It Happens (Cont.) n Report crime to your local police n Contact the passport office n May need legal help, consumer law if: u Debtors won’t respond u Credit bureaus will not help n Contact bank u Stolen check, fraudulent bank accounts n Post office u If thief has filed change of address form
MIS Training Institute, Inc.Section X - Slide 16CS1 053 ©Network Security Services, LLC U.S. Laws and Regulations n 18 U.S.C "The Identity Theft and Assumption Deterrence Act of 1998" n State Laws: ytheft-State-Law.htm n California: Civil Code –Residents Civil Code – Business u Requires reporting database break-ins
MIS Training Institute, Inc.Section X - Slide 17CS1 053 ©Network Security Services, LLC In Short n Know you are at risk n Take positive actions to prevent identity theft n If it happens, act quickly n Know your rights n Document your steps
MIS Training Institute, Inc.Section X - Slide 18CS1 053 ©Network Security Services, LLC Additional Resources n n n n n
MIS Training Institute, Inc.Section X - Slide 19CS1 053 ©Network Security Services, LLC Magazines To Stay Current n SC Magazine: n Disaster Recovery Journal: n Information Security n Access Control & Security Systems: u
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
IDENTITY THEFT Awareness and Prevention. What is Identity Theft? IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumers personal.
Avoid Identity Theft TCU Technology Resources Information Security Services.
Preventing Its More Than Just Your Wallet…. Identity Theft One New Identity Theft Victim Every 3 Seconds in 2012 (Javelin Strategy & Researchs 2012 Identity.
Identity Theft Presented by Lawrence County Sheriffs Office and Lawrence County Information Systems & Technology.
Information Security Office The University of Arizona Security Awareness Brown Bag Series Identity Theft and Telephone Fraud.
Identity Theft Deter, Detect, and Defend At Home & At Work.
Identity Theft A consumers guide to protecting your personal identity and finances Offered by the Michigan State Police.
1 Identity Theft Prevention Practical, simple precautions for you and your business.
Protecting Your Identity Identity Theft. What is identify theft? To get credit To get credit Open fraudulent accounts Open fraudulent accounts Write checks.
National Crime Prevention Council 2005 Identity Theft and Strategies for Crime Prevention.
CONSUMER ACTION - Credit Card Fraud Training Credit Card Fraud An Educational Partnership of Consumer Action and Chase ©2009.
Identity Theft Don't Be a Victim Revision II. Course Data Author: Lynne Presley, Staff Organization & Development, Oklahoma Dept. of Corrections Course.
Personal Privacy Identity protection in this wired world.
Identity Theft What You Need to Know. Learning Goals Define Identity Theft Learn how your identity is stolen Learn how you become a victim Learn what.
Objective 7.03 Understand ways to avoid identity theft. Identity Theft.
Identity Theft and You Identity Theft and You Updated May of 2007.
1 Data Handling at Purdue. Section I The Importance of Data Security (slides 4 – 5) Laws and Policies (Slides 7 – 18) - Federal - State - Purdue Section.
Red Flag Rules WELCOME Iowa State University Identity Theft Prevention Program.
© 2009 Charles D. Knutson Identity Theft: Why Would Anyone Want My Identity? Dr. Charles D. Knutson Brigham Young University
Activity 1………….…………The ABCs of Credit Activity 2……………….……………Credit Scores Activity 3………….…………Establishing Credit Activity 4………….…Maintaining Good Credit.
Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.
Company LOGO Data Protection Fundamentals Sensitisation MQA By : Mrs. Pravina DODAH Mr. Hemrajsingh BHUGOWON Date : 09 Nov 2012.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
ID Theft Program Solution Overview One Call | One Solution Prepared Exclusively for By.
Personal Information Security and Malware Awareness Workshop Bard College at Simons Rock Information Technology Services (ITS) Summer 2012 (Please sign.
Banking. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Personal Information Security Workshop Williams College Office for Information Technology (OIT) Winter 2010.
Identity Theft A Core Risk of HIPAA Security Lapses Gail Sausser.
Presented by: Default Prevention & Debt Management Techniques for Students & Borrowers.
© 2016 SlidePlayer.com Inc. All rights reserved.