Credit Security October 2012. What is it? Costs of Identity Theft Employer Risks 3 D’s (Deter, Detect, Defend) IRS Tips New Areas Questions Agenda 2.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Compliance with Federal Trade Commission’s “Red Flag Rule”
Identity Theft Ta’Mar Boyd Adam Devin. What is Identity Theft  Identity theft occurs when someone uses your personally identifying information, like.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do Sherry Daniels Family Living Educator Portage County UW Extension 1462 Strongs Ave., Stevens Point,
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
IDENTITY THEFT AND FRAUD CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft Stefany K. Watson Brandon K. Mosley.
1 Identity Theft and Phishing: What You Need to Know.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Identity Theft Andrew Schreiber Alex Demetriou Jessica Ferrell.
Be Cautious of Identity Theft By: Sydney Langley.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Identity Theft Project Erin L. Caraway Jacob Locke.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Jeff loses his identity! Lesson 8: Identity Theft.
Identity Theft By: Tiffany Goode and Jessica Jackson.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
Jeff loses his identity! Lesson 5: Identity Theft.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
Protecting Your Credit Identity
Protecting Your Identity:
Tax Identity Theft Presenter Date
Protecting Your Identity:
Protecting Your Credit
Jeff loses his identity!
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Credit Security October 2012

What is it? Costs of Identity Theft Employer Risks 3 D’s (Deter, Detect, Defend) IRS Tips New Areas Questions Agenda 2

What is it? Credit Security is the freedom from any threat of danger or risk occurring to your finances and having precautions taken to guard against financial crime, attack or sabotage. 3

Most Common Form Related to Credit Security: Identity Theft A form of stealing someone’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit or other benefits in that person’s name. 4

5

6

In 2010, the number of Identity Theft victims dropped 28 percent to 8.1 million Losses from identity theft also fell to $37 billion from $54 billion in

8

9

10

Personal Liability –Credit Cards: commonly liable up to $50 if the card is fraudulently used before reported stolen (Fair Credit Billing Act) Even if it is used for cash advances from an ATM Costs of Identity Theft in Regards to Individual Financial Instruments 11

Debit Cards: no fixed liability, but instead liable for when the loss is reported –Reported within two days theft or loss, liable for $50 –Reported after two days but within 60 days, liable for up to $500 of what is illegally withdrawn –Reported after more than 60 days, potentially liable for all money that was fraudulently withdrawn from the end of the 60 days until when the card was reported 12 Costs of Identity Theft in Regards to Individual Financial Instruments

Checks: banks typically are responsible for losses as a result of a forged check Victims may be liable if bank is not promptly noted of a forgery or if a victim does not monitor their accounts on a regular basis Forger could receive a felony between the fifth and first degree depending on the amount of loss theft/ 13 Costs of Identity Theft in Regards to Individual Financial Instruments

Risks to Employers & Individuals Recent Example A nurse at Kings County Hospital in New York City was charged with stealing Social Security numbers of nearly 60 employees Received $200 per name Over $100,000 was purchased by the perpetrators Federal Fair and Accurate Credit Transaction Act of 2003 $2,500 fine per infraction if employee or customer information is stolen from Company State Ohio Law-Identity Theft Prison terms from 6 months to 10 years (5 th degree to 1 st degree felony) Fines range from $2,500 to $20,000 Penalties increased for the resulting loss and crimes against: Individuals 65 or older Against the disabled 14

3 D’s (Deter, Detect, Defend) Deter: Minimize your risk Detect: Identify suspicious activity Defend: Recover from identity theft 15

Thieves steal an identity by: –Dumpster diving –Skimming –Phishing –Changing your address –Old-fashioned stealing –Pretexting Thieves use a stolen identity for: –Credit card fraud –Phone or utilities fraud –Bank/finance fraud –Government documents fraud –Other fraud Deter - Individual 16

Deter – Individual (continued) Nothing can guarantee you won’t become a victim of identity theft but you can try to minimize the risk through the following: –Protect your social security number –Treat your trash and mail carefully –Be on guard when using the internet –Select intricate passwords –Verify a source before sharing information –Safeguard your purse and wallet 17

Best way to protect personal identifiable information is by encryption. (Does not prevent information from being captured, but makes it unintelligible and therefore useless) –Identify the data that requires encryption –Determine the information's lifetime (i.e. credit card expiration dates) –Select the appropriate encryption techniques –Set policies, procedures, and train users –Identify encryption key access criteria: guard passwords –Install encryption technology: appropriate access Deter - Individual (continued) 18

Deter - Business 19 Common Steps to Protect Employees’ Information Secure job applications Require confidentiality agreements Run background checks on staff who handle personal information Implement a data removal policy Don’t cover up breaches Implement a document destruction period Bond employees Make sure business computers have anti-virus & anti-spyware protection Keep software and browsers updated with security patches Make sure network is protected with a firewall Educate employees about scams

Detect - Individual Signs of identity theft: Accounts opened or debts that can’t be explained Fraudulent credit report information Bills or other incorrect mail Credit cards not applied for Being denied credit or specific rates for no apparent reason Getting calls or letters from debt collectors about items not purchased 20

What personal information should you monitor regularly? –Financial statements/accounts –Credit reports: aggregate personal information, financial data & alternative data is collected Free report at least once every 12 months through: Equifax.com, Experian.com or Transunion.com can be used to purchase credit reports Other types of ways a breach occurs are through: –Insider mistakes –Malicious insiders (Hospital article) –Outside attacks Detect - Individual (continued) 21

Ways to Detect –Security cameras in the building & at entrances/exits –Security alarm –Motion detectors –All confidential data appropriately secured with limited access –Third party IT company: monitor & systems Detect - Business 22

Defend - Individual What should you do if your identity is stolen Place a fraud alert on your credit reports & review credit reports –Prevents more accounts from being opened Close the accounts that you know, or believe have been tampered with or opened fraudulently –Call each company & follow up in writing –Dispute transactions File a complaint with the Federal Trade Commission –Helps law enforcement to track down thieves –Provides report to the police File a report with the police where the identity theft took place 23

Defend - Business A type of employer insurance: “Employee Dishonesty Policy” protects the employer if an employee steals other employees’ information or client information. –Offered by the Uhl Agency Recovering from a breach Notify law enforcement & affected businesses –Banks or credit issuers that maintain the accounts affected Notify Individuals –Consider nature of the compromise, type of information taken, likelihood of misuse and potential damage arising from misuse –Send notice to individuals detailing the event, what could happen & how to protect against it –Designate a firm contact person –Consult with law enforcement so notification does not impede investigation 24

Awareness and knowledge are the most effective tools to Deter, Detect & Defend against Identity Theft 25 Best Defense is a Great Offense

IRS Tips (Individuals & Businesses) IRS does not initiate contact through to request personal information. If you receive an from the IRS or a website claiming to be the IRS but does not begin with forward it to the IRS at To learn how to identify a secure website, visit the Federal Trade Commission at: ssl.aspx. Identity thieves get your personal information from stealing your wallet, looking through trash, posing as someone reputable, etc. A stolen Social Security number can be used by an individual to get a job and cause your earnings to be under reported on your tax return. You will have to verify yourself with the IRS to correct this. Do not routinely carry your Social Security card on you. 26

IRS impersonation schemes flourish during tax season, contact the IRS if a letter seems to be not legitimate. Use a strong password to protect your tax return. Burn file to a CD or flash drive and store in a safe place to remove personal information from your hard drive. If you were impacted by an identity theft, file a complaint at An easy to use convenient reporting mechanism. For more identity theft information, search Identity Theft on irs.gov. IRS Tips (continued) 27

Protection Services A good website for deterring the best and most comprehensive types of protection is located at A review of the five most popular identity theft services and how they stack up to each other. –LifeLock is one example offering two services at either $10 or $25 per month. –This covers fraud & credit monitoring, junk mail & preapproved credit offer removal and $1,000,000 in ID theft coverage along with several other protection services. Brixey & Meyer uses a secure portal that minimizes the risks seen in ing or faxing information. –The portal uses the highest level of encryption technology to minimize any threats to the security of your personal data. 28

Radio Frequency Identification (RFID) cards –Allow consumers to buy products faster with their card only needing to be waved instead of swiping and signing –Signal can be intercepted by electronic reader (available for purchase) –200 million credit cards contain these chips, usually seen by radio waves or by a “pay pass” label on the card SMS (Text messaging) Phishing Attacks –Increased 913% during the first week of September 2012 #1 Text-based threat –Forward message to 7726 to notify your phone carrier –Can spoof identities to make it appear text is coming from a legitimate source Fraudulent Tax Returns –In 2011, 335,341 tax returns claiming $1.9 billion in fraudulent refunds –Individuals taking deductions and credits they don’t qualify for or individuals filing returns using stolen identities New Areas of Risk 29

30 Situation to Avoid!

Questions 31