IDENTITY THEFT Just Because You’re Paranoid Doesn’t Mean They’re Not Out To Get You!

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
Parachute Neighborhood Watch Presentation February 9, 2010.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
©2005 Qwest Communications International, Inc. NOTE: Qwest is providing the above information as a customer service for educational purposes only. Qwest.
Identity Theft. MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BALANCING LIFE’S ISSUES, INC. Identity Theft Protection, Prevention and Self Help.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Clean Up © 2011.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
7.3.1.G1 According to The federal Trade Commission, Identity theft Affects Approximately 12.6Million People Every year.
Be Cautious of Identity Theft By: Sydney Langley.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
Preventative Maintenance.  Obtain a free copy of your credit report annually by visiting or by calling
Jeff loses his identity! Lesson 8: Identity Theft.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Frauds, Scams and Slams: Credit Card and ATM Fraud Prepared by Dr. Jan Park Gerontology Specialist Oklahoma Cooperative Extension service April 2002.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Assets By Preventing Identity Theft
IDENTITY THEFT.
When you get caught for Identity Theft
Protecting Your Identity:
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

IDENTITY THEFT Just Because You’re Paranoid Doesn’t Mean They’re Not Out To Get You!

Evan Engler Coordinator of Financial Services NYSUT Member Benefits (631)

Facts & Figures Still the fastest-growing crime in America Still the fastest-growing crime in America $15.6 Billion in Consumer Fraud losses annually-FTC* $15.6 Billion in Consumer Fraud losses annually-FTC* $48 Billion in Consumer Fraud losses annually-Javelin** $48 Billion in Consumer Fraud losses annually-Javelin** (Why the disparity? Different methodologies, possible statistical errors) Est million victims in U.S. per year Est million victims in U.S. per year Time-consuming and potentially expensive to correct* Time-consuming and potentially expensive to correct* - Median: 4-6 hrs., minimal out-of-pocket expenses - Severe: hrs., $2,000 out-of-pocket Overall: number of incidents up, severity down Overall: number of incidents up, severity down ID thieves more common, move more quickly ID thieves more common, move more quickly Gender disparity: women 26% more likely to be victims Gender disparity: women 26% more likely to be victims *Source: **Source: ID Fraud Survey Reportwww.javelinstrategy.com

Defining the Crime Identity theft occurs when someone uses your personally identifying information (name, Social Security number, credit card number, etc.) to commit fraud or other crimes. Identity theft occurs when someone uses your personally identifying information (name, Social Security number, credit card number, etc.) to commit fraud or other crimes.

The Crime Itself Basic – Lost/stolen wallet/purse Basic – Lost/stolen wallet/purse use for purchases use for purchases time frame and security issues time frame and security issues the MOST COMMON form: low-tech the MOST COMMON form: low-tech Account Takeover Account Takeover switch address and billing for accounts switch address and billing for accounts use for purchases, goods & services use for purchases, goods & services Full ID Theft Full ID Theft in addition to Account Takeover in addition to Account Takeover creation of new accounts creation of new accounts other forms on the decline; “new account” fraud is on the rise other forms on the decline; “new account” fraud is on the rise

What is Needed (Part 1) Information Information - Name - Address - Phone number - Date of birth - Social Security Number - Driver’s license - Account #s: existing credit cards, checking, savings, utility, policy #s)

What is Needed (Part 2) Mother’s maiden name Mother’s maiden name Name of high school/mascot Name of high school/mascot Model of first car owned Model of first car owned Place of birth Place of birth Pet’s name Pet’s name address address On-line ID’s On-line ID’s Favorite color Favorite color

Where Do They Get The Info? Lost/stolen purse or wallet Lost/stolen purse or wallet Mail theft Mail theft Your place of business Your place of business time cards time cards ID badges ID badges newsletters newsletters HR updates HR updates

Where Do They Get The Info? (continued) Stores/Restaurants Stores/Restaurants purchases with credit cards or checks purchases with credit cards or checks Mailing lists – legal/illegal home/business Mailing lists – legal/illegal home/business Internet Internet - search engines - news archives - public records - internet purchases/auctions

An Internet Hacker’s Toolkit Viruses: take over computer, perform mischief and/or destroy content Viruses: take over computer, perform mischief and/or destroy content Worms: Destroy, slow down, frustrate Worms: Destroy, slow down, frustrate Trojan horses: designed to lower your security and let anyone in Trojan horses: designed to lower your security and let anyone in Spyware: programs that run silently in the background, gathering information about your online habits (sold to marketers) Spyware: programs that run silently in the background, gathering information about your online habits (sold to marketers) Adware: similar to spyware, but information delivered to a much larger base of corporate interests Adware: similar to spyware, but information delivered to a much larger base of corporate interests Keyloggers: VERY dangerous; records every keystroke you make (usernames, passwords), and delivers them to a third party Keyloggers: VERY dangerous; records every keystroke you make (usernames, passwords), and delivers them to a third party

New School… “Phishing” - hunting for information; s or pop-ups sent to your computer, ostensibly from financial institutions or other companies “Phishing” - hunting for information; s or pop-ups sent to your computer, ostensibly from financial institutions or other companies “Pharming” - fake web sites on servers; authentic looking, but gathering data for criminal interests “Pharming” - fake web sites on servers; authentic looking, but gathering data for criminal interests “Skimming” – using electronic readers/storage devices to steal credit or debit card numbers “Skimming” – using electronic readers/storage devices to steal credit or debit card numbers “ Screen scrapers ” – can snatch and send images of what is on your screen to a third party (account numbers, usernames, etc.) “ Screen scrapers ” – can snatch and send images of what is on your screen to a third party (account numbers, usernames, etc.)

…and Old School “Dumpster diving” – your garbage can be a treasure trove of information for ID thieves: bills, bank statements, old W-2’s or tax forms… “Dumpster diving” – your garbage can be a treasure trove of information for ID thieves: bills, bank statements, old W-2’s or tax forms… “Pickpocketing” – what are you carrying around every day that a thief can use? “Pickpocketing” – what are you carrying around every day that a thief can use? “ Pretexting ” – using false pretense on the phone (or via ) to get you to give up valuable information: “I’m calling from the Hurricane Relief Disaster Fund…” “ Pretexting ” – using false pretense on the phone (or via ) to get you to give up valuable information: “I’m calling from the Hurricane Relief Disaster Fund…”

What Can Happen Then? Info used to obtain documents to create fraudulent ID Info used to obtain documents to create fraudulent ID Internet sites – “Entertainment only” – for IDs, licenses, birth certificates Internet sites – “Entertainment only” – for IDs, licenses, birth certificates Contact account issuers to change address, then run up charges Contact account issuers to change address, then run up charges Use pre-approved offers to open new accts – use until limit is hit – delinquent account on your credit report Use pre-approved offers to open new accts – use until limit is hit – delinquent account on your credit report Open bank accounts to write bad checks Open bank accounts to write bad checks Establish new lines of credit/loans/mortgages Establish new lines of credit/loans/mortgages

What Can Happen Then? Forge counterfeit checks or debit cards Forge counterfeit checks or debit cards Clone cell numbers to make calls or establish new service in your name Clone cell numbers to make calls or establish new service in your name Obtain utility services in your name Obtain utility services in your name Use info to file for Gov’t. loans/grants/benefits including unemployment and/or tax refunds Use info to file for Gov’t. loans/grants/benefits including unemployment and/or tax refunds Once debt is accumulated, file bankruptcy in your name to avoid payment Once debt is accumulated, file bankruptcy in your name to avoid payment Provide your name to police if arrested; when they don’t show for court date, arrest warrants go out in your name Provide your name to police if arrested; when they don’t show for court date, arrest warrants go out in your name Applications limited only by their imagination and intelligence Applications limited only by their imagination and intelligence

Remember…An Ounce of Prevention is Worth a Pound of Cure Now That I’ve Scared You …… What Do You Do?

The Basics Carry only what you need – no SSN or extra credit cards Carry only what you need – no SSN or extra credit cards Passwords Passwords create different passwords: no “magic password” that provides access to ALL your accounts create different passwords: no “magic password” that provides access to ALL your accounts rotate regularly rotate regularly be creative – mix letters & #s be creative – mix letters & #s Invest in a cross-cut shredder (or BURN everything) Invest in a cross-cut shredder (or BURN everything) Locked mailbox or PO box Locked mailbox or PO box Check your credit report and review your file annually– Check your credit report and review your file annually– Do not provide personal or financial information over the phone or in public areas Do not provide personal or financial information over the phone or in public areas

The Basics (continued) Register for “Do Not Call” list Register for “Do Not Call” list Opt out of Opt out of the sale of your information by the institutions you do business with the sale of your information by the institutions you do business with pre-approved credit offers by calling OPT-OUT (they will require SSN) or at (preferred: “permanent” opt-out vs. “five-year” option) pre-approved credit offers by calling OPT-OUT (they will require SSN) or at (preferred: “permanent” opt-out vs. “five-year” option) Remove your name from commercial marketing databases: Direct Marketing Association ($1) Remove your name from commercial marketing databases: Direct Marketing Association ($1) Keep a list or photocopy of all credit accounts with expiration dates and phone numbers in safe secure spot Keep a list or photocopy of all credit accounts with expiration dates and phone numbers in safe secure spot

The Basics (continued) Be alert to telephone scams – be wary of providing personal information over the phone and notify institutions of suspicious inquiries Be alert to telephone scams – be wary of providing personal information over the phone and notify institutions of suspicious inquiries Do not give out financial information unless you have initiated the call and know the person/institution you are dealing with Do not give out financial information unless you have initiated the call and know the person/institution you are dealing with Block line of sight when using ATMs, phone or bank cards Block line of sight when using ATMs, phone or bank cards Do not sign up for unfamiliar contests or sweepstakes Do not sign up for unfamiliar contests or sweepstakes

The Basics (continued) Restrict use of SSN in business relationships – ask for alternate PIN – push the issue – if required ask for company Privacy Act notice Restrict use of SSN in business relationships – ask for alternate PIN – push the issue – if required ask for company Privacy Act notice Carefully review your copy of your SS Personal Earnings & Benefits Statement Carefully review your copy of your SS Personal Earnings & Benefits Statement Be cautious of the need/use of child’s SSN or the appearance of your child’s name in mail solicitations Be cautious of the need/use of child’s SSN or the appearance of your child’s name in mail solicitations Never throw away receipts in public trash cans Never throw away receipts in public trash cans Stay up to date: or Stay up to date: or

What Do You Do? – Your Mail Do not use your mailbox for outgoing mail Do not use your mailbox for outgoing mail Never put acct # on outside of envelope (OR on personal checks) Never put acct # on outside of envelope (OR on personal checks) Be conscious of how and what mail you discard Be conscious of how and what mail you discard Track arrival of regular bills Track arrival of regular bills Put response postcards in envelopes Put response postcards in envelopes Have mail held or picked up when you are away Have mail held or picked up when you are away

What Do You Do? – Bank Accounts Ask bank or creditors to add security protection to accounts – special code or password Ask bank or creditors to add security protection to accounts – special code or password Carefully review statements Carefully review statements Checks Checks don’t preprint personal information on checks don’t preprint personal information on checks report lost/stolen checks immediately report lost/stolen checks immediately review shipment completely review shipment completely pick up at bank instead of delivery pick up at bank instead of delivery store cancelled checks securely store cancelled checks securely

What Do You Do? – Credit Accounts/Credit Cards Sign credit cards in permanent ink immediately ---add “ask for photo ID” Sign credit cards in permanent ink immediately ---add “ask for photo ID” Never write PIN’s on cards (or anywhere else) Never write PIN’s on cards (or anywhere else) Cut/shred old credit and ATM cards Cut/shred old credit and ATM cards Destroy unwanted credit card convenience checks Destroy unwanted credit card convenience checks Use credit cards instead of Use credit cards instead of debit cards whenever possible

What Do You Do? – Credit Accounts/Credit Cards FRAUD ALERTS: Creditors must use “reasonable policies and procedures” (usually a phone call) to verify your identity before issuing new credit in your name Initial: 90 days, issued upon request, may be renewed Extended: 7 years, requires Identity Theft Report CREDIT FREEZE: Restricts access to your credit report; potential creditors cannot get access until you remove the freeze; in New York, free for first-time users or identity theft victims, $5 each time it is used thereafter

What Do You Do? – Credit Accounts/Credit Cards (continued) Cancel credit accounts no longer in use Cancel credit accounts no longer in use Draw line through any blank area above your signature Draw line through any blank area above your signature Lost/stolen credit cards Lost/stolen credit cards report immediately report immediately ask issuer to close account and start new one if needed ask issuer to close account and start new one if needed update any automatic payments update any automatic payments

What Do You Do? – Computers Firewall protection – especially DSL or cable modem Firewall protection – especially DSL or cable modem Use credit cards, NOT debit cards, for online purchases (as well as any other kinds of purchases!) Use credit cards, NOT debit cards, for online purchases (as well as any other kinds of purchases!) Don’t store information in accounts on websites, or use online “wallets” Don’t store information in accounts on websites, or use online “wallets”

What Do You Do? – Computers Before buying from Web site: Before buying from Web site: check with Better Business Bureau check with Better Business Bureau check the site’s privacy policy check the site’s privacy policy ensure site is secure and protects your personal info before sending it ensure site is secure and protects your personal info before sending it - https in address line of browser - “Lock” icon in address line OR at bottom right of browser

What Do You Do? – Computers (continued) Do not respond to internet or phone solicitations even from businesses you recognize Do not respond to internet or phone solicitations even from businesses you recognize Check for spyware regularly at home & work – Spybot®, Ad-aware® both effective AND free Check for spyware regularly at home & work – Spybot®, Ad-aware® both effective AND free If setting up a home network, enable encryption on wireless routers immediately If setting up a home network, enable encryption on wireless routers immediately When disposing of an old computer, do not rely on “delete” function to remove files – use a strong “wipe” utility program When disposing of an old computer, do not rely on “delete” function to remove files – use a strong “wipe” utility program

Rules to Follow Document Everything!!!!!!!! Document Everything!!!!!!!! Follow up on your actions Follow up on your actions Be persistent Be persistent Don’t give up Don’t give up Don’t give in – and never, NEVER agree to pay ANY portion of the debt!!!!!!! Don’t give in – and never, NEVER agree to pay ANY portion of the debt!!!!!!! Keep records of all correspondence (dates, time, etc.) – include commitments to take action Keep records of all correspondence (dates, time, etc.) – include commitments to take action

Things To Consider If creditors, agencies or credit bureaus are uncooperative, consult an attorney that specializes in consumer law – NYSUT Member Benefits Trust-endorsed Legal Service Plan If creditors, agencies or credit bureaus are uncooperative, consult an attorney that specializes in consumer law – NYSUT Member Benefits Trust-endorsed Legal Service Plan To deal with stress and anxiety To deal with stress and anxiety psychological counseling may be needed psychological counseling may be needed you can network with other victims via The Identity Theft Resource Center ( you can network with other victims via The Identity Theft Resource Center (

Identity Theft Coverage Relatively new - offered by limited carriers Relatively new - offered by limited carriers Most commonly a rider on existing insurance Most commonly a rider on existing insurance Coverage focuses on Coverage focuses on 1) Education – Who, What, When, Where, Why & How? 2) Prevention 3) Restoration 4) Reimbursement

Identity Theft Insurance Coverage includes $ benefit for victims to cover Coverage includes $ benefit for victims to cover - lost wages ($500 week x 4 weeks) - loan re-application fees - attorney fees - misc. costs for documentation, postage, copying materials, etc. Premium costs Premium costs $15-25k coverage/$100 deductible ($25 to $125 annually) $15-25k coverage/$100 deductible ($25 to $125 annually) Hand holding varies from plan to plan Hand holding varies from plan to plan

NYSUT Member Benefits Programs Identity Theft 911 Identity Theft Added to MetLife Home/Renters/Condo/Mobile Home Insurance Policies - Specialists in Education & Restoration Equifax – Credit Watch Gold Equifax – Credit Watch Gold - Voluntary Program - NYSUT Member Benefits Discount - Includes ID Theft Insurance coverage

NYSUT Member Benefits For information about the programs mentioned in this presentation or for information about contractual expense reimbursement/ endorsement arrangements with endorsed program providers, please call NYSUT Member Benefits at or visit us at For information about the programs mentioned in this presentation or for information about contractual expense reimbursement/ endorsement arrangements with endorsed program providers, please call NYSUT Member Benefits at or visit us at