Office of Personnel Management (OPM) Data Breach A briefing for use by DON commanders and supervisory staff

Slides:



Advertisements
Similar presentations
Presented (insert date) By (insert organizations name)
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
SEMINOLE COUNTY SHERIFF’S OFFICE
Presented By Drexel and FMFCU.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Consumer Authentication in e-Banking & Part 748 – Appendix B Response Program Catherine Yao Information Systems Officer NCUA.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.
Presented By The Plano Police Department Crime Prevention Unit.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
© Chery F. Kendrick & Kendrick Technical Services.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
1 Identity Theft Information Recovery Program. 2 Crook.
© 2004 TransUnion LLC. All Rights Reserved. August 10, 2005 Seven Easy Steps to Fraud Prevention Northwestern University Clifton M. O’Neal Director, Corporate.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
A briefing for use by DON commanders and supervisory staff Department of the Navy | United States Marine Corps1.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Internet Safety Dr. Steve Broskoske Misericordia University.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
2015 ANNUAL TRAINING By: Denise Goff
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Identity Theft Project Erin L. Caraway Jacob Locke.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Presented By Plano Police Department Crime Prevention Unit.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Identity Theft Project By: Timmy Townsend And Eric Fields.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Protecting Your Assets By Preventing Identity Theft
Small Business and Personal Credit
Data Compromises: A Tax Practitioners “Nightmare”
Tax Identity Theft Presenter Date
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Protecting Your Identity:
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Red Flags Rule An Introduction County College of Morris
Identity Theft Pub 4012 – Tab P Pub 4491 – Lesson 1
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
Identity Theft Someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information. If you’re a victim Place fraud.
Data Breach of United States Office of Personnel Management
Presentation transcript:

Office of Personnel Management (OPM) Data Breach A briefing for use by DON commanders and supervisory staff

Command Talking Points In the spring of 2015, the Office of Personnel Management (OPM) became aware of unprecedented compromises to government employee personal data. While the full scope of the data breaches is unknown, at a minimum they impact current and former federal employees including Department of the Navy (DON) personnel. OPM, DHS, and the FBI are continuing to investigate the extent of these intrusions. We fully expect the list of affected employees to grow as a result of this investigation. It may include a significant number of current and former military members and their families. While the spectrum of risk to affected individuals is also unknown, it is reasonable to assume it includes identify theft at a minimum. The DON recognizes the seriousness of these breaches and will provide you access to timely and accurate information as it becomes available at Service Members, Civilians, Contractors and to be proactive, pay attention and remain vigilant. Report any suspicious activity to your chain of command.

Background OPM believes the first intrusion into its systems occurred in December 2014, and became aware of the incident in April OPM then became aware of a second intrusion into its systems in May OPM estimates that at a minimum, these breaches affect millions of current and former government employees. Since investigations are ongoing, additional Personally Identifiable Information (PII) exposures will likely come to light. If OPM determines that more individuals have been impacted, they will conduct additional notifications. OPM maintains personnel records for the federal workforce. The kind of data that may have been compromised in these incidents is sensitive. Compromised data may include information within background investigations, job assignments, training records and benefit selection decisions. At a minimum, this could include: name, Social Security Number, date and place of birth, and current and former addresses.

Notification Process for Incident #1 Affected Civilian Employees from for all current – Be sure to check Junk folders. US Mail for invalid addresses and retirees. Automatically enrolled for 18 months of free identity theft insurance up to $1M from CSID. Voluntary sign up with PIN (PIN provided in notification /letter) for additional free credit monitoring services for 18 months. Similar notifications are expected for Incident # 2 affected individuals as they are identified.

ResourceContact InfoProvides CSID® Credit Monitoring Service U.S. toll free: International call collect: Assistance with signing up for CSID credit monitoring services for affected individuals. Department of Navy FAQ to data breach related questions. Department of the Navy Civilian Employee Assistance Program (DONCEAP) Toll free: DONCEAP ( ) TTY: International: Support for financial issues and identity theft for all DON civilians and their families. Federal Trade Commission (FTC) Complaint Submission Toll free: ID-THEFT ( ) A clearinghouse for complaints by victims of identity theft. Federal Trade Commission (FTC) Identity Theft Recovery Plan Downloadable PDF: A step by step guide on what to do if your identity information has been stolen. Free Credit Report Review Call: One free credit report per year from each of the three major crediting bureaus (contact information for credit bureaus can be found on the Federal Trade Commission website: Guide to Keeping Your Social Media Accounts Secure Safety guidelines and tips to keeping your personal information safe while using social media. Internal Revenue Service (IRS) Toll free: Guidance on what to do if you suspect the improper use of identification information in connection with tax violations. Phishing to report phishing attempts. Social Security Administration Toll free: Guidance on what to do if you suspect your Social Security number is being fraudulently used. TransUnion® Fraud Alert Call: Placing fraud alert on your credit file to let creditors know to contact you before opening a new account in your name. Table of Resources Potentially Affected Individuals