Presentation is loading. Please wait.

Presentation is loading. Please wait.

Avoid Identity Theft TCU Technology Resources

Similar presentations

Presentation on theme: "Avoid Identity Theft TCU Technology Resources"— Presentation transcript:

1 Avoid Identity Theft TCU Technology Resources Information Security Services

2 Old Fashioned Stealing
It only takes a few bits of information for thieves to steal your identity. Dumpster Diving Skimming Phishing Pretexting Changing Your Address Old Fashioned Stealing TCU Information Security Services

3 Dumpster diving Thieves rummage through trash looking for bills or other paper with personal information. TCU Information Security Services

4 Skimming Identity thieves steal credit/debit card numbers when processing your card. TCU Information Security Services

5 Phishing They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information. TCU Information Security Services

6 Pretexting Using false pretenses, thieves obtain your personal information from financial institutions, telephone companies, and other sources. TCU Information Security Services

7 Changing Your Address They divert your billing statements to another location by completing a “change of address” form. TCU Information Security Services

8 “Old fashioned” stealing
They steal wallets and purses; mail, including bank and credit card statements; pre- approved credit offers; and new checks or tax information. They steal personnel records from their employers, or bribe employees who have access. TCU Information Security Services

9 Personal Information Don’t give out personal information on the phone, through mail, or over the Internet unless you know who you are dealing with. Shred financial documents, preapproved credit applications, insurance forms, bank statements, credit and debit card receipts and other paperwork with personal information. Do not carry your social security card or put the number on check or credit receipts. Give it out only if necessary. Do not put your telephone number on checks. Keep your personal information in a safe, secure place at home. TCU Information Security Services

10 Credit card and bank security
Make a list or photo copies of your credit and debit cards (front and back) and the contact numbers so you can quickly cancel them if stolen. Keep in a safe place. Carry only one credit card if you can. Use credit rather than debit bank cards. Most credit cards will not charge you if they are used fraudulently. This also reduces the risk of giving criminals direct access to your bank accounts. Review monthly credit card and bank statements for suspicious activity. TCU Information Security Services

11 Credit card and bank security (continued)
Watch your mail for statements. If statements do not arrive when expected it is possible an identity thief has taken over your credit card account and changed your billing address. Be careful using ATM’s. Someone may look over your shoulder to get your PIN. Do not put your credit card number on the Internet unless you are on a secured site (look for a yellow padlock displayed in your browser window or https in the URL). Pick up ordered checks at the bank. TCU Information Security Services

12 Passwords and Pins Do not use passwords like your birth date, you mother’s maiden name or the last four digits of your social security number. Choose security questions that no one can look up. If your mother’s maiden name is the only choice, use a different name, such as your grandmother’s name. Change your passwords frequently, do not share you passwords with anyone and do not write down your password. TCU Technology Resources staff will never ask for your TCU password, either by phone, in an or in person. TCU Information Security Services

13 and the internet Be suspicious of unsolicited s from supposedly legitimate organizations requesting personal financial information. Contact the organization directly to verify a request for information. Do not click on links within s unless you are absolutely certain of the source. If you want to follow a link ed to you, copy and paste it in your browser. Still be wary of entering in any personal information. TCU Information Security Services

14 Email and the internet (continued)
Do not fill out forms in messages that ask for personal financial information. Do not open attachments unless you know who sent them and what they are. Do not enter personal information in a pop- up screen. When conducting any kind of financial transaction, rather than using a displayed link, type in the address of a web site. TCU Information Security Services

15 Social networking sites such as MySpace and Facebook
Limit the amount of personal information you post. Do not provide information that can be used to answer security questions. Avoid providing information that will allow a person to stalk you (your address, class schedule or phone number). Do not provide personal identifying information such as your social security number, birth date, or your mother’s maiden name. TCU Information Security Services

16 Social networking sites such as MySpace and Facebook (continued)
Be aware that anything you post online may be copied to other places. If you delete it from your site, it is not necessarily REALLY deleted from the Internet. Be skeptical of people who may misrepresent who they are. Don’t believe everything you read. TCU Information Security Services

17 Monitor your financial accounts and billing statements
Watch for bills or statements that don’t arrive in the mail as expected. Examine bills for purchases you didn’t make. Be alert to denials of credit for no apparent reason. Watch for inquiries from companies you haven’t contacted, accounts you didn’t open, debts you can’t explain. TCU Information Security Services

18 Get a credit report Inspect the accounts and financial activity for inaccurate information. The law requires the major nationwide consumer reporting companies—Equifax, Experian, and TransUnion—to give you a free copy of your credit report each year if you ask for it. Visit or call , a service created by these three companies, to order your free credit reports each year. You can also write: Annual Credit Report Request Service, P.O. Box , Atlanta, GA TCU Information Security Services

19 Suspect id theft? Follow these steps
FRAUD ALERT Place a fraud alert on your credit reports and review the reports carefully. The alert tells creditors to follow certain procedures before they open new accounts in your name or make changes to your existing accounts. The three nationwide consumer reporting companies have toll-free numbers for placing an initial 90-day fraud alert; a call to one company is sufficient. Equifax Experian TransUnion TCU Information Security Services

20 Suspect id theft? Follow these steps
CLOSE ACCOUNTS Call the companies where accounts were opened or changed without your permission. Follow-up in writing. Go to for an ID Theft Affidavit. Verify that disputed accounts have been closed and debts discharged. Keep copies of all correspondence and notes of calls and conversations. FILE A POLICE REPORT File a report with law enforcement officials to help you with creditors who may want proof of the crime. TCU Information Security Services

21 Suspect id theft? Follow these steps
INFORM THE FEDERAL TRADE COMMISSION 1-877-ID-THEFT By mail: Identity Theft Clearinghouse, Federal Trade Commission, Washington, DC 20580 TCU Information Security Services

22 resources TCU Information Security Services TCU Computer Help Desk TCU Computer Help Desk Federal Trade Commission Credit Report TCU Information Security Services

Download ppt "Avoid Identity Theft TCU Technology Resources"

Similar presentations

Ads by Google