identity theft presented by lawrence county sheriffs office and lawrence county information systems...

46
Identity Identity Theft Theft Presented by Lawrence County Sheriff’s Office and Lawrence County Information Systems &

Upload: serena-parkhill

Post on 29-Mar-2015

224 views

Category:

Documents


2 download

TRANSCRIPT

Identity TheftIdentity Theft

Presented by Lawrence County Sheriff’s Office and

Lawrence County Information Systems &

Technology

Identity TheftIdentity Theft

Before We BeginBefore We Begin Class Length: 1 hourClass Length: 1 hour Sign Training LogSign Training Log Restrooms & ExitsRestrooms & Exits QuestionsQuestions HandoutsHandouts FeedbackFeedback

Identity TheftIdentity Theft

Learning ObjectivesLearning Objectives

Identity TheftIdentity Theft

Learning ObjectivesLearning Objectives Learn what Identity Theft is and some of the Learn what Identity Theft is and some of the

different types of Identity Theft. different types of Identity Theft.

Learn some of the steps you can take to Learn some of the steps you can take to prevent your identity from being stolen.prevent your identity from being stolen.

Learn what to do if you believe your identity Learn what to do if you believe your identity has been stolen.has been stolen.

NotNot intended to make everyone an expert. intended to make everyone an expert.

Identity TheftIdentity Theft

What is Identity Theft?What is Identity Theft?

Identity TheftIdentity Theft

What is Identity Theft?What is Identity Theft?

Identity Theft is when someone uses your Identity Theft is when someone uses your personally identifiable information, such personally identifiable information, such as your name, Social Security number, or as your name, Social Security number, or credit card number, without your credit card number, without your consent, to commit fraud or other crimes.consent, to commit fraud or other crimes.

Identity Theft is Identity Theft is #1#1 Crime in America Crime in America today.today.

Identity TheftIdentity Theft

Identity Theft StatisticsIdentity Theft Statistics

13+ million Americans have had their 13+ million Americans have had their identities stolen this year to date.identities stolen this year to date.

Business losses are upwards of $50 billion Business losses are upwards of $50 billion annually, and $5 billion is spent by victims annually, and $5 billion is spent by victims each year recovering from identity theft.each year recovering from identity theft.

7% of all adults have their identities 7% of all adults have their identities misused each year, with an average misused each year, with an average $3,500 lost per instance.$3,500 lost per instance.

Identity TheftIdentity Theft

Identity Theft StatisticsIdentity Theft Statistics

80% of large organizations surveyed 80% of large organizations surveyed indicate they had experienced one or more indicate they had experienced one or more data breaches over the previous 12 data breaches over the previous 12 months.months.

49% of the business security breaches 49% of the business security breaches involved the loss or theft of paper involved the loss or theft of paper documents.documents.

The average business security breach The average business security breach recovery cost was $6.75 million!recovery cost was $6.75 million!

Identity TheftIdentity Theft

Identity Theft TypesIdentity Theft Types

Identity TheftIdentity Theft

Identity Theft TypesIdentity Theft Types Financial. Financial.

Credit Card, Bank Account, Investment, Credit Card, Bank Account, Investment, Mortgage & Tax Fraud.Mortgage & Tax Fraud.

Medical.Medical. Assuming your identity for medical care.Assuming your identity for medical care.

Criminal.Criminal. Commit crimes while assuming your identity.Commit crimes while assuming your identity. You can be arrested and jailed for a crime You can be arrested and jailed for a crime

you didn’t commit and know nothing about. you didn’t commit and know nothing about.

Identity TheftIdentity Theft

Identity Theft TypesIdentity Theft Types Child.Child.

Stealing the identity of a child.Stealing the identity of a child. Often goes undetected for years because Often goes undetected for years because

no one has been monitoring their credit.no one has been monitoring their credit. Senior Citizens.Senior Citizens.

Targeting senior citizens via a variety of Targeting senior citizens via a variety of methods to obtain personal information.methods to obtain personal information.

Elderly people under the care nursing Elderly people under the care nursing facilities are at higher risk.facilities are at higher risk.

Identity TheftIdentity Theft

Identity Theft TypesIdentity Theft Types Social Security Number (SSN).Social Security Number (SSN).

Common denominator in most types of Common denominator in most types of identity theft.identity theft.

Easily commit crimes and financial fraud in Easily commit crimes and financial fraud in your good name.your good name.

Create a different identity using your SSN Create a different identity using your SSN – also called – also called Synthetic Identity TheftSynthetic Identity Theft..

Identity TheftIdentity Theft

How Personal How Personal Information Is ObtainedInformation Is Obtained

Identity TheftIdentity Theft

How Personal How Personal Information Is ObtainedInformation Is Obtained

Workplace. Workplace. Absconding personnel records, Absconding personnel records, financial reports, email messages, etc. financial reports, email messages, etc.

Old-Fashioned Stealing.Old-Fashioned Stealing. Stealing wallets and Stealing wallets and purses, mail, etc. purses, mail, etc.

Dumpster Diving.Dumpster Diving. Rummaging through trash Rummaging through trash looking for documents with your personal looking for documents with your personal information on it. information on it.

Skimming.Skimming. Scanning credit/debit card numbers by Scanning credit/debit card numbers by using a special storage device when processing using a special storage device when processing your card. your card.

Identity TheftIdentity Theft

How Personal How Personal Information Is ObtainedInformation Is Obtained

Phishing.Phishing. Spam E-mails from supposed Spam E-mails from supposed reputable companies to get you to link to reputable companies to get you to link to malicious sites to reveal your personal malicious sites to reveal your personal information. information.

Changing Your Address.Changing Your Address. Diverting your Diverting your billing statements to another location by billing statements to another location by completing a change of address form.completing a change of address form.

Pretexting.Pretexting.  Using false pretenses to get you   Using false pretenses to get you to divulge personal information.to divulge personal information.

Identity TheftIdentity Theft

How Personal How Personal Information Is ObtainedInformation Is Obtained

Social Networking.Social Networking. Searching the Internet Searching the Internet for information people make publicly for information people make publicly available on sites such as Facebook, available on sites such as Facebook, Myspace, Twitter, etc.Myspace, Twitter, etc.

MalwareMalware. Malicious software such as . Malicious software such as Spyware, Trojan Horses, Rootkits to Spyware, Trojan Horses, Rootkits to gain/maintain control of your computer or gain/maintain control of your computer or obtain information like account logins and obtain information like account logins and passwords.passwords.

Identity TheftIdentity Theft

Example forms of Example forms of Identity TheftIdentity Theft

Identity TheftIdentity Theft

Example forms of Example forms of Identity TheftIdentity Theft

Credit Card Fraud:Credit Card Fraud: Make unauthorized purchases with your Make unauthorized purchases with your

credit card account(s).credit card account(s). Open new credit card accounts in your Open new credit card accounts in your

name, and rack up charges on those name, and rack up charges on those accounts as well. accounts as well.

Usually use different billing address so Usually use different billing address so you don’t have any idea it’s happening.you don’t have any idea it’s happening.

Can severely damage your credit.Can severely damage your credit.

Identity TheftIdentity Theft

Government Documents Fraud: Government Documents Fraud: Obtain a driver's license or official ID Obtain a driver's license or official ID

card issued in your name but with their card issued in your name but with their picture. picture.

Use your name and Social Security Use your name and Social Security number to get government benefits. number to get government benefits.

File a fraudulent tax return using your File a fraudulent tax return using your information. information.

Example forms of Example forms of Identity TheftIdentity Theft

Identity TheftIdentity Theft

Medical Identity Fraud:Medical Identity Fraud: Receive medical care or medication in your Receive medical care or medication in your

name.name. Health insurance claims filed with your Health insurance claims filed with your

insurance carrier.insurance carrier. False medical records and health information False medical records and health information

created that could place you at great personal created that could place you at great personal risk.risk.

Phone or Utilities Fraud: Phone or Utilities Fraud: Open a new phone or wireless account in your Open a new phone or wireless account in your

name, or run up charges on your existing name, or run up charges on your existing account.account.

Example forms of Example forms of Identity TheftIdentity Theft

Identity TheftIdentity Theft

Preventative MeasuresPreventative Measures

Identity TheftIdentity Theft

Preventative MeasuresPreventative Measures Place a Place a FreezeFreeze on your credit: on your credit:

#1 way to protect your credit.#1 way to protect your credit. Accomplished through the 3 major credit Accomplished through the 3 major credit

reporting agencies (TransUnion, Equifax or reporting agencies (TransUnion, Equifax or Experian). Experian).

No new accounts (credit card, banking, No new accounts (credit card, banking, brokerage, loans, rental agreements, etc.) may brokerage, loans, rental agreements, etc.) may be be attached to your name/social security be be attached to your name/social security number without your approval.number without your approval.

$10 fee (per agency) to freeze, or temporarily $10 fee (per agency) to freeze, or temporarily unfreeze, your credit report in order to create a unfreeze, your credit report in order to create a new account.new account.

Identity TheftIdentity Theft

Preventative MeasuresPreventative Measures Monitor your credit reports regularly.Monitor your credit reports regularly.

At least annually.At least annually. Everyone is entitled to at least one free Everyone is entitled to at least one free

report per year.report per year. Go Go ONLYONLY to Annual Credit Report to get to Annual Credit Report to get

your free report your free report http://www.annualcreditreport.comhttp://www.annualcreditreport.com. .

Ensure all activity is accounted for; clarify Ensure all activity is accounted for; clarify with the credit bureau in question if you with the credit bureau in question if you don’t understand report contents, or don’t understand report contents, or suspect fraudulent activity.suspect fraudulent activity.

Identity TheftIdentity Theft

Preventative MeasuresPreventative Measures Opt out of pre-approved credit offers (i.e. Opt out of pre-approved credit offers (i.e.

Financial Junk Main) with the three major Financial Junk Main) with the three major credit reporting agencies.credit reporting agencies. No cost.No cost. Significantly reduces the number of Significantly reduces the number of

organizations receiving your credit organizations receiving your credit information.information.

Reduces the amount of documents you Reduces the amount of documents you need to shred prior to discarding.need to shred prior to discarding.

Identity TheftIdentity Theft

Preventative MeasuresPreventative Measures Shred all documents containing important Shred all documents containing important

personally identifiable information on it personally identifiable information on it before discarding.before discarding.

Carry only necessary identification and Carry only necessary identification and credit/debit cards in your wallet/purse.credit/debit cards in your wallet/purse.

Be aware if you’re using contact-less credit Be aware if you’re using contact-less credit cards:cards: Can be scanned without your knowledge.Can be scanned without your knowledge. Use a scan-proof wallet.Use a scan-proof wallet.

Don’t carry anything with your SSN on it.Don’t carry anything with your SSN on it.

Identity TheftIdentity Theft

Preventative MeasuresPreventative Measures Use a pre-paid credit card for certain Use a pre-paid credit card for certain

purchases.purchases. Never provide your personal information to Never provide your personal information to

anyone unless:anyone unless: It’s absolutely necessary.It’s absolutely necessary. You initiate it (be very suspicious if you You initiate it (be very suspicious if you

didn’t).didn’t). You can confirm the validity of the person You can confirm the validity of the person

and/or company receiving it.and/or company receiving it. Purchase a USPS-approved locking mailbox.Purchase a USPS-approved locking mailbox.

Identity TheftIdentity Theft

Preventative MeasuresPreventative Measures Be vigilant when using the Internet:Be vigilant when using the Internet:

Be on the alert for unsolicited e-mail messages and links in e-mails. These links very Be on the alert for unsolicited e-mail messages and links in e-mails. These links very often lead to malicious websites that may look legitimate, or install malware on your often lead to malicious websites that may look legitimate, or install malware on your computer.computer.

When using the Internet, be watchful of the actual address of the site you’re on. When using the Internet, be watchful of the actual address of the site you’re on. Ensure you’re actually on the website you intend to be be:Ensure you’re actually on the website you intend to be be:

Identity TheftIdentity Theft

Preventative MeasuresPreventative Measures

Search Engines.Search Engines. Using a search engine (i.e. Google) is a Using a search engine (i.e. Google) is a

useful and widely used tool for locating useful and widely used tool for locating information and items on the Internet.information and items on the Internet.

Be very selective of links you go to Be very selective of links you go to when searching.when searching.

Identity TheftIdentity Theft

Preventative MeasuresPreventative Measures When making purchases over the Internet, When making purchases over the Internet,

limit your business to places that are limit your business to places that are reputable and legitimate. reputable and legitimate. You may find items advertised for less, You may find items advertised for less,

but don’t trust unknown sites.but don’t trust unknown sites. Be suspicious any site unless you know Be suspicious any site unless you know

it to be reputable.it to be reputable. Check the Better Business Bureau if you Check the Better Business Bureau if you

are uncertain: are uncertain: http://www.bbb.orghttp://www.bbb.org

Identity TheftIdentity Theft

Preventative MeasuresPreventative Measures

Whenever possible, pay for on-line Whenever possible, pay for on-line purchases through PayPal.purchases through PayPal.

The recipient of the funds The recipient of the funds does not have does not have access to your financial account access to your financial account informationinformation..

More and more companies are More and more companies are accepting accepting PayPalPayPal as an allowed payment as an allowed payment method.method.

Identity TheftIdentity Theft

Social Networking:Social Networking: Restrict access to your page(s) to only those you Restrict access to your page(s) to only those you

have authorized (“Friends” or allowed “Followers”). have authorized (“Friends” or allowed “Followers”). Communicate with only those persons you Communicate with only those persons you

personally know, and don’t accept requests to be personally know, and don’t accept requests to be “Friends” with anyone else.“Friends” with anyone else.

Be guarded about what you publish on your pages. Be guarded about what you publish on your pages. Vigilance on social networking sites goes beyond Vigilance on social networking sites goes beyond

identity theft. There are always people hunting for identity theft. There are always people hunting for victims to exploit, be they adults or children.victims to exploit, be they adults or children.

Anything you share can be used against youAnything you share can be used against you..

Preventative MeasuresPreventative Measures

Identity TheftIdentity Theft

Preventative MeasuresPreventative Measures Protect Usernames & Passwords:Protect Usernames & Passwords:

Never reveal to anyone.Never reveal to anyone. If absolutely necessary to write them down, If absolutely necessary to write them down,

keep them in a locked, safe place.keep them in a locked, safe place. Never place on your computer or electronic Never place on your computer or electronic

device unless under a high level of encryption.device unless under a high level of encryption. Don’t use the same password for multiple Don’t use the same password for multiple

accounts.accounts.

Identity TheftIdentity Theft

What to Do If YourWhat to Do If Your Identity Has Been Stolen Identity Has Been Stolen

Identity TheftIdentity Theft

What to Do If YourWhat to Do If Your Identity Has Been Stolen Identity Has Been Stolen

Contact the 3 credit reporting agencies and Contact the 3 credit reporting agencies and have them place a have them place a Fraud AlertFraud Alert on your file. on your file.

Contact financial institutions where your Contact financial institutions where your credit has been misused and formally dispute credit has been misused and formally dispute any charges and close compromised any charges and close compromised accounts.accounts.

File a complaint with the Federal Trade File a complaint with the Federal Trade Commission (FTC) (Commission (FTC) (get copy of the reportget copy of the report).).

Identity TheftIdentity Theft

What to Do If YourWhat to Do If Your Identity Has Been Stolen Identity Has Been Stolen

File a report with the Attorney General’s File a report with the Attorney General’s Office (Office (get copy of the reportget copy of the report).).

File a report with your local law enforcement File a report with your local law enforcement office, or the appropriate law enforcement office, or the appropriate law enforcement agency in the community where the identity agency in the community where the identity theft took place (theft took place (get copy of the reportget copy of the report).).

File a report with the Social Security File a report with the Social Security Administration (Administration (get copy of the reportget copy of the report).).

Identity TheftIdentity Theft

VideoVideo

Identity TheftIdentity Theft

ResourcesResources

Identity TheftIdentity Theft

ResourcesResources Federal Trade Commission (FTC)Federal Trade Commission (FTC)::

ID Theft Resources: ID Theft Resources: http://www.ftc.gov/idthefthttp://www.ftc.gov/idtheft Online Complaint Form: Online Complaint Form:

https://www.ftccomplaintassistant.govhttps://www.ftccomplaintassistant.gov Telephone: Telephone: 1-877-ID-THEFT1-877-ID-THEFT

Identity Theft Resource Center (IDRC):Identity Theft Resource Center (IDRC): http://www.idtheftcenter.orghttp://www.idtheftcenter.org

SD Attorney General’s Office: SD Attorney General’s Office: Online Complaint Form: Online Complaint Form: http://atg.sd.govhttp://atg.sd.gov Telephone: 605-773-3215 Telephone: 605-773-3215

Identity TheftIdentity Theft

ResourcesResources TransUnion:TransUnion: 1-800-680-7289; 1-800-680-7289;

www.transunion.comwww.transunion.com; Fraud Victim ; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, Assistance Division, P.O. Box 6790, Fullerton, CA 92834-6790 CA 92834-6790

Equifax:Equifax: 1-800-525-6285; 1-800-525-6285; www.equifax.comwww.equifax.com; ; P.O. Box 740241, Atlanta, GA 30374-0241P.O. Box 740241, Atlanta, GA 30374-0241

Experian:Experian: 1-888-EXPERIAN (397-3742); 1-888-EXPERIAN (397-3742); www.experian.com;www.experian.com; P.O. Box 9554, Allen, TX P.O. Box 9554, Allen, TX 7501375013

Identity TheftIdentity Theft

ResourcesResources Free Annual Credit Report:Free Annual Credit Report:

http://www.annualcreditreport.comhttp://www.annualcreditreport.com

Opt Out Prescreen:Opt Out Prescreen: www.OptOutPreScreen.comwww.OptOutPreScreen.com Telephone: 1-888-567-8688Telephone: 1-888-567-8688

Social Security Administration:Social Security Administration: https://www.socialsecurity.gov/fraudreport/oig/https://www.socialsecurity.gov/fraudreport/oig/

public_fraud_reporting/form.htmpublic_fraud_reporting/form.htm

Identity TheftIdentity Theft

SummarySummary

Identity TheftIdentity Theft

SummarySummary Identity Theft is a serious crime that can Identity Theft is a serious crime that can

significantly and negatively affect your life.significantly and negatively affect your life. Safeguard your personal information, and never Safeguard your personal information, and never

provide it to anyone unless it’s absolutely provide it to anyone unless it’s absolutely necessary, and when you do ensure it is for valid necessary, and when you do ensure it is for valid purposes.purposes.

Be wary of scams to obtain your personal Be wary of scams to obtain your personal information, whether they be via the Internet or information, whether they be via the Internet or other means.other means.

Carefully monitor your credit report and monthly Carefully monitor your credit report and monthly financial account statements for unusual activity.financial account statements for unusual activity.

Take appropriate steps in the event you believe Take appropriate steps in the event you believe your identity has been compromised.your identity has been compromised.

Identity TheftIdentity Theft

Questions?Questions?

Identity TheftIdentity Theft

Questions?Questions?

What is the most effective method for What is the most effective method for protecting yourself from becoming an protecting yourself from becoming an Identity Theft victim?Identity Theft victim?

Placing a Freeze on your credit reports Placing a Freeze on your credit reports with the 3 credit reporting agencies with the 3 credit reporting agencies (TransUnion, Equifax or Experian). (TransUnion, Equifax or Experian).

What is the first thing you should do when What is the first thing you should do when you believe your identity has been stolen?you believe your identity has been stolen?

Contact one of the 3 credit reporting Contact one of the 3 credit reporting agencies and file a Fraud Alert.agencies and file a Fraud Alert.

Identity TheftIdentity Theft

Please fill out survey,Please fill out survey,take a resource handouttake a resource handout

&&Thank you for attending!Thank you for attending!