SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Child Identity Theft Education Kit
Who’s at Risk?
Consider a teenager who is about to start college. She has
deposited money into a savings account and is ready to move
it into a checking account. Much to her surprise, she is denied
a credit card from her bank as well as a checking account. She
is told that her credit score is too low to get a credit card because
she had failed to pay off the other two credit cards she has.
However, she had never applied for a credit card. She had just
turned 18.
Another individual is wanted for forgery as well as failure to pay
child support for two children, has a suspended driving license,
and has two misdemeanor charges for fighting – but he is only
10 years old. His parents’ IRS tax statement states they cannot
claim their son as a dependent due to his full-time employment.
After working hard in college, a young man is ready to start
his career as a computer security specialist. However, he can’t
find his Social Security card so he applies for a replacement
card. He then learns that someone is not only using his Social
Security number for employment, but is also collecting unemployment in another state. After checking his credit reports, the
young man finds this person also has a car loan as well as a
credit card in good standing.

The three hypothetical examples above illustrate various types of child identity theft. Simply put, this
crime occurs when an individual uses the identifying information of a child for personal gain. That
information can include Social Security numbers, mother’s maiden name, date of birth, location of
birth, and even just the name and address of the child.

2 of 7
Child identity theft can be discovered when
children are still young or after they reach 18
years old (or are emancipated) and start to use
their own information and build a credit history.

In the case of young children, the parents are usually the first to realize there might be a problem.
They might receive calls from collection agencies, get a rejected federal or state tax form, or receive
pre-approved credit card offers directed to their child. Their teen may be denied the right to a driver’s
license due to accumulated tickets or even receive notice of a valid driver’s license in their state or
another state.
Almost all adult-child identity theft victims find out in a negative manner. They are denied credit,
loans, tenancy, and even a job. They aren’t able to sign up for utilities like cable or phone service,
are terminated from employment without cause, receive bills for credit cards they never requested
or received, and may even be arrested for the crimes of another person.

Who Typically Steals a Child’s Identity?
Currently there are two categories of people who are stealing and using
children’s identifying information.
•	 Unknown perpetrator: These thieves have either stolen or purchased
the Social Security number and sometimes other identifying information of a child. Some people create Social Security numbers that just
happen to belong to a child.
•	 Family members: A reality of child identity theft is the fact that parents or family members of a child have been found to use the child’s
identifying information, often in times of desperation. Be it job loss or
mounting debt, they are compelled to take advantage of their child’s
“clean” credit history. They may open new lines of credit using the
child’s SSN to help pay off bills, and perhaps have never learned to
live within their means and are unable to pay off current credit cards.

3 of 7
How Do Imposters Use Stolen Information
The primary use of stolen identifying information is for financial purposes. It can also be used for
many other purposes. Here are some examples of both:
•	 Open a bank account or checking account
•	 Apply for credit/debit cards and loans, including tuition/student and car loans
•	 Apply for utilities, such as cellular phone, cable and Internet services
•	 Rent an apartment
•	 Get a job
•	 Use the child’s SSN as the family SSN due to the inability of a parent to get a SSN
•	 Avoid a criminal record on the perpetrator’s file
•	 Avoid a medical record with the perpetrator’s file information (perhaps for insurance purposes or to hide
a medical condition)
•	 Fraudulently receive welfare, unemployment or medical benefits

4 of 7
Safeguarding Your Child Starts at Home
It is important to protect your child’s Social Security number and birth certificate. Hold your children’s personal information as closely as you hold them. The suggestions below can help protect
your child’s identity:
•	 Carry your child’s Social Security card, birth certificate or passport with you only when
absolutely necessary.
•	 Unless you initiate contact, do not provide your child’s Social Security number (or any part of it) over
the phone, over the Internet, or in person.
•	 If you are asked for your child’s Social Security number ask these three questions: Why is it needed? Isn’t there another way to identify my child? How will my child’s information be protected?
•	 Lock birth certificates and documents with your child’s Social Security number in a safe place.
•	 Purchase and use a cross-cut shredder.
•	 It is important that you talk with your children about identity theft. Create a safe environment with
open dialogue. Explain it in terms they can understand, using examples such as “defensive driving”
or “expensive jewelry”. Leave the door open for them to ask questions or express concerns.
•	 Sign up for an identity protection and credit monitoring service such as the Equifax Complete™
Family Plan. This type of service is a proactive tool to not only monitor your credit files and protect your family’s identities, but also to receive alerts if there is any activity reported on your
child’s Equifax credit file. More information is available at www.equifax.com.
•	 Most schools ask for personal identifying information. Ask if this is optional or if another form of identification such as a utility bill is sufficient.
•	 Never use your child’s Social Security number to open accounts for your benefit. This may be
tempting if you have bad credit, but not paying bills on time could keep your child from getting
credit cards, student loans, an apartment, or even a job when they turn 18.

5 of 7
Internet Safety and Your Child
•	 It’s important to teach your child not to give out personal information
over the phone, as well as not to post any information on the Internet.
Children and teenagers are likely to post personal identifying information
on social networking sites.
•	 Know the web sites your child visits. Find out what type of information
is being requested to register or to create a profile. Talk to your child
about the risks of posting personal information in a public forum.
•	 Protect computers from viruses, malware, and spyware. Always
update firewall and virus protection software.
•	 Teach your child to password-protect their log-in information. Teach
your child about creating safe passwords.
•	 Talk with your child about scams they might encounter over the
phone, on social sites and over the Internet/smartphones via ads
or emails.

6 of 7
Resolving Child Identity Theft Cases
First Steps to Take:
•	 Contact the local police and report the crime with any evidence you have: credit cards,
bills, collection notices, and letters from the IRS or any other governmental or law enforcement agency.
•	 Get a report from the police, not just an investigation number.
For Financial Identity Theft:
•	 Using a copy of the police report, request a copy of any information known by the three credit
reporting agencies. The request will need to be in writing and in compliance with the current
requirements of each agency.
•	 Contact any credit issuers or collection agencies listed on the credit report or that have been in
contact with the victim. Explain that this is a case of child identity theft and that the contract
is not binding due to the age of the child at the time the contract was written.
•	 Ask to have all accounts, application inquiries and collection notices removed immediately
from your child’s credit report. You can do this via the credit issuer or through a dispute process with the credit reporting agencies. In the end, the credit issuer is the final decision maker
as to whether to accept the claim of fraud or not.
•	 Request copies of all application and transaction records. According to federal law, they must
make those documents available to the victim/parent when a police report has been submitted
with the written request. Make copies and provide those to the police investigating the case.
They may help you discover how this crime occurred.
For Other Identity Crimes:
•	 In the area of criminal identity theft, you may need to provide an alibi for your children
(i.e., school attendance records; doctor’s appointments).
•	 If you believe the imposter has obtained employment using the child’s SSN, contact the
Social Security Administration and request a copy of the “child’s work statement- form
7040”. It will list all the places “the person has worked.” You then need to ask to have
that document amended, explaining this is a case of child identity theft.

7 of 7

Weitere ähnliche Inhalte

Mehr von - Mark - Fullbright

2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps - Mark - Fullbright
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 

Kürzlich hochgeladen

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Kürzlich hochgeladen (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Family Plan Identity Theft Kit

  • 1. Child Identity Theft Education Kit
  • 2. Who’s at Risk? Consider a teenager who is about to start college. She has deposited money into a savings account and is ready to move it into a checking account. Much to her surprise, she is denied a credit card from her bank as well as a checking account. She is told that her credit score is too low to get a credit card because she had failed to pay off the other two credit cards she has. However, she had never applied for a credit card. She had just turned 18. Another individual is wanted for forgery as well as failure to pay child support for two children, has a suspended driving license, and has two misdemeanor charges for fighting – but he is only 10 years old. His parents’ IRS tax statement states they cannot claim their son as a dependent due to his full-time employment. After working hard in college, a young man is ready to start his career as a computer security specialist. However, he can’t find his Social Security card so he applies for a replacement card. He then learns that someone is not only using his Social Security number for employment, but is also collecting unemployment in another state. After checking his credit reports, the young man finds this person also has a car loan as well as a credit card in good standing. The three hypothetical examples above illustrate various types of child identity theft. Simply put, this crime occurs when an individual uses the identifying information of a child for personal gain. That information can include Social Security numbers, mother’s maiden name, date of birth, location of birth, and even just the name and address of the child. 2 of 7
  • 3. Child identity theft can be discovered when children are still young or after they reach 18 years old (or are emancipated) and start to use their own information and build a credit history. In the case of young children, the parents are usually the first to realize there might be a problem. They might receive calls from collection agencies, get a rejected federal or state tax form, or receive pre-approved credit card offers directed to their child. Their teen may be denied the right to a driver’s license due to accumulated tickets or even receive notice of a valid driver’s license in their state or another state. Almost all adult-child identity theft victims find out in a negative manner. They are denied credit, loans, tenancy, and even a job. They aren’t able to sign up for utilities like cable or phone service, are terminated from employment without cause, receive bills for credit cards they never requested or received, and may even be arrested for the crimes of another person. Who Typically Steals a Child’s Identity? Currently there are two categories of people who are stealing and using children’s identifying information. • Unknown perpetrator: These thieves have either stolen or purchased the Social Security number and sometimes other identifying information of a child. Some people create Social Security numbers that just happen to belong to a child. • Family members: A reality of child identity theft is the fact that parents or family members of a child have been found to use the child’s identifying information, often in times of desperation. Be it job loss or mounting debt, they are compelled to take advantage of their child’s “clean” credit history. They may open new lines of credit using the child’s SSN to help pay off bills, and perhaps have never learned to live within their means and are unable to pay off current credit cards. 3 of 7
  • 4. How Do Imposters Use Stolen Information The primary use of stolen identifying information is for financial purposes. It can also be used for many other purposes. Here are some examples of both: • Open a bank account or checking account • Apply for credit/debit cards and loans, including tuition/student and car loans • Apply for utilities, such as cellular phone, cable and Internet services • Rent an apartment • Get a job • Use the child’s SSN as the family SSN due to the inability of a parent to get a SSN • Avoid a criminal record on the perpetrator’s file • Avoid a medical record with the perpetrator’s file information (perhaps for insurance purposes or to hide a medical condition) • Fraudulently receive welfare, unemployment or medical benefits 4 of 7
  • 5. Safeguarding Your Child Starts at Home It is important to protect your child’s Social Security number and birth certificate. Hold your children’s personal information as closely as you hold them. The suggestions below can help protect your child’s identity: • Carry your child’s Social Security card, birth certificate or passport with you only when absolutely necessary. • Unless you initiate contact, do not provide your child’s Social Security number (or any part of it) over the phone, over the Internet, or in person. • If you are asked for your child’s Social Security number ask these three questions: Why is it needed? Isn’t there another way to identify my child? How will my child’s information be protected? • Lock birth certificates and documents with your child’s Social Security number in a safe place. • Purchase and use a cross-cut shredder. • It is important that you talk with your children about identity theft. Create a safe environment with open dialogue. Explain it in terms they can understand, using examples such as “defensive driving” or “expensive jewelry”. Leave the door open for them to ask questions or express concerns. • Sign up for an identity protection and credit monitoring service such as the Equifax Complete™ Family Plan. This type of service is a proactive tool to not only monitor your credit files and protect your family’s identities, but also to receive alerts if there is any activity reported on your child’s Equifax credit file. More information is available at www.equifax.com. • Most schools ask for personal identifying information. Ask if this is optional or if another form of identification such as a utility bill is sufficient. • Never use your child’s Social Security number to open accounts for your benefit. This may be tempting if you have bad credit, but not paying bills on time could keep your child from getting credit cards, student loans, an apartment, or even a job when they turn 18. 5 of 7
  • 6. Internet Safety and Your Child • It’s important to teach your child not to give out personal information over the phone, as well as not to post any information on the Internet. Children and teenagers are likely to post personal identifying information on social networking sites. • Know the web sites your child visits. Find out what type of information is being requested to register or to create a profile. Talk to your child about the risks of posting personal information in a public forum. • Protect computers from viruses, malware, and spyware. Always update firewall and virus protection software. • Teach your child to password-protect their log-in information. Teach your child about creating safe passwords. • Talk with your child about scams they might encounter over the phone, on social sites and over the Internet/smartphones via ads or emails. 6 of 7
  • 7. Resolving Child Identity Theft Cases First Steps to Take: • Contact the local police and report the crime with any evidence you have: credit cards, bills, collection notices, and letters from the IRS or any other governmental or law enforcement agency. • Get a report from the police, not just an investigation number. For Financial Identity Theft: • Using a copy of the police report, request a copy of any information known by the three credit reporting agencies. The request will need to be in writing and in compliance with the current requirements of each agency. • Contact any credit issuers or collection agencies listed on the credit report or that have been in contact with the victim. Explain that this is a case of child identity theft and that the contract is not binding due to the age of the child at the time the contract was written. • Ask to have all accounts, application inquiries and collection notices removed immediately from your child’s credit report. You can do this via the credit issuer or through a dispute process with the credit reporting agencies. In the end, the credit issuer is the final decision maker as to whether to accept the claim of fraud or not. • Request copies of all application and transaction records. According to federal law, they must make those documents available to the victim/parent when a police report has been submitted with the written request. Make copies and provide those to the police investigating the case. They may help you discover how this crime occurred. For Other Identity Crimes: • In the area of criminal identity theft, you may need to provide an alibi for your children (i.e., school attendance records; doctor’s appointments). • If you believe the imposter has obtained employment using the child’s SSN, contact the Social Security Administration and request a copy of the “child’s work statement- form 7040”. It will list all the places “the person has worked.” You then need to ask to have that document amended, explaining this is a case of child identity theft. 7 of 7