SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Identity Theft

brian•andrea•elijah•rebecca•isaac•jordan•jack•mary•connor•gab
luke•amber•juan•kate•lynn•adam•faith•angel•makayla•carl•mad
mason•sierra•sean•brooke•charles•sara•evan•michelle•jackson•
alex•kimberly•steven•caroline•jesus•danielle•nathaniel•zoe•cody
vanessa•bryan•kaylee•jared•trinity•timothy•shelby•ian•bailey•
seth•jacqueline•devin•paige•richard•courtney•patrick•autumn•c
melissa•adrian•jada•trevor•angela•blake•mia•sebastian•alexa•g
marissa•chase•catherine•garrett•christina•julian•claire•lucas•la
miguel•gabriella•alejandro•leslie•antonio•mariah•mark•isabel•a
leah•jeremy•ariana•jesse•caitlin•eric•savannah•luis•allison•isaia

Federal Reserve Bank of Boston
Identity
Theft
You’ve probably heard about it in the news.
It may even have happened to someone you know.
The FBI calls identity theft one of the fastest growing
crimes in the United States and estimates that
500,000 to 700,000 Americans become identity
theft victims each year.
Identity theft is a federal crime. It occurs when one
person’s identification (which can include name,
social security number, or any account number)
is used or transferred by another person
for unlawful activities.
This booklet is designed
to help you understand
what identity theft is,
how it happens,
how to protect yourself,
and what steps to take
if your identity is stolen.
How
Identity
Theft
Can
Affect
You
The consequences of identity theft
can be staggering. Victims spend
extensive

time

closing

bad

accounts, opening new ones, and
fixing credit records. There can be
high out-of-pocket expenses related
to clearing your name. You could
be denied loans and jobs — and,
though unlikely, you could even be
mistakenly arrested as a result of
crimes committed in your name.
What Identity Thieves Do with Your Information
Identity thieves frequently open new accounts in your name. They often
apply for new credit cards using your information, make charges, and
leave the bills unpaid. It is also common for them to set up telephone
or utility service in your name and not pay for it. Some victims have
found that identity thieves applied for loans, apartments, and mortgages. Thieves have also been known to print counterfeit checks in a
victim’s name.
Thieves also often access your existing accounts. They may take money
from your bank accounts, make charges on your credit cards, and use
your checks and credit to make down payments for cars, furniture, and
other expensive items. They may even file for government benefits
including unemployment insurance and tax refunds.
Unfortunately, thieves often use a stolen identity again and again. It is
very common for victims to learn that thieves have opened and
accessed numerous accounts, often over a long span of time.

Four out of five victims have no idea how an identity thief obtained their
personal information. Among those who think they know what happened, many believe the identity theft occurred when their purse or wallet was stolen or lost. Thieves also steal identities from the trash — this
is called “dumpster diving” — and it can occur at home, at work, or at a
business. Mail can be stolen from your home mailbox, from a drop-box,
at businesses, and even directly from postal workers. Home computers
can be infected with viruses that transmit your data to thieves.
Group identity theft has become a major problem for consumers. A thief
gains access to a place that keeps records for many people. Targets
have included stores, fitness centers, car dealers, schools, hospitals,
and even credit bureaus. Thieves may either use the stolen identities
themselves or sell them to other criminals.

Identity Theft

How Identity Theft Happens
“Pretexting” is a method of identity theft that is on the rise. The identity thief poses as a legitimate representative of a survey firm, bank,
Internet service provider, employer, landlord, or even a government
agency. The thief contacts you through the mail, telephone, or e-mail,
and attempts to get you to reveal your information, usually by asking
you to “verify” some data.
Victims of identity theft often find that
Victims of identity
someone they know has committed the
theft often find that
crime. Roommates, hired help, and landsomeone they know has
lords all have access to your home, and it is
committed the crime.
possible for them to access private information. Identity theft within families is also fairly common. This causes particular difficulties, because victims may be reluctant to notify the authorities or press charges. People are especially vulnerable when ending relationships with roommates and spouses.
Identity theft often goes undectected. Within a month of being committed, half of the crimes still remain unnoticed. One in ten stays hidden for
two or more years. Identity thieves may change “your” address on an
account so that you won’t ever receive the bills with the fraudulent
charges on them. They will often pay the minimum balances on accounts
they have opened, so as to avoid calling attention to the account and having it cut off. They may even use the identities of children or persons
who are deceased, so that the crime is less likely to be noticed.
Four out of five victims
have no idea how an
identity thief obtained
their information.
Steps
to
Prevent
Fraud
Think about taking care of your identity
on a regular basis just like you take
care of your health. Some activities
you do every day, like brushing your
teeth and taking vitamins. Other actions
should be taken once or twice a year,
like getting dental check-ups and an
annual physical. On the following pages
are some steps to follow to protect
your identity.
Change Your Daily Routine
At Home
In the home, keep personal information safe, especially if you have
roommates or are having any work done in your home. Don’t keep
Personal Identification Numbers (PINs) near your checkbook, ATM
card, or debit card.
Shred any papers with confidential informaAnything with an
tion before you throw them out — even the
account number on it
junk mail. Anything with an account number
can be used in identity
can be used in identity theft. This includes
theft.
prescreened credit card offers, receipts, canceled checks, bank statements, expired charge cards, doctors’ bills, and
insurance documents.

You should be wary of any mail, telephone, or Internet request for information — it could be “pretexting.” Unless you initiated the contact
with a business, don’t give out any confidential information — such as
your credit card number, social security number, PIN, birth date, or
even your mother’s maiden name. Also be careful of unexpected
e-mails that look as if they are from a legitimate company asking you
to enter some information at a linked web site; sometimes phony web
sites can look real. Make sure your family members also know not to
give out any information to others.

Identity Theft

Since many identity thefts are traced to having a purse or wallet stolen,
carry as few cards with identification and personal information as possible. Don’t take your social security number, and bring as few credit
cards as you can. Think about putting different cards in different parts
of your purse or knapsack.
Check your banking and credit statements soon after you receive them
and make sure there is no unexplained activity. Keep track of when in
the month each of your bills usually arrives. If a bill does not arrive on
time, call the company to make sure no changes have been made to
your account. Often, identity thieves will change the address of a bill
so that it will take you longer to figure out the scam. If you’re careful,
you may notice the theft earlier.

Out of the Home — Shopping and Services
When you sign a credit card slip, avoid putting your address, telephone
number, or driver’s license number on it. Also, be sure to take your
receipts with you to shred at home because “dumpster diving” is very
common at large retail areas, such as malls. This will help to minimize
how much personal information about you is floating around out there.
Be particularly wary of giving out your social security number. Few
institutions — businesses granting you credit, employers filling out tax
forms for you, or government agencies — have any reasonable cause to
know your social security number. However, a
Be particularly wary of
business may refuse to serve you if you do not
giving out your social
give them the information they request. It is
security number.
up to you if you still want to do business with
the establishment.

Get Your Check-ups
Your Credit Report
Many people don’t realize they are victims of identity theft until long after
the initial crime occurred. Identity thieves often try to hide the crimes for
as long as possible so that they can access more money. To stop the
crimes as soon as possible, make sure you carefully check your credit
reports regularly. Your credit reports are important tools for limiting the
amount of damage a thief can cause.
How to Read Your Credit Report
1. Check to make sure you are aware of all
accounts listed, and balances are what you
expect them to be.
2. Look for anything suspicious in the section
that lists who has received a copy of your
credit history. Some identity thieves “pretext” by posing as a landlord or employer.
3. Make sure no inquiries have been made
about loans or leases you didn’t apply for.
4. Check for addresses where you have
never lived.
5. Check for typos in your social security
number.
6. If there is any incorrect information in
the records, contact the credit bureau,
creditor, employer, or government
agency immediately. Follow up with
a letter describing what actions
were taken. Your protections are
usually stronger if you report
the problem quickly and
in writing.
Contact each of the three major credit reporting agencies to order a copy
of your credit report at least once each year. (The phone numbers and
addresses are listed at the back of this booklet.) Your credit report will
generally contain information on where you
Make it harder for
work and live, the credit accounts that have
thieves to use your
been opened in your name, if you own a home,
accounts.
if there are any liens against your home, how
you pay your bills, and whether you’ve been sued, arrested, or have filed
for bankruptcy. Consider canceling credit cards you haven’t used in a
long time. You can also consider adding a “fraud alert” to make it harder
for thieves to open new accounts without your knowledge. With a fraud
alert, the credit agency has to call you to confirm any request it receives
to open a new account in your name. If you decide you want this service,
just contact the credit reporting agencies.

At Work
The newest trend in identity theft is to hit groups of people, and workplaces can be vulnerable. Find out if your company has a policy about
protecting its employees from identity theft. Make sure your employer
stores your personal information in a safe place. Also, find out which
other employees have access to your personal information.

Companies and Agencies with Which You Do Business
Identity theft can occur through records maintained by your bank, credit card companies, the Department of Motor Vehicles, utilities, insurance
companies, and phone companies. Try to have as little information as
possible printed on any cards these groups may issue. If you want, ask
these companies about their policies with regard to sharing your information. You can stop many components of information sharing.
When choosing a PIN, use one that is hard to guess. Avoid the last 4
digits of your social security number, your mother’s maiden name, birth
dates, names of pets, or even the name of your hometown baseball
team. Try to mix numbers, letters and symbols.
Make it harder for thieves to use your accounts. Put passwords on
credit card, bank, and phone accounts. Get credit cards with your picture on them. Call the companies that issue the accounts and find out
what security options they offer.
Don’t print your social security number or phone number on your
checks. Don’t have your checks delivered to your home — go and pick
them up yourself at your bank.
Try not to use your social security number for an identifier:
• Check your drivers license to make sure you aren’t using your social
security number as identification — few states require this any more.
• If a school, employer, health insurer, or other institution needs to give
you an identification number, often they simply use your social security number. Find out if they can use another number instead.

Your Mail
Reduce the circulation of your information through the mail. Stop
receiving prescreened credit offers by calling 1-888-5OPTOUT. You
can also reduce direct mail marketing and telemarketing by contacting
the Direct Marketing Association. Notify each of the three major credit bureaus that you do not want personal information about you shared
for promotional purposes. (This will also reduce unsolicited mail.)
Consider putting a lock on your mailbox.

Identity Theft Insurance
Home insurance policies can include “identity theft insurance” as an
option. But know that if you are a victim, insured or not, you should be
able to get out of paying all fraudulent bills.

Identity Theft

• The only places you must use your social security number are on government and financial forms, such as tax forms and most credit applications.
What to
Do If
You’re
a Victim
of Identity
Theft
There are several steps you can and
should take to protect yourself if you
are a victim of identity theft. These
steps are listed on the following pages.
Begin documenting the time and
money you spend on straightening
out identity theft.
Make Sure to Document Your Actions
Begin documenting the time and money you spend on straightening out
identity theft. In some states, any person found guilty of financial identity theft will be ordered to pay restitution to the victim for any financial
loss, including lost wages.
• Keep copies of correspondence and documents related to the theft.
• Write records of all telephone calls, including the date and time of
your call and the name and title of the person who assisted you.
• Write letters to confirm all phone conversations. Include the date,
the name of the person you spoke with, and what actions were taken.
• To be extra careful, send documents and letters Return Receipt
Requested and keep the postal receipt with your copy.
Consider using the ID Theft Affidavit to avoid having to complete different forms. This form can assist you in disputing inaccurate information
that appears on your credit report as a result of fraud. It’s available on
www.consumer.gov/idtheft. Keep copies of all affidavits that you send.

Contact the Police
Immediately call the police to file a report with your local law enforcement. If your identity was stolen when you were away from home, you
may need to contact the police in that jurisdiction, too. Opening a police
case accomplishes two things: First, the
After you call the
police can start investigating the crime.
Second, you will need information from the
police, contact the
police report to help you straighten out your
credit bureaus.
credit and accounts after the crime. When you
talk to the police, make sure you get the police report number and information on how to reach the investigator. Give this information to all the
companies you contact in getting your credit cleared up after the crime.

Stop the Damage
After you call the police, contact the credit bureaus. Next, contact any
credit card companies and banks where your accounts may be at risk.
Credit Bureaus
Contact the fraud departments at each of the three credit bureaus.
Equifax:
Experian:
TransUnion:

(800) 525-6285
(888) EXPERIAN (397-3742)
(800) 680-7289

• Get all three agencies to flag the accounts with a “fraud alert.” Find
out from each credit reporting agency how long the fraud alert will
remain on your report, and how to extend that time, if needed. Ask
that all creditors contact you at a phone number you provide to
verify all future applications.
• Add a “victim’s statement” to the report; include your name, state the
problem, and provide a telephone number where you can be reached.

• In a few months, order new copies of your reports to verify your corrections and changes, and to make sure no new fraudulent activity
has occurred. Unfortunately, identity thieves often strike the same
accounts again and again. Because of this, it is very important to continue to monitor your credit reports very closely for a while after the
initial crime. Even with a "fraud alert,” thieves may still find ways to
open new accounts. Ask the credit bureaus if they will supply you
with free reports every few months.

Credit Card Companies
If a thief has gained access to a credit card, contact the security department of that credit card company.
• Close any affected accounts so that they’re registered as “closed at
customer request.”
• Get new account numbers, and protect the accounts with passwords.
• Follow up with a letter documenting the date, the name of the person
who helped you, and what actions were taken.

Identity Theft

• Have each credit bureau send you a copy of your report. These reports
will guide you in tracing where and when any fraud occurred to your
accounts.
Just because one card has been compromised, you may not want to
close all of your credit accounts, and you may want to hold on to some
cards. You may want to get counseling about this decision from a victim assistance group. (Some useful nonprofit groups are listed on the
back of this booklet.)

Banks
Inform your bank if your wallet or purse was stolen or lost. Tell them
what bank account information, including account numbers, ATM cards,
or checks it contained.
• Cancel checking and savings accounts and open new ones.
• Stop payments on outstanding checks.
• Get a new ATM card, account number, and PIN or password.

Contact the Government Authorities
It is also good to contact other authorities that specialize in identity
theft. The Federal Trade Commission (FTC) runs the ID Theft Hotline
and the ID Theft Data Clearinghouse.
FTC Identity Theft Hot Line: (877) IDTHEFT (438-4338)
If mail service was used in the fraud, contact the U.S. Postal Inspection
Service. This agency is helpful if any fraudulent utility bills or apartment leases show up on your credit report.
U.S. Postal Inspectors: (800) 372-8347

If you would like to learn more, there are government and consumer
groups that can help you. Opposite is a list of useful organizations.
Credit Agencies
Equifax
P.O. Box 740241
Atlanta, GA 30374
www.equifax.com
Report Fraud:
(800) 525-6285
Order a Credit Report:
(800) 685-1111
Experian
P.O. Box 2002
Allen, TX 75013
www.experian.com
Report Fraud:
(888) EXPERIAN (397-3742)
Order a Credit Report:
(888) EXPERIAN (397-3742)
TransUnion
P.O. Box 1000
Chester, PA 19022
www.transunion.com
Report Fraud:
(800) 680-7289
Order a Credit Report:
(800) 916-8800

Nonprofit Resources
Identity Theft Resource Center
P.O. Box 26833
San Diego, CA 92196
(858) 693-7935
www.idtheftcenter.org
Privacy Rights Clearinghouse
3100 - 5th Ave., Suite B
San Diego, CA 92103
(619) 298-3396
www.privacyrights.org

Direct Marketers
Direct Marketing Association
Mail Preference Service
P.O. Box 643
Carmel, NY 10512
www.the-dma.org/consumers/
offmailinglist.html

This publication is also available in Spanish.
Esta publicación también está disponible
en español:
Robo de Identidad
www.bos.frb.org/consumer/identity/
spanish/index.htm

Federal Government
Resources
Federal Trade Commission
Identity Theft Clearinghouse
600 Pennsylvania Avenue, NW
Washington, DC 20580
www.consumer.gov/idtheft
Report Fraud:
(877) IDTHEFT (438-4338)

First copy free, additional copies are $1.00 each.
Make check or money order payable to the Federal
Reserve Bank of Boston.
e-mail: PublicComm.Affairs-Bos@bos.frb.org
phone: 1-800-409-1333

U.S. Postal Inspection Service
475 L’Enfant Plaza SW
Washington, DC 20260
www.usps.gov/postalinspectors
Mail Fraud Complaint Center:
(800) 372-8347

mail: Identity Theft Brochure
Public and Community Affairs Department
Federal Reserve Bank of Boston
600 Atlantic Avenue
Boston, MA 02210
You can also view this brochure online at the Federal Reserve
Bank of Boston’s public web site:
www.bos.frb.org/consumer/identity/index.htm
revised 11/05
Identity
Theft:
Protect
Yourself
A Video Resource
from the
Federal Reserve Bank of Boston
Fax

Institution

Format
VHS
DVD

Copies of the video are available in VHS or DVD format for a charge of $7.50 each. Shipping is included. Payment must accompany
order form.
Please make checks or money orders payable to the Federal Reserve Bank of Boston.
For more information on the “Identity Theft: Protect Yourself” video, please contact us via telephone at 1-800-409-1333
or e-mail us at PublicComm.Affairs-Bos@bos.frb.org.

E-mail Address

Phone Number

Address

Name

Identity Theft: Protect Yourself Video Order Form
Federal Reserve Bank of Boston
Attn: Identity Theft Video
Public & Community Affairs Department, T-7
600 Atlantic Avenue
Boston, MA 02210

This 13-minute video details how easily personal financial information can get into the wrong hands, allowing criminals to unlawfully
obtain credit in your name. Through interviews with victims, law enforcement, and industry representatives, this video aims to provide
consumers with ample information on how to protect their vital financial information. The video also outlines what a consumer should
do if they suspect that their identity has been stolen.

As part of an ongoing commitment to consumer education, the Federal Reserve Bank of Boston released a video in 2001 on identity theft,
entitled "Identity Theft: Protect Yourself."

Identity Theft: Protect Yourself Video
Federal Reserve Bank of Boston
Public & Community Affairs, T-7
600 Atlantic Avenue
Boston, MA 02210

Weitere ähnliche Inhalte

Was ist angesagt?

Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overviewgaby350
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft- Mark - Fullbright
 
Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity TheftJlove Minguez
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
 
Scam types and its avoidance
Scam types and its avoidanceScam types and its avoidance
Scam types and its avoidancescamtools
 
Identity Theft
Identity TheftIdentity Theft
Identity TheftLisa Sosebee
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptbDudleyDoright
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca- Mark - Fullbright
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive StepsAre You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive StepsScamchargeback
 
Internet Scams, Fraud, And Hoaxes
Internet Scams, Fraud, And HoaxesInternet Scams, Fraud, And Hoaxes
Internet Scams, Fraud, And Hoaxeschartwick
 

Was ist angesagt? (20)

Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
 
ID Theft
ID TheftID Theft
ID Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity Theft
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Scam types and its avoidance
Scam types and its avoidanceScam types and its avoidance
Scam types and its avoidance
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Monitor Your Credit Report
Monitor Your Credit  ReportMonitor Your Credit  Report
Monitor Your Credit Report
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Dean r berry scam susceptibility 12 20
Dean r berry scam susceptibility 12 20Dean r berry scam susceptibility 12 20
Dean r berry scam susceptibility 12 20
 
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive StepsAre You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
 
Frauds and Seniors
Frauds and SeniorsFrauds and Seniors
Frauds and Seniors
 
Internet Scams, Fraud, And Hoaxes
Internet Scams, Fraud, And HoaxesInternet Scams, Fraud, And Hoaxes
Internet Scams, Fraud, And Hoaxes
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 

Andere mochten auch

CHINA DEVELOPMENT - overview
CHINA DEVELOPMENT - overviewCHINA DEVELOPMENT - overview
CHINA DEVELOPMENT - overviewMilan Kapoor
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Securitydrkelleher
 
Cyber theft !!!
Cyber theft !!!Cyber theft !!!
Cyber theft !!!Milan Kapoor
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Andere mochten auch (17)

CHINA DEVELOPMENT - overview
CHINA DEVELOPMENT - overviewCHINA DEVELOPMENT - overview
CHINA DEVELOPMENT - overview
 
Inside a Cyber-Theft Ring
Inside a Cyber-Theft RingInside a Cyber-Theft Ring
Inside a Cyber-Theft Ring
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Cyber theft !!!
Cyber theft !!!Cyber theft !!!
Cyber theft !!!
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Hacking
HackingHacking
Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Ă„hnlich wie Identity Theft

Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada- Mark - Fullbright
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You- Mark - Fullbright
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftCost U Less Direct
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pntjessmc1
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftNorfolk Naval Shipyard
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft pptAngela Lawson
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?- Mark - Fullbright
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Theft
Identity TheftIdentity Theft
Identity TheftMaria Taylor
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineKristi Valentini
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 

Ă„hnlich wie Identity Theft (20)

Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity Theft
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
 
Phishing
PhishingPhishing
Phishing
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity theft
Identity theftIdentity theft
Identity theft
 

Mehr von - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report- Mark - Fullbright
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

KĂĽrzlich hochgeladen

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

KĂĽrzlich hochgeladen (20)

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Identity Theft

  • 1. Identity Theft brian•andrea•elijah•rebecca•isaac•jordan•jack•mary•connor•gab luke•amber•juan•kate•lynn•adam•faith•angel•makayla•carl•mad mason•sierra•sean•brooke•charles•sara•evan•michelle•jackson• alex•kimberly•steven•caroline•jesus•danielle•nathaniel•zoe•cody vanessa•bryan•kaylee•jared•trinity•timothy•shelby•ian•bailey• seth•jacqueline•devin•paige•richard•courtney•patrick•autumn•c melissa•adrian•jada•trevor•angela•blake•mia•sebastian•alexa•g marissa•chase•catherine•garrett•christina•julian•claire•lucas•la miguel•gabriella•alejandro•leslie•antonio•mariah•mark•isabel•a leah•jeremy•ariana•jesse•caitlin•eric•savannah•luis•allison•isaia Federal Reserve Bank of Boston
  • 2. Identity Theft You’ve probably heard about it in the news. It may even have happened to someone you know. The FBI calls identity theft one of the fastest growing crimes in the United States and estimates that 500,000 to 700,000 Americans become identity theft victims each year. Identity theft is a federal crime. It occurs when one person’s identification (which can include name, social security number, or any account number) is used or transferred by another person for unlawful activities.
  • 3. This booklet is designed to help you understand what identity theft is, how it happens, how to protect yourself, and what steps to take if your identity is stolen.
  • 4. How Identity Theft Can Affect You The consequences of identity theft can be staggering. Victims spend extensive time closing bad accounts, opening new ones, and fixing credit records. There can be high out-of-pocket expenses related to clearing your name. You could be denied loans and jobs — and, though unlikely, you could even be mistakenly arrested as a result of crimes committed in your name.
  • 5. What Identity Thieves Do with Your Information Identity thieves frequently open new accounts in your name. They often apply for new credit cards using your information, make charges, and leave the bills unpaid. It is also common for them to set up telephone or utility service in your name and not pay for it. Some victims have found that identity thieves applied for loans, apartments, and mortgages. Thieves have also been known to print counterfeit checks in a victim’s name. Thieves also often access your existing accounts. They may take money from your bank accounts, make charges on your credit cards, and use your checks and credit to make down payments for cars, furniture, and other expensive items. They may even file for government benefits including unemployment insurance and tax refunds. Unfortunately, thieves often use a stolen identity again and again. It is very common for victims to learn that thieves have opened and accessed numerous accounts, often over a long span of time. Four out of five victims have no idea how an identity thief obtained their personal information. Among those who think they know what happened, many believe the identity theft occurred when their purse or wallet was stolen or lost. Thieves also steal identities from the trash — this is called “dumpster diving” — and it can occur at home, at work, or at a business. Mail can be stolen from your home mailbox, from a drop-box, at businesses, and even directly from postal workers. Home computers can be infected with viruses that transmit your data to thieves. Group identity theft has become a major problem for consumers. A thief gains access to a place that keeps records for many people. Targets have included stores, fitness centers, car dealers, schools, hospitals, and even credit bureaus. Thieves may either use the stolen identities themselves or sell them to other criminals. Identity Theft How Identity Theft Happens
  • 6. “Pretexting” is a method of identity theft that is on the rise. The identity thief poses as a legitimate representative of a survey firm, bank, Internet service provider, employer, landlord, or even a government agency. The thief contacts you through the mail, telephone, or e-mail, and attempts to get you to reveal your information, usually by asking you to “verify” some data. Victims of identity theft often find that Victims of identity someone they know has committed the theft often find that crime. Roommates, hired help, and landsomeone they know has lords all have access to your home, and it is committed the crime. possible for them to access private information. Identity theft within families is also fairly common. This causes particular difficulties, because victims may be reluctant to notify the authorities or press charges. People are especially vulnerable when ending relationships with roommates and spouses. Identity theft often goes undectected. Within a month of being committed, half of the crimes still remain unnoticed. One in ten stays hidden for two or more years. Identity thieves may change “your” address on an account so that you won’t ever receive the bills with the fraudulent charges on them. They will often pay the minimum balances on accounts they have opened, so as to avoid calling attention to the account and having it cut off. They may even use the identities of children or persons who are deceased, so that the crime is less likely to be noticed.
  • 7. Four out of five victims have no idea how an identity thief obtained their information.
  • 8. Steps to Prevent Fraud Think about taking care of your identity on a regular basis just like you take care of your health. Some activities you do every day, like brushing your teeth and taking vitamins. Other actions should be taken once or twice a year, like getting dental check-ups and an annual physical. On the following pages are some steps to follow to protect your identity.
  • 9. Change Your Daily Routine At Home In the home, keep personal information safe, especially if you have roommates or are having any work done in your home. Don’t keep Personal Identification Numbers (PINs) near your checkbook, ATM card, or debit card. Shred any papers with confidential informaAnything with an tion before you throw them out — even the account number on it junk mail. Anything with an account number can be used in identity can be used in identity theft. This includes theft. prescreened credit card offers, receipts, canceled checks, bank statements, expired charge cards, doctors’ bills, and insurance documents. You should be wary of any mail, telephone, or Internet request for information — it could be “pretexting.” Unless you initiated the contact with a business, don’t give out any confidential information — such as your credit card number, social security number, PIN, birth date, or even your mother’s maiden name. Also be careful of unexpected e-mails that look as if they are from a legitimate company asking you to enter some information at a linked web site; sometimes phony web sites can look real. Make sure your family members also know not to give out any information to others. Identity Theft Since many identity thefts are traced to having a purse or wallet stolen, carry as few cards with identification and personal information as possible. Don’t take your social security number, and bring as few credit cards as you can. Think about putting different cards in different parts of your purse or knapsack.
  • 10. Check your banking and credit statements soon after you receive them and make sure there is no unexplained activity. Keep track of when in the month each of your bills usually arrives. If a bill does not arrive on time, call the company to make sure no changes have been made to your account. Often, identity thieves will change the address of a bill so that it will take you longer to figure out the scam. If you’re careful, you may notice the theft earlier. Out of the Home — Shopping and Services When you sign a credit card slip, avoid putting your address, telephone number, or driver’s license number on it. Also, be sure to take your receipts with you to shred at home because “dumpster diving” is very common at large retail areas, such as malls. This will help to minimize how much personal information about you is floating around out there. Be particularly wary of giving out your social security number. Few institutions — businesses granting you credit, employers filling out tax forms for you, or government agencies — have any reasonable cause to know your social security number. However, a Be particularly wary of business may refuse to serve you if you do not giving out your social give them the information they request. It is security number. up to you if you still want to do business with the establishment. Get Your Check-ups Your Credit Report Many people don’t realize they are victims of identity theft until long after the initial crime occurred. Identity thieves often try to hide the crimes for as long as possible so that they can access more money. To stop the crimes as soon as possible, make sure you carefully check your credit reports regularly. Your credit reports are important tools for limiting the amount of damage a thief can cause.
  • 11. How to Read Your Credit Report 1. Check to make sure you are aware of all accounts listed, and balances are what you expect them to be. 2. Look for anything suspicious in the section that lists who has received a copy of your credit history. Some identity thieves “pretext” by posing as a landlord or employer. 3. Make sure no inquiries have been made about loans or leases you didn’t apply for. 4. Check for addresses where you have never lived. 5. Check for typos in your social security number. 6. If there is any incorrect information in the records, contact the credit bureau, creditor, employer, or government agency immediately. Follow up with a letter describing what actions were taken. Your protections are usually stronger if you report the problem quickly and in writing.
  • 12. Contact each of the three major credit reporting agencies to order a copy of your credit report at least once each year. (The phone numbers and addresses are listed at the back of this booklet.) Your credit report will generally contain information on where you Make it harder for work and live, the credit accounts that have thieves to use your been opened in your name, if you own a home, accounts. if there are any liens against your home, how you pay your bills, and whether you’ve been sued, arrested, or have filed for bankruptcy. Consider canceling credit cards you haven’t used in a long time. You can also consider adding a “fraud alert” to make it harder for thieves to open new accounts without your knowledge. With a fraud alert, the credit agency has to call you to confirm any request it receives to open a new account in your name. If you decide you want this service, just contact the credit reporting agencies. At Work The newest trend in identity theft is to hit groups of people, and workplaces can be vulnerable. Find out if your company has a policy about protecting its employees from identity theft. Make sure your employer stores your personal information in a safe place. Also, find out which other employees have access to your personal information. Companies and Agencies with Which You Do Business Identity theft can occur through records maintained by your bank, credit card companies, the Department of Motor Vehicles, utilities, insurance companies, and phone companies. Try to have as little information as possible printed on any cards these groups may issue. If you want, ask these companies about their policies with regard to sharing your information. You can stop many components of information sharing. When choosing a PIN, use one that is hard to guess. Avoid the last 4 digits of your social security number, your mother’s maiden name, birth dates, names of pets, or even the name of your hometown baseball team. Try to mix numbers, letters and symbols.
  • 13. Make it harder for thieves to use your accounts. Put passwords on credit card, bank, and phone accounts. Get credit cards with your picture on them. Call the companies that issue the accounts and find out what security options they offer. Don’t print your social security number or phone number on your checks. Don’t have your checks delivered to your home — go and pick them up yourself at your bank. Try not to use your social security number for an identifier: • Check your drivers license to make sure you aren’t using your social security number as identification — few states require this any more. • If a school, employer, health insurer, or other institution needs to give you an identification number, often they simply use your social security number. Find out if they can use another number instead. Your Mail Reduce the circulation of your information through the mail. Stop receiving prescreened credit offers by calling 1-888-5OPTOUT. You can also reduce direct mail marketing and telemarketing by contacting the Direct Marketing Association. Notify each of the three major credit bureaus that you do not want personal information about you shared for promotional purposes. (This will also reduce unsolicited mail.) Consider putting a lock on your mailbox. Identity Theft Insurance Home insurance policies can include “identity theft insurance” as an option. But know that if you are a victim, insured or not, you should be able to get out of paying all fraudulent bills. Identity Theft • The only places you must use your social security number are on government and financial forms, such as tax forms and most credit applications.
  • 14. What to Do If You’re a Victim of Identity Theft There are several steps you can and should take to protect yourself if you are a victim of identity theft. These steps are listed on the following pages.
  • 15. Begin documenting the time and money you spend on straightening out identity theft.
  • 16. Make Sure to Document Your Actions Begin documenting the time and money you spend on straightening out identity theft. In some states, any person found guilty of financial identity theft will be ordered to pay restitution to the victim for any financial loss, including lost wages. • Keep copies of correspondence and documents related to the theft. • Write records of all telephone calls, including the date and time of your call and the name and title of the person who assisted you. • Write letters to confirm all phone conversations. Include the date, the name of the person you spoke with, and what actions were taken. • To be extra careful, send documents and letters Return Receipt Requested and keep the postal receipt with your copy. Consider using the ID Theft Affidavit to avoid having to complete different forms. This form can assist you in disputing inaccurate information that appears on your credit report as a result of fraud. It’s available on www.consumer.gov/idtheft. Keep copies of all affidavits that you send. Contact the Police Immediately call the police to file a report with your local law enforcement. If your identity was stolen when you were away from home, you may need to contact the police in that jurisdiction, too. Opening a police case accomplishes two things: First, the After you call the police can start investigating the crime. Second, you will need information from the police, contact the police report to help you straighten out your credit bureaus. credit and accounts after the crime. When you talk to the police, make sure you get the police report number and information on how to reach the investigator. Give this information to all the companies you contact in getting your credit cleared up after the crime. Stop the Damage After you call the police, contact the credit bureaus. Next, contact any credit card companies and banks where your accounts may be at risk.
  • 17. Credit Bureaus Contact the fraud departments at each of the three credit bureaus. Equifax: Experian: TransUnion: (800) 525-6285 (888) EXPERIAN (397-3742) (800) 680-7289 • Get all three agencies to flag the accounts with a “fraud alert.” Find out from each credit reporting agency how long the fraud alert will remain on your report, and how to extend that time, if needed. Ask that all creditors contact you at a phone number you provide to verify all future applications. • Add a “victim’s statement” to the report; include your name, state the problem, and provide a telephone number where you can be reached. • In a few months, order new copies of your reports to verify your corrections and changes, and to make sure no new fraudulent activity has occurred. Unfortunately, identity thieves often strike the same accounts again and again. Because of this, it is very important to continue to monitor your credit reports very closely for a while after the initial crime. Even with a "fraud alert,” thieves may still find ways to open new accounts. Ask the credit bureaus if they will supply you with free reports every few months. Credit Card Companies If a thief has gained access to a credit card, contact the security department of that credit card company. • Close any affected accounts so that they’re registered as “closed at customer request.” • Get new account numbers, and protect the accounts with passwords. • Follow up with a letter documenting the date, the name of the person who helped you, and what actions were taken. Identity Theft • Have each credit bureau send you a copy of your report. These reports will guide you in tracing where and when any fraud occurred to your accounts.
  • 18. Just because one card has been compromised, you may not want to close all of your credit accounts, and you may want to hold on to some cards. You may want to get counseling about this decision from a victim assistance group. (Some useful nonprofit groups are listed on the back of this booklet.) Banks Inform your bank if your wallet or purse was stolen or lost. Tell them what bank account information, including account numbers, ATM cards, or checks it contained. • Cancel checking and savings accounts and open new ones. • Stop payments on outstanding checks. • Get a new ATM card, account number, and PIN or password. Contact the Government Authorities It is also good to contact other authorities that specialize in identity theft. The Federal Trade Commission (FTC) runs the ID Theft Hotline and the ID Theft Data Clearinghouse. FTC Identity Theft Hot Line: (877) IDTHEFT (438-4338) If mail service was used in the fraud, contact the U.S. Postal Inspection Service. This agency is helpful if any fraudulent utility bills or apartment leases show up on your credit report. U.S. Postal Inspectors: (800) 372-8347 If you would like to learn more, there are government and consumer groups that can help you. Opposite is a list of useful organizations.
  • 19. Credit Agencies Equifax P.O. Box 740241 Atlanta, GA 30374 www.equifax.com Report Fraud: (800) 525-6285 Order a Credit Report: (800) 685-1111 Experian P.O. Box 2002 Allen, TX 75013 www.experian.com Report Fraud: (888) EXPERIAN (397-3742) Order a Credit Report: (888) EXPERIAN (397-3742) TransUnion P.O. Box 1000 Chester, PA 19022 www.transunion.com Report Fraud: (800) 680-7289 Order a Credit Report: (800) 916-8800 Nonprofit Resources Identity Theft Resource Center P.O. Box 26833 San Diego, CA 92196 (858) 693-7935 www.idtheftcenter.org Privacy Rights Clearinghouse 3100 - 5th Ave., Suite B San Diego, CA 92103 (619) 298-3396 www.privacyrights.org Direct Marketers Direct Marketing Association Mail Preference Service P.O. Box 643 Carmel, NY 10512 www.the-dma.org/consumers/ offmailinglist.html This publication is also available in Spanish. Esta publicaciĂłn tambiĂ©n está disponible en español: Robo de Identidad www.bos.frb.org/consumer/identity/ spanish/index.htm Federal Government Resources Federal Trade Commission Identity Theft Clearinghouse 600 Pennsylvania Avenue, NW Washington, DC 20580 www.consumer.gov/idtheft Report Fraud: (877) IDTHEFT (438-4338) First copy free, additional copies are $1.00 each. Make check or money order payable to the Federal Reserve Bank of Boston. e-mail: PublicComm.Affairs-Bos@bos.frb.org phone: 1-800-409-1333 U.S. Postal Inspection Service 475 L’Enfant Plaza SW Washington, DC 20260 www.usps.gov/postalinspectors Mail Fraud Complaint Center: (800) 372-8347 mail: Identity Theft Brochure Public and Community Affairs Department Federal Reserve Bank of Boston 600 Atlantic Avenue Boston, MA 02210 You can also view this brochure online at the Federal Reserve Bank of Boston’s public web site: www.bos.frb.org/consumer/identity/index.htm revised 11/05
  • 20. Identity Theft: Protect Yourself A Video Resource from the Federal Reserve Bank of Boston
  • 21. Fax Institution Format VHS DVD Copies of the video are available in VHS or DVD format for a charge of $7.50 each. Shipping is included. Payment must accompany order form. Please make checks or money orders payable to the Federal Reserve Bank of Boston. For more information on the “Identity Theft: Protect Yourself” video, please contact us via telephone at 1-800-409-1333 or e-mail us at PublicComm.Affairs-Bos@bos.frb.org. E-mail Address Phone Number Address Name Identity Theft: Protect Yourself Video Order Form Federal Reserve Bank of Boston Attn: Identity Theft Video Public & Community Affairs Department, T-7 600 Atlantic Avenue Boston, MA 02210 This 13-minute video details how easily personal financial information can get into the wrong hands, allowing criminals to unlawfully obtain credit in your name. Through interviews with victims, law enforcement, and industry representatives, this video aims to provide consumers with ample information on how to protect their vital financial information. The video also outlines what a consumer should do if they suspect that their identity has been stolen. As part of an ongoing commitment to consumer education, the Federal Reserve Bank of Boston released a video in 2001 on identity theft, entitled "Identity Theft: Protect Yourself." Identity Theft: Protect Yourself Video
  • 22. Federal Reserve Bank of Boston Public & Community Affairs, T-7 600 Atlantic Avenue Boston, MA 02210