SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
Identity Theft
Checklist
Guidance for
the general
public
Identity Assurance Framework
Contents

1.0	 Introduction............................................................................................................................................................... 2
2.0	 Case studies............................................................................................................................................................... 3
3.0	 Methods for committing identity theft........................................................................................................ 4
	
Traditional ways to access personal information for identity theft........................................4
	
Online methods for stealing personal information................................................................4
4.0	 How to prevent identity theft........................................................................................................................... 5
5.0	
	
	
	
	

What to do if you are a victim. ......................................................................................................................... 6
Lost or stolen documents.......................................................................................................6
Stolen or misdirected mail...................................................................................................11
Suspicious mail or phone calls.............................................................................................12
Strange transactions or other concerns...............................................................................14
1.0

Introduction

What is your identity? Who are you?
Your identity is made up of facts about
yourself. This can include your name, lifeevent information like your date and place
of birth, physiological attributes (e.g.
your height and eye colour), and unique
information used by a specific agency
or organisation (e.g. customer number,
passport number).
Identity information is all the facts you have given
to government agencies, and organisations, as
well as the information you create about yourself
(e.g. information shared on social networking
websites). It is fact-based information that may or
may not change over time. Identity information
is often something we take for granted but is the
information that enables us to do many day-to-day
activities. Without identity information, you would
not be able to open a bank account or get a driver
licence or a passport.
Identity theft occurs when someone uses your
identity information. Often, it is not until someone
causes damage to your identity that you become
aware that the theft has occurred. With your
identity information, a fraudster can commit a
number of different crimes including taking out
loans or accumulating speeding tickets in your
name. Identity theft can damage your personal
and financial reputation.

2

Identity Assurance Framework

To help combat identity crime, the Government
is improving systems and processes that involve
identity data. Agencies will also intervene in
cases of identity theft when they have the legal
power to so.
Identity theft can seem minor, such as borrowing
someone’s ID to gain access to services you may
not be otherwise entitled to (e.g. the purchase of
alcohol at licensed and unlicensed premises),
but it can escalate into more serious crimes
(e.g. gaining access to money from financial
institutions). There are serious consequences for
committing identity crime. Individuals found guilty
of fraud in New Zealand face large fines, and may
find themselves behind bars.
Agencies are actively working to help you
protect your identity, but you need to do your
part. The Government’s current focus is on
prevention of identity crime by raising people’s
awareness of the issue and providing advice about
how to reduce the chance of becoming a victim.
This document includes information on what you
can do to protect yourself from identity theft, and
also information on what to do should it happen
to you. There are also some real-life examples of
how identity theft has affected individuals.
2.0

Case studies

While she was away

Convicted of someone else’s crime

Jane Campbell* is changing her name to
escape her identity theft problems. After a
brief holiday in 2007, she had no mail waiting
for her on her return. Thinking there was a
problem with a post office redirection, she
ignored it. But four weeks later, $31,000 had
disappeared from her account after fraudsters
stole her mail and created fake IDs using her
full name and date of birth.
In 2009, fraudsters struck again. It is unknown
if it was the same set of fraudsters, or if her
details had been sold on.

In 2008, 18-year-old John Smith* appeared
in the Gore District Court and was convicted
of drink driving. However, the real John Smith
was actually living in Papakura at the time,
and was not in Gore when the offence
occurred. The real John Smith was left to deal
with Police, get affidavits to prove that he was
in Auckland at the time of the offence and
could not have committed the crime. As traffic
offences do not always result in an arrest,
fingerprinting did not take place, so proving
identity was more difficult.

What could be done to stop it?

How did this happen?

An alert can be placed on your credit file; if
someone tries to take out a loan in your name,
the bank will receive the alert when they do a
credit check.

The real John Smith suspects that he shared
his full name and date of birth with an
individual he had met on a trip to Southland,
and they used his details.

* Name was changed for privacy reasons.

identity theft checklist

3
3.0

Methods for committing
identity theft
Traditional ways to access personal
information for identity theft

Online methods for stealing
personal information

Dumpster diving: fraudsters go through bins
to collect ‘trash’ or discarded items to obtain
copies of individuals’ cheques, credit card or bank
statements, or other records that contain their
personal information.

Malware: a software code or programme
inserted into an information system in order
to cause harm to that system, or to other systems
or to subvert them for use other than that
intended by their own users. Viruses, worms,
trojan horses, backdoors, keystroke loggers, screen
scrapers, rootkits, and spyware are all different
kinds of malware.

Pretexting: criminals contact a financial
institution or telephone company, impersonating
a legitimate customer, and request account
information. In other cases, the pretext is
accomplished by an insider at the financial
institution, or by fraudulently opening an
online account in a customer’s name.
Shoulder surfing: looking over someone’s
shoulder or from a nearby location as the victim
enters a PIN at an ATM or EFTPOS machine, or
enters a password online.
Skimming: capturing personal data from
the magnetic stripes on the back of credit or
debit cards. The data is transmitted to another
location where it is re-encoded onto
fraudulent credit cards.
Business record theft: someone steals data
from a business or bribes insiders to obtain the
information from the business or organisation.

Spam: unsolicited, unwanted or harmful
electronic messages are increasingly being used
as a method for delivering malware and criminal
phishing scams.
Phishing: obtaining unsuspecting Internet users’
personal identifying information through emails
and mirror-websites that look like legitimate
businesses, such as financial institutions or
government agencies. Typically, a phishing attack is
composed of the following steps:
•	 the phisher sends its potential victim an email
that appears to be from an existing company.
The email uses the colours, graphics, logos and
wording of the company;
•	 the potential victim reads the email and
provides the phisher with personal information
by either responding to the email or clicking
on a link and providing the information via a
form on a website that appears to be from the
company; and
•	 through this, the victim’s personal information
is directly transmitted to the scammer.
Hacking: exploiting vulnerabilities in
electronic systems or computer software
to steal personal data.

4

Identity Assurance Framework
4.0

How to prevent 
identity theft
Identity theft is more likely to occur if
you make it easy for someone to take and
use your identity information. There are
a number of things you can do to protect
your identity information:
•	 Be careful with your identity information, how
much you give out and who you share it with.
•	 If someone asks for your identity information,
ask why the organisation or individual needs it,
and what they intend to do with it.
•	 Do not write down PIN numbers or passwords.
Netsafe (www.netsafe.org.nz) provide tips
about managing passwords. Your bank
should be able to provide some information
about choosing and managing your Personal
Identification Numbers (PIN).
•	 Keep key documents that are used to establish
your identity (e.g. birth certificate and passport)
in a safe and secure place.

•	 If you use Internet banking, do not log on from
a shared or public computer, such as an Internet
café, to make any sensitive transactions.
•	 Remove all personal information from
computers before you dispose of them.
•	 Be suspicious of any unexpected events (e.g.
letters from creditors, bank transactions you can
not remember making) that could be the result
of identity crime.
•	 If you move, ensure all your mail forwarded to
your new address.
•	 If you believe you are the victim of an identity
crime, contact the Police.
•	 Keep an eye out for the igovt logo on
government websites. igovt is a secure
government logon service, which can be used
on multiple websites.

•	 Make sure you properly dispose (shred or burn)
of bank statements, electricity bills and any
piece of correspondence with your name and
address on it. These documents should never
be put in public or recycling bins. Consider
getting your statements provided online – it is
good for you and the environment too.
•	 Be cautious, identity crime does not always
result from information that is stolen; people
often give it away by publishing it in public
places (e.g. date of birth posted on a social
networking website).

identity theft checklist

5
5.0

What to do if you
are a victim
Lost or stolen documents
What has happened and
what could happen:

What you need to do:

Your Eftpos card, credit
card or cheque book have
been lost or stolen

It is important to contact your bank immediately if your cards
or cheque book are lost or stolen. If you fail to notify the bank
immediately, they may not be able to reimburse you for any losses
that may occur.

What could happen:
A thief could make fraudulent
transactions from your
accounts, and you could be
liable for the money.

You have lost your
New Zealand Passport or
believe it is being misused
What could happen:
A thief could apply for false
documents in your name,
travel on your Passport or sell
it to a criminal organisation.

Once reported lost, your cards are likely to be cancelled, and
reissued to you.
Contact: Your bank, Police
Further information: Scamwatch - Bank Details
Go to your nearest police station and report the passport as lost/
stolen, you should obtain a copy of the police report for applying
for a new passport. You also need to report this to your nearest
Department of Internal Affairs Office so that the Passport can be
cancelled (New Zealand, Sydney or London).
To apply for a new passport:
•	 Obtain a Passport application form (available online).
•	 Complete the declaration or loss or theft page.
•	 Post this application in with any required documents and
the appropriate fee.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Department of Internal Affairs, Police
Further information: Safe Travel and Passports

6

Identity Assurance Framework
Lost or stolen documents
What has happened and
what could happen:

What you need to do:

You suspect someone has
obtained a New Zealand
Passport in your name

Contact the Department of Internal Affairs with your details
and suspicions.

What could happen:
A thief could be using your
name to commit other
crimes, such as travelling
illegally or obtaining loans in
your name.

You have lost your nonNew Zealand Passport or
believe it is being misused
What could happen:
A thief could be using your
name to commit international
crime, to obtain false
documents or work illegally
in New Zealand.

If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Department of Internal Affairs, Police
Further information: Department of Internal Affairs - Passport
Contact Details

Go to your nearest police station and report the passport
as lost/stolen.  
You should then alert Immigration New Zealand if your passport
included a valid Immigration New Zealand visa.  You will most likely
need to include a copy of the police report when you apply for a new
passport either from your nearest diplomatic mission or passport
issuance location.
Contact: Police, your nearest diplomatic mission and Immigration
New Zealand
Further information: New Zealand Police Identity Theft Information

You suspect someone
has obtained a nonNew Zealand Passport
in your name

Contact the nearest embassy or Passport office for the country
concerned.  You will need to provide your personal and contact
details as well as details of your suspicions.

What could happen:

Further information: Scamwatch - Scams,

A thief could be using your
name to commit other crimes
such as travel illegally or
obtain loans in your name.

Ministry of Foreign Affairs and Trade – Diplomatic Missions in
New Zealand

Contact: Your nearest diplomatic mission

identity theft checklist

7
Lost or stolen documents
What has happened and
what could happen:

What you need to do:

Your New Zealand
Driver Licence has been
lost or stolen

Go to your nearest police station and report the licence as
lost/stolen.

What could happen:
A thief could be using your
licence to take out loans in
your name, to drive when
they are not entitled to
or to obtain other false
documentation.

You should replace your driver licence as soon as possible. The
issuing of a replacement licence will automatically cancel your
previous licence.
To replace your lost licence:
•	 Visit any New Zealand Transport Agency (NZTA) driver
licensing agent.
•	 Present evidence of your identity and address.
•	 Submit a completed application (form DL2).
•	 Pay the replacement licence fee.
Your replacement licence will have the same expiry date as your
previous licence. Alternatively, you can apply to renew your licence
for up to 10 years.
If you can not get to a driver licensing agent to replace (or renew)
your driver licence, you should contact NZTA to have your driver
licence card cancelled.
Contact the NZTA:
Email: info@nzta.govt.nz
Phone: 0800 822 422
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: NZTA, Police
Further information: NZTA Stolen/Lost Licences

8

Identity Assurance Framework
Lost or stolen documents
What has happened and
what could happen:

What you need to do:

You suspect someone
has obtained a
New Zealand driver
licence in your name

Contact the NZTA:

What could happen:

Email: info@nzta.govt.nz
Phone: 0800 822 422
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.

A thief could be using your
licence to take out loans in
your name, to drive when
they are not entitled to
or to obtain other false
documentation.

Contact: NZTA, Police

You think your
New Zealand Immigration
visa or permit is being
misused

Contact Immigration New Zealand with your personal and contact
details and suspicions.

What could happen:

Contact: Immigration New Zealand, Police

Someone who is not
entitled to be in New Zealand
could be obtaining benefits
in your name.

Further information: Immigration New Zealand

You suspect someone
has used your details to
commit immigration fraud

Contact Immigration New Zealand with your personal and contact
details and suspicions. You may be referred to report the suspicions
to the Police.

What could happen:

Contact: Immigration New Zealand, Police

Someone could be using
your details to avoid
deportation or gain a different
tier of residency. This may
impact on your ability to live
in New Zealand.

Further information: NZTA Contact Us

If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.

Further information: Immigration New Zealand - Complaints Process

identity theft checklist

9
Lost or stolen documents
What has happened and
what could happen:

What you need to do:

You have lost your
Citizenship Certificate or
believe it is being misused

You should contact the New Zealand Citizenship office to report the
loss and receive confirmation of your citizenship.

What could happen:

•	 Complete the relevant form, available on the Citizenship website.

A thief could be using your
name to commit international
crime, to obtain false
documents or work illegally
in New Zealand.

•	 Include the appropriate fee.

To receive confirmation of your citizenship you will need to:

•	 Post your application to Citizenship.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Police, Department of Internal Affairs
Further information: Department of Internal Affairs Confirmation of New Zealand Citizenship

You suspect someone has
obtained New Zealand
Citizenship in your name
What could happen:
Someone could use your
details to gain New Zealand
Citizenship and a
New Zealand passport.
With this they can obtain
loans, licences etc and
steal your identity.

10

Identity Assurance Framework

Contact the Department of Internal Affairs with your details
and suspicions.
If you have evidence of your identity being fraudulently used
by another person, you should report this to the Police.
Contact: Police, Department of Internal Affairs
Further information: Department of Internal Affairs Citizenship information
Stolen or misdirected mail
What has happened and
what could happen:

What you need to do:

You have not received
mail that you expected
to receive

Follow up with the person or organisation that should have sent the
item to ensure that mail is still being sent and the address details
are up to date. You can also contact New Zealand Post to ensure that
there is not a hold or redirection in place for your mail.

What could happen:
Someone could be
intercepting your mail
to obtain credit cards or
other documents that they
have fraudulently applied
for in your name. They
could also be trying to collate
data in order to commit
identity fraud.

An identity thief has
falsified change of address
forms, stolen your mail or
committed another type
of mail fraud to get your
personal information

Contact: Your account provider, New Zealand Post
Further information: Neighbourhood Support Identity
Theft Information

Contact your account providers and New Zealand Post to update
your contact details.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Police, Your account provider, New Zealand Post
Further information: New Zealand Police Identity Theft Information

What could happen:
You could be sent fines,
incur debts or lose money
because someone is
impersonating you.

identity theft checklist

11
Suspicious mail or phone calls
What has happened and
what could happen:

What you need to do:

You have received mail for
a bank account you did not
open or credit card you did
not request

Keep all of the mail, and contact the applicable bank about the
account or credit card.

What could happen:

Contact: Your bank, Police

An identity thief may have
applied for a number of credit
cards in your name.

Further information: New Zealand Bankers’ Association

A finance company
contacts you trying to
collect on a loan you did
not take out

Contact the finance company with all of the information to put a
hold on the account.

What could happen:

Contact: The finance company

A thief may have applied for
loans in your name, which
you may be liable for.

Further information: Scamwatch - Bank Details

You receive a fine in the
mail or notification of court
proceedings that you know
nothing about

Go to your nearest court and report the issue. Take proof of your
own identity, and any information that you have to prove that you
were not involved in the crime.

What could happen:

Further information: Ministry of Justice - Common Questions

An identity thief may have
used your name to avoid
prosecution under their
own identity.

12

Identity Assurance Framework

If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.

If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.

Contact: Ministry of Justice
Suspicious mail or phone calls
What has happened and
what could happen:

What you need to do:

You receive a phone call
from your bank asking
for your internet banking
details or PIN number

Your bank will never ask you to disclose your PIN number or give out
your internet banking details password to a person.

What could happen:
An identity thief may be
trying to steal your savings
and investments.

You should never respond to an unprompted request for these
details. Note down as much as you can about the call, without
disclosing your details and let your bank know about the scam.
Contact: Your bank
Further information: Scamwatch – Bank Details

identity theft checklist

13
Strange transactions or other concerns
What has happened and
what could happen:

What you need to do:

You find that any of your
bank accounts have been
tampered with

Contact your bank straight away and discuss specifically the
transactions that appear to be fraudulent.

What could happen:
An identity thief may
be trying to gain access
to your finances.

If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: your bank, Police
Further information: Scamwatch - Bank Details

You think an identity
thief has interfered with
your investments or
brokerage account

Contact your investment provider straight away and discuss the
specific transactions that appear to be fraudulent.

What could happen:

Contact: your investment provider, Police

An identity thief may
be trying to gain access to
your finances.

Further information: Scamwatch - Bank Details

You are being billed for an
account you did not open

Contact the bank or utility company straight away and discuss
specifically the account in dispute.

What could happen:

If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.

An identity thief may be using
your identity to take out
money and loans which they
intend to default on.

You believe someone
has filed for bankruptcy
in your name
What could happen:
An identity thief may have
filed for bankruptcy in your
name to hide financial
offending against you.

14

Identity Assurance Framework

If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.

Contact: bank or utility company, Police
Further information: New Zealand Bankers’ Association Identity
Fraud Information
You can contact the Insolvency and Trustee Service for assistance on
finding out if someone has filed in your name. The service will also
be able to help you work with the Ministry of Justice to clear the
legal proceedings against you.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Insolvency and Trustee Service (Ministry of Economic
Development), Ministry of Justice, Police
Further information: Insolvency and Trustee Service
Strange transactions or other concerns
What has happened and
what could happen:

What you need to do:

You find that a utility
account has been
tampered with

Contact your utility company with the details that have been
changed, or the account that has been incorrectly charged. Any
evidence you have to support your claim may be helpful.  

What could happen:

If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.

An identity thief may be
trying to bill you for their
account, or steal your mail for
use as proof of identity.

You find enquiries on
your credit report that you
did not know about
What could happen:
An identity thief may have
applied for loans or bank
accounts in your name.

Contact: Your utility company, Police
Further information: Neighbourhood Support Identity Theft
Information
Discuss the enquiries with your bank as you are likely to discover
the enquiries when taking out a loan. You can also contact New
Zealand’s two credit agencies, Veda Advantage or Dun & Bradstreet,
to query your credit report and get more information. You may need
to follow up with the enquirer to determine if a loan or account has
been issued in your name.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Your bank, Veda Advantage or Dun & Bradstreet, Police
Further information: Veda Advantage - Identity Theft,
Dun & Bradstreet

You find inaccurate
information on your
credit report
What could happen:
An identity thief may have
applied for loans or bank
accounts in your name.

Discuss the inaccuracies with your bank as you are likely to discover
these when taking out a loan. You can also contact New Zealand’s
two credit agencies, Veda Advantage or Dun & Bradstreet to query
your credit report and get more information. You may need to follow
up with the enquirer to determine if a loan or account has been
issued in your name.
If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Your bank, Veda Advantage or Dun & Bradstreet, Police
Further information: Veda Advantage - Updating Your Details,
Dun & Bradstreet

identity theft checklist

15
Strange transactions or other concerns
What has happened and
what could happen:

What you need to do:

You have reason to
believe your IRD number
has been misused

You can contact Inland Revenue to determine if there is tax, income,
or due payments against your number that you can not account for.
Inland Revenue should be able to assist in determining where these
payments are being made from (the source is on your tax record).

What could happen:
An identity thief may be using
your identity as they do not
have the right to work in
New Zealand, to obtain a
benefit or tax credit, to avoid
paying tax or to interact with
another government agency.

If you have evidence of your identity being fraudulently used by
another person, you should report this to the Police.
Contact: Inland Revenue, Police
Further information: Inland Revenue Complaints Service

You become aware that
someone is wrongfully
using your identity to
commit a crime, what
should you do?

Go to your nearest police station and report the issue. Take proof
of your own identity, and any information that you have to prove
that you are not involved in the crime.

What could happen:

Note: Prior to a conviction the Police are the point of contact;
however after receiving a conviction the Ministry of Justice will
be the first point of contact.

A thief may be using your
name to the Police and may
incur fines and criminal
charges in your name, which
may leave you in breach of
the court if you do not clear
your name.

16

Identity Assurance Framework

Contact: Police
Further information: New Zealand Police Identity Theft Information
For any identity theft situation you may also wish
to report the incident to the Police, if not already
contacted, as someone may be using your identity
in multiple places that you are unaware of.
If you feel that you privacy has been breached,
contact the agency concerned in the first instance.
If you are not satisfied with their response you can
contact the Privacy Commissioner’s enquiries line:
Phone: 0800 803 909
Email: enquiries@privacy.org.nz
For more information: www.privacy.org.nz

identity theft checklist

17
The Identity Theft Checklist – Guidance for the general public.nz

Weitere ähnliche Inhalte

Was ist angesagt?

Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Data theft
Data theftData theft
Data theftLaura
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Id Theft
Id TheftId Theft
Id Theftmojo_5
 
All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity TheftJlove Minguez
 

Was ist angesagt? (20)

Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Data theft
Data theftData theft
Data theft
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Id Theft
Id TheftId Theft
Id Theft
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity Theft
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 

Andere mochten auch

Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
The Fleecing of Foster Children
The Fleecing of Foster Children The Fleecing of Foster Children
The Fleecing of Foster Children - Mark - Fullbright
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013- Mark - Fullbright
 
Business Marketing Your Mobile app
Business Marketing Your Mobile appBusiness Marketing Your Mobile app
Business Marketing Your Mobile app- Mark - Fullbright
 
Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012- Mark - Fullbright
 
Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data SecurityFourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security- Mark - Fullbright
 

Andere mochten auch (6)

Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
The Fleecing of Foster Children
The Fleecing of Foster Children The Fleecing of Foster Children
The Fleecing of Foster Children
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
 
Business Marketing Your Mobile app
Business Marketing Your Mobile appBusiness Marketing Your Mobile app
Business Marketing Your Mobile app
 
Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012
 
Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data SecurityFourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security
 

Ähnlich wie The Identity Theft Checklist – Guidance for the general public.nz

12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.PdfSanea
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 

Ähnlich wie The Identity Theft Checklist – Guidance for the general public.nz (14)

12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Identity Theft Toolkit
Identity Theft ToolkitIdentity Theft Toolkit
Identity Theft Toolkit
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 

Mehr von - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Kürzlich hochgeladen

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

The Identity Theft Checklist – Guidance for the general public.nz

  • 1. Identity Theft Checklist Guidance for the general public Identity Assurance Framework
  • 2.
  • 3. Contents 1.0 Introduction............................................................................................................................................................... 2 2.0 Case studies............................................................................................................................................................... 3 3.0 Methods for committing identity theft........................................................................................................ 4 Traditional ways to access personal information for identity theft........................................4 Online methods for stealing personal information................................................................4 4.0 How to prevent identity theft........................................................................................................................... 5 5.0 What to do if you are a victim. ......................................................................................................................... 6 Lost or stolen documents.......................................................................................................6 Stolen or misdirected mail...................................................................................................11 Suspicious mail or phone calls.............................................................................................12 Strange transactions or other concerns...............................................................................14
  • 4. 1.0 Introduction What is your identity? Who are you? Your identity is made up of facts about yourself. This can include your name, lifeevent information like your date and place of birth, physiological attributes (e.g. your height and eye colour), and unique information used by a specific agency or organisation (e.g. customer number, passport number). Identity information is all the facts you have given to government agencies, and organisations, as well as the information you create about yourself (e.g. information shared on social networking websites). It is fact-based information that may or may not change over time. Identity information is often something we take for granted but is the information that enables us to do many day-to-day activities. Without identity information, you would not be able to open a bank account or get a driver licence or a passport. Identity theft occurs when someone uses your identity information. Often, it is not until someone causes damage to your identity that you become aware that the theft has occurred. With your identity information, a fraudster can commit a number of different crimes including taking out loans or accumulating speeding tickets in your name. Identity theft can damage your personal and financial reputation. 2 Identity Assurance Framework To help combat identity crime, the Government is improving systems and processes that involve identity data. Agencies will also intervene in cases of identity theft when they have the legal power to so. Identity theft can seem minor, such as borrowing someone’s ID to gain access to services you may not be otherwise entitled to (e.g. the purchase of alcohol at licensed and unlicensed premises), but it can escalate into more serious crimes (e.g. gaining access to money from financial institutions). There are serious consequences for committing identity crime. Individuals found guilty of fraud in New Zealand face large fines, and may find themselves behind bars. Agencies are actively working to help you protect your identity, but you need to do your part. The Government’s current focus is on prevention of identity crime by raising people’s awareness of the issue and providing advice about how to reduce the chance of becoming a victim. This document includes information on what you can do to protect yourself from identity theft, and also information on what to do should it happen to you. There are also some real-life examples of how identity theft has affected individuals.
  • 5. 2.0 Case studies While she was away Convicted of someone else’s crime Jane Campbell* is changing her name to escape her identity theft problems. After a brief holiday in 2007, she had no mail waiting for her on her return. Thinking there was a problem with a post office redirection, she ignored it. But four weeks later, $31,000 had disappeared from her account after fraudsters stole her mail and created fake IDs using her full name and date of birth. In 2009, fraudsters struck again. It is unknown if it was the same set of fraudsters, or if her details had been sold on. In 2008, 18-year-old John Smith* appeared in the Gore District Court and was convicted of drink driving. However, the real John Smith was actually living in Papakura at the time, and was not in Gore when the offence occurred. The real John Smith was left to deal with Police, get affidavits to prove that he was in Auckland at the time of the offence and could not have committed the crime. As traffic offences do not always result in an arrest, fingerprinting did not take place, so proving identity was more difficult. What could be done to stop it? How did this happen? An alert can be placed on your credit file; if someone tries to take out a loan in your name, the bank will receive the alert when they do a credit check. The real John Smith suspects that he shared his full name and date of birth with an individual he had met on a trip to Southland, and they used his details. * Name was changed for privacy reasons. identity theft checklist 3
  • 6. 3.0 Methods for committing identity theft Traditional ways to access personal information for identity theft Online methods for stealing personal information Dumpster diving: fraudsters go through bins to collect ‘trash’ or discarded items to obtain copies of individuals’ cheques, credit card or bank statements, or other records that contain their personal information. Malware: a software code or programme inserted into an information system in order to cause harm to that system, or to other systems or to subvert them for use other than that intended by their own users. Viruses, worms, trojan horses, backdoors, keystroke loggers, screen scrapers, rootkits, and spyware are all different kinds of malware. Pretexting: criminals contact a financial institution or telephone company, impersonating a legitimate customer, and request account information. In other cases, the pretext is accomplished by an insider at the financial institution, or by fraudulently opening an online account in a customer’s name. Shoulder surfing: looking over someone’s shoulder or from a nearby location as the victim enters a PIN at an ATM or EFTPOS machine, or enters a password online. Skimming: capturing personal data from the magnetic stripes on the back of credit or debit cards. The data is transmitted to another location where it is re-encoded onto fraudulent credit cards. Business record theft: someone steals data from a business or bribes insiders to obtain the information from the business or organisation. Spam: unsolicited, unwanted or harmful electronic messages are increasingly being used as a method for delivering malware and criminal phishing scams. Phishing: obtaining unsuspecting Internet users’ personal identifying information through emails and mirror-websites that look like legitimate businesses, such as financial institutions or government agencies. Typically, a phishing attack is composed of the following steps: • the phisher sends its potential victim an email that appears to be from an existing company. The email uses the colours, graphics, logos and wording of the company; • the potential victim reads the email and provides the phisher with personal information by either responding to the email or clicking on a link and providing the information via a form on a website that appears to be from the company; and • through this, the victim’s personal information is directly transmitted to the scammer. Hacking: exploiting vulnerabilities in electronic systems or computer software to steal personal data. 4 Identity Assurance Framework
  • 7. 4.0 How to prevent identity theft Identity theft is more likely to occur if you make it easy for someone to take and use your identity information. There are a number of things you can do to protect your identity information: • Be careful with your identity information, how much you give out and who you share it with. • If someone asks for your identity information, ask why the organisation or individual needs it, and what they intend to do with it. • Do not write down PIN numbers or passwords. Netsafe (www.netsafe.org.nz) provide tips about managing passwords. Your bank should be able to provide some information about choosing and managing your Personal Identification Numbers (PIN). • Keep key documents that are used to establish your identity (e.g. birth certificate and passport) in a safe and secure place. • If you use Internet banking, do not log on from a shared or public computer, such as an Internet café, to make any sensitive transactions. • Remove all personal information from computers before you dispose of them. • Be suspicious of any unexpected events (e.g. letters from creditors, bank transactions you can not remember making) that could be the result of identity crime. • If you move, ensure all your mail forwarded to your new address. • If you believe you are the victim of an identity crime, contact the Police. • Keep an eye out for the igovt logo on government websites. igovt is a secure government logon service, which can be used on multiple websites. • Make sure you properly dispose (shred or burn) of bank statements, electricity bills and any piece of correspondence with your name and address on it. These documents should never be put in public or recycling bins. Consider getting your statements provided online – it is good for you and the environment too. • Be cautious, identity crime does not always result from information that is stolen; people often give it away by publishing it in public places (e.g. date of birth posted on a social networking website). identity theft checklist 5
  • 8. 5.0 What to do if you are a victim Lost or stolen documents What has happened and what could happen: What you need to do: Your Eftpos card, credit card or cheque book have been lost or stolen It is important to contact your bank immediately if your cards or cheque book are lost or stolen. If you fail to notify the bank immediately, they may not be able to reimburse you for any losses that may occur. What could happen: A thief could make fraudulent transactions from your accounts, and you could be liable for the money. You have lost your New Zealand Passport or believe it is being misused What could happen: A thief could apply for false documents in your name, travel on your Passport or sell it to a criminal organisation. Once reported lost, your cards are likely to be cancelled, and reissued to you. Contact: Your bank, Police Further information: Scamwatch - Bank Details Go to your nearest police station and report the passport as lost/ stolen, you should obtain a copy of the police report for applying for a new passport. You also need to report this to your nearest Department of Internal Affairs Office so that the Passport can be cancelled (New Zealand, Sydney or London). To apply for a new passport: • Obtain a Passport application form (available online). • Complete the declaration or loss or theft page. • Post this application in with any required documents and the appropriate fee. If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: Department of Internal Affairs, Police Further information: Safe Travel and Passports 6 Identity Assurance Framework
  • 9. Lost or stolen documents What has happened and what could happen: What you need to do: You suspect someone has obtained a New Zealand Passport in your name Contact the Department of Internal Affairs with your details and suspicions. What could happen: A thief could be using your name to commit other crimes, such as travelling illegally or obtaining loans in your name. You have lost your nonNew Zealand Passport or believe it is being misused What could happen: A thief could be using your name to commit international crime, to obtain false documents or work illegally in New Zealand. If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: Department of Internal Affairs, Police Further information: Department of Internal Affairs - Passport Contact Details Go to your nearest police station and report the passport as lost/stolen. You should then alert Immigration New Zealand if your passport included a valid Immigration New Zealand visa. You will most likely need to include a copy of the police report when you apply for a new passport either from your nearest diplomatic mission or passport issuance location. Contact: Police, your nearest diplomatic mission and Immigration New Zealand Further information: New Zealand Police Identity Theft Information You suspect someone has obtained a nonNew Zealand Passport in your name Contact the nearest embassy or Passport office for the country concerned. You will need to provide your personal and contact details as well as details of your suspicions. What could happen: Further information: Scamwatch - Scams, A thief could be using your name to commit other crimes such as travel illegally or obtain loans in your name. Ministry of Foreign Affairs and Trade – Diplomatic Missions in New Zealand Contact: Your nearest diplomatic mission identity theft checklist 7
  • 10. Lost or stolen documents What has happened and what could happen: What you need to do: Your New Zealand Driver Licence has been lost or stolen Go to your nearest police station and report the licence as lost/stolen. What could happen: A thief could be using your licence to take out loans in your name, to drive when they are not entitled to or to obtain other false documentation. You should replace your driver licence as soon as possible. The issuing of a replacement licence will automatically cancel your previous licence. To replace your lost licence: • Visit any New Zealand Transport Agency (NZTA) driver licensing agent. • Present evidence of your identity and address. • Submit a completed application (form DL2). • Pay the replacement licence fee. Your replacement licence will have the same expiry date as your previous licence. Alternatively, you can apply to renew your licence for up to 10 years. If you can not get to a driver licensing agent to replace (or renew) your driver licence, you should contact NZTA to have your driver licence card cancelled. Contact the NZTA: Email: info@nzta.govt.nz Phone: 0800 822 422 If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: NZTA, Police Further information: NZTA Stolen/Lost Licences 8 Identity Assurance Framework
  • 11. Lost or stolen documents What has happened and what could happen: What you need to do: You suspect someone has obtained a New Zealand driver licence in your name Contact the NZTA: What could happen: Email: info@nzta.govt.nz Phone: 0800 822 422 If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. A thief could be using your licence to take out loans in your name, to drive when they are not entitled to or to obtain other false documentation. Contact: NZTA, Police You think your New Zealand Immigration visa or permit is being misused Contact Immigration New Zealand with your personal and contact details and suspicions. What could happen: Contact: Immigration New Zealand, Police Someone who is not entitled to be in New Zealand could be obtaining benefits in your name. Further information: Immigration New Zealand You suspect someone has used your details to commit immigration fraud Contact Immigration New Zealand with your personal and contact details and suspicions. You may be referred to report the suspicions to the Police. What could happen: Contact: Immigration New Zealand, Police Someone could be using your details to avoid deportation or gain a different tier of residency. This may impact on your ability to live in New Zealand. Further information: NZTA Contact Us If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Further information: Immigration New Zealand - Complaints Process identity theft checklist 9
  • 12. Lost or stolen documents What has happened and what could happen: What you need to do: You have lost your Citizenship Certificate or believe it is being misused You should contact the New Zealand Citizenship office to report the loss and receive confirmation of your citizenship. What could happen: • Complete the relevant form, available on the Citizenship website. A thief could be using your name to commit international crime, to obtain false documents or work illegally in New Zealand. • Include the appropriate fee. To receive confirmation of your citizenship you will need to: • Post your application to Citizenship. If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: Police, Department of Internal Affairs Further information: Department of Internal Affairs Confirmation of New Zealand Citizenship You suspect someone has obtained New Zealand Citizenship in your name What could happen: Someone could use your details to gain New Zealand Citizenship and a New Zealand passport. With this they can obtain loans, licences etc and steal your identity. 10 Identity Assurance Framework Contact the Department of Internal Affairs with your details and suspicions. If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: Police, Department of Internal Affairs Further information: Department of Internal Affairs Citizenship information
  • 13. Stolen or misdirected mail What has happened and what could happen: What you need to do: You have not received mail that you expected to receive Follow up with the person or organisation that should have sent the item to ensure that mail is still being sent and the address details are up to date. You can also contact New Zealand Post to ensure that there is not a hold or redirection in place for your mail. What could happen: Someone could be intercepting your mail to obtain credit cards or other documents that they have fraudulently applied for in your name. They could also be trying to collate data in order to commit identity fraud. An identity thief has falsified change of address forms, stolen your mail or committed another type of mail fraud to get your personal information Contact: Your account provider, New Zealand Post Further information: Neighbourhood Support Identity Theft Information Contact your account providers and New Zealand Post to update your contact details. If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: Police, Your account provider, New Zealand Post Further information: New Zealand Police Identity Theft Information What could happen: You could be sent fines, incur debts or lose money because someone is impersonating you. identity theft checklist 11
  • 14. Suspicious mail or phone calls What has happened and what could happen: What you need to do: You have received mail for a bank account you did not open or credit card you did not request Keep all of the mail, and contact the applicable bank about the account or credit card. What could happen: Contact: Your bank, Police An identity thief may have applied for a number of credit cards in your name. Further information: New Zealand Bankers’ Association A finance company contacts you trying to collect on a loan you did not take out Contact the finance company with all of the information to put a hold on the account. What could happen: Contact: The finance company A thief may have applied for loans in your name, which you may be liable for. Further information: Scamwatch - Bank Details You receive a fine in the mail or notification of court proceedings that you know nothing about Go to your nearest court and report the issue. Take proof of your own identity, and any information that you have to prove that you were not involved in the crime. What could happen: Further information: Ministry of Justice - Common Questions An identity thief may have used your name to avoid prosecution under their own identity. 12 Identity Assurance Framework If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: Ministry of Justice
  • 15. Suspicious mail or phone calls What has happened and what could happen: What you need to do: You receive a phone call from your bank asking for your internet banking details or PIN number Your bank will never ask you to disclose your PIN number or give out your internet banking details password to a person. What could happen: An identity thief may be trying to steal your savings and investments. You should never respond to an unprompted request for these details. Note down as much as you can about the call, without disclosing your details and let your bank know about the scam. Contact: Your bank Further information: Scamwatch – Bank Details identity theft checklist 13
  • 16. Strange transactions or other concerns What has happened and what could happen: What you need to do: You find that any of your bank accounts have been tampered with Contact your bank straight away and discuss specifically the transactions that appear to be fraudulent. What could happen: An identity thief may be trying to gain access to your finances. If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: your bank, Police Further information: Scamwatch - Bank Details You think an identity thief has interfered with your investments or brokerage account Contact your investment provider straight away and discuss the specific transactions that appear to be fraudulent. What could happen: Contact: your investment provider, Police An identity thief may be trying to gain access to your finances. Further information: Scamwatch - Bank Details You are being billed for an account you did not open Contact the bank or utility company straight away and discuss specifically the account in dispute. What could happen: If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. An identity thief may be using your identity to take out money and loans which they intend to default on. You believe someone has filed for bankruptcy in your name What could happen: An identity thief may have filed for bankruptcy in your name to hide financial offending against you. 14 Identity Assurance Framework If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: bank or utility company, Police Further information: New Zealand Bankers’ Association Identity Fraud Information You can contact the Insolvency and Trustee Service for assistance on finding out if someone has filed in your name. The service will also be able to help you work with the Ministry of Justice to clear the legal proceedings against you. If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: Insolvency and Trustee Service (Ministry of Economic Development), Ministry of Justice, Police Further information: Insolvency and Trustee Service
  • 17. Strange transactions or other concerns What has happened and what could happen: What you need to do: You find that a utility account has been tampered with Contact your utility company with the details that have been changed, or the account that has been incorrectly charged. Any evidence you have to support your claim may be helpful. What could happen: If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. An identity thief may be trying to bill you for their account, or steal your mail for use as proof of identity. You find enquiries on your credit report that you did not know about What could happen: An identity thief may have applied for loans or bank accounts in your name. Contact: Your utility company, Police Further information: Neighbourhood Support Identity Theft Information Discuss the enquiries with your bank as you are likely to discover the enquiries when taking out a loan. You can also contact New Zealand’s two credit agencies, Veda Advantage or Dun & Bradstreet, to query your credit report and get more information. You may need to follow up with the enquirer to determine if a loan or account has been issued in your name. If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: Your bank, Veda Advantage or Dun & Bradstreet, Police Further information: Veda Advantage - Identity Theft, Dun & Bradstreet You find inaccurate information on your credit report What could happen: An identity thief may have applied for loans or bank accounts in your name. Discuss the inaccuracies with your bank as you are likely to discover these when taking out a loan. You can also contact New Zealand’s two credit agencies, Veda Advantage or Dun & Bradstreet to query your credit report and get more information. You may need to follow up with the enquirer to determine if a loan or account has been issued in your name. If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: Your bank, Veda Advantage or Dun & Bradstreet, Police Further information: Veda Advantage - Updating Your Details, Dun & Bradstreet identity theft checklist 15
  • 18. Strange transactions or other concerns What has happened and what could happen: What you need to do: You have reason to believe your IRD number has been misused You can contact Inland Revenue to determine if there is tax, income, or due payments against your number that you can not account for. Inland Revenue should be able to assist in determining where these payments are being made from (the source is on your tax record). What could happen: An identity thief may be using your identity as they do not have the right to work in New Zealand, to obtain a benefit or tax credit, to avoid paying tax or to interact with another government agency. If you have evidence of your identity being fraudulently used by another person, you should report this to the Police. Contact: Inland Revenue, Police Further information: Inland Revenue Complaints Service You become aware that someone is wrongfully using your identity to commit a crime, what should you do? Go to your nearest police station and report the issue. Take proof of your own identity, and any information that you have to prove that you are not involved in the crime. What could happen: Note: Prior to a conviction the Police are the point of contact; however after receiving a conviction the Ministry of Justice will be the first point of contact. A thief may be using your name to the Police and may incur fines and criminal charges in your name, which may leave you in breach of the court if you do not clear your name. 16 Identity Assurance Framework Contact: Police Further information: New Zealand Police Identity Theft Information
  • 19. For any identity theft situation you may also wish to report the incident to the Police, if not already contacted, as someone may be using your identity in multiple places that you are unaware of. If you feel that you privacy has been breached, contact the agency concerned in the first instance. If you are not satisfied with their response you can contact the Privacy Commissioner’s enquiries line: Phone: 0800 803 909 Email: enquiries@privacy.org.nz For more information: www.privacy.org.nz identity theft checklist 17