SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Indentify Theft Protecting Your Greatest Asset
What Is ID Theft? ,[object Object]
What is ID Theft? ,[object Object],[object Object],[object Object]
[object Object]
[object Object]
[object Object]
[object Object],[object Object]
[object Object]
Five Areas of Identity Theft ,[object Object],[object Object],[object Object],[object Object],[object Object]
Financial Identity Fraud ,[object Object]
Medical Identity Fraud ,[object Object]
TERMS you should know: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Three Major Credit Reporting Agencies  ,[object Object],[object Object],[object Object]
Are You At Risk? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
We Can Help! ,[object Object]
Who is Kroll? ,[object Object]
Call Robin Gray 224-588-7850 For protection starting today!

Weitere ähnliche Inhalte

Was ist angesagt?

Your digital identity
Your digital identityYour digital identity
Your digital identityTC Techies
 
Data theft
Data theftData theft
Data theftLaura
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97alessio d
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRAKrishnakant Mishra
 

Was ist angesagt? (20)

Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Digital Identity
Digital Identity Digital Identity
Digital Identity
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Your digital identity
Your digital identityYour digital identity
Your digital identity
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
Data theft
Data theftData theft
Data theft
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 

Andere mochten auch

Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and IntegrityZaid Shabbir
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 

Andere mochten auch (7)

Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Software Security
Software SecuritySoftware Security
Software Security
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
System security
System securitySystem security
System security
 

Ähnlich wie Indentify Theft Slide Show

Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect youIdentity Theft Protection
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition- Mark - Fullbright
 
Privacy in the Medical FieldIDS CAPSTONE PROJECT PART 2By L.docx
Privacy in the Medical FieldIDS CAPSTONE PROJECT PART 2By L.docxPrivacy in the Medical FieldIDS CAPSTONE PROJECT PART 2By L.docx
Privacy in the Medical FieldIDS CAPSTONE PROJECT PART 2By L.docxstilliegeorgiana
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Identity theft- Horowitz Law
Identity theft- Horowitz LawIdentity theft- Horowitz Law
Identity theft- Horowitz LawSanford Horowitz
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 

Ähnlich wie Indentify Theft Slide Show (20)

ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft - If you are me, then who am I
Identity Theft - If you are me, then who am IIdentity Theft - If you are me, then who am I
Identity Theft - If you are me, then who am I
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
 
Privacy in the Medical FieldIDS CAPSTONE PROJECT PART 2By L.docx
Privacy in the Medical FieldIDS CAPSTONE PROJECT PART 2By L.docxPrivacy in the Medical FieldIDS CAPSTONE PROJECT PART 2By L.docx
Privacy in the Medical FieldIDS CAPSTONE PROJECT PART 2By L.docx
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity theft- Horowitz Law
Identity theft- Horowitz LawIdentity theft- Horowitz Law
Identity theft- Horowitz Law
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 

Indentify Theft Slide Show

Hinweis der Redaktion

  1. Social Security Identity – employment, government and documents fraud Financial – credit card, bank and loan
  2. Companies you already have an existing relationship with (example: a credit card, loan or utility service) may view your reports but only to review your credit-worthiness. Placing a freeze is a strong step to take and will affect your ability to get instant credit since it can take up to 3 days to thaw a report. However, it also locks out thieves, and that is the purpose. In those states with freezes, most laws state that victims with a police report get this service FTC – Government agency that oversees ID Theft. However, it is not widely enforced and not 100% reliable. ITRC has found fraud alerts to be about 65-70% effective. for free. Some states also allow the consumer to buy a freeze. You may thaw your freeze anytime you wish to apply for credit but you will need to plan ahead. See Fact Sheet 124 for more information or our State & Local Resources to see if your state has a freeze program.
  3. Equifax is the only agency that is tied into the US postal Inspector office
  4. SSN - Your social security number is the pot of gold for your identity thief. You make it easy for him by: Carrying your SSN in your wallet/purse. Writing it on checks. Writing it on forms just because the blank line is there. Letting your university or workplace use it as an ID. Your thief loves your mail and you provide easy access for him. You have an unlockable mailbox and raise the red flag to let your thief know you're ready to share. You don't notice when there is unusual break in mail service. You mail your sensitive information in your local mailbox instead of taking it to the post office. You forget to submit a change of address when you move. You still receive pre-approved credit card offers because you have not opted out at 1-888-5OPTOUT or www.optoutprescreen.com . Many times the identity thief knows their victims and has easy access to sensitive data. Visitors to your home are likely to see sensitive mail, forms, etc laying out in open view. You keep your tax returns and financial spreadsheets on your computer without password protection. You leave pay stubs and other interesting information in the front seat of your car. You don't own a cross-cut shredder. You put sensitive data in your garbage. Monitoring your credit report is your best opportunity to detect identity theft. You don't order your free annual credit reports. You don't thoroughly review all credit report entries. You don't try to correct false entries and convince yourself that it's probably just a typo. Many people use their credit cards for daily purchases. Thieves may charge small amounts hoping you don't notice. You don't verify every entry on your credit card and bank statements. You don't realize when your statement doesn't arrive on time. Public computers are convenient, but it's no place to enter sensitive information. You don't know who uses the computer before or after you. Who's watching your entries? You check your bank account balance. You logon to web sites and enter your passwords. You leave the auto-complete feature enabled so the next person has a possibility of reviewing your entries. You accept the "save my information for next time" prompts.