SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Child Identity Theft Education Kit
Who’s at Risk?
Consider a teenager who is about to start college. She has
deposited money into a savings account and is ready to move
it into a checking account. Much to her surprise, she is denied
a credit card from her bank as well as a checking account. She
is told that her credit score is too low to get a credit card because
she had failed to pay off the other two credit cards she has.
However, she had never applied for a credit card. She had just
turned 18.
Another individual is wanted for forgery as well as failure to pay
child support for two children, has a suspended driving license,
and has two misdemeanor charges for fighting – but he is only
10 years old. His parents’ IRS tax statement states they cannot
claim their son as a dependent due to his full-time employment.
After working hard in college, a young man is ready to start
his career as a computer security specialist. However, he can’t
find his Social Security card so he applies for a replacement
card. He then learns that someone is not only using his Social
Security number for employment, but is also collecting unemployment in another state. After checking his credit reports, the
young man finds this person also has a car loan as well as a
credit card in good standing.

The three hypothetical examples above illustrate various types of child identity theft. Simply put, this
crime occurs when an individual uses the identifying information of a child for personal gain. That
information can include Social Security numbers, mother’s maiden name, date of birth, location of
birth, and even just the name and address of the child.

2 of 7
Child identity theft can be discovered when
children are still young or after they reach 18
years old (or are emancipated) and start to use
their own information and build a credit history.

In the case of young children, the parents are usually the first to realize there might be a problem.
They might receive calls from collection agencies, get a rejected federal or state tax form, or receive
pre-approved credit card offers directed to their child. Their teen may be denied the right to a driver’s
license due to accumulated tickets or even receive notice of a valid driver’s license in their state or
another state.
Almost all adult-child identity theft victims find out in a negative manner. They are denied credit,
loans, tenancy, and even a job. They aren’t able to sign up for utilities like cable or phone service,
are terminated from employment without cause, receive bills for credit cards they never requested
or received, and may even be arrested for the crimes of another person.

Who Typically Steals a Child’s Identity?
Currently there are two categories of people who are stealing and using
children’s identifying information.
•	 Unknown perpetrator: These thieves have either stolen or purchased
the Social Security number and sometimes other identifying information of a child. Some people create Social Security numbers that just
happen to belong to a child.
•	 Family members: A reality of child identity theft is the fact that parents or family members of a child have been found to use the child’s
identifying information, often in times of desperation. Be it job loss or
mounting debt, they are compelled to take advantage of their child’s
“clean” credit history. They may open new lines of credit using the
child’s SSN to help pay off bills, and perhaps have never learned to
live within their means and are unable to pay off current credit cards.

3 of 7
How Do Imposters Use Stolen Information
The primary use of stolen identifying information is for financial purposes. It can also be used for
many other purposes. Here are some examples of both:
•	 Open a bank account or checking account
•	 Apply for credit/debit cards and loans, including tuition/student and car loans
•	 Apply for utilities, such as cellular phone, cable and Internet services
•	 Rent an apartment
•	 Get a job
•	 Use the child’s SSN as the family SSN due to the inability of a parent to get a SSN
•	 Avoid a criminal record on the perpetrator’s file
•	 Avoid a medical record with the perpetrator’s file information (perhaps for insurance purposes or to hide
a medical condition)
•	 Fraudulently receive welfare, unemployment or medical benefits

4 of 7
Safeguarding Your Child Starts at Home
It is important to protect your child’s Social Security number and birth certificate. Hold your children’s personal information as closely as you hold them. The suggestions below can help protect
your child’s identity:
•	 Carry your child’s Social Security card, birth certificate or passport with you only when
absolutely necessary.
•	 Unless you initiate contact, do not provide your child’s Social Security number (or any part of it) over
the phone, over the Internet, or in person.
•	 If you are asked for your child’s Social Security number ask these three questions: Why is it needed? Isn’t there another way to identify my child? How will my child’s information be protected?
•	 Lock birth certificates and documents with your child’s Social Security number in a safe place.
•	 Purchase and use a cross-cut shredder.
•	 It is important that you talk with your children about identity theft. Create a safe environment with
open dialogue. Explain it in terms they can understand, using examples such as “defensive driving”
or “expensive jewelry”. Leave the door open for them to ask questions or express concerns.
•	 Sign up for an identity protection and credit monitoring service such as the Equifax Complete™
Family Plan. This type of service is a proactive tool to not only monitor your credit files and protect your family’s identities, but also to receive alerts if there is any activity reported on your
child’s Equifax credit file. More information is available at www.equifax.com.
•	 Most schools ask for personal identifying information. Ask if this is optional or if another form of identification such as a utility bill is sufficient.
•	 Never use your child’s Social Security number to open accounts for your benefit. This may be
tempting if you have bad credit, but not paying bills on time could keep your child from getting
credit cards, student loans, an apartment, or even a job when they turn 18.

5 of 7
Internet Safety and Your Child
•	 It’s important to teach your child not to give out personal information
over the phone, as well as not to post any information on the Internet.
Children and teenagers are likely to post personal identifying information
on social networking sites.
•	 Know the web sites your child visits. Find out what type of information
is being requested to register or to create a profile. Talk to your child
about the risks of posting personal information in a public forum.
•	 Protect computers from viruses, malware, and spyware. Always
update firewall and virus protection software.
•	 Teach your child to password-protect their log-in information. Teach
your child about creating safe passwords.
•	 Talk with your child about scams they might encounter over the
phone, on social sites and over the Internet/smartphones via ads
or emails.

6 of 7
Resolving Child Identity Theft Cases
First Steps to Take:
•	 Contact the local police and report the crime with any evidence you have: credit cards,
bills, collection notices, and letters from the IRS or any other governmental or law enforcement agency.
•	 Get a report from the police, not just an investigation number.
For Financial Identity Theft:
•	 Using a copy of the police report, request a copy of any information known by the three credit
reporting agencies. The request will need to be in writing and in compliance with the current
requirements of each agency.
•	 Contact any credit issuers or collection agencies listed on the credit report or that have been in
contact with the victim. Explain that this is a case of child identity theft and that the contract
is not binding due to the age of the child at the time the contract was written.
•	 Ask to have all accounts, application inquiries and collection notices removed immediately
from your child’s credit report. You can do this via the credit issuer or through a dispute process with the credit reporting agencies. In the end, the credit issuer is the final decision maker
as to whether to accept the claim of fraud or not.
•	 Request copies of all application and transaction records. According to federal law, they must
make those documents available to the victim/parent when a police report has been submitted
with the written request. Make copies and provide those to the police investigating the case.
They may help you discover how this crime occurred.
For Other Identity Crimes:
•	 In the area of criminal identity theft, you may need to provide an alibi for your children
(i.e., school attendance records; doctor’s appointments).
•	 If you believe the imposter has obtained employment using the child’s SSN, contact the
Social Security Administration and request a copy of the “child’s work statement- form
7040”. It will list all the places “the person has worked.” You then need to ask to have
that document amended, explaining this is a case of child identity theft.

7 of 7

Weitere ähnliche Inhalte

Mehr von - Mark - Fullbright

2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps - Mark - Fullbright
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 

Kürzlich hochgeladen

MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...Krashi Coaching
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptxmanishaJyala2
 
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfMinawBelay
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...Nguyen Thanh Tu Collection
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Celine George
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Mark Carrigan
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...Nguyen Thanh Tu Collection
 
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptxHVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptxKunal10679
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxNehaChandwani11
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxCeline George
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxheathfieldcps1
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxMohamed Rizk Khodair
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the lifeNitinDeodare
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatmentsaipooja36
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 

Kürzlich hochgeladen (20)

MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptxHVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 

Family Plan Identity Theft Kit

  • 1. Child Identity Theft Education Kit
  • 2. Who’s at Risk? Consider a teenager who is about to start college. She has deposited money into a savings account and is ready to move it into a checking account. Much to her surprise, she is denied a credit card from her bank as well as a checking account. She is told that her credit score is too low to get a credit card because she had failed to pay off the other two credit cards she has. However, she had never applied for a credit card. She had just turned 18. Another individual is wanted for forgery as well as failure to pay child support for two children, has a suspended driving license, and has two misdemeanor charges for fighting – but he is only 10 years old. His parents’ IRS tax statement states they cannot claim their son as a dependent due to his full-time employment. After working hard in college, a young man is ready to start his career as a computer security specialist. However, he can’t find his Social Security card so he applies for a replacement card. He then learns that someone is not only using his Social Security number for employment, but is also collecting unemployment in another state. After checking his credit reports, the young man finds this person also has a car loan as well as a credit card in good standing. The three hypothetical examples above illustrate various types of child identity theft. Simply put, this crime occurs when an individual uses the identifying information of a child for personal gain. That information can include Social Security numbers, mother’s maiden name, date of birth, location of birth, and even just the name and address of the child. 2 of 7
  • 3. Child identity theft can be discovered when children are still young or after they reach 18 years old (or are emancipated) and start to use their own information and build a credit history. In the case of young children, the parents are usually the first to realize there might be a problem. They might receive calls from collection agencies, get a rejected federal or state tax form, or receive pre-approved credit card offers directed to their child. Their teen may be denied the right to a driver’s license due to accumulated tickets or even receive notice of a valid driver’s license in their state or another state. Almost all adult-child identity theft victims find out in a negative manner. They are denied credit, loans, tenancy, and even a job. They aren’t able to sign up for utilities like cable or phone service, are terminated from employment without cause, receive bills for credit cards they never requested or received, and may even be arrested for the crimes of another person. Who Typically Steals a Child’s Identity? Currently there are two categories of people who are stealing and using children’s identifying information. • Unknown perpetrator: These thieves have either stolen or purchased the Social Security number and sometimes other identifying information of a child. Some people create Social Security numbers that just happen to belong to a child. • Family members: A reality of child identity theft is the fact that parents or family members of a child have been found to use the child’s identifying information, often in times of desperation. Be it job loss or mounting debt, they are compelled to take advantage of their child’s “clean” credit history. They may open new lines of credit using the child’s SSN to help pay off bills, and perhaps have never learned to live within their means and are unable to pay off current credit cards. 3 of 7
  • 4. How Do Imposters Use Stolen Information The primary use of stolen identifying information is for financial purposes. It can also be used for many other purposes. Here are some examples of both: • Open a bank account or checking account • Apply for credit/debit cards and loans, including tuition/student and car loans • Apply for utilities, such as cellular phone, cable and Internet services • Rent an apartment • Get a job • Use the child’s SSN as the family SSN due to the inability of a parent to get a SSN • Avoid a criminal record on the perpetrator’s file • Avoid a medical record with the perpetrator’s file information (perhaps for insurance purposes or to hide a medical condition) • Fraudulently receive welfare, unemployment or medical benefits 4 of 7
  • 5. Safeguarding Your Child Starts at Home It is important to protect your child’s Social Security number and birth certificate. Hold your children’s personal information as closely as you hold them. The suggestions below can help protect your child’s identity: • Carry your child’s Social Security card, birth certificate or passport with you only when absolutely necessary. • Unless you initiate contact, do not provide your child’s Social Security number (or any part of it) over the phone, over the Internet, or in person. • If you are asked for your child’s Social Security number ask these three questions: Why is it needed? Isn’t there another way to identify my child? How will my child’s information be protected? • Lock birth certificates and documents with your child’s Social Security number in a safe place. • Purchase and use a cross-cut shredder. • It is important that you talk with your children about identity theft. Create a safe environment with open dialogue. Explain it in terms they can understand, using examples such as “defensive driving” or “expensive jewelry”. Leave the door open for them to ask questions or express concerns. • Sign up for an identity protection and credit monitoring service such as the Equifax Complete™ Family Plan. This type of service is a proactive tool to not only monitor your credit files and protect your family’s identities, but also to receive alerts if there is any activity reported on your child’s Equifax credit file. More information is available at www.equifax.com. • Most schools ask for personal identifying information. Ask if this is optional or if another form of identification such as a utility bill is sufficient. • Never use your child’s Social Security number to open accounts for your benefit. This may be tempting if you have bad credit, but not paying bills on time could keep your child from getting credit cards, student loans, an apartment, or even a job when they turn 18. 5 of 7
  • 6. Internet Safety and Your Child • It’s important to teach your child not to give out personal information over the phone, as well as not to post any information on the Internet. Children and teenagers are likely to post personal identifying information on social networking sites. • Know the web sites your child visits. Find out what type of information is being requested to register or to create a profile. Talk to your child about the risks of posting personal information in a public forum. • Protect computers from viruses, malware, and spyware. Always update firewall and virus protection software. • Teach your child to password-protect their log-in information. Teach your child about creating safe passwords. • Talk with your child about scams they might encounter over the phone, on social sites and over the Internet/smartphones via ads or emails. 6 of 7
  • 7. Resolving Child Identity Theft Cases First Steps to Take: • Contact the local police and report the crime with any evidence you have: credit cards, bills, collection notices, and letters from the IRS or any other governmental or law enforcement agency. • Get a report from the police, not just an investigation number. For Financial Identity Theft: • Using a copy of the police report, request a copy of any information known by the three credit reporting agencies. The request will need to be in writing and in compliance with the current requirements of each agency. • Contact any credit issuers or collection agencies listed on the credit report or that have been in contact with the victim. Explain that this is a case of child identity theft and that the contract is not binding due to the age of the child at the time the contract was written. • Ask to have all accounts, application inquiries and collection notices removed immediately from your child’s credit report. You can do this via the credit issuer or through a dispute process with the credit reporting agencies. In the end, the credit issuer is the final decision maker as to whether to accept the claim of fraud or not. • Request copies of all application and transaction records. According to federal law, they must make those documents available to the victim/parent when a police report has been submitted with the written request. Make copies and provide those to the police investigating the case. They may help you discover how this crime occurred. For Other Identity Crimes: • In the area of criminal identity theft, you may need to provide an alibi for your children (i.e., school attendance records; doctor’s appointments). • If you believe the imposter has obtained employment using the child’s SSN, contact the Social Security Administration and request a copy of the “child’s work statement- form 7040”. It will list all the places “the person has worked.” You then need to ask to have that document amended, explaining this is a case of child identity theft. 7 of 7