SlideShare ist ein Scribd-Unternehmen logo
1 von 33
IDENTITY THEFT   “ The fastest growing white-collar crime in America” According to the FBI
Identity Theft Privacy & Security Training Randall Chesnutt , CITRMS Avoid ID Theft USA Houston, Texas  The Institute of Fraud Risk Management is the nation’s only professional certification program ( CITRMS ) specifically developed to train and equip professionals to understand and address Identity Theft and related fraud issues. This is the same organization that trains F.B.I
WHAT IS IDENTITY THEFT? ,[object Object],[object Object],[object Object]
Identity Theft is in the News
[object Object],[object Object],Identity Theft is Spiraling out of Control !
 
[object Object],[object Object],[object Object],[object Object],FOUR  AREAS OF NEGLECT
Drivers  License Medical Financial What someone is subject to as a victim of Identity Theft, is only limited to the imagination of the person who has their information. Social  Security Five Types of Identity Theft It’s not just about Credit Cards, it’s a Legal Issue  ! Less than 28% Criminal
Driver’s License Identity Theft ,[object Object],[object Object],[object Object],Our Driver’s License has become an unofficial National Identification Card !
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Driver’s License Identity Theft
Illegal Immigrants use your Social Security Number to  gain employment  or  report income  under your name. They take the income leaving you with the tax bill. They can  file false income tax returns  or even file for social security benefits using your number. Thieves and Criminals can use your SSN to apply for credit ,  obtain a Driver’s License  and much more … 10 million Social Security Numbers are bought and sold every  six weeks in the U.S. Social Security Identity Theft
Why you are at Risk
CHILDREN ARE A BETTER TARGET FOR IDENTITY THEFT THAN YOU. Children have a clean credit history and  parents rarely have reasons to check their child’s credit report. This crime can go undetected for up to 15 years.    Why your Children are at Risk ?
[object Object],[object Object],There are over 52,000,000 people in the U.S. without Health Insurance .     (US Census Bureau 2007) Stolen Health Insurance Card are being sold on the black market    for $500-$600 each !  (AARP) Medical Identity Theft
Why you are at Risk
[object Object],[object Object],[object Object],[object Object],Criminal Identity Theft occurs when an imposter gives another person’s name and personal information such as a  driver’s license, date of birth or social security number  to a law enforcement officer during an investigation or upon arrest.  Criminal Identity Theft
Why you are at Risk
Victims of Financial Identity Theft are people who have had  bank accounts  wiped out,  credit  histories  ruined  and  jobs  and valuable possessions  taken away .  Thieves use your  social security number  to   open new accounts and can  change the billing address  leaving you with the debt. Financial Institutions advertise zero liability for fraudulent activity on accounts if notified within 48 hours.  What happens after 48 hours ?  You could be responsible for debts you didn’t create ! Financial Identity Theft
Federal Trade Commission free report: 877.IDTHEFT consumer.gov/idtheft Financial Identity Theft Financial Identity Theft
Pg. 19 ,[object Object],[object Object],[object Object],Credit Monitoring is the best way to alert an individual of possible Financial ID Theft. Financial Identity Theft Financial Identity Theft Financial Identity Theft
February 2004 ID Theft Victims Face Tough Bank Fights ,[object Object],[object Object],[object Object],[object Object],Financial Identity Theft
•  FTC – 3% •  Other Federal Agency – 5% •  State Dept of Motor Vehicle Admin – 7% •  State AG or State Consumer Agency – 8% •  Lawyer – 12% •  Credit Bureau – 22% •  Local Police – 26% •  Credit Grantor – 43% •  Did Not Contact Anyone – 38% WHERE DO VICTIM GO FOR HELP
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],USA Today, October 12, 2006 Criminals covet your identity Data  and have perfected more ways to manipulate your identity than you can imagine.  How Profitable is Identity Theft ?
[object Object],[object Object],[object Object],- Sept 2003, Identity Theft Resource Center interviewed 2,000 victims The Cost to Individuals Identity Thieves don’t discriminate!   A professional thief can assume your identity in just a few hours, but it can take years for you to repair the damage and restore your good name!  Over  70%  of the time you’ll need an attorney to resolve these issues.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],*(Identity Theft Resource Center 2007) Latest Facts About this Crime
Pictures taken with cell phone camera after waiting several minutes for someone to respond. Identity Theft in the Workplace
Access to the computer, mail and other documents possible.
WHAT CAN YOU DO? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETER  identity thieves by safeguarding your information . ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECT  suspicious activity by routinely monitoring your financial  accounts and billing statements. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DEFEND  against identity theft as soon as you suspect  a problem. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
QUESTIONS! Joe Orsak Randall Chesnutt Ron Hargrove

Weitere ähnliche Inhalte

Was ist angesagt?

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 

Was ist angesagt? (20)

Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Phishing
PhishingPhishing
Phishing
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Phishing
PhishingPhishing
Phishing
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safety
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Phishing
PhishingPhishing
Phishing
 

Andere mochten auch

Mercedes benz and its competitors in india analysis 2014
Mercedes benz and its competitors in india analysis 2014Mercedes benz and its competitors in india analysis 2014
Mercedes benz and its competitors in india analysis 2014
Aditya Machado
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 

Andere mochten auch (15)

21st Century Business Challenges
21st Century Business Challenges21st Century Business Challenges
21st Century Business Challenges
 
Rolex ppt (dipen) 17 07-2014
Rolex ppt (dipen) 17 07-2014Rolex ppt (dipen) 17 07-2014
Rolex ppt (dipen) 17 07-2014
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Software Security
Software SecuritySoftware Security
Software Security
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Mercedes benz and its competitors in india analysis 2014
Mercedes benz and its competitors in india analysis 2014Mercedes benz and its competitors in india analysis 2014
Mercedes benz and its competitors in india analysis 2014
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Rolex Ppt R 2.
Rolex Ppt R 2.Rolex Ppt R 2.
Rolex Ppt R 2.
 
Rolex ppt(includes, introduction, history , innovation, ceo, rolex watchs , c...
Rolex ppt(includes, introduction, history , innovation, ceo, rolex watchs , c...Rolex ppt(includes, introduction, history , innovation, ceo, rolex watchs , c...
Rolex ppt(includes, introduction, history , innovation, ceo, rolex watchs , c...
 
Rolex Marketing Plan
Rolex Marketing PlanRolex Marketing Plan
Rolex Marketing Plan
 
Mercedes benz Presentation
Mercedes benz PresentationMercedes benz Presentation
Mercedes benz Presentation
 
System security
System securitySystem security
System security
 
STEAL THIS PRESENTATION!
STEAL THIS PRESENTATION! STEAL THIS PRESENTATION!
STEAL THIS PRESENTATION!
 

Ähnlich wie Identity Theft Presentation

Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
danc752
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
jwnollet
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
jessmc1
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
Lisa Sosebee
 

Ähnlich wie Identity Theft Presentation (20)

Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 

Identity Theft Presentation

  • 1. IDENTITY THEFT “ The fastest growing white-collar crime in America” According to the FBI
  • 2. Identity Theft Privacy & Security Training Randall Chesnutt , CITRMS Avoid ID Theft USA Houston, Texas The Institute of Fraud Risk Management is the nation’s only professional certification program ( CITRMS ) specifically developed to train and equip professionals to understand and address Identity Theft and related fraud issues. This is the same organization that trains F.B.I
  • 3.
  • 4. Identity Theft is in the News
  • 5.
  • 6.  
  • 7.
  • 8. Drivers License Medical Financial What someone is subject to as a victim of Identity Theft, is only limited to the imagination of the person who has their information. Social Security Five Types of Identity Theft It’s not just about Credit Cards, it’s a Legal Issue ! Less than 28% Criminal
  • 9.
  • 10.
  • 11. Illegal Immigrants use your Social Security Number to gain employment or report income under your name. They take the income leaving you with the tax bill. They can file false income tax returns or even file for social security benefits using your number. Thieves and Criminals can use your SSN to apply for credit , obtain a Driver’s License and much more … 10 million Social Security Numbers are bought and sold every six weeks in the U.S. Social Security Identity Theft
  • 12. Why you are at Risk
  • 13. CHILDREN ARE A BETTER TARGET FOR IDENTITY THEFT THAN YOU. Children have a clean credit history and parents rarely have reasons to check their child’s credit report. This crime can go undetected for up to 15 years.   Why your Children are at Risk ?
  • 14.
  • 15. Why you are at Risk
  • 16.
  • 17. Why you are at Risk
  • 18. Victims of Financial Identity Theft are people who have had bank accounts wiped out, credit histories ruined and jobs and valuable possessions taken away . Thieves use your social security number to open new accounts and can change the billing address leaving you with the debt. Financial Institutions advertise zero liability for fraudulent activity on accounts if notified within 48 hours. What happens after 48 hours ? You could be responsible for debts you didn’t create ! Financial Identity Theft
  • 19. Federal Trade Commission free report: 877.IDTHEFT consumer.gov/idtheft Financial Identity Theft Financial Identity Theft
  • 20.
  • 21.
  • 22. • FTC – 3% • Other Federal Agency – 5% • State Dept of Motor Vehicle Admin – 7% • State AG or State Consumer Agency – 8% • Lawyer – 12% • Credit Bureau – 22% • Local Police – 26% • Credit Grantor – 43% • Did Not Contact Anyone – 38% WHERE DO VICTIM GO FOR HELP
  • 23.
  • 24.
  • 25.
  • 26. Pictures taken with cell phone camera after waiting several minutes for someone to respond. Identity Theft in the Workplace
  • 27. Access to the computer, mail and other documents possible.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.  
  • 33. QUESTIONS! Joe Orsak Randall Chesnutt Ron Hargrove

Hinweis der Redaktion

  1. How many of you have been victims or know someone who has been a victim of Identity Theft
  2. I am a Certified Identity theft Risk Management Speacilist
  3. So, identity thieves can do a lot of damage… They can go on spending sprees using your credit card Using your name and Social Security number, they can open new credit card accounts They could give your name to the police if they get arrested
  4. Mention 340 million doesn’t mean they are victims it just means there information has been breached.
  5. Some people say take my credit, or that I am good at protecting my information, BUT WHAT ABOUT EVERYONE ELSE are they protecting your information. Unlike the drug trade one transaction one product, with your information it can be sold over and over again Pill bottle
  6. The Average time it takes before you find out you are a victim is 12.3 months
  7. The Average time it takes before you find out you are a victim is 12.3 months
  8. While there are no ways to absolutely guarantee you’ll never be a victim of identity theft, there are ways to minimize your risk. By following the “3 D’s” of identity protection, we can all make it more difficult for thieves to walk away with our identities. The “3 D’s” are Deter, Detect, and Defend; let me tell you about some specific steps you can take to minimize your risk. Don’t worry about taking notes, I have handouts for you from the Federal Trade Commission.
  9. Shred paperwork with personal information and financial documents before you discard them. Don’t carry your Social Security card in your wallet or write your Social Security number on a check. Give it out only if absolutely necessary; you can always ask to use another identifier. Don’t give out personal information on the phone, through the mail, or over the Internet unless you are sure who you are dealing with. Never click on links sent in unsolicited emails; instead, type in a web address you know.  Don’t use obvious passwords. Your mother’s maiden name, or the last four digits of your Social Security number – all are obvious passwords. Keep your personal information in a secure place at home, especially if you have roommates, employ outside help, or are having work done in your house.
  10. Credit reports contain information about you, including what accounts you have and your bill paying history. There are three major nationwide consumer reporting companies – Equifax, Experian, and TransUnion – the law requires them to give you a free copy of your credit report each year if you ask for it. www.AnnualCreditReport.com is a service created by these three companies: It is the only authorized site where you can order the free credit report you’re entitled to each year. When asking for your credit report, you may need to provide certain personal information, including your Social Security number and information about your monthly bills.
  11. Placing a fraud alert on your credit reports tells creditors to follow certain procedures before they open new accounts in your name or make certain changes to your existing accounts. The 3 consumer reporting companies have toll-free numbers for placing an initial 90-day fraud alert; a call to one company is sufficient. It entitles you to free copies of your credit reports. Look for inquiries from companies you haven’t contacted, accounts you didn’t open, and debts on your accounts that you can’t explain. To close your accounts, call the security or fraud departments of each company where an account was opened or changed without your okay. Follow up in writing, with copies of supporting documents. Use the ID Theft Affidavit at ftc.gov/idtheft to support your written statement. Ask for written verification that the disputed account has been closed and the fraudulent debts discharged. The FTC is the federal consumer protection agency that helps law enforcement officials in their investigations.