SlideShare a Scribd company logo
1 of 2
HOW THIEVES GET
YOUR IDENTITY:
• Dumpster Diving—Going through your trash.
• Skimming—Storing your credit card number in a special storage device when processing
  your card.
• Phishing—Pretending to be a financial institution and sending scam alerts to get your
  personal information.
• Changing Your Address—Completing a change of address form to get
  your mail and personal statements.
• Stealing—Taking your purse, wallet, mail, pre-approved credit cards, new checks,
  personnel files from work, or tax information.



TIPS TO AVOID IDENTITY THEFT:                                     (See Page 2 for definitions & details)

1.    Shred Financial Documents
2.    Never Click on Links in Unsolicited E-mails
3.    Do Not Use Obvious Passwords
4.    Do Not Give Out Personal Information
5.    Protect Your Social Security Number
6.    Keep Your Personal Information in a Secure Place
7.    Be Alert to Bills that Do Not Arrive when They Should
8.    Be Proactive about Unexpected Credit Cards or Account Statements
9.    Be Alert for Credit Being Denied Unexpectedly
10.   Respond Immediately to Calls or Letters about Purchases You Never Made
11.   Check Your Credit Report
12.   Regularly Review Your Financial Statements
13.   Close Any Accounts that have been Tampered With or Established Fraudulently
14.   Go Paperless
15.   Store Your Financial and Personal Information in a Storage Box by Year
16.   Be Alert when Responding to E-mails
17.   When Contacted by an Institution by Phone, Tell Them You will Call Them Right Back
18.   Opt Out of Pre-Approved Credit Offers
19.   Get a Locking Mailbox
20.   Copy All of Your Credit Cards and Save Them in a File at Home
21.   Carry Only One or Two Cards at a Time
TIPS TO AVOID                                      often denied for a variety of reasons, one of       it came directly from a financial institution.
                                                   which is when too much credit is opened in a        If you respond to the e-mail, you encour-
IDENTITY THEFT:                                    short period of time. Being denied credit may       age them to continue trying to get personal
                                                   mean that someone else has opened accounts          information from you. Simply add the address
1. SHRED FINANCIAL                                 in your name.                                       to your spam list to keep them from contact-
DOCUMENTS: Any paperwork with                                                                          ing you in the future. Visit the addresses you
personal information should be put through a
                                                   10. RESPOND IMMEDIATELY TO                          know if you are concerned the notice is valid.
shredder before being thrown away.                 CALLS OR LETTERS ABOUT PUR-
                                                   CHASES MADE: Credit card companies                  17. WHEN CONTACTED BY AN
2. NEVER CLICK ON LINKS IN                         create a profile of their clients detailing out     INSTITUTION BY PHONE, TELL
UNSOLICITED E-MAILS: Since                         the most common places a customer shops             THEM YOU WILL CALL THEM
“phishing” is becoming a common problem,           and the items that they frequently buy. If          RIGHT BACK: Let them give you their
 use up-to-date firewalls, anti-spyware, and       something is purchased that does not suit           name and number, but do not call that num-
 anti-virus software to protect your home          your profile, they will contact you for verifica-   ber back. Instead, call the number on the back
 computer. Good anti-spam software is a must.      tion. Respond to the notice right away to head      of your card and ask to speak to a representa-
 Plus, never click on links in e-mails. Instead,   off potential theft and damage to your credit.      tive about your account. Let them know that
 open a new window and go to the website                                                               you were contacted and ask them to verify any
 address you know in order to enter informa-       11. CHECK YOUR CREDIT
                                                                                                       problems. All account managers have access
 tion. (Fake PayPal e-mails are becoming more      REPORT: Any credit opened in your name              to the same information, so they will be able
 common, so be extra wary when dealing with        will show up on your credit report. By staying      to see if there is a problem with your account
 these.) You might also want to avoid e-mail       on top of this, you will be able to stop identity   or not.
 archiving in the event that someone hacks         theft before too much damage occurs.
 into your account.                                                                                    18. OPT OUT OF PRE-APPROVED
                                                   12. REGULARLY REVIEW YOUR
                                                                                                       CREDIT OFFERS: Although I do not
3. DO NOT USE OBVIOUS                              FINANCIAL STATEMENTS: Look for                      personally believe that people can get your
PASSWORDS: These include your birth                any charges that you did not make. Also not         identity through pre-approved credit card
date, mother’s maiden name, or the last four       that consumers usually have only 30 days to         applications without your social security
digits of your Social Security number.             dispute items they did not authorize.               information, it never hurts to opt-out of
                                                   13. CLOSE ANY ACCOUNTS THAT                         credit card offers. By doing so, you lessen the
4. DO NOT GIVE OUT PERSONAL
                                                                                                       amount of mail that comes to your mailbox,
INFORMATION: Whether over the                      HAVE BEEN TAMPERED WITH OR
                                                                                                       and you will still be able to apply for credit
phone, through the mail, or over the Internet,     ESTABLISHED FRAUDULENTLY:                           online. Check out the FTC’s Consumer Alert
don’t share your information unless you know       Get a new card with a new number and close          webpage to see all the ways you can opt out.
who you are dealing with.                          the old card, since this alone may stop a thief
                                                   in possession of your information.                  19. GET A LOCKING MAILBOX:
5. PROTECT YOUR SOCIAL                                                                                 This is an especially good idea for anyone in
SECURITY NUMBER: Never carry your                  14. GO PAPERLESS: You can receive                   a nice area. The nicer the area you live in, the
social security number in your wallet or write     many of your bills through your e-mail/on-          more ideal a target you make to an identity
your social security number on a check.            line banking instead of having them mailed.         thief because they assume you have more
                                                   By requesting this benefit, you keep account        money for them to steal.
6. KEEP YOUR PERSONAL IN-                          numbers and personal information private.
FORMATION IN A SECURE PLACE:                       You are also able to save hard copies directly      20. COPY ALL OF YOUR CREDIT
This is especially important with roommates,       to your hard drive, which allows you to find        CARDS AND SAVE THEM IN A FILE
outside help, or if you are having work done       the information quickly and easily when             AT HOME: By having a copy of the card
in your home.                                      needed.                                             (front and back) in a locked filing cabinet or
7. BE ALERT TO BILLS THAT                          15. STORE YOUR FINANCIAL AND                        other safe place, you will be able to quickly
DO NOT ARRIVE WHEN THEY                                                                                and easily contact your creditors should your
                                                   PERSONAL INFORMATION IN
                                                                                                       purse or wallet ever be stolen.
SHOULD: If they do not arrive, they may            A STORAGE BOX BY YEAR: This is
have been routed somewhere else.                   especially important when dealing with taxes        21. CARRY ONLY ONE OR TWO
                                                   since the IRS can demand to see evidential          CARDS AT A TIME: Lock away all the
8. BE PROACTIVE ABOUT UN                           proof of deductions for as long as eleven           other cards in a safe place and carry as few
EXPECTED CREDIT CARDS OR                           years after you file. By keeping it in a storage    cards as possible. This way, if someone ever
ACCOUNT STATEMENTS: If an                          box, you can shred the contents when the            gets into your wallet or purse, you will notice
account or credit card arrives that you did        time period is up. Note: this does not include      immediately if a card is stolen and be able to
not open/activate, someone else did. Call          social security numbers.                            report it right away.
the company immediately and have it closed/
canceled.                                          16. BE ALERT WHEN RESPONDING
                                                   TO E-MAILS: E-mails are now commonly
9. BE ALERT FOR CREDIT BEING                       used to steal or “phish” information out of
DENIED UNEXPECTEDLY: Credit is                     consumers by making the e-mail look as if

More Related Content

Similar to Identity Theft Tips

Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineKristi Valentini
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
Protect Yourself Against Identity Theft
Protect Yourself Against Identity TheftProtect Yourself Against Identity Theft
Protect Yourself Against Identity Theftpmass
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims- Mark - Fullbright
 
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...Ken Fishkin, CISSP, CIPP/US, CIPT
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theftnewsusa01
 
Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
How to prevent identity fraud
How to prevent identity fraudHow to prevent identity fraud
How to prevent identity fraudscamtools
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 

Similar to Identity Theft Tips (20)

Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Protect Yourself Against Identity Theft
Protect Yourself Against Identity TheftProtect Yourself Against Identity Theft
Protect Yourself Against Identity Theft
 
Monitor Your Credit Report
Monitor Your Credit  ReportMonitor Your Credit  Report
Monitor Your Credit Report
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
National Cybersecurity Awareness Month - Personal Security and Privacy Tips f...
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
How to prevent identity fraud
How to prevent identity fraudHow to prevent identity fraud
How to prevent identity fraud
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 

Recently uploaded

latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Recently uploaded (20)

latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Identity Theft Tips

  • 1. HOW THIEVES GET YOUR IDENTITY: • Dumpster Diving—Going through your trash. • Skimming—Storing your credit card number in a special storage device when processing your card. • Phishing—Pretending to be a financial institution and sending scam alerts to get your personal information. • Changing Your Address—Completing a change of address form to get your mail and personal statements. • Stealing—Taking your purse, wallet, mail, pre-approved credit cards, new checks, personnel files from work, or tax information. TIPS TO AVOID IDENTITY THEFT: (See Page 2 for definitions & details) 1. Shred Financial Documents 2. Never Click on Links in Unsolicited E-mails 3. Do Not Use Obvious Passwords 4. Do Not Give Out Personal Information 5. Protect Your Social Security Number 6. Keep Your Personal Information in a Secure Place 7. Be Alert to Bills that Do Not Arrive when They Should 8. Be Proactive about Unexpected Credit Cards or Account Statements 9. Be Alert for Credit Being Denied Unexpectedly 10. Respond Immediately to Calls or Letters about Purchases You Never Made 11. Check Your Credit Report 12. Regularly Review Your Financial Statements 13. Close Any Accounts that have been Tampered With or Established Fraudulently 14. Go Paperless 15. Store Your Financial and Personal Information in a Storage Box by Year 16. Be Alert when Responding to E-mails 17. When Contacted by an Institution by Phone, Tell Them You will Call Them Right Back 18. Opt Out of Pre-Approved Credit Offers 19. Get a Locking Mailbox 20. Copy All of Your Credit Cards and Save Them in a File at Home 21. Carry Only One or Two Cards at a Time
  • 2. TIPS TO AVOID often denied for a variety of reasons, one of it came directly from a financial institution. which is when too much credit is opened in a If you respond to the e-mail, you encour- IDENTITY THEFT: short period of time. Being denied credit may age them to continue trying to get personal mean that someone else has opened accounts information from you. Simply add the address 1. SHRED FINANCIAL in your name. to your spam list to keep them from contact- DOCUMENTS: Any paperwork with ing you in the future. Visit the addresses you personal information should be put through a 10. RESPOND IMMEDIATELY TO know if you are concerned the notice is valid. shredder before being thrown away. CALLS OR LETTERS ABOUT PUR- CHASES MADE: Credit card companies 17. WHEN CONTACTED BY AN 2. NEVER CLICK ON LINKS IN create a profile of their clients detailing out INSTITUTION BY PHONE, TELL UNSOLICITED E-MAILS: Since the most common places a customer shops THEM YOU WILL CALL THEM “phishing” is becoming a common problem, and the items that they frequently buy. If RIGHT BACK: Let them give you their use up-to-date firewalls, anti-spyware, and something is purchased that does not suit name and number, but do not call that num- anti-virus software to protect your home your profile, they will contact you for verifica- ber back. Instead, call the number on the back computer. Good anti-spam software is a must. tion. Respond to the notice right away to head of your card and ask to speak to a representa- Plus, never click on links in e-mails. Instead, off potential theft and damage to your credit. tive about your account. Let them know that open a new window and go to the website you were contacted and ask them to verify any address you know in order to enter informa- 11. CHECK YOUR CREDIT problems. All account managers have access tion. (Fake PayPal e-mails are becoming more REPORT: Any credit opened in your name to the same information, so they will be able common, so be extra wary when dealing with will show up on your credit report. By staying to see if there is a problem with your account these.) You might also want to avoid e-mail on top of this, you will be able to stop identity or not. archiving in the event that someone hacks theft before too much damage occurs. into your account. 18. OPT OUT OF PRE-APPROVED 12. REGULARLY REVIEW YOUR CREDIT OFFERS: Although I do not 3. DO NOT USE OBVIOUS FINANCIAL STATEMENTS: Look for personally believe that people can get your PASSWORDS: These include your birth any charges that you did not make. Also not identity through pre-approved credit card date, mother’s maiden name, or the last four that consumers usually have only 30 days to applications without your social security digits of your Social Security number. dispute items they did not authorize. information, it never hurts to opt-out of 13. CLOSE ANY ACCOUNTS THAT credit card offers. By doing so, you lessen the 4. DO NOT GIVE OUT PERSONAL amount of mail that comes to your mailbox, INFORMATION: Whether over the HAVE BEEN TAMPERED WITH OR and you will still be able to apply for credit phone, through the mail, or over the Internet, ESTABLISHED FRAUDULENTLY: online. Check out the FTC’s Consumer Alert don’t share your information unless you know Get a new card with a new number and close webpage to see all the ways you can opt out. who you are dealing with. the old card, since this alone may stop a thief in possession of your information. 19. GET A LOCKING MAILBOX: 5. PROTECT YOUR SOCIAL This is an especially good idea for anyone in SECURITY NUMBER: Never carry your 14. GO PAPERLESS: You can receive a nice area. The nicer the area you live in, the social security number in your wallet or write many of your bills through your e-mail/on- more ideal a target you make to an identity your social security number on a check. line banking instead of having them mailed. thief because they assume you have more By requesting this benefit, you keep account money for them to steal. 6. KEEP YOUR PERSONAL IN- numbers and personal information private. FORMATION IN A SECURE PLACE: You are also able to save hard copies directly 20. COPY ALL OF YOUR CREDIT This is especially important with roommates, to your hard drive, which allows you to find CARDS AND SAVE THEM IN A FILE outside help, or if you are having work done the information quickly and easily when AT HOME: By having a copy of the card in your home. needed. (front and back) in a locked filing cabinet or 7. BE ALERT TO BILLS THAT 15. STORE YOUR FINANCIAL AND other safe place, you will be able to quickly DO NOT ARRIVE WHEN THEY and easily contact your creditors should your PERSONAL INFORMATION IN purse or wallet ever be stolen. SHOULD: If they do not arrive, they may A STORAGE BOX BY YEAR: This is have been routed somewhere else. especially important when dealing with taxes 21. CARRY ONLY ONE OR TWO since the IRS can demand to see evidential CARDS AT A TIME: Lock away all the 8. BE PROACTIVE ABOUT UN proof of deductions for as long as eleven other cards in a safe place and carry as few EXPECTED CREDIT CARDS OR years after you file. By keeping it in a storage cards as possible. This way, if someone ever ACCOUNT STATEMENTS: If an box, you can shred the contents when the gets into your wallet or purse, you will notice account or credit card arrives that you did time period is up. Note: this does not include immediately if a card is stolen and be able to not open/activate, someone else did. Call social security numbers. report it right away. the company immediately and have it closed/ canceled. 16. BE ALERT WHEN RESPONDING TO E-MAILS: E-mails are now commonly 9. BE ALERT FOR CREDIT BEING used to steal or “phish” information out of DENIED UNEXPECTEDLY: Credit is consumers by making the e-mail look as if