SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
c t i v e to
          ra                o
     te




                            lk
in




                                it




          Fighting Back against
          IdentIty theft
                                        ys ty ur T
                                      da tI yo hOS
                                      Id ec N &




          FEDERAL TRADE COMMISSION
                                        ot pLA
                                        en t
                                      Pr TO
                                      w
                                     hO
About thIs toolkIt
The Federal Trade Commission, the nation’s consumer protection agency,
has developed this toolkit to help organizations combat identity theft
by raising awareness and educating people through a Protect Your
Identity Day. This kit provides information and sample materials to
help plan and host a successful Protect Your Identity Day.
Included in this kit is a CD that contains the entire kit contents, which you
can customize and print. The CD also includes Deter, Detect, Defend
videos for computer broadcast and Talking About Identity Theft: A
How-To Guide, which offers more sample materials, including a speech,
presentation, and template media materials in English and Spanish. You
also can download that guide at ftc.gov/idtheft.
This kit also includes a DVD that features Deter, Detect, Defend videos
for television broadcast.

how to use the Cd-RoM:                                how to use the dVd:
1. Load the CD-ROM in your computer.                  Follow the normal loading instructions for
                                                      your DVD player.
2. PC: If you use Windows, Autorun will
   launch the program automatically. If
   Autorun is not active, double-click the
   “My Computer” icon and then double-
   click on the “Interactive Toolkit” icon.
  MAC: Double-click the “Interactive
  Toolkit” icon then double-click the file
  you would like to view.


how to plAn & host
protect your identity days
tAble of Contents
About Identity Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
         • Tips: Avoid ID Theft: Deter, Detect, Defend
About Protect Your Identity Day . . . . . . . . . . . . . . . . . . . . . .7
        • Host a Protect Your Identity Day
Outreach To Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
        • 6 Steps to Media Success
        • Plan a Media Event
Outreach To Partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
        • 5 Steps to Successful Partnerships
Plan Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
         • 8 Steps to a Successful Event
         • Sample Run of Show
         • Sample Talking Points
         • Sample Official Proclamation
         • Sample Consumer Quiz
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

                                                                                                   1
About IdentIty theft
whAt Is IdentIty theft?
Identity theft occurs when someone uses your personally identifying
information, like your name, Social Security number, or credit card
number, without your permission, to commit fraud or other crimes.
The Federal Trade Commission estimates that as many as 10 million
Americans have their identities stolen each year. In fact, you or someone
you know may have experienced some form of identity theft.
Identity theft is serious. People whose identities have been stolen can
spend hundreds of dollars and dozens of hours cleaning up the mess
thieves have made of their good name and credit record. Consumers
victimized by identity theft may lose out on job opportunities, or be
denied loans for education, housing, or cars because of negative
information on their credit reports. They may even be arrested for
crimes they did not commit. The potential for damage, loss, and stress is
considerable.

how do thIeVes steAl An IdentIty?
Identity theft starts with the misuse of your personally identifying
information. For identity thieves, your name and Social Security number,
credit card numbers, or other financial account information is as good as
gold.
Skilled identity thieves may use a variety of methods to get hold of your
information:
    They may steal your mail, wallet, or purse.
    They may get personal information from you by posing
     as legitimate companies through email, in a practice known as
     “phishing.” Or they might lie to you on the phone.
    They may take your information from businesses or other
     institutions by stealing personnel records, bribing or conning an
     employee who has access to these records, or breaking into your
     records electronically.
Some identity theft victims even report that their information has been
stolen by someone they know.

tIps AVoId Id theft: deteR, deteCt, defend
While nothing can guarantee that you won’t become a victim of identity
theft, you can take specific steps to minimize your risk, and minimize the
damage if a problem develops. It’s about following the “3 D’s” of identity
theft protection – Deter, Detect, Defend.




                                                                             3
Order your credit report:

            deteR:                                                                 The law requires the major nationwide credit reporting companies –
                                                                                    Equifax, Experian, and TransUnion – to give you a free copy of your
    deteR IdentIty thIeVes by sAfeguARdIng                                          credit report each year if you ask for it.
    youR InfoRMAtIon                                                               Visit www.AnnualCreditReport.com or call 1-877-322-8228, a
      Shred financial documents and paperwork with personal                         service created by these three companies, to order your free credit
      information before you discard them.                                          reports each year. Or you can complete the Annual Credit Report
      Protect your Social Security number. Don’t carry your Social                  Request Form and mail it to: Annual Credit Report Request
      Security card in your wallet or write your Social Security number on          Service, P.O. Box 105281, Atlanta, GA 30348-5281. You can
      a check. Give it out only if absolutely necessary or ask to use another       download the form at ftc.gov/freereports.
      identifier.
      Don’t give out personal information on the phone, through
      the mail, or over the Internet unless you have initiated the
                                                                                        defend:
      contact and know who you are dealing with.                                defend AgAInst IdentIty theft As soon As
      Never click on links sent in unsolicited emails; instead, type in         you suspeCt A pRobleM
      a Web address you know. Use firewalls, anti-spyware, and anti-virus         Place a “Fraud Alert” on your credit reports, and review
      software to protect your home computer; keep them up-to-date. Visit         the reports carefully. The alert tells creditors to follow certain
      OnGuardOnline.gov for more information.                                     procedures before they open new accounts in your name or make
      Don’t use an obvious password like your birth date, your mother’s           certain changes to your existing accounts. The three nationwide credit
      maiden name, or the last four digits of your Social Security number.        reporting companies have toll-free numbers for placing an initial
                                                                                  90-day fraud alert; a call to one company is sufficient:
      Keep your personal information in a secure place at home,
      especially if you have roommates, employ outside help, or are                  Equifax: 1-800-525-6285
      having work done in your house.                                                Experian: 1-888-EXPERIAN (397-3742)
                                                                                     TransUnion: 1-800-680-7289
                                                                                  Placing a fraud alert entitles you to free copies of your credit reports.
            deteCt:                                                               Look for inquiries from companies you haven’t contacted, accounts
    deteCt suspICIous ACtIVIty by RoutInely                                       you didn’t open, and debts on your accounts that you can’t explain.

    MonItoRIng youR fInAnCIAl ACCounts                                           Close accounts. Close any accounts that have been tampered with or
                                                                                  established fraudulently.
    bIllIng stAteMents
                                                                                   Call the security or fraud departments of each company where
      Be alert to signs that require immediate attention:
                                                                                    an account was opened or changed without your okay. Follow up in
       Mail or bills that do not arrive as expected.                               writing, with copies of supporting documents.
       Unexpected credit cards or account statements.                             Use the Identity Theft Affidavit at ftc.gov/idtheft to support your
       Denials of credit for no apparent reason.                                   written statement.
       Calls or letters about purchases you did not make.                         Ask for written verification that the disputed account has been
                                                                                    closed and the fraudulent debts discharged.
      Inspect:
                                                                                   Keep copies of documents and records of your conversations
       Your credit report. Credit reports have information about you,
                                                                                    about the theft.
        including what accounts you have and your bill paying history.
                                                                                  File a police report. File a report with law enforcement officials to
       Your financial statements. Review financial accounts and
                                                                                  help you with creditors who may want proof of the crime.
        billing statements regularly, looking for charges you did not
        make.                                                                     Report your complaint to the FTC. Your report helps law
                                                                                  enforcement officials across the country in their investigations.
                                                                                     Online: ftc.gov/idtheft
                                                                                     By phone: 1-877-ID-THEFT (438-4338) or TTY, 1-866-653-4261
4                                                                                                                                                             5
About protect your
identity day
The Federal Trade Commission helps people learn how to minimize the
risk of becoming a victim of identity theft.
While there is no fool-proof way to avoid identity theft, there are ways to
minimize the chances of becoming a victim and minimize the damage
should a theft occur. Hosting a Protect Your Identity Day can show
your community how.
Law enforcement officials, state attorneys general, state and local
government, and community and business leaders each can play a pivotal
role in educating the public. We encourage you to host a Protect Your
Identity Day in your community.
There is no single date for a Protect Your Identity Day. You can
designate any day that works for your community or organization.
The important thing is to take the lead in educating your particular
community about avoiding identity theft.


host A protect your identity day
Hosting a Protect Your Identity Day is easy, and there are many ways
to do it. When, where, and how it happens is up to you. Consider hosting
a media event, such as a press conference, to raise awareness of the
Day and the issue. Or stage a dedicated event at your local civic center,
police station, mall, public library, or university. Or arrange a booth at
an existing community event, such as a county fair or festival. You might
consider hosting a “shred event” so people in your community can shred
unwanted personal information and records. This could be a half-day
or full-day event. If you are interested in expanding your reach and
resources, recruit a partner organization as a co-sponsor.
Here are three possible approaches for implementing your Day:
      1. Media outreach
      2. Partnership outreach
      3. Events
We offer step-by-step guidance and customizable template materials to
help you implement each approach. Different levels of engagement will
enable you to use your resources to maximum effect.




                                                                              7
outReACh to MedIA
When hosting a Protect Your Identity Day, you can work with local
media to spread the word to your community about identity theft and
demonstrate your group’s commitment to fighting this crime.
Media outreach takes many forms – from a call to a reporter to suggest
a story to issuing a formal press release to organizing a media event.
All can be effective. The important thing is to tailor the outreach to your
organization’s particular approach to Protect Your Identity Day.
Following are two sections that offer basic guidance about reaching out
to media and planning a media event.
For more information on media outreach and template media materials,
please visit ftc.gov/idtheft, and refer to the CD in this kit. See Section 7
of Talking About Identity Theft: A How-To Guide.


6 steps to MedIA suCCess on
        protect your identity day
Whether your organization plans on releasing helpful tips to consumers
about how to combat identity theft on its Protect Your Identity Day
or hosting a full scale media event, six general steps can help you get
positive media coverage for your event.

 1 seleCt A tARget AudIenCe
Determine who you want to reach. This may include businesspeople,
financial planners, teachers, your employees or organization’s members,
or local officials. You may wish to focus on a particular population, such
as older citizens or students.


 2 deVelop A MedIA lIst
Once you have identified your target audience, create a media list. It
should be comprised of media outlets (local newspapers, television/
cable stations, and radio stations) and reporters at each outlet who may
find the identity theft issue relevant to the subject area they cover. Include
these journalists’ names and contact information (phone, email, fax,
address) on your list. By communicating with specific individuals at news
outlets, you are more likely to get a response.


 3 fInd the news Angle
Identity theft is an issue that gets coverage. However, to generate local
media interest, your organization should consider what will make your
Protect Your Identity Day a compelling story. Consider including
some of the following to strengthen your local news hook:

                                                                                 9
Time the event around a major identity theft story in the news,
                                                                                      plAn A MedIA eVent on protect your
        possibly when arrests, indictments, or prosecutions are made; during
        National Consumer Protection Week (early March); or around                    identity day
        spring cleaning or back-to-school times, when people are thinking of          Media events or press conferences allow you to deliver your story to
        financial issues.                                                             many media outlets at once. When planning a media event, consider:
        Local statistics that highlight the prevalence of identity theft in
        your county, city, or state. The FTC compiles statistics on identity theft    tIMIng. Check your local calendar listings before planning an event to
        complaints by state and city.                                                 make sure it doesn’t conflict with another major media event. The best
        Tips and resources consumers can use to deter, detect, and defend             time to schedule a media event is 10 a.m. This allows time in the morning
        against identity theft.                                                       for the media to review the story options for the day. Consider also that
        Any partners your organization has chosen to work with to hold a              your event might be more successful at certain times of the year (for
        Protect Your Identity Day.                                                    example: during tax season when financial issues and identity theft are
                                                                                      more top-of-mind for consumers).
      4 pRepARe MedIA MAteRIAls  InfoRMAtIon
     Once you have your core story idea in place, prepare press materials. Key        loCAtIon. Ideally, the location of the event should be relevant to the
     materials include:                                                               issue or story being presented. Take the time to scout your location
                                                                                      before you choose it, and visit it again a few times before you host the
        Press release – A one- to two-page document with information
                                                                                      event. Think about what equipment you will need (for example: podium,
        about your group’s Protect Your Identity Day and a quote from
                                                                                      microphone, other A/V items, media check-in table), as well as space
        your spokesperson(s).
                                                                                      requirements to accommodate attendees and potential press.
        Media advisory – A one-page document inviting journalists to
        attend a Protect Your Identity Day media event, should your
        organization decide to host one as part of the day. The advisory should       InVItIng guests. Consider inviting community leaders, including
        highlight basic information (who, what, when, and where).                     the mayor, local law enforcement, local city council members, and noted
                                                                                      identity theft experts to speak at a news conference. Also, be sure to
        Talking points – A one- to two-page document with basic talking
                                                                                      invite individuals from the community who may wish to learn more about
        points for your spokesperson(s), which highlight how to deter, detect,
                                                                                      identity theft (for example: religious groups, fraternal organizations,
        and defend against identity theft.
                                                                                      military, business people, and educators).
     For a full suite of template media materials, please visit ftc.gov/idtheft
     or refer to the DVD in this kit and see Section 7 of Talking About
     Identity Theft: A How-To Guide.                                                  InVItIng MedIA. The most effective way to invite media to a press
                                                                                      conference is through a media advisory. Send your advisory to the
      5 IdentIfy A MedIA spokespeRson                                                 reporter about 10 days before your event and again the day before the
     It will be helpful to identify possible spokespersons early on whom              event.
     the media can interview. These could be a victim who can offer first-
     hand testimonial and an expert – either a law enforcement officer or a           otheR ConsIdeRAtIons.
     politician. A strong spokesperson is credentialed and knowledgeable
     about the identity theft issue and is comfortable speaking to the media.            Do you need to prepare signs, like banners and podium signs, that
     If your spokesperson wants more information on identity theft, he or she            can be placed in front of cameras and photographers?
     can get up to speed at ftc.gov/idtheft.                                             Do you have an agenda or “run of show” that outlines the flow of
                                                                                         the media event?
      6 ContACt (oR “pItCh”) the MedIA                                                   When will you brief assigned spokesperson(s) before the media
     Contact the media about 10 days prior to Protect Your Identity Day.                 event, go over the event agenda, and prepare for potential questions?
     Typically, it is helpful to send an email pitch first that includes your press      Who is creating the press kits, including the agenda, fact sheet,
     release. Follow up with a phone call to the reporter the next day.                  bios of speakers, press release, and other relevant materials?



10                                                                                                                                                                11
outReACh to pARtneRs
Developing relationships with like-minded organizations is an important
part of outreach efforts as you work to deter, detect, and defend against
identity theft. By joining credible partners who can help expound on
your identity theft messages, you can add depth, multiply your “arms and
legs,” and increase consumer awareness about identity theft.


5 steps to suCCessful protect your
        identity day pARtneRshIps

 1 IdentIfy youR pARtneRs
To decide which partners are a good fit, list local organizations that
your audience knows and trusts. Seek advice from others like local law
enforcement agencies, for example, on which organizations they would
recommend aligning with for a Protect Your Identity Day.
Some partners that may be appropriate for identity theft prevention
include:

   Consumer groups (victims’              Business and labor
   assistance, legal aid…)                organizations (grocery stores,
   Law enforcement agencies               real estate offices, financial
   (police departments, state             advisors, local unions, utility
   attorney general’s office…)            companies…)

   City, county, and state                Seniors’ groups (assisted living
   government (Department of              facilities, area agencies on
   Motor Vehicles, local Social           aging, senior centers…)
   Security office…)                      Education groups (schools,
   Faith-based organizations              libraries, universities…)
   (churches, temples, mosques,           Medical community (hospital
   synagogues…)                           administrators, pharmacies,
   Media organizations (radio             health centers…)
   stations, television stations,         Military (base officials,
   newspapers…)                           veterans, family support
                                          offices…)




                                                                             13
2 do youR hoMewoRk  MAke ContACt                                              4 be CleAR on who Is doIng whAt
     Learn as much as you can about any prospective partners: their role in         Confirm your partnership arrangements in a letter or email to your new
     the community, how they are impacted by identity theft, and how their          partner organization. This document can be a simple list of the details
     mission relates to the community or consumer protection and/or privacy.        of the partnership. You may want to include a summary of the role and
     As you approach potential partners, remember that enthusiasm goes a            responsibilities of each partner, as well.
     long way. Call or set up a meeting to start the ball rolling and gauge their
     interest. During this meeting, tailor your presentation to the particular
                                                                                     5 CoMMunICAte CleARly  fRequently
     group as much as possible, and highlight how the partnership could
     benefit their group. Be prepared to speak about the benefits of addressing     Once your partnership is established and outreach is underway, keep
     identity theft together, the potential “win-win” of a partnership, and         your partner(s) informed and involved. It is important to keep local law
     background about Protect Your Identity Day and identity theft.                 enforcement agencies aware of your work, too, because they are your
                                                                                    allies in the fight against identity theft. Give them notice of any events or
                                                                                    special projects that you host.
      3 plAn A pRoteCt youR IdentIty dAy
     Once you and your partner(s) have agreed to work together, establish
     a plan for your Protect Your Identity Day, starting with a
     group brainstorm about how this day could look. Clarify roles and
     responsibilities, and reach consensus on your goals and strategies for
     success.




14                                                                                                                                                                  15
plAn eVents
A successful Protect Your Identity Day event can raise awareness
about identity theft by bringing together a wide range of participants
and reaching a wide range of people – either directly or through media
coverage.


8 steps to A suCCessful protect your
        identity day eVent
Following are some important considerations for planning a Protect
Your Identity Day event.

 1 deteRMIne tIMIng
Check your newspaper’s local calendar listings before planning an event
to avoid conflicts. If you plan on inviting the media, the best time to
schedule an event is 10 a.m.

 2 estAblIsh A budget
What the event looks like and where it is held will be determined largely
by your budget. For example, holding your event at a hotel will involve
considerable fees. However, a local police station may be more than
willing to offer space at no cost. It is important to prioritize the elements
you want in place to make your Protect Your Identity Day a success.

 3 seCuRe A loCAtIon
The location of the event should be relevant to the issue or story being
presented, be accessible to public transportation, and have ample
parking. Scout a few locations before making your choice, and visit a
few times before you host the event. Anticipate what equipment will be
necessary (for example: podium, microphone, other audiovisual items,
media check-in table), as well as space requirements to accommodate
attendees and potential press. Think about police stations, law
enforcement offices, grocery stores, places of worship, senior centers,
community recreation centers, schools, universities, libraries, public
parks, museums, or other community locations.

 4 deVelop the Run of show
Another important element to consider is the agenda or general run of
show for the day. Think through the full event agenda, considering a
variety of factors: food and beverages; hand-outs; parking; audiovisual
needs; room set-up, and length of program. See Sample Run of Show
on page 19.




                                                                                17
5 InVIte guests                                                                    sAMple Run of show
                                                                                         9:30 am –10:00 am                             Arrivals / Refreshments
     Consider inviting community leaders, including the mayor, local council                                                Guests, media (if invited) check in
     members, law enforcement experienced in dealing with identity theft, and
     identity theft experts. A proclamation from a prominent official is useful,         10:00 am –10:05 am              Introductions / Opening Remarks
                                                                                                   Your organization’s leader makes welcoming remarks
     whether the official is attending or not. See Sample Proclamation                                  Local official makes remarks about identity theft
     on page 20. Invite other guests, including all the organizations and
     individuals you support or with which you’re involved.                              10:05 am –10:20 am                Deterring, Detecting, and Defending
                                                                                                                      Against Identity Theft in Our Community
     They may include:
                                                                                         10:20 am – 10:30 am                Identity Theft Panel Discussion
        Consumer groups                              Professional associations
                                                                                                  Several victims of identity theft share their experiences
        Victim advocacy groups                       (outside the workplace)                                                   and convey lessons learned
        Community or neighborhood                    High school or college alumni
        associations                                 groups                              10:30 am – 10:50 am                                 Questions  Answers
                                                                                                                                                             All
        Volunteer and/or charitable                  General public (families,
        organizations                                individuals)                        10:50 am – 10:55 am                               Closing Remarks
        Civic organizations, local                   Former identity theft victims                               Distinguished guest makes closing remarks
                                                                                                                              (mayor or other “VIP” figure)
        business groups, or chambers of              Media
        commerce                                     Other                               10:55 am – 11:00 am                                  Conclusion
        Law enforcers                                                                           Your organization’s leader thanks everyone for attending

      6 InVIte pRess                                                                     sAMple tAlkIng poInts
     The most common way to invite media to a press conference is by                     The following are suggested talking points to include in your Protect
     developing and distributing a media advisory to reporters. Send the                 Your Identity Day. They are general and can be tailored to fit your
     advisory to the reporter about 10 days before your event and again the              particular event.
     day before the event. See Outreach to Media, Step 6: Contact (or                       The Federal Trade Commission is working with law
     “Pitch”) the Media on page 10 for details.                                             enforcement agencies, businesses, consumer groups, and
                                                                                            organizations across the country to educate people about identity
      7 CReAte MAteRIAls                                                                    theft. The agency is encouraging organizations to host Protect Your
                                                                                            Identity Days throughout the year and throughout the nation to
     Whether you are developing a basic invitation and agenda for the day,                  increase awareness about deterring, detecting, and defending against
     or a full suite of Protect Your Identity Day materials (for example:                   the crime.
     flier, poster, press materials, agenda, identity theft tips, t-shirts, balloons),
     build in enough time to create the materials, get input on them from                   Identity theft is a serious crime. It occurs when your personal
     others, revise them appropriately, and produce them. One way to engage                 information is stolen and used without your knowledge to commit
     the audience on identity theft is to test their knowledge of the issue,                fraud or other crimes.
     with an informative quiz that can be used as a handout. See Sample                     Identity theft can cost you time and money. It can destroy your
     Consumer Quiz on page 20. The FTC’s “Avoid ID Theft: Deter, Detect,                    credit and ruin your good name.
     Defend” logo and materials are available for your use at no cost.                      While there are no guaranteed ways to avoid identity theft,
     This kit and many of the FTC publications listed on page 23                            you can minimize your chances of becoming a victim and minimize
     can be ordered in bulk, for free, from bulkorder.ftc.gov.                              the damage should a theft occur.
                                                                                             Deter thieves by safeguarding your information. Shred
      8 fInAlIze logIstICs                                                                    sensitive materials, protect your Social Security number, and never
     Ensure that all logistical details are thought out, implemented,                         give out personal information on the phone or Internet.
     and double-checked. This could include audiovisual, invitations,                        Detect suspicious activity by routinely monitoring your
     spokespersons, and materials.                                                            financial accounts and billing statements. Inspect your credit
     For more information about Events, see Outreach to Media,                                report, and be alert to unusual signs, like bills that don’t arrive or
     Plan a Media Event on Protect Your Identity Day, on page 11.                             denials of credit.

18                                                                                                                                                                     19
Defend against identity theft as soon as you suspect it.                   4. I can use passwords like my birthday, my mother’s maiden name, or
          Place a fraud alert on your credit reports, close accounts that have          the last four digits of my Social Security number when I’m online.
          been tampered with, file a police report, and report the theft to the         Identity thieves are clever, but they’re not likely to take the time to
          FTC.                                                                          figure these things out.
        To combat identity theft, the FTC leads a nationwide education               5. If I think my identity has been stolen, I need to close any accounts that
        program: Avoid ID Theft: Deter, Detect, Defend.                                 have been tampered with, place a “Fraud Alert” on my credit reports,
        To learn more, visit ftc.gov/idtheft.                                           file a police report, and contact the Federal Trade Commission to file
                                                                                        a complaint.

     sAMple pRoClAMAtIon                                                             6. If I don’t enter my personal information online, I probably don’t have
                                                                                        to worry about identity theft.
     Whereas, identity theft is a serious crime, one that impacts people from
     all walks of life and in our community; and                                     AnsweRs
     Whereas [insert organization] is committed to fighting identity theft by        1. False. Identity thieves are clever and can do quite a bit of damage
     collaborating with local residents and other organizations to educate the          using your Social Security number. Your Social Security number is
     public about this issue; and                                                       as good as gold. Protect your Social Security number. Don’t carry
     Whereas [insert organization] has a proud history of [insert your                  your Social Security card in your wallet or write your Social Security
     organization’s mission descriptor such as “fighting for justice,” or               number on a check. Find out why someone needs it, or ask to use
     “serving all peoples,” etc.]; and                                                  another identification number.
     Whereas the Federal Trade Commission wishes to educate all Americans            2. True. Our trash can be a treasure trove for identity thieves because
     about how to avoid identity theft by deterring, detecting and defending            some of what we might throw away, like bank or credit card
     against it; and                                                                    statements, can include sensitive information on it. Shred all mail or
     Whereas [insert name of city, state] recognizes that ongoing education             documents that include personal information.
     and preparation for safe communities is necessary for a peaceful quality        3. False. It is crucial to monitor your financial accounts and billing
     of life,                                                                           statements regularly. Identity thieves are sneaky and sophisticated,
     Now, therefore, I, [insert official’s name], of the City of [insert city], do      and sometimes, the way people find out their identity has been stolen
     hereby proclaim the day of [insert month, date, year] as: Protect Your             is by checking their credit reports. Visit www.AnnualCreditReport.com
     Identity Day.                                                                      or call 1-877-322-8228 to order your free credit reports each year.
                                                                                        Regularly read your financial statements as well. Identity thieves strike
     Be it further resolved that [insert name of city, state] agrees to support         everywhere, even in the safest of communities.
     this effort in our community in order to become a leading model of safety,
     shared learning, and prosperity.                                                4. False. Don’t use obvious passwords like your birth date, or your
                                                                                        mother’s maiden name. Identity thieves are likely to start with
     sAMple ConsuMeR quIz                                                               this information, knowing that many consumers rely on “easy-to-
                                                                                        remember” passwords like these to protect their most sensitive
     tRue oR fAlse?                                                                     information.
     1. It’s okay if I carry my Social Security card around with me. Identity        5. True. Once your identity has been stolen, the thief has your good
        thieves need far more than this number to successfully steal my                 name and credit at his/her fingertips. Alerting the relevant authorities
        identity.                                                                       can stop further damage to your identity and help law enforcement
                                                                                        work to protect you (and others who may be impacted).
     2. By shredding a lot of mail that contains my personal information on
        it, I am helping to deter potential dumpster divers, who might take my       6. False. Skilled identity thieves may use a variety of methods to get your
        mail and then steal my identity.                                                information, such as stealing your mail, wallet, or purse; obtaining
                                                                                        personal information from you by posing as legitimate business
     3. I don’t need to check my credit that often; I know it’s rock solid and I
                                                                                        people; stealing personnel records from employers; or hacking into
        live in a safe community where identity thieves aren’t likely to strike.
                                                                                        computers.




20                                                                                                                                                                  21
AddItIonAl ResouRCes
More information on identity theft is available online at ftc.gov/idtheft,
or by phone at 1-877-ID-THEFT (438-4338).
Many of the FTC publications listed here can be ordered in bulk, for free,
from bulkorder.ftc.gov.

AVoId Id theft: deteR, deteCt, defend toolkIt
A toolkit to educate organizations or constituents about identity theft and
how to deter, detect, and defend against it. It includes:
    Talking About Identity Theft: A How-to Guide
    Take Charge: Fighting Back Against Identity Theft
    Avoid ID Theft: Deter, Detect, Defend brochure
    Avoid ID Theft: Deter, Detect, Defend video

ftC publICAtIons:
   Deter, Detect, Defend: Avoid ID Theft. Tri-fold brochure with
   tips for consumers on how to deter, detect, and defend against identity
   theft. This is the best publication to share with the audience at your
   Protect Your Identity Day event.
   Take Charge: Fighting Back Against Identity Theft. The FTC’s
  comprehensive guide for victims of identity theft. Includes the ID
  Theft Affidavit.
   Remedying the Effects of Identity Theft. Summarizes your
   rights if you’re a victim of identity theft.
   What To Do If Your Personal Information Has Been
   Compromised. How to respond if your personal information is
   compromised as a result of a security breach at another organization.
   Identity Crisis…What to Do If Your Identity Is Stolen.
   Advice on dealing with identity theft.
   How Not to Get Hooked by a Phishing Scam. How to avoid
   online scammers who want to steal your personal information.
   Credit, ATM, and Debit Cards: What To Do If They’re Lost
   or Stolen. Outlines procedures for reporting loss or theft, and for
   minimizing your risk.
   Your Access to Free Credit Reports. Explains your right to a
   free copy of your credit reports and how to order online, by phone, or
   through the mail. Also includes a copy of the standard credit report
   request form.
   How to Dispute Credit Report Errors. Explains how to dispute
   and correct inaccurate information in your credit report, and includes
   a sample dispute letter.


                                                                              23
Medical Identity Theft. Explains how medical identity theft
        occurs and how it differs from traditional identity theft. Offers tips to
        minimize your risk and how to recover should you experience a theft.
        Fair Credit Billing. Explains the Fair Credit Billing Act, which
        establishes procedures for resolving billing errors on your credit card
        accounts, and includes a sample dispute letter.
        Debt Collection FAQs: A Guide for Consumers. Answers
        commonly asked questions about your rights under the Fair Debt
        Collection Practices Act, which prohibits debt collectors from using
        unfair or deceptive practices to collect overdue bills.
        Stop. Think. Click. 7 Practices for Safer Computing. Provides
        practical tips to help you be on guard against Internet fraud, secure
        your computer, and protect your personal information. Available at
        OnGuardOnline.gov.
        To Buy or Not To Buy: Identity Theft Spawns New Products
        and Services to Help Minimize Risk. Explains when you
        should initiate fraud alerts or credit freezes and how to evaluate credit
        monitoring products and services.
        Extra! Extra! Count on Scammers and Schemers to Follow
        the News. Warns consumers that scammers claiming to be from the
        Internal Revenue Service or the Social Security Administration may
        call or send emails saying they need personal or financial information
        to deposit a tax or government rebate check directly. The scammers
        then use that information to commit identity theft.
        Military Personnel  Families Fighting Back Against
        Identity Theft. Explains how to deter, detect, and defend against
        identity theft to military personnel and their families, who have special
        rights.
        Protecting Personal Information: A Guide for Business.
        Offers tips for business on creating and implementing a plan for
        safeguarding personal information. Interactive tutorial is available at
        ftc.gov/infosecurity.

     ConsuMeR sentInel netwoRk
     A free tool from the FTC for law enforcement. Consumer Sentinel
     enables searches of millions of fraud and identity theft complaints
     online. To become a member of the network, visit
     Register.ConsumerSentinel.gov.




24
To learn more about identity theft and how to deter,
detect, and defend against it, visit ftc.gov/idtheft. Or
request bulk orders for free, from bulkorder.ftc.gov.

Mais conteúdo relacionado

Mais procurados

Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 
Cyber ID Sleuth Data Security Forensics
Cyber ID Sleuth Data Security ForensicsCyber ID Sleuth Data Security Forensics
Cyber ID Sleuth Data Security Forensicsbtr-security
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft businessMatt Smith
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBakerTillyConsulting
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT- Mark - Fullbright
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention- Mark - Fullbright
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 

Mais procurados (20)

Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
Cyber ID Sleuth Data Security Forensics
Cyber ID Sleuth Data Security ForensicsCyber ID Sleuth Data Security Forensics
Cyber ID Sleuth Data Security Forensics
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft business
 
Jon ppoint
Jon ppointJon ppoint
Jon ppoint
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
Identity Theft Toolkit
Identity Theft ToolkitIdentity Theft Toolkit
Identity Theft Toolkit
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 

Destaque

2014 legalshield and Identify Theft Information
2014 legalshield and Identify Theft Information2014 legalshield and Identify Theft Information
2014 legalshield and Identify Theft InformationLynn Kronk
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSGreg Ewers
 
How to Prevent Identity Theft
How to Prevent Identity TheftHow to Prevent Identity Theft
How to Prevent Identity Thefthotspotshield
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
Privacy Identity Theft National ID Card and REAL ID Act
Privacy Identity Theft National ID Card and REAL ID ActPrivacy Identity Theft National ID Card and REAL ID Act
Privacy Identity Theft National ID Card and REAL ID ActAmin Bandeali
 
Identity theft blue4it nljug
Identity theft blue4it nljugIdentity theft blue4it nljug
Identity theft blue4it nljugBrian Vermeer
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017Brian Vermeer
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationMonikaPenkova
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
E-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation IssuesE-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation IssuesNurul Izzah
 

Destaque (20)

2014 legalshield and Identify Theft Information
2014 legalshield and Identify Theft Information2014 legalshield and Identify Theft Information
2014 legalshield and Identify Theft Information
 
Social Illness-Cyber Crime
Social Illness-Cyber CrimeSocial Illness-Cyber Crime
Social Illness-Cyber Crime
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
 
How to Prevent Identity Theft
How to Prevent Identity TheftHow to Prevent Identity Theft
How to Prevent Identity Theft
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Privacy Identity Theft National ID Card and REAL ID Act
Privacy Identity Theft National ID Card and REAL ID ActPrivacy Identity Theft National ID Card and REAL ID Act
Privacy Identity Theft National ID Card and REAL ID Act
 
Identity theft blue4it nljug
Identity theft blue4it nljugIdentity theft blue4it nljug
Identity theft blue4it nljug
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
E-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation IssuesE-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation Issues
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 

Semelhante a Ftc identity theft kit

Protect Yourself Against Identity Theft
Protect Yourself Against Identity TheftProtect Yourself Against Identity Theft
Protect Yourself Against Identity Theftpmass
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theftnewsusa01
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Reclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To RecoveryReclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To Recoveryjonmcdowall
 
Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachDaniel Michels
 

Semelhante a Ftc identity theft kit (20)

Protecting Vanderbilt Information
Protecting Vanderbilt InformationProtecting Vanderbilt Information
Protecting Vanderbilt Information
 
Guarding Vanderbilt information
Guarding Vanderbilt informationGuarding Vanderbilt information
Guarding Vanderbilt information
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Protect Yourself Against Identity Theft
Protect Yourself Against Identity TheftProtect Yourself Against Identity Theft
Protect Yourself Against Identity Theft
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Monitor Your Credit Report
Monitor Your Credit  ReportMonitor Your Credit  Report
Monitor Your Credit Report
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Reclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To RecoveryReclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To Recovery
 
Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax Breach
 

Último

(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTharshitverma1762
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Sonam Pathan
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一S SDS
 
Managing Finances in a Small Business (yes).pdf
Managing Finances  in a Small Business (yes).pdfManaging Finances  in a Small Business (yes).pdf
Managing Finances in a Small Business (yes).pdfmar yame
 
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...Amil baba
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfMichael Silva
 
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...Amil baba
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Sonam Pathan
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfMichael Silva
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGeckoCoinGecko
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technologyz xss
 

Último (20)

(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results Presentation
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
 
Managing Finances in a Small Business (yes).pdf
Managing Finances  in a Small Business (yes).pdfManaging Finances  in a Small Business (yes).pdf
Managing Finances in a Small Business (yes).pdf
 
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdf
 
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth AdvisorsQ1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdf
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology
 

Ftc identity theft kit

  • 1. c t i v e to ra o te lk in it Fighting Back against IdentIty theft ys ty ur T da tI yo hOS Id ec N & FEDERAL TRADE COMMISSION ot pLA en t Pr TO w hO
  • 2. About thIs toolkIt The Federal Trade Commission, the nation’s consumer protection agency, has developed this toolkit to help organizations combat identity theft by raising awareness and educating people through a Protect Your Identity Day. This kit provides information and sample materials to help plan and host a successful Protect Your Identity Day. Included in this kit is a CD that contains the entire kit contents, which you can customize and print. The CD also includes Deter, Detect, Defend videos for computer broadcast and Talking About Identity Theft: A How-To Guide, which offers more sample materials, including a speech, presentation, and template media materials in English and Spanish. You also can download that guide at ftc.gov/idtheft. This kit also includes a DVD that features Deter, Detect, Defend videos for television broadcast. how to use the Cd-RoM: how to use the dVd: 1. Load the CD-ROM in your computer. Follow the normal loading instructions for your DVD player. 2. PC: If you use Windows, Autorun will launch the program automatically. If Autorun is not active, double-click the “My Computer” icon and then double- click on the “Interactive Toolkit” icon. MAC: Double-click the “Interactive Toolkit” icon then double-click the file you would like to view. how to plAn & host protect your identity days tAble of Contents About Identity Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 • Tips: Avoid ID Theft: Deter, Detect, Defend About Protect Your Identity Day . . . . . . . . . . . . . . . . . . . . . .7 • Host a Protect Your Identity Day Outreach To Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 • 6 Steps to Media Success • Plan a Media Event Outreach To Partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 • 5 Steps to Successful Partnerships Plan Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 • 8 Steps to a Successful Event • Sample Run of Show • Sample Talking Points • Sample Official Proclamation • Sample Consumer Quiz Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 1
  • 3. About IdentIty theft whAt Is IdentIty theft? Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. The Federal Trade Commission estimates that as many as 10 million Americans have their identities stolen each year. In fact, you or someone you know may have experienced some form of identity theft. Identity theft is serious. People whose identities have been stolen can spend hundreds of dollars and dozens of hours cleaning up the mess thieves have made of their good name and credit record. Consumers victimized by identity theft may lose out on job opportunities, or be denied loans for education, housing, or cars because of negative information on their credit reports. They may even be arrested for crimes they did not commit. The potential for damage, loss, and stress is considerable. how do thIeVes steAl An IdentIty? Identity theft starts with the misuse of your personally identifying information. For identity thieves, your name and Social Security number, credit card numbers, or other financial account information is as good as gold. Skilled identity thieves may use a variety of methods to get hold of your information: They may steal your mail, wallet, or purse. They may get personal information from you by posing as legitimate companies through email, in a practice known as “phishing.” Or they might lie to you on the phone. They may take your information from businesses or other institutions by stealing personnel records, bribing or conning an employee who has access to these records, or breaking into your records electronically. Some identity theft victims even report that their information has been stolen by someone they know. tIps AVoId Id theft: deteR, deteCt, defend While nothing can guarantee that you won’t become a victim of identity theft, you can take specific steps to minimize your risk, and minimize the damage if a problem develops. It’s about following the “3 D’s” of identity theft protection – Deter, Detect, Defend. 3
  • 4. Order your credit report: deteR: The law requires the major nationwide credit reporting companies – Equifax, Experian, and TransUnion – to give you a free copy of your deteR IdentIty thIeVes by sAfeguARdIng credit report each year if you ask for it. youR InfoRMAtIon Visit www.AnnualCreditReport.com or call 1-877-322-8228, a Shred financial documents and paperwork with personal service created by these three companies, to order your free credit information before you discard them. reports each year. Or you can complete the Annual Credit Report Protect your Social Security number. Don’t carry your Social Request Form and mail it to: Annual Credit Report Request Security card in your wallet or write your Social Security number on Service, P.O. Box 105281, Atlanta, GA 30348-5281. You can a check. Give it out only if absolutely necessary or ask to use another download the form at ftc.gov/freereports. identifier. Don’t give out personal information on the phone, through the mail, or over the Internet unless you have initiated the defend: contact and know who you are dealing with. defend AgAInst IdentIty theft As soon As Never click on links sent in unsolicited emails; instead, type in you suspeCt A pRobleM a Web address you know. Use firewalls, anti-spyware, and anti-virus Place a “Fraud Alert” on your credit reports, and review software to protect your home computer; keep them up-to-date. Visit the reports carefully. The alert tells creditors to follow certain OnGuardOnline.gov for more information. procedures before they open new accounts in your name or make Don’t use an obvious password like your birth date, your mother’s certain changes to your existing accounts. The three nationwide credit maiden name, or the last four digits of your Social Security number. reporting companies have toll-free numbers for placing an initial 90-day fraud alert; a call to one company is sufficient: Keep your personal information in a secure place at home, especially if you have roommates, employ outside help, or are Equifax: 1-800-525-6285 having work done in your house. Experian: 1-888-EXPERIAN (397-3742) TransUnion: 1-800-680-7289 Placing a fraud alert entitles you to free copies of your credit reports. deteCt: Look for inquiries from companies you haven’t contacted, accounts deteCt suspICIous ACtIVIty by RoutInely you didn’t open, and debts on your accounts that you can’t explain. MonItoRIng youR fInAnCIAl ACCounts Close accounts. Close any accounts that have been tampered with or established fraudulently. bIllIng stAteMents Call the security or fraud departments of each company where Be alert to signs that require immediate attention: an account was opened or changed without your okay. Follow up in Mail or bills that do not arrive as expected. writing, with copies of supporting documents. Unexpected credit cards or account statements. Use the Identity Theft Affidavit at ftc.gov/idtheft to support your Denials of credit for no apparent reason. written statement. Calls or letters about purchases you did not make. Ask for written verification that the disputed account has been closed and the fraudulent debts discharged. Inspect: Keep copies of documents and records of your conversations Your credit report. Credit reports have information about you, about the theft. including what accounts you have and your bill paying history. File a police report. File a report with law enforcement officials to Your financial statements. Review financial accounts and help you with creditors who may want proof of the crime. billing statements regularly, looking for charges you did not make. Report your complaint to the FTC. Your report helps law enforcement officials across the country in their investigations. Online: ftc.gov/idtheft By phone: 1-877-ID-THEFT (438-4338) or TTY, 1-866-653-4261 4 5
  • 5. About protect your identity day The Federal Trade Commission helps people learn how to minimize the risk of becoming a victim of identity theft. While there is no fool-proof way to avoid identity theft, there are ways to minimize the chances of becoming a victim and minimize the damage should a theft occur. Hosting a Protect Your Identity Day can show your community how. Law enforcement officials, state attorneys general, state and local government, and community and business leaders each can play a pivotal role in educating the public. We encourage you to host a Protect Your Identity Day in your community. There is no single date for a Protect Your Identity Day. You can designate any day that works for your community or organization. The important thing is to take the lead in educating your particular community about avoiding identity theft. host A protect your identity day Hosting a Protect Your Identity Day is easy, and there are many ways to do it. When, where, and how it happens is up to you. Consider hosting a media event, such as a press conference, to raise awareness of the Day and the issue. Or stage a dedicated event at your local civic center, police station, mall, public library, or university. Or arrange a booth at an existing community event, such as a county fair or festival. You might consider hosting a “shred event” so people in your community can shred unwanted personal information and records. This could be a half-day or full-day event. If you are interested in expanding your reach and resources, recruit a partner organization as a co-sponsor. Here are three possible approaches for implementing your Day: 1. Media outreach 2. Partnership outreach 3. Events We offer step-by-step guidance and customizable template materials to help you implement each approach. Different levels of engagement will enable you to use your resources to maximum effect. 7
  • 6. outReACh to MedIA When hosting a Protect Your Identity Day, you can work with local media to spread the word to your community about identity theft and demonstrate your group’s commitment to fighting this crime. Media outreach takes many forms – from a call to a reporter to suggest a story to issuing a formal press release to organizing a media event. All can be effective. The important thing is to tailor the outreach to your organization’s particular approach to Protect Your Identity Day. Following are two sections that offer basic guidance about reaching out to media and planning a media event. For more information on media outreach and template media materials, please visit ftc.gov/idtheft, and refer to the CD in this kit. See Section 7 of Talking About Identity Theft: A How-To Guide. 6 steps to MedIA suCCess on protect your identity day Whether your organization plans on releasing helpful tips to consumers about how to combat identity theft on its Protect Your Identity Day or hosting a full scale media event, six general steps can help you get positive media coverage for your event. 1 seleCt A tARget AudIenCe Determine who you want to reach. This may include businesspeople, financial planners, teachers, your employees or organization’s members, or local officials. You may wish to focus on a particular population, such as older citizens or students. 2 deVelop A MedIA lIst Once you have identified your target audience, create a media list. It should be comprised of media outlets (local newspapers, television/ cable stations, and radio stations) and reporters at each outlet who may find the identity theft issue relevant to the subject area they cover. Include these journalists’ names and contact information (phone, email, fax, address) on your list. By communicating with specific individuals at news outlets, you are more likely to get a response. 3 fInd the news Angle Identity theft is an issue that gets coverage. However, to generate local media interest, your organization should consider what will make your Protect Your Identity Day a compelling story. Consider including some of the following to strengthen your local news hook: 9
  • 7. Time the event around a major identity theft story in the news, plAn A MedIA eVent on protect your possibly when arrests, indictments, or prosecutions are made; during National Consumer Protection Week (early March); or around identity day spring cleaning or back-to-school times, when people are thinking of Media events or press conferences allow you to deliver your story to financial issues. many media outlets at once. When planning a media event, consider: Local statistics that highlight the prevalence of identity theft in your county, city, or state. The FTC compiles statistics on identity theft tIMIng. Check your local calendar listings before planning an event to complaints by state and city. make sure it doesn’t conflict with another major media event. The best Tips and resources consumers can use to deter, detect, and defend time to schedule a media event is 10 a.m. This allows time in the morning against identity theft. for the media to review the story options for the day. Consider also that Any partners your organization has chosen to work with to hold a your event might be more successful at certain times of the year (for Protect Your Identity Day. example: during tax season when financial issues and identity theft are more top-of-mind for consumers). 4 pRepARe MedIA MAteRIAls InfoRMAtIon Once you have your core story idea in place, prepare press materials. Key loCAtIon. Ideally, the location of the event should be relevant to the materials include: issue or story being presented. Take the time to scout your location before you choose it, and visit it again a few times before you host the Press release – A one- to two-page document with information event. Think about what equipment you will need (for example: podium, about your group’s Protect Your Identity Day and a quote from microphone, other A/V items, media check-in table), as well as space your spokesperson(s). requirements to accommodate attendees and potential press. Media advisory – A one-page document inviting journalists to attend a Protect Your Identity Day media event, should your organization decide to host one as part of the day. The advisory should InVItIng guests. Consider inviting community leaders, including highlight basic information (who, what, when, and where). the mayor, local law enforcement, local city council members, and noted identity theft experts to speak at a news conference. Also, be sure to Talking points – A one- to two-page document with basic talking invite individuals from the community who may wish to learn more about points for your spokesperson(s), which highlight how to deter, detect, identity theft (for example: religious groups, fraternal organizations, and defend against identity theft. military, business people, and educators). For a full suite of template media materials, please visit ftc.gov/idtheft or refer to the DVD in this kit and see Section 7 of Talking About Identity Theft: A How-To Guide. InVItIng MedIA. The most effective way to invite media to a press conference is through a media advisory. Send your advisory to the 5 IdentIfy A MedIA spokespeRson reporter about 10 days before your event and again the day before the It will be helpful to identify possible spokespersons early on whom event. the media can interview. These could be a victim who can offer first- hand testimonial and an expert – either a law enforcement officer or a otheR ConsIdeRAtIons. politician. A strong spokesperson is credentialed and knowledgeable about the identity theft issue and is comfortable speaking to the media. Do you need to prepare signs, like banners and podium signs, that If your spokesperson wants more information on identity theft, he or she can be placed in front of cameras and photographers? can get up to speed at ftc.gov/idtheft. Do you have an agenda or “run of show” that outlines the flow of the media event? 6 ContACt (oR “pItCh”) the MedIA When will you brief assigned spokesperson(s) before the media Contact the media about 10 days prior to Protect Your Identity Day. event, go over the event agenda, and prepare for potential questions? Typically, it is helpful to send an email pitch first that includes your press Who is creating the press kits, including the agenda, fact sheet, release. Follow up with a phone call to the reporter the next day. bios of speakers, press release, and other relevant materials? 10 11
  • 8. outReACh to pARtneRs Developing relationships with like-minded organizations is an important part of outreach efforts as you work to deter, detect, and defend against identity theft. By joining credible partners who can help expound on your identity theft messages, you can add depth, multiply your “arms and legs,” and increase consumer awareness about identity theft. 5 steps to suCCessful protect your identity day pARtneRshIps 1 IdentIfy youR pARtneRs To decide which partners are a good fit, list local organizations that your audience knows and trusts. Seek advice from others like local law enforcement agencies, for example, on which organizations they would recommend aligning with for a Protect Your Identity Day. Some partners that may be appropriate for identity theft prevention include: Consumer groups (victims’ Business and labor assistance, legal aid…) organizations (grocery stores, Law enforcement agencies real estate offices, financial (police departments, state advisors, local unions, utility attorney general’s office…) companies…) City, county, and state Seniors’ groups (assisted living government (Department of facilities, area agencies on Motor Vehicles, local Social aging, senior centers…) Security office…) Education groups (schools, Faith-based organizations libraries, universities…) (churches, temples, mosques, Medical community (hospital synagogues…) administrators, pharmacies, Media organizations (radio health centers…) stations, television stations, Military (base officials, newspapers…) veterans, family support offices…) 13
  • 9. 2 do youR hoMewoRk MAke ContACt 4 be CleAR on who Is doIng whAt Learn as much as you can about any prospective partners: their role in Confirm your partnership arrangements in a letter or email to your new the community, how they are impacted by identity theft, and how their partner organization. This document can be a simple list of the details mission relates to the community or consumer protection and/or privacy. of the partnership. You may want to include a summary of the role and As you approach potential partners, remember that enthusiasm goes a responsibilities of each partner, as well. long way. Call or set up a meeting to start the ball rolling and gauge their interest. During this meeting, tailor your presentation to the particular 5 CoMMunICAte CleARly fRequently group as much as possible, and highlight how the partnership could benefit their group. Be prepared to speak about the benefits of addressing Once your partnership is established and outreach is underway, keep identity theft together, the potential “win-win” of a partnership, and your partner(s) informed and involved. It is important to keep local law background about Protect Your Identity Day and identity theft. enforcement agencies aware of your work, too, because they are your allies in the fight against identity theft. Give them notice of any events or special projects that you host. 3 plAn A pRoteCt youR IdentIty dAy Once you and your partner(s) have agreed to work together, establish a plan for your Protect Your Identity Day, starting with a group brainstorm about how this day could look. Clarify roles and responsibilities, and reach consensus on your goals and strategies for success. 14 15
  • 10. plAn eVents A successful Protect Your Identity Day event can raise awareness about identity theft by bringing together a wide range of participants and reaching a wide range of people – either directly or through media coverage. 8 steps to A suCCessful protect your identity day eVent Following are some important considerations for planning a Protect Your Identity Day event. 1 deteRMIne tIMIng Check your newspaper’s local calendar listings before planning an event to avoid conflicts. If you plan on inviting the media, the best time to schedule an event is 10 a.m. 2 estAblIsh A budget What the event looks like and where it is held will be determined largely by your budget. For example, holding your event at a hotel will involve considerable fees. However, a local police station may be more than willing to offer space at no cost. It is important to prioritize the elements you want in place to make your Protect Your Identity Day a success. 3 seCuRe A loCAtIon The location of the event should be relevant to the issue or story being presented, be accessible to public transportation, and have ample parking. Scout a few locations before making your choice, and visit a few times before you host the event. Anticipate what equipment will be necessary (for example: podium, microphone, other audiovisual items, media check-in table), as well as space requirements to accommodate attendees and potential press. Think about police stations, law enforcement offices, grocery stores, places of worship, senior centers, community recreation centers, schools, universities, libraries, public parks, museums, or other community locations. 4 deVelop the Run of show Another important element to consider is the agenda or general run of show for the day. Think through the full event agenda, considering a variety of factors: food and beverages; hand-outs; parking; audiovisual needs; room set-up, and length of program. See Sample Run of Show on page 19. 17
  • 11. 5 InVIte guests sAMple Run of show 9:30 am –10:00 am Arrivals / Refreshments Consider inviting community leaders, including the mayor, local council Guests, media (if invited) check in members, law enforcement experienced in dealing with identity theft, and identity theft experts. A proclamation from a prominent official is useful, 10:00 am –10:05 am Introductions / Opening Remarks Your organization’s leader makes welcoming remarks whether the official is attending or not. See Sample Proclamation Local official makes remarks about identity theft on page 20. Invite other guests, including all the organizations and individuals you support or with which you’re involved. 10:05 am –10:20 am Deterring, Detecting, and Defending Against Identity Theft in Our Community They may include: 10:20 am – 10:30 am Identity Theft Panel Discussion Consumer groups Professional associations Several victims of identity theft share their experiences Victim advocacy groups (outside the workplace) and convey lessons learned Community or neighborhood High school or college alumni associations groups 10:30 am – 10:50 am Questions Answers All Volunteer and/or charitable General public (families, organizations individuals) 10:50 am – 10:55 am Closing Remarks Civic organizations, local Former identity theft victims Distinguished guest makes closing remarks (mayor or other “VIP” figure) business groups, or chambers of Media commerce Other 10:55 am – 11:00 am Conclusion Law enforcers Your organization’s leader thanks everyone for attending 6 InVIte pRess sAMple tAlkIng poInts The most common way to invite media to a press conference is by The following are suggested talking points to include in your Protect developing and distributing a media advisory to reporters. Send the Your Identity Day. They are general and can be tailored to fit your advisory to the reporter about 10 days before your event and again the particular event. day before the event. See Outreach to Media, Step 6: Contact (or The Federal Trade Commission is working with law “Pitch”) the Media on page 10 for details. enforcement agencies, businesses, consumer groups, and organizations across the country to educate people about identity 7 CReAte MAteRIAls theft. The agency is encouraging organizations to host Protect Your Identity Days throughout the year and throughout the nation to Whether you are developing a basic invitation and agenda for the day, increase awareness about deterring, detecting, and defending against or a full suite of Protect Your Identity Day materials (for example: the crime. flier, poster, press materials, agenda, identity theft tips, t-shirts, balloons), build in enough time to create the materials, get input on them from Identity theft is a serious crime. It occurs when your personal others, revise them appropriately, and produce them. One way to engage information is stolen and used without your knowledge to commit the audience on identity theft is to test their knowledge of the issue, fraud or other crimes. with an informative quiz that can be used as a handout. See Sample Identity theft can cost you time and money. It can destroy your Consumer Quiz on page 20. The FTC’s “Avoid ID Theft: Deter, Detect, credit and ruin your good name. Defend” logo and materials are available for your use at no cost. While there are no guaranteed ways to avoid identity theft, This kit and many of the FTC publications listed on page 23 you can minimize your chances of becoming a victim and minimize can be ordered in bulk, for free, from bulkorder.ftc.gov. the damage should a theft occur. Deter thieves by safeguarding your information. Shred 8 fInAlIze logIstICs sensitive materials, protect your Social Security number, and never Ensure that all logistical details are thought out, implemented, give out personal information on the phone or Internet. and double-checked. This could include audiovisual, invitations, Detect suspicious activity by routinely monitoring your spokespersons, and materials. financial accounts and billing statements. Inspect your credit For more information about Events, see Outreach to Media, report, and be alert to unusual signs, like bills that don’t arrive or Plan a Media Event on Protect Your Identity Day, on page 11. denials of credit. 18 19
  • 12. Defend against identity theft as soon as you suspect it. 4. I can use passwords like my birthday, my mother’s maiden name, or Place a fraud alert on your credit reports, close accounts that have the last four digits of my Social Security number when I’m online. been tampered with, file a police report, and report the theft to the Identity thieves are clever, but they’re not likely to take the time to FTC. figure these things out. To combat identity theft, the FTC leads a nationwide education 5. If I think my identity has been stolen, I need to close any accounts that program: Avoid ID Theft: Deter, Detect, Defend. have been tampered with, place a “Fraud Alert” on my credit reports, To learn more, visit ftc.gov/idtheft. file a police report, and contact the Federal Trade Commission to file a complaint. sAMple pRoClAMAtIon 6. If I don’t enter my personal information online, I probably don’t have to worry about identity theft. Whereas, identity theft is a serious crime, one that impacts people from all walks of life and in our community; and AnsweRs Whereas [insert organization] is committed to fighting identity theft by 1. False. Identity thieves are clever and can do quite a bit of damage collaborating with local residents and other organizations to educate the using your Social Security number. Your Social Security number is public about this issue; and as good as gold. Protect your Social Security number. Don’t carry Whereas [insert organization] has a proud history of [insert your your Social Security card in your wallet or write your Social Security organization’s mission descriptor such as “fighting for justice,” or number on a check. Find out why someone needs it, or ask to use “serving all peoples,” etc.]; and another identification number. Whereas the Federal Trade Commission wishes to educate all Americans 2. True. Our trash can be a treasure trove for identity thieves because about how to avoid identity theft by deterring, detecting and defending some of what we might throw away, like bank or credit card against it; and statements, can include sensitive information on it. Shred all mail or Whereas [insert name of city, state] recognizes that ongoing education documents that include personal information. and preparation for safe communities is necessary for a peaceful quality 3. False. It is crucial to monitor your financial accounts and billing of life, statements regularly. Identity thieves are sneaky and sophisticated, Now, therefore, I, [insert official’s name], of the City of [insert city], do and sometimes, the way people find out their identity has been stolen hereby proclaim the day of [insert month, date, year] as: Protect Your is by checking their credit reports. Visit www.AnnualCreditReport.com Identity Day. or call 1-877-322-8228 to order your free credit reports each year. Regularly read your financial statements as well. Identity thieves strike Be it further resolved that [insert name of city, state] agrees to support everywhere, even in the safest of communities. this effort in our community in order to become a leading model of safety, shared learning, and prosperity. 4. False. Don’t use obvious passwords like your birth date, or your mother’s maiden name. Identity thieves are likely to start with sAMple ConsuMeR quIz this information, knowing that many consumers rely on “easy-to- remember” passwords like these to protect their most sensitive tRue oR fAlse? information. 1. It’s okay if I carry my Social Security card around with me. Identity 5. True. Once your identity has been stolen, the thief has your good thieves need far more than this number to successfully steal my name and credit at his/her fingertips. Alerting the relevant authorities identity. can stop further damage to your identity and help law enforcement work to protect you (and others who may be impacted). 2. By shredding a lot of mail that contains my personal information on it, I am helping to deter potential dumpster divers, who might take my 6. False. Skilled identity thieves may use a variety of methods to get your mail and then steal my identity. information, such as stealing your mail, wallet, or purse; obtaining personal information from you by posing as legitimate business 3. I don’t need to check my credit that often; I know it’s rock solid and I people; stealing personnel records from employers; or hacking into live in a safe community where identity thieves aren’t likely to strike. computers. 20 21
  • 13. AddItIonAl ResouRCes More information on identity theft is available online at ftc.gov/idtheft, or by phone at 1-877-ID-THEFT (438-4338). Many of the FTC publications listed here can be ordered in bulk, for free, from bulkorder.ftc.gov. AVoId Id theft: deteR, deteCt, defend toolkIt A toolkit to educate organizations or constituents about identity theft and how to deter, detect, and defend against it. It includes: Talking About Identity Theft: A How-to Guide Take Charge: Fighting Back Against Identity Theft Avoid ID Theft: Deter, Detect, Defend brochure Avoid ID Theft: Deter, Detect, Defend video ftC publICAtIons: Deter, Detect, Defend: Avoid ID Theft. Tri-fold brochure with tips for consumers on how to deter, detect, and defend against identity theft. This is the best publication to share with the audience at your Protect Your Identity Day event. Take Charge: Fighting Back Against Identity Theft. The FTC’s comprehensive guide for victims of identity theft. Includes the ID Theft Affidavit. Remedying the Effects of Identity Theft. Summarizes your rights if you’re a victim of identity theft. What To Do If Your Personal Information Has Been Compromised. How to respond if your personal information is compromised as a result of a security breach at another organization. Identity Crisis…What to Do If Your Identity Is Stolen. Advice on dealing with identity theft. How Not to Get Hooked by a Phishing Scam. How to avoid online scammers who want to steal your personal information. Credit, ATM, and Debit Cards: What To Do If They’re Lost or Stolen. Outlines procedures for reporting loss or theft, and for minimizing your risk. Your Access to Free Credit Reports. Explains your right to a free copy of your credit reports and how to order online, by phone, or through the mail. Also includes a copy of the standard credit report request form. How to Dispute Credit Report Errors. Explains how to dispute and correct inaccurate information in your credit report, and includes a sample dispute letter. 23
  • 14. Medical Identity Theft. Explains how medical identity theft occurs and how it differs from traditional identity theft. Offers tips to minimize your risk and how to recover should you experience a theft. Fair Credit Billing. Explains the Fair Credit Billing Act, which establishes procedures for resolving billing errors on your credit card accounts, and includes a sample dispute letter. Debt Collection FAQs: A Guide for Consumers. Answers commonly asked questions about your rights under the Fair Debt Collection Practices Act, which prohibits debt collectors from using unfair or deceptive practices to collect overdue bills. Stop. Think. Click. 7 Practices for Safer Computing. Provides practical tips to help you be on guard against Internet fraud, secure your computer, and protect your personal information. Available at OnGuardOnline.gov. To Buy or Not To Buy: Identity Theft Spawns New Products and Services to Help Minimize Risk. Explains when you should initiate fraud alerts or credit freezes and how to evaluate credit monitoring products and services. Extra! Extra! Count on Scammers and Schemers to Follow the News. Warns consumers that scammers claiming to be from the Internal Revenue Service or the Social Security Administration may call or send emails saying they need personal or financial information to deposit a tax or government rebate check directly. The scammers then use that information to commit identity theft. Military Personnel Families Fighting Back Against Identity Theft. Explains how to deter, detect, and defend against identity theft to military personnel and their families, who have special rights. Protecting Personal Information: A Guide for Business. Offers tips for business on creating and implementing a plan for safeguarding personal information. Interactive tutorial is available at ftc.gov/infosecurity. ConsuMeR sentInel netwoRk A free tool from the FTC for law enforcement. Consumer Sentinel enables searches of millions of fraud and identity theft complaints online. To become a member of the network, visit Register.ConsumerSentinel.gov. 24
  • 15. To learn more about identity theft and how to deter, detect, and defend against it, visit ftc.gov/idtheft. Or request bulk orders for free, from bulkorder.ftc.gov.