SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
IDENTITY THEFT 101: 
HOW IT HAPPENS AND WHAT 
YOU CAN DO TO PREVENT IT 
Your information is on file everywhere, from your doctor's office 
to your bank to your school. Savvy criminals know how to get to it, 
so you need to know how to protect it. 
Identity theft can take many forms, but no matter how it hits you, 
its impact can be devastating. 
IDENTITY THEFT 
IS A MAJOR THREAT 
13.1 million consumers suffered identity fraud in 2013. 
Every 2 seconds, another American becomes a victim of identity fraud. 
FORMS OF 
REPORTED 
IDENTITY 
THEFT 
WHAT CRIMINALS DO WITH 
YOUR INFORMATION 
Criminals can get your personal information by: 
Dumpster diving Listening to personal 
Shoulder surfing when you 
enter personal information 
Stealing mail Phishing emails requesting 
Skimming credit 
personal information 
Hacking online accounts containing 
personal or financial information 
With your personal information, criminals can: 
Take out 
a loan 
Open utilities 
accounts 
Posing as a legitimate institution over 
the phone or by email to obtain personal 
quitclaim deed 
THE FINANCIAL IMPACT THAT ID 
THEFT CAN HAVE ON YOUR CREDIT 
10% Types of credit 
used 
10% New credit 
15% Length of credit 
history 
FICO 
CREDIT 
SCORES 
CONSIST OF 
35% Payment history 
30% Amounts owed 
Criminals who have stolen your identity reduce your credit score by: 
Opening new 
credit card 
accounts and 
utilities accounts. 
Obtaining home or 
car loans in your 
name that they may 
default on. 
Upsetting the 
balance between 
credit available 
and credit used. 
Applying for credit, 
which will lower 
your score even if 
the applications 
are denied. 
Failing to make payments 
Failure to pay any bill accrued in your name, including medical bills and utility 
bills can result in the charge being reported to a collections agency, which will 
appear on your credit report and negatively impact your credit score. 
Victims must painstakingly comb through credit reports 
to pinpoint all false inquiries, accounts, and charges and go 
through the lengthy process of disputing them. 
Until the damage is repaired, the victim’s low credit score can impact: 
Ability to get a job when 
employers run the victim’s credit 
Employers are hesitant to hire 
individuals with a low credit score, 
assuming that they're irresponsible. 
Approval for a home or car loan 
If you have a low credit score, you 
may be denied for a loan. 
Application approval for an 
apartment lease 
Individuals with a low credit score 
are seen as high risk and 
landlords may worry that they will 
not pay rent on time or at all. 
Interest rates on lines of credit 
If you are approved for a loan 
or credit card, your interest 
rate is much higher if your credit 
score is low. 
Approval for new credit cards 
A low credit score will result in 
denial for new lines of credit. 
Insurance premiums 
Insurance premiums are based 
off your credit score. A low score 
results in high premiums. 
Victims may also lose money when identity thieves file 
fraudulent tax returns or apply for government benefits 
claims using the victim’s stolen identity. 
Victims of employment fraud, where the criminal obtains 
a job using the victim's identity, may: 
Have trouble getting a job because it 
appears they're employed. 
Be unable to receive unemployment or 
other benefits they need because the 
government believes they are working. 
THE EMOTIONAL IMPACT 
OF IDENTITY THEFT 
Credit card companies and others who believe that the victim has 
been avoiding payments can turn everyday life into a nightmare, with: 
Notices from 
collection agencies 
Persistent harassing 
phone calls 
Astronomical 
bills 
Victims often come to dread looking in the mailbox or answering the phone. 
Identity theft effectively disrupts nearly every part of everyday life. 
In some cases, victims like Erie Salgado have been arrested for crimes 
committed using the stolen identity. Salgado was released 4 days later, but the 
fear of being arrested still haunts him. 
10 WAYS TO PREVENT 
IDENTITY THEFT 
Be extremely cautious about who you give your information to, and never 
trust emails or phone calls from companies claiming to need personal or 
financial details. 
Set up a hold on your mail while you’re traveling so criminals can’t steal 
personal information from your mailbox when you’re away. 
Never discuss personal or financial details on the phone when you’re in a 
public place. 
Check your financial information often, including credit reports, bank 
statements, and any other notices you receive regarding financial 
accounts. 
Make a note of items you don’t receive as well as ones you do – if you stop 
getting credit card or bank statements it could mean that someone has 
filed a false address in your name. 
Keep records of your financial accounts and transaction for five years. 
These will be helpful if you need to dispute fraudulent transactions. 
Keep financial documents and personal records, such as a birth certificate 
and social security card, in a secure location like a home safe. 
Lock your purse or wallet up when you’re at work. 
Place outgoing mail in a post office collection box, not your unsecured 
mail box. 
Shred credit card offers, financial statements, and other mail before 
discarding it. 
Over time, it is possible to recover from identity theft, 
but it's important to act quickly. 
01 
02 
03 
04 
05 
06 
07 
08 
09 
10 
With IdentityForce’s UltraSecure+Credit, your personal information, including your 
credit, will be monitored 24/7, and you’ll be notified immediately of any suspicious 
activity so you can act before any damage is done. If anything does happen, 
IdentityForce will be with you every step of the way helping you restore your identity. 
Brought to you by: 
34% Government 
documents/benefits 
fraud 
17% Credit card 
fraud 
14% Phone or 
utilities fraud 
17% Others 
4% Loan fraud 
6% Employment 
related fraud 
8% Bank fraud 
Apply for a new 
credit card 
information directly from you 
Make withdrawals from 
your bank account 
conversations 
or debit cards 
Use telephone 
calling cards 
File fraudulent 
tax returns 
File a 
SOURCES: 
http://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-january-dece 
mber-2013/sentinel-cy2013.pdf 
https://www.javelinstrategy.com/brochure/314 
http://money.cnn.com/2014/02/06/pf/identity-fraud/ 
http://www.justice.gov/criminal/fraud/websites/idtheft.html 
http://www.myfico.com/crediteducation/whatsinyourscore.aspx 
http://money.msn.com/credit-rating/4-ways-id-theft-affects-your-credit 
http://www.bankrate.com/finance/debt/credit-score-seen-as-a-judge-of-character.aspx 
https://www.familysecure.com/CreditScore.aspx 
http://www.heraldnet.com/article/20130407/NEWS01/704079939 
https://www.ncjrs.gov/spotlight/identity_theft/summary.html 
http://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure 
http://m.wftv.com/news/news/local/9-investigates-identity-theft-victims-legal-woes/ndLQS/ 
http://www.huffingtonpost.com/russ-warner/employmentrelated-identit_b_3017872.html 
http://www.spamlaws.com/identity-theft-skimming

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SIN
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NC
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
What Is Financial Exploitation
What Is Financial ExploitationWhat Is Financial Exploitation
What Is Financial Exploitation
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
ID Theft
ID TheftID Theft
ID Theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Identity theft
Identity theftIdentity theft
Identity theft
 

Destaque

Propuesta gastronómica Picata
Propuesta gastronómica PicataPropuesta gastronómica Picata
Propuesta gastronómica PicataJorge Ortiz
 
HPCM Management Ledger & FDMEE: The Perfect Partnership?
HPCM Management Ledger & FDMEE: The Perfect Partnership?HPCM Management Ledger & FDMEE: The Perfect Partnership?
HPCM Management Ledger & FDMEE: The Perfect Partnership?Ray Février
 
Loading Smartlists into PBCS using FDMEE
Loading Smartlists into PBCS using FDMEELoading Smartlists into PBCS using FDMEE
Loading Smartlists into PBCS using FDMEERay Février
 
Easier as us (brief)
Easier as us (brief)Easier as us (brief)
Easier as us (brief)aimwatson
 
EPM, ERP, Cloud and On-Premise – All options explained - OOW CON9532
EPM, ERP, Cloud and On-Premise – All options explained - OOW CON9532EPM, ERP, Cloud and On-Premise – All options explained - OOW CON9532
EPM, ERP, Cloud and On-Premise – All options explained - OOW CON9532Ray Février
 
Star construction
Star constructionStar construction
Star constructionaimwatson
 
Music Video research (taylor & bridgit)
Music Video research (taylor & bridgit)Music Video research (taylor & bridgit)
Music Video research (taylor & bridgit)aimwatson
 
FDMEE 11.1.2.4.200 Partner Meeting - May 2016
FDMEE 11.1.2.4.200 Partner Meeting - May 2016FDMEE 11.1.2.4.200 Partner Meeting - May 2016
FDMEE 11.1.2.4.200 Partner Meeting - May 2016Ray Février
 
Quelques remarques sur le projet de code de travail algérien version de juill...
Quelques remarques sur le projet de code de travail algérien version de juill...Quelques remarques sur le projet de code de travail algérien version de juill...
Quelques remarques sur le projet de code de travail algérien version de juill...Abdelhak ZAIM
 

Destaque (16)

Propuesta gastronómica Picata
Propuesta gastronómica PicataPropuesta gastronómica Picata
Propuesta gastronómica Picata
 
Digipak
Digipak Digipak
Digipak
 
HPCM Management Ledger & FDMEE: The Perfect Partnership?
HPCM Management Ledger & FDMEE: The Perfect Partnership?HPCM Management Ledger & FDMEE: The Perfect Partnership?
HPCM Management Ledger & FDMEE: The Perfect Partnership?
 
Research
Research Research
Research
 
Loading Smartlists into PBCS using FDMEE
Loading Smartlists into PBCS using FDMEELoading Smartlists into PBCS using FDMEE
Loading Smartlists into PBCS using FDMEE
 
Easier as us (brief)
Easier as us (brief)Easier as us (brief)
Easier as us (brief)
 
EPM, ERP, Cloud and On-Premise – All options explained - OOW CON9532
EPM, ERP, Cloud and On-Premise – All options explained - OOW CON9532EPM, ERP, Cloud and On-Premise – All options explained - OOW CON9532
EPM, ERP, Cloud and On-Premise – All options explained - OOW CON9532
 
Welcome
WelcomeWelcome
Welcome
 
Star construction
Star constructionStar construction
Star construction
 
Music Video research (taylor & bridgit)
Music Video research (taylor & bridgit)Music Video research (taylor & bridgit)
Music Video research (taylor & bridgit)
 
Olly murs
Olly mursOlly murs
Olly murs
 
FDMEE 11.1.2.4.200 Partner Meeting - May 2016
FDMEE 11.1.2.4.200 Partner Meeting - May 2016FDMEE 11.1.2.4.200 Partner Meeting - May 2016
FDMEE 11.1.2.4.200 Partner Meeting - May 2016
 
Heidi 1sa
Heidi 1saHeidi 1sa
Heidi 1sa
 
Gaseous state
Gaseous  stateGaseous  state
Gaseous state
 
Quelques remarques sur le projet de code de travail algérien version de juill...
Quelques remarques sur le projet de code de travail algérien version de juill...Quelques remarques sur le projet de code de travail algérien version de juill...
Quelques remarques sur le projet de code de travail algérien version de juill...
 
Quizz du 22102016
Quizz du 22102016Quizz du 22102016
Quizz du 22102016
 

Semelhante a Identity Theft 101: How It Happens & What You Can Do To Prevent It

Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name- Mark - Fullbright
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do listSandy Kleinhenz
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pntjessmc1
 
Identity Theft and Your SSN
Identity Theft and Your SSNIdentity Theft and Your SSN
Identity Theft and Your SSNGreg Ewers
 

Semelhante a Identity Theft 101: How It Happens & What You Can Do To Prevent It (20)

Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft and Your SSN
Identity Theft and Your SSNIdentity Theft and Your SSN
Identity Theft and Your SSN
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 

Último

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Último (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Identity Theft 101: How It Happens & What You Can Do To Prevent It

  • 1. IDENTITY THEFT 101: HOW IT HAPPENS AND WHAT YOU CAN DO TO PREVENT IT Your information is on file everywhere, from your doctor's office to your bank to your school. Savvy criminals know how to get to it, so you need to know how to protect it. Identity theft can take many forms, but no matter how it hits you, its impact can be devastating. IDENTITY THEFT IS A MAJOR THREAT 13.1 million consumers suffered identity fraud in 2013. Every 2 seconds, another American becomes a victim of identity fraud. FORMS OF REPORTED IDENTITY THEFT WHAT CRIMINALS DO WITH YOUR INFORMATION Criminals can get your personal information by: Dumpster diving Listening to personal Shoulder surfing when you enter personal information Stealing mail Phishing emails requesting Skimming credit personal information Hacking online accounts containing personal or financial information With your personal information, criminals can: Take out a loan Open utilities accounts Posing as a legitimate institution over the phone or by email to obtain personal quitclaim deed THE FINANCIAL IMPACT THAT ID THEFT CAN HAVE ON YOUR CREDIT 10% Types of credit used 10% New credit 15% Length of credit history FICO CREDIT SCORES CONSIST OF 35% Payment history 30% Amounts owed Criminals who have stolen your identity reduce your credit score by: Opening new credit card accounts and utilities accounts. Obtaining home or car loans in your name that they may default on. Upsetting the balance between credit available and credit used. Applying for credit, which will lower your score even if the applications are denied. Failing to make payments Failure to pay any bill accrued in your name, including medical bills and utility bills can result in the charge being reported to a collections agency, which will appear on your credit report and negatively impact your credit score. Victims must painstakingly comb through credit reports to pinpoint all false inquiries, accounts, and charges and go through the lengthy process of disputing them. Until the damage is repaired, the victim’s low credit score can impact: Ability to get a job when employers run the victim’s credit Employers are hesitant to hire individuals with a low credit score, assuming that they're irresponsible. Approval for a home or car loan If you have a low credit score, you may be denied for a loan. Application approval for an apartment lease Individuals with a low credit score are seen as high risk and landlords may worry that they will not pay rent on time or at all. Interest rates on lines of credit If you are approved for a loan or credit card, your interest rate is much higher if your credit score is low. Approval for new credit cards A low credit score will result in denial for new lines of credit. Insurance premiums Insurance premiums are based off your credit score. A low score results in high premiums. Victims may also lose money when identity thieves file fraudulent tax returns or apply for government benefits claims using the victim’s stolen identity. Victims of employment fraud, where the criminal obtains a job using the victim's identity, may: Have trouble getting a job because it appears they're employed. Be unable to receive unemployment or other benefits they need because the government believes they are working. THE EMOTIONAL IMPACT OF IDENTITY THEFT Credit card companies and others who believe that the victim has been avoiding payments can turn everyday life into a nightmare, with: Notices from collection agencies Persistent harassing phone calls Astronomical bills Victims often come to dread looking in the mailbox or answering the phone. Identity theft effectively disrupts nearly every part of everyday life. In some cases, victims like Erie Salgado have been arrested for crimes committed using the stolen identity. Salgado was released 4 days later, but the fear of being arrested still haunts him. 10 WAYS TO PREVENT IDENTITY THEFT Be extremely cautious about who you give your information to, and never trust emails or phone calls from companies claiming to need personal or financial details. Set up a hold on your mail while you’re traveling so criminals can’t steal personal information from your mailbox when you’re away. Never discuss personal or financial details on the phone when you’re in a public place. Check your financial information often, including credit reports, bank statements, and any other notices you receive regarding financial accounts. Make a note of items you don’t receive as well as ones you do – if you stop getting credit card or bank statements it could mean that someone has filed a false address in your name. Keep records of your financial accounts and transaction for five years. These will be helpful if you need to dispute fraudulent transactions. Keep financial documents and personal records, such as a birth certificate and social security card, in a secure location like a home safe. Lock your purse or wallet up when you’re at work. Place outgoing mail in a post office collection box, not your unsecured mail box. Shred credit card offers, financial statements, and other mail before discarding it. Over time, it is possible to recover from identity theft, but it's important to act quickly. 01 02 03 04 05 06 07 08 09 10 With IdentityForce’s UltraSecure+Credit, your personal information, including your credit, will be monitored 24/7, and you’ll be notified immediately of any suspicious activity so you can act before any damage is done. If anything does happen, IdentityForce will be with you every step of the way helping you restore your identity. Brought to you by: 34% Government documents/benefits fraud 17% Credit card fraud 14% Phone or utilities fraud 17% Others 4% Loan fraud 6% Employment related fraud 8% Bank fraud Apply for a new credit card information directly from you Make withdrawals from your bank account conversations or debit cards Use telephone calling cards File fraudulent tax returns File a SOURCES: http://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-january-dece mber-2013/sentinel-cy2013.pdf https://www.javelinstrategy.com/brochure/314 http://money.cnn.com/2014/02/06/pf/identity-fraud/ http://www.justice.gov/criminal/fraud/websites/idtheft.html http://www.myfico.com/crediteducation/whatsinyourscore.aspx http://money.msn.com/credit-rating/4-ways-id-theft-affects-your-credit http://www.bankrate.com/finance/debt/credit-score-seen-as-a-judge-of-character.aspx https://www.familysecure.com/CreditScore.aspx http://www.heraldnet.com/article/20130407/NEWS01/704079939 https://www.ncjrs.gov/spotlight/identity_theft/summary.html http://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure http://m.wftv.com/news/news/local/9-investigates-identity-theft-victims-legal-woes/ndLQS/ http://www.huffingtonpost.com/russ-warner/employmentrelated-identit_b_3017872.html http://www.spamlaws.com/identity-theft-skimming