SlideShare uma empresa Scribd logo
1 de 103
 
Protection of Personal Information Instructor : Detective Mike
Detective Mike Founder OOD ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A message from Mike.
Insert Welcome Video
 
 
 
Areas to Protect  Your  Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why do  YOU  think protection of personal information is important?
 
 
Insert Video 1 Here
 
 
 
 
 
 
 
Insert Video 2 Here
Why protect personal information from being fed to data vendors? ,[object Object],[object Object],[object Object]
Protect Your Signature ,[object Object],[object Object],[object Object],[object Object]
Protect Your Signature
Use a Privately Owned Mailbox ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use a Privately Owned Mailbox ,[object Object],[object Object],[object Object]
Use a Privately Owned Mailbox ,[object Object],[object Object]
Example of P.O. Mailbox Label ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],WRONG!
Use a Privately Owned Mailbox ,[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
 
 
Motor Vehicle Department ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Home Address/Phone Number ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Home Address Phone Number ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Home Address Phone Number ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Insert Video 4 Here
Home Address Phone Number ,[object Object],[object Object],[object Object],[object Object],[object Object]
Home Address & Phone Number ,[object Object],[object Object],[object Object]
Phone Tip
 
Current Creditors  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Future Creditors ,[object Object],[object Object],[object Object],[object Object]
 
 
Future Creditors ,[object Object],[object Object],[object Object],[object Object]
 
The Three Credit Bureaus  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
The Three Credit Bureaus ,[object Object],[object Object],[object Object],[object Object],[object Object]
Business Locations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Free Public Record ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Backstop Your Identity https://www.zabasearch.com/zabasphere/signup/
 
 
Intelius ,[object Object],[object Object]
Internet data vendors to opt out of *All require letters to be sent* ,[object Object],InfoSpace.com InfoUSA.com Intelius.com PeopleData.com PeopleFinder.com  PrivateEye.com SwitchBoard.com USSearch.com USAPeopleSearch.com WestLaw.com WhitePages.com
 
Internet data vendors to opt out of ,[object Object],[object Object],[object Object]
DMA Choice.org
[object Object],[object Object],[object Object],[object Object],[object Object]
P.O. Boxes, Opt-out’s, credit bureau’s ,[object Object],[object Object],[object Object]
 
 
 
Recorders Office ,[object Object],[object Object],[object Object]
 
Insert Video 5
 
Trust Fund ,[object Object],[object Object],[object Object],[object Object],[object Object]
Trust Fund ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trust Fund Note the signature vs. autograph  Specifically the direction of the “T” crossing. Autograph date 11-16-06 Signature 2-9-06
Magazine/Internet ,[object Object],[object Object],[object Object]
Magazine/Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Magazine/Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Insert Video 6
 
[object Object],[object Object],[object Object],[object Object]
Shred or tear?
Shred or tear?
Shred or tear?
 
Tips to Avoid Identity Theft ,[object Object],[object Object],[object Object],[object Object]
Tips to Avoid Identity Theft ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Tips to Avoid Identity Theft ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tips to Avoid Identity Theft ,[object Object],[object Object],[object Object]
Tips to Avoid Identity Theft ,[object Object]
Easy as 1-2-3-4 ,[object Object],[object Object],[object Object],[object Object]
Guaranteed Identity Recovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Guaranteed Identity Recovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Guaranteed Identity Recovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
End Result: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions?
Thanks! Privacy Associate info:

Mais conteúdo relacionado

Semelhante a Identity Theft

Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
Lisa Sosebee
 
Scams 0710
Scams 0710Scams 0710
Scams 0710
KEIRO2
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
Lisa Sosebee
 
Identity Theft and Your SSN
Identity Theft and Your SSNIdentity Theft and Your SSN
Identity Theft and Your SSN
Greg Ewers
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
krupp
 

Semelhante a Identity Theft (20)

Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SIN
 
February 2017 Market Monitor
February 2017 Market MonitorFebruary 2017 Market Monitor
February 2017 Market Monitor
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Scams 0710
Scams 0710Scams 0710
Scams 0710
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Fraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying Information
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity Theft and Your SSN
Identity Theft and Your SSNIdentity Theft and Your SSN
Identity Theft and Your SSN
 
Safeguarding Your Child's Future
Safeguarding Your Child's FutureSafeguarding Your Child's Future
Safeguarding Your Child's Future
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Holiday Shopping Online Tips
Holiday Shopping Online TipsHoliday Shopping Online Tips
Holiday Shopping Online Tips
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Identity Theft

Notas do Editor

  1. The person conducting the presentation should add their information here and include a short bio.
  2. This page reflects the background of the detective that has implemented the “opt-out” process.
  3. Explain the home page.
  4. Explain that notes of many of the websites we will be discussing can be found at the US Privacy Associates website under the “resources” tab. This is to help keep the training flowing and reduce note taking by the attendee.
  5. Explain that there are two Opt Out packages. One for the General Public and One for “Public Safety Officials.” The difference is verbiage in letters and the PSO book includes agency and rank.
  6. This is what will be covered during the presentation.
  7. This slide is designed to begin instructor/student interaction. Ask the question to the audience and share a story.
  8. The gang area of the presentation can be used for the general public but is very helpful for law enforcement presentations.
  9. This subject talks about the job of killing for a gang.
  10. Gangster related movies that have become popular in our society.
  11. A bullet proof vest customized with gang colors.
  12. Raising the next generation around gang and street violence.
  13. Humor.
  14. Prison/street gang.
  15. More stories about killing police officers.
  16. This video shows how a death threat against an officer was planned. The officer eventually used the Opt Out e-book to protect his home address from Public record.
  17. This slide is a motivational slide to ask the audience a question.
  18. Explain to the audience the importance of having difference signatures. One for only at work. The “Online signature” is for anything placed on line. This includes signatures on documents when purchasing a home. A Non-important signature is usually for services that need a signature on a piece of paper. Usually just scribble.
  19. This autograph is Randy Johnson. On the left is a FREE ballpark signature, on the right is a paid, approx. $350.00, autograph.
  20. The use of a “Privately Owned” mailbox from the UPS Store can be used to look like an apartment complex to data vendors. The UPS store is a private company and tend not to release your personal information without your approval.
  21. The goal is to “Stack” your home address on data vendor reports by using multiple privately owned mailboxes. Once one PO box is added to your data record it moves your true home address down on the list. When you add other P.O. boxes it continues to “Bump” the true home address down and eventually off the data vendor list.
  22. The easiest way to “Stack” an address is by sending friends with “Privately Owned” magazines with your name on them. The magazines sell personal information to various data vendors therefore populating or “stacking” your home address on data vendor reports.
  23. The address on the left is an obvious P.O. Box. The address on the right looks to be an apartment complex. 2903 N. Shoreline, Building 105, Apartment 254.
  24. Everyone uses the P.O. box once it’s in place.
  25. Once the P.O. box is in place I recommend using the online United States Postal Service form to complete a family move to the Privately Owned mailbox.
  26. On this page notice the address. You may have to try entering the address various ways for it to be accepted. For example you may have to leave out the dash.
  27. Notice this will cost one dollar to confirm the family move.
  28. The credit card billing address must match the current or new address to continue with the family move.
  29. This page offers you a chance to request free catalogs to be delivered to the privately owned mailbox. I recommend selecting all of them. When these companies sell your “new home” information it will be the privately owned mailbox that is populated on the data vendor sites.
  30. This slide explains what the customer can expect from the USPS
  31. This slide indicates what mail will be forwarded and for how long.
  32. Tips for drivers license usage.
  33. Tips for home food orders.
  34. E-bay has the ability to track where items are shipped, so does PayPal. This information is available to some data vendors. UPS verifies people and residence via package delivery. If sent to the Privately Owned mailbox that information is what is released. Work mail should be sent to the P.O. box to thwart an unwanted co-worker from locating your home. Make sure insurance companies know the P.O. box is a mailing address and confirm your house is the covered address for the policy. Warranty card information on washers/dryers, computers etc. is used to up sell you or shared with data vendors.
  35. Phone numbers can be tied to an address. Females have told phone companies their last names have changed so if the number is sold or listed people may not locate you via phone number. Always pay to have an unlisted phone number.
  36. MagicJack is great for people with high speed internet. You can select an out of state phone number and set your address to another location.
  37. Good video on the bad’s of VOIP phone’s.
  38. Once a child has a phone in their name chances of them getting offered pre-approved credit rises. The number and their name may now be available in a data vendor list. Once the contract is expired keep the number but change phone carriers. This is known as “porting” a phone. Obtaining subscriber information is much more complicated on a “ported” phone. Start watching for credit mailings in your child’s name. This would indicate a possible compromise in your child’s identity.
  39. When you purchase a cell phone tell the sales rep what name you want appearing on caller ID. If it’s after the sale contact customer service, many can update caller id info.
  40. People who have “smartphones” or a phone that can receive emails can use a service called NowMessage to receive their voice mails as an email.
  41. Be careful when opting out of some online companies. They may not have your email address but may want you to provide one to opt out. Use a non-working email address.
  42. ALL mail should now go to the P.O. Box. It’ doesn’t matter what it is.
  43. The only time you won’t use a PO box on an application is when purchasing a home. The lending company will require the home address be used. This is why you should use a trust fund. The US Code explains it’s a Federal violation to KNOWINGLY make a false statement for the purpose of influencing the action of a Federal Credit Union. Basically, don’t use this training to dodge paying bills.
  44. This is from a Best Buy credit application
  45. The actual law.
  46. Headers are “pulled” from credit applications and applicant information is sold to data vendor companies to update your address for advertisement targeting. When you list a relative on a credit application, the credit companies continue to build a “Family Tree” of relatives around you. Ask if you may list a friend to be contacted.
  47. Example of a family flow chart.
  48. Contact numbers for the 3 credit bureaus.
  49. A sample letter to initiate a credit freeze. It’s better to use the online service but letters and instructions are included in the Opt Out e-book.
  50. Don’t provide home information to the listed locations unless using the privately owned mailbox.
  51. Various online search companies
  52. How zabasearch works. Search for Bobby Oxford in Illinois.
  53. Name, home address, map and recorded date listed.
  54. Sign up for ZabaSphere to know when people search your name.
  55. If zabasearch refuses to remove personal information after sending a letter they do offer an online opt-out for 20.00 for two and a half years.
  56. ZabaSearch is linked to Intelius. Their opt out info is in the privacy package.
  57. Here is what Intelius request’s to opt out. I recommend calling them and telling them you have faxed proof and your info is still listed. Some operators remove it while you’re on the phone.
  58. A list of the data vendors that require a letter be sent to opt out of their online data list.
  59. Sample letter
  60. Explain the DMA.org., optoutprescreen and privacy rights.org
  61. This ties all the prior slides and information together. The WHY’s of what we provide.
  62. Explain this is what a data vendor report contains. Point out that all of the information contained is what is needed to commit an identity theft.
  63. Point out the address history and the reason for the PO boxes is to “Stack” the current address and historical address off this report.
  64. Point out all of the available personal information. Note the family members are in blue links for more information and the Mothers maiden name is listed as well.
  65. Tips for the recorders office.
  66. Open Records video.
  67. Open Records video.
  68. Open Records video.
  69. Trust fund information.
  70. **Don’t use your name as the trust** Stress the importance of using a code name, family pets name,
  71. The pictures here show Bret Michaels from the rock band Poison used the “Bret Michaels trust fund of 1993.” His information would have been harder to locate if he would have used something other than his name. Also not the direction of the “T” crossing in the autograph versus the legal signature.
  72. Covering the use of magazines. Remember the magazine mailing address will be sold to data vendors to target you with advertisements.
  73. Basic online safety.
  74. Wireless safety
  75. Wireless safety.
  76. Wireless safety.
  77. Continued thought and motivation slide to audience.
  78. A person tears up a pre-approved credit offer.
  79. Tapes it back together and completes the application process.
  80. The credit card is issued.
  81. Funny class break
  82. The basic tips for prevention of ID theft.
  83. Basic ID Theft tips.
  84. Skimmer video.
  85. Debit card pin #: Encourage people not to use debit at point of sale since they aren’t as protected as using a credit charge. Tell people to place a bogus pin number on the back of their debit card. If lost or stolen and the card is used in a debit machine that takes the card in, after 3 incorrect attempts with the bad pin # the card is removed from circulation. RFID is Radio Frequency Identification: RFID is a small chip with an antenna that emits personal information from credit cards to passport ID’s to card readers that convert the information into readable data.
  86. Make sure people know about free child identification cards available online.