SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
 

  Business Identity Theft Fact Sheet

 
 

 

What is Business Identity Theft? 
Business  identity  theft  is  a  relatively  new  type  of  crime  that  is  on  the  rise  and 
spreading quickly throughout the U.S.  According to Dun & Bradstreet, a leading 
provider of business credit information in the U.S., business identity theft cases 
have been reported in at least 22 states. 

Business Identity Theft  


New and rapidly spreading type of ID theft  



Criminals hijack a legit business identity 



Criminals open accounts/steal using the legit 
business ID, often going unnoticed  



The victimized business is left holding the 
debts and credit damages from the crime 

Instead of targeting individuals for identity theft, criminals look for ways to steal 
a  legitimate  business  identity  by  gaining  access  to  its  bank  accounts  and  credit 
cards, as well as other sensitive company information.  Thieves then secure lines 
of credit with banks and retailers at the expense of the victim entity.  Once the 
scheme is uncovered, businesses may need to spend valuable time and resources 
to repair the damage to their credit and reputation, and banks and retailers may 
be left with significant financial losses.    

How Do Criminals Steal Business Identities?  
Examples  of  business  identity  theft  include  a  variety  of  schemes  involving 
fraudulent use of a company’s information, including:  


 

Use of Business Records 




Criminals looking to gain access to online 
business records 





Attempting to exploit state business 



registration websites  


Thieves altering data to open accounts 

 

Impact of Business Identity Theft  


Tarnished business credit history 



Costly and time consuming to fix 

Clever  criminals  are  using  the  economic  downturn  to  their  advantage  by 
targeting inactive companies, or companies that can be re‐instated for business.  

Difficulty obtaining future credit  



Establishing  temporary  office  space  and/or  merchant  accounts  in  your 
company’s name 
Ordering merchandise or services with stolen credit card information, or 
with bogus account details in the name of your company 
Scams  and  phishing  attacks  designed  to  get  access  to  your  company’s 
banking or credit information, including rummaging through your trash 
Filing  bogus  reports  with  state  business  filing  offices,  or  manipulating 
online  business  records,  in  order  to  change  your  registered  address  or 
appoint new officers/change your registered agent information (to then 
establish lines of credit with banks and retailers) 

 

State and National Efforts 


Outreach to the business community, 
particularly small and medium‐sized entities 



Information‐sharing between the States 



How Can Businesses Prevent Business Identity Theft? 
One of the most effective ways to protect your business from identity theft is by 
regularly checking your records with the Secretary of State’s office (or the state 
agency responsible for housing such information).  These offices provide online 
search features that make it easy to check and verify that business registration 
information  is  accurate.    Businesses  should  notify  the  Secretary  of  State of  any 
unauthorized changes.  Other prevention steps include:  

Establishment of National Association of 
Secretaries of State Identity Theft Task Force 

 



Sign up for email notification of business record changes, if available 



Monitor credit reports and sign up for a credit monitoring service 

 
National Association of Secretaries of State   

                                                                                          June 2011 
 
 

(Continued)  How Can Businesses Prevent Business 
Identity Theft? 


Monitor  business  accounts,  bills,  credit  card  statements,  etcetera,  and 
reconcile your statements on a regular basis 



Sign  up  for  email  notifications  from  banks  and  other  creditors,  if 
available 



File  all  reports  and  renewals  with  state  filing  offices  in  a  timely  and 
thorough  manner,  and  remain  aware  of  who  has  access  to  this 
information within your company 

Tips to Shield Yourself from Business 



Identity Theft 



Continue checking business records, even if your business is dissolved or 
inactive 
Safeguard your company’s sensitive information, including account 
numbers and passwords, being sure to shred any trash that contains this 
information 
Ensure that your computers are secure, and train employees to avoid 
phishing scams and emails that may contain malicious viruses  



Prevent:  Check business records regularly 



Protect:  Sign up for email alerts available & 



monitor credit reports on a regular basis 


Preserve:  Report any irregularities or 
problems immediately  

 

If You Suspect a Problem 


Contact law enforcement  and credit agencies 



Contact the Secretary of State’s office 



If you suspect that your company has become a victim of business identity theft, 
it is important to take quick action to minimize the potential damage.  Steps you 
should take in this situation include: 

Notify banks and creditors right away 



What to Do if Business Identity Theft Occurs? 

Correct any altered business records  




Place a fraud alert on business/merchant accounts 



Notify local and/or state law enforcement officials 



Request  copies  of  documentation  used  to  fraudulently  open  or  access 
accounts 



 

Report the issue to the credit reporting agencies (e.g. Dun & Bradstreet, 
Equifax, Experian, TransUnion) 


 

Contact  banks,  credit  card  providers,  and  other  relevant  creditors  to 
notify them of the fraud 

If  the  theft  involves  unauthorized  changes  to  business  information  on 
file with the state, correct the records and notify the Secretary of State’s 
Office (or the state agency responsible for housing such information)  

 
 
 
 
 

 

 

 

 

Additional State and National Resources 
 
State Website Page Here: www.ProtectYourBusiness.us  
 
The National Association of Secretaries of State: www.nass.org  
 
National Federation of Independent Small Business: www.nfib.org  
 
U.S. Secret Service Field Offices: www.secretservice.gov/field_offices.shtml 
 

 

National Association of Secretaries of State   

                                                                                          June 2011 

Mais conteúdo relacionado

Mais de - Mark - Fullbright

Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps - Mark - Fullbright
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014- Mark - Fullbright
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age - Mark - Fullbright
 

Mais de - Mark - Fullbright (20)

Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 

Último

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Último (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 

Business Identity Theft Fact Sheet

  • 1.     Business Identity Theft Fact Sheet       What is Business Identity Theft?  Business  identity  theft  is  a  relatively  new  type  of  crime  that  is  on  the  rise  and  spreading quickly throughout the U.S.  According to Dun & Bradstreet, a leading  provider of business credit information in the U.S., business identity theft cases  have been reported in at least 22 states.  Business Identity Theft    New and rapidly spreading type of ID theft    Criminals hijack a legit business identity   Criminals open accounts/steal using the legit  business ID, often going unnoticed    The victimized business is left holding the  debts and credit damages from the crime  Instead of targeting individuals for identity theft, criminals look for ways to steal  a  legitimate  business  identity  by  gaining  access  to  its  bank  accounts  and  credit  cards, as well as other sensitive company information.  Thieves then secure lines  of credit with banks and retailers at the expense of the victim entity.  Once the  scheme is uncovered, businesses may need to spend valuable time and resources  to repair the damage to their credit and reputation, and banks and retailers may  be left with significant financial losses.     How Do Criminals Steal Business Identities?   Examples  of  business  identity  theft  include  a  variety  of  schemes  involving  fraudulent use of a company’s information, including:      Use of Business Records    Criminals looking to gain access to online  business records    Attempting to exploit state business   registration websites    Thieves altering data to open accounts    Impact of Business Identity Theft    Tarnished business credit history   Costly and time consuming to fix  Clever  criminals  are  using  the  economic  downturn  to  their  advantage  by  targeting inactive companies, or companies that can be re‐instated for business.   Difficulty obtaining future credit    Establishing  temporary  office  space  and/or  merchant  accounts  in  your  company’s name  Ordering merchandise or services with stolen credit card information, or  with bogus account details in the name of your company  Scams  and  phishing  attacks  designed  to  get  access  to  your  company’s  banking or credit information, including rummaging through your trash  Filing  bogus  reports  with  state  business  filing  offices,  or  manipulating  online  business  records,  in  order  to  change  your  registered  address  or  appoint new officers/change your registered agent information (to then  establish lines of credit with banks and retailers)    State and National Efforts   Outreach to the business community,  particularly small and medium‐sized entities   Information‐sharing between the States   How Can Businesses Prevent Business Identity Theft?  One of the most effective ways to protect your business from identity theft is by  regularly checking your records with the Secretary of State’s office (or the state  agency responsible for housing such information).  These offices provide online  search features that make it easy to check and verify that business registration  information  is  accurate.    Businesses  should  notify  the  Secretary  of  State of  any  unauthorized changes.  Other prevention steps include:   Establishment of National Association of  Secretaries of State Identity Theft Task Force     Sign up for email notification of business record changes, if available   Monitor credit reports and sign up for a credit monitoring service    National Association of Secretaries of State                                                                                              June 2011 
  • 2.     (Continued)  How Can Businesses Prevent Business  Identity Theft?   Monitor  business  accounts,  bills,  credit  card  statements,  etcetera,  and  reconcile your statements on a regular basis   Sign  up  for  email  notifications  from  banks  and  other  creditors,  if  available   File  all  reports  and  renewals  with  state  filing  offices  in  a  timely  and  thorough  manner,  and  remain  aware  of  who  has  access  to  this  information within your company  Tips to Shield Yourself from Business   Identity Theft   Continue checking business records, even if your business is dissolved or  inactive  Safeguard your company’s sensitive information, including account  numbers and passwords, being sure to shred any trash that contains this  information  Ensure that your computers are secure, and train employees to avoid  phishing scams and emails that may contain malicious viruses    Prevent:  Check business records regularly   Protect:  Sign up for email alerts available &   monitor credit reports on a regular basis   Preserve:  Report any irregularities or  problems immediately     If You Suspect a Problem   Contact law enforcement  and credit agencies   Contact the Secretary of State’s office   If you suspect that your company has become a victim of business identity theft,  it is important to take quick action to minimize the potential damage.  Steps you  should take in this situation include:  Notify banks and creditors right away   What to Do if Business Identity Theft Occurs?  Correct any altered business records     Place a fraud alert on business/merchant accounts   Notify local and/or state law enforcement officials   Request  copies  of  documentation  used  to  fraudulently  open  or  access  accounts     Report the issue to the credit reporting agencies (e.g. Dun & Bradstreet,  Equifax, Experian, TransUnion)     Contact  banks,  credit  card  providers,  and  other  relevant  creditors  to  notify them of the fraud  If  the  theft  involves  unauthorized  changes  to  business  information  on  file with the state, correct the records and notify the Secretary of State’s  Office (or the state agency responsible for housing such information)                     Additional State and National Resources    State Website Page Here: www.ProtectYourBusiness.us     The National Association of Secretaries of State: www.nass.org     National Federation of Independent Small Business: www.nfib.org     U.S. Secret Service Field Offices: www.secretservice.gov/field_offices.shtml      National Association of Secretaries of State                                                                                              June 2011