SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
Welcome to

ID Theft
& ACCOUNT
FRAUD
a

Prevention & Cleanup

© 2012

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
What will you learn?
 During this presentation you will learn:

• How ID theft and account fraud
happen
• The effects of ID theft and account
fraud
• How to avoid becoming a victim

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
What is ID theft and account fraud?

 When someone steals another
person’s personal information
to commit fraud

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Other types of ID theft

 Medical ID theft
 Theft of a child’s identity

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Theft of a deceased person’s identity

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Criminal ID theft

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
How do thieves get your information?

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Data breach

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
The costs of identity theft
 Average fraud amount per victim in
2010: $4,607
 Estimated out-of-pocket cost for
victims of ID theft in 2010: $631
 Victims may spend more than 100
hours cleaning up a newly opened
fraudulent account.

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
ID theft prevention

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Specialty reports

Medical Information Bureau
(MIB)

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Specialty reports

Residential tenant reports

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Check writing history reports

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Employment data reports
 The Work Number maintains
information on approximately 25
million employees.
 800-996-7566

 www.theworknumber.com

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Insurance claims reports
 Informs insurers about claims you
have made against your
homeowners or automobile
insurance policies

 LexisNexis C.L.U.E.: 866-312-8076
 Insurance Services Office (ISO)
A-Plus: 800-627-3487

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Employment background
check reports
 LexisNexis Employment History
Report
 866-312-8075

 personalreports.lexisnexis.com/em
ployment_history_report.jsp

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Internet safety

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Active duty alert

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Already an ID theft victim?

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
ID theft cleanup
 File a police report.
 Contact appropriate state and federal law
enforcement agencies.

 Complete a free ID theft affidavit from the
FTC: www.ftc.gov/idtheft.

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Fraud alerts
What is a fraud alert?
 Credit bureaus will work with you to verify
information and delete fraudulent data in
reports.
 Place a minor alert if you suspect your
child’s identity has been stolen.

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Freeze your credit

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Shopping for ID theft services

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Dealing with collection agencies

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Non-profit resources
 Consumer Action:
www.consumer-action.org
 Identity Theft Resource Center:
www.idtheftcenter.org
 National Fraud Information
Center:
www.fraud.org

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Non-profit resources
 Privacy Rights Clearinghouse:
www.privacyrights.org
 AARP:
www.aarp.org/money/scams-fraud/
 Nat’l Assoc. of Attorneys
General (NAAG):
www.naag.org

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
Visit money-wise.org
for additional information and to access
free financial education materials

MoneyWI$E
A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP

Mais conteúdo relacionado

Mais procurados

Status of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in CanadaStatus of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in CanadaAlessa
 
Group Presentation
Group PresentationGroup Presentation
Group Presentationabethune
 
Group Presentation
Group PresentationGroup Presentation
Group PresentationWrennEvents
 
Follow the Money (Example: ONE) - Tackling Corruption 2016
Follow the Money (Example: ONE) - Tackling Corruption 2016Follow the Money (Example: ONE) - Tackling Corruption 2016
Follow the Money (Example: ONE) - Tackling Corruption 2016FollowingtheMoney
 
QPWB Brochure Presentation
QPWB Brochure PresentationQPWB Brochure Presentation
QPWB Brochure PresentationMike Barker
 
Business Disaster Recovery Plan
Business Disaster Recovery PlanBusiness Disaster Recovery Plan
Business Disaster Recovery PlanCristofer Pereyra
 

Mais procurados (7)

Status of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in CanadaStatus of Beneficial Ownership Transparency in Canada
Status of Beneficial Ownership Transparency in Canada
 
Guarantees
GuaranteesGuarantees
Guarantees
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
Follow the Money (Example: ONE) - Tackling Corruption 2016
Follow the Money (Example: ONE) - Tackling Corruption 2016Follow the Money (Example: ONE) - Tackling Corruption 2016
Follow the Money (Example: ONE) - Tackling Corruption 2016
 
QPWB Brochure Presentation
QPWB Brochure PresentationQPWB Brochure Presentation
QPWB Brochure Presentation
 
Business Disaster Recovery Plan
Business Disaster Recovery PlanBusiness Disaster Recovery Plan
Business Disaster Recovery Plan
 

Destaque

Fraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFairfax County
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation nickski51
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destaque (13)

Fraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying Information
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
History of computer crime
History of computer crimeHistory of computer crime
History of computer crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Semelhante a Identity Theft & Account Fraud

Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015James Kane
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameSpringboard
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4danc752
 
Identity Theft
Identity TheftIdentity Theft
Identity TheftBlinsink
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule GeneralTeo Leonard
 
Life Lock Customer Selling
Life Lock Customer SellingLife Lock Customer Selling
Life Lock Customer SellingCharles Seay
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse Systemoldshaman
 
LifeLock Customer Selling V1
LifeLock Customer Selling V1LifeLock Customer Selling V1
LifeLock Customer Selling V1Ellis Curlee
 
Identity Theft Protection
Identity Theft ProtectionIdentity Theft Protection
Identity Theft ProtectionMark Bustamonte
 

Semelhante a Identity Theft & Account Fraud (20)

Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
Idt Workshop
Idt WorkshopIdt Workshop
Idt Workshop
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
 
Idt
IdtIdt
Idt
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 
IDShield White Paper
IDShield White PaperIDShield White Paper
IDShield White Paper
 
Life Lock Customer Selling
Life Lock Customer SellingLife Lock Customer Selling
Life Lock Customer Selling
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse System
 
Group Presentation
Group PresentationGroup Presentation
Group Presentation
 
LifeLock Customer Selling V1
LifeLock Customer Selling V1LifeLock Customer Selling V1
LifeLock Customer Selling V1
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
Identity Theft Protection
Identity Theft ProtectionIdentity Theft Protection
Identity Theft Protection
 

Mais de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mais de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Último (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Identity Theft & Account Fraud

  • 1. Welcome to ID Theft & ACCOUNT FRAUD a Prevention & Cleanup © 2012 MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 2. What will you learn?  During this presentation you will learn: • How ID theft and account fraud happen • The effects of ID theft and account fraud • How to avoid becoming a victim MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 3. What is ID theft and account fraud?  When someone steals another person’s personal information to commit fraud MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 4. Other types of ID theft  Medical ID theft  Theft of a child’s identity MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 5. Theft of a deceased person’s identity MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 6. Criminal ID theft MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 7. How do thieves get your information? MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 8. Data breach MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 9. The costs of identity theft  Average fraud amount per victim in 2010: $4,607  Estimated out-of-pocket cost for victims of ID theft in 2010: $631  Victims may spend more than 100 hours cleaning up a newly opened fraudulent account. MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 10. ID theft prevention MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 11. Specialty reports Medical Information Bureau (MIB) MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 12. Specialty reports Residential tenant reports MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 13. Check writing history reports MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 14. Employment data reports  The Work Number maintains information on approximately 25 million employees.  800-996-7566  www.theworknumber.com MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 15. Insurance claims reports  Informs insurers about claims you have made against your homeowners or automobile insurance policies  LexisNexis C.L.U.E.: 866-312-8076  Insurance Services Office (ISO) A-Plus: 800-627-3487 MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 16. Employment background check reports  LexisNexis Employment History Report  866-312-8075  personalreports.lexisnexis.com/em ployment_history_report.jsp MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 17. Internet safety MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 18. Active duty alert MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 19. Already an ID theft victim? MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 20. ID theft cleanup  File a police report.  Contact appropriate state and federal law enforcement agencies.  Complete a free ID theft affidavit from the FTC: www.ftc.gov/idtheft. MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 21. Fraud alerts What is a fraud alert?  Credit bureaus will work with you to verify information and delete fraudulent data in reports.  Place a minor alert if you suspect your child’s identity has been stolen. MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 22. Freeze your credit MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 23. Shopping for ID theft services MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 24. Dealing with collection agencies MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 25. MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 26. Non-profit resources  Consumer Action: www.consumer-action.org  Identity Theft Resource Center: www.idtheftcenter.org  National Fraud Information Center: www.fraud.org MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 27. Non-profit resources  Privacy Rights Clearinghouse: www.privacyrights.org  AARP: www.aarp.org/money/scams-fraud/  Nat’l Assoc. of Attorneys General (NAAG): www.naag.org MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP
  • 28. Visit money-wise.org for additional information and to access free financial education materials MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP