SlideShare uma empresa Scribd logo
1 de 15
Police Report Vs. Incident
Report
A Resource for Identity Theft Victims
Advocate Tip
• Requesting a police and investigation is a not
always available to victims of identity theft.
• Victims are often left to gather facts from credit
reports, statements and documented phone calls.
• This document will provide a guideline on steps to
take.
• A well detailed police/incident report will always
help your case and be an important key to resolve
your identity theft case.
• Not every identity theft case is the same. Use what
you need. Don’t feel you have place a fraud alert
and freeze after getting a wrong call about a debt.
Police Report
• Basically a police report is a description of facts
detailing a crime written up by the officer or
representative of a police department who was
deployed to the scene.
• A well-drafted report is an important tool in solving
a crime.
• It's important to make sure your report is detailed,
factual and specific to what happened.
• Police reports also require an investigation follow
up. Generally by a detective. However that is not a
guarantee your case will be investigated.
Incident Report
• Similar to Police Reports, an Incident Report is a
victims statement regarding a crime.
• Often bank statements, letters and other
supporting documents are included.
• These reports are generally not investigated and
are for insurance purposes or businesses
requesting a police report.
Online Police Report
• Many states offer the option to file an incident
report online. Make sure you make a copy
and keep any confirmation numbers for your
records.
• These may or may not be reviewed by an
officer or investigated.
• Generally this option does not allow
documents to be submitted.
• Follow up with supporting documents with
your police department.
Key Points
–
–
–
–

How much money was stolen?
When did you find out about the crime?
Do you have a suspect?
Which part of your identity was used:
• Name only?
• Social Security Number?
– Have you reviewed your credit report?
– Are you being contacted by a bank or debt collector?
– Are you being accused of:
Opening a checking account
Taking out a loan or line of credit
Committing a crime
The Fair Credit Reporting Act
(FCRA)
• The Federal Trade Commission (FTC), the nation’s consumer
protection agency, enforces the FCRA including this
requirement, which is known as Section 609(e).
• The law applies to a business that has provided credit, goods,
or services to, accepted payment from, or otherwise entered
into a transaction with someone who is believed to have
fraudulently used another person’s identification.
• Businesses Must Provide Victims and Law Enforcement with
Transaction Records Relating to Identity Theft
• http://www.business.ftc.gov/documents/bus66-businessesmust-provide-victims-and-law-enforcement-transactionrecords-relating-identity
Common Types of Identity Theft
•
•
•
•
•
•
•
•

Utility Fraud
Tax Fraud
Employment Fraud
Driver’s License Identity
Theft
Synthetic Identity Theft
Child Identity Theft
Debt Tagging
Data Breach

• Criminal Fraud
• Document - Benefit
Fraud
• Financial Fraud
• Wire Fraud or HELOC
• Check Fraud
• Medical Identity Theft
• Credit Card Fraud
– New Account
– Account Take Over
Credit Reporting Agencies
• All information that is considered part of the
identity theft committed against you should be
listed on your police/incident report.
• It’s imperative to closely review your credit
reports for inaccuracies:
→Names not belonging to you
→Addresses not belonging to you
→Credit Accounts, including collection accounts
Identity Theft Affidavit
• The Federal Trade Commission is the
agency to obtain your Identity Theft
Affidavit.
• This detailed report and your
Police/Incident Report are the best tools to
clear your good name.
• Two ways to file your complaint
– Online
– Identity Theft Affidavit
Identity Theft Report
Credit Reporting Agencies
National Reporting
Agencies
•
•
•
•
•

Experian
Equifax
TransUnion
Annual Credit Report
IRS
! Remember !
If you are a victim of Identity
Theft these reports are free!

Specialty Reporting
Agencies
•
•
•
•
•

•
•
•
•

ChexSystems
Clarity Services
TeleTrack
C.L.U.E.® Report
LexisNexis Personal
Reports
Innovis
Medical Information Bureau
Certegy
TeleCheck
Fraud Alerts
• After you confirm fraudulent accounts or criminal
charges have been filed against you.
• Per The Fair and Accurate Credit Transactions Act
you can order free credit reports and place fraud
alerts to protect our credit files.
• Financial institutions, Credit Bureaus and
Collection Agencies may require a copy of your
credit report.
• Use caution and only provide one if required.
• If mailing, send certified mail, receipt requested.
Free Consumer Resources
• Identity Theft Resource Center, Non-Profit
Organization
• Federal Trade Commission
• OnGuardOnline
• IRS
• The Internet Crime Complaint Center (IC3)
• Bureau of Consumer Protection Business
Center
• Consumer Protection
Compiled and designed by Mark Fullbright , Certified Identity Theft
Risk Management Specialist™ (CITRMS) as a free service for
consumers to protect themselves and reduce their exposure to identity
theft.
Stay Safe, Stay Secure

* THE FAIR CREDIT REPORTING ACT (FCRA)
* IDENTITY THEFT RESOURCE CENTER, NON-PROFIT ORGANIZATION
* FEDERAL TRADE COMMISSION

Mais conteúdo relacionado

Mais procurados

Criminological research and statistics
Criminological research and statisticsCriminological research and statistics
Criminological research and statisticsArvin Kim Arnilla
 
Filipino youth delinquency
Filipino youth delinquencyFilipino youth delinquency
Filipino youth delinquencyArnel Rivera
 
Title ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateTitle ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateJose Van Tan
 
Classes of questioned documents
Classes of questioned documentsClasses of questioned documents
Classes of questioned documentskiran malik
 
Four Types of Police Reports
Four Types of Police ReportsFour Types of Police Reports
Four Types of Police ReportsJean Reynolds
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewFrancis Postrado
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015monde24836
 
Primer Tc (Presentation)
Primer Tc (Presentation)Primer Tc (Presentation)
Primer Tc (Presentation)probation
 
Q&A On Probation (Presentation)
Q&A On Probation (Presentation)Q&A On Probation (Presentation)
Q&A On Probation (Presentation)probation
 
Jurat example
Jurat exampleJurat example
Jurat exampleattyakc
 

Mais procurados (20)

Criminological research and statistics
Criminological research and statisticsCriminological research and statistics
Criminological research and statistics
 
Criminal procedure simplified
Criminal procedure simplifiedCriminal procedure simplified
Criminal procedure simplified
 
PNP MASTER PLANS
PNP MASTER PLANSPNP MASTER PLANS
PNP MASTER PLANS
 
ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Who are criminally liable
Who are criminally liableWho are criminally liable
Who are criminally liable
 
Filipino youth delinquency
Filipino youth delinquencyFilipino youth delinquency
Filipino youth delinquency
 
Title ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateTitle ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the state
 
criminal justice system
criminal justice systemcriminal justice system
criminal justice system
 
Classes of questioned documents
Classes of questioned documentsClasses of questioned documents
Classes of questioned documents
 
Four Types of Police Reports
Four Types of Police ReportsFour Types of Police Reports
Four Types of Police Reports
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and Overview
 
Justifyingcircumstance
JustifyingcircumstanceJustifyingcircumstance
Justifyingcircumstance
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
 
Pnp operational procedure
Pnp operational procedurePnp operational procedure
Pnp operational procedure
 
Primer Tc (Presentation)
Primer Tc (Presentation)Primer Tc (Presentation)
Primer Tc (Presentation)
 
Q&A On Probation (Presentation)
Q&A On Probation (Presentation)Q&A On Probation (Presentation)
Q&A On Probation (Presentation)
 
Aggravating circumstances
Aggravating circumstancesAggravating circumstances
Aggravating circumstances
 
Jurat example
Jurat exampleJurat example
Jurat example
 
Rule 117 motion to quash
Rule 117 motion to quashRule 117 motion to quash
Rule 117 motion to quash
 

Destaque

Four Types of Police Reports
Four Types of Police ReportsFour Types of Police Reports
Four Types of Police ReportsJean Reynolds
 
Nursing records & reports
Nursing records & reportsNursing records & reports
Nursing records & reportsjasleenbrar03
 
Terminating Unsafe Employees
Terminating  Unsafe EmployeesTerminating  Unsafe Employees
Terminating Unsafe EmployeesMary Wright
 
Criminal Justice 5: Types of Reports
Criminal Justice 5: Types of ReportsCriminal Justice 5: Types of Reports
Criminal Justice 5: Types of ReportsJean Reynolds
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps - Mark - Fullbright
 
Accident Investigation Report - Sample 1
Accident Investigation Report - Sample 1Accident Investigation Report - Sample 1
Accident Investigation Report - Sample 1John Keller
 

Destaque (8)

Four Types of Police Reports
Four Types of Police ReportsFour Types of Police Reports
Four Types of Police Reports
 
Incident report
Incident reportIncident report
Incident report
 
Nursing records & reports
Nursing records & reportsNursing records & reports
Nursing records & reports
 
Terminating Unsafe Employees
Terminating  Unsafe EmployeesTerminating  Unsafe Employees
Terminating Unsafe Employees
 
Criminal Justice 5: Types of Reports
Criminal Justice 5: Types of ReportsCriminal Justice 5: Types of Reports
Criminal Justice 5: Types of Reports
 
Police Report Writing
Police Report WritingPolice Report Writing
Police Report Writing
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
Accident Investigation Report - Sample 1
Accident Investigation Report - Sample 1Accident Investigation Report - Sample 1
Accident Investigation Report - Sample 1
 

Semelhante a Police Report Vs. Incident Report

West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedAdam Singer
 
Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims - Mark - Fullbright
 
mr neeraj - day 2 - aml kyc
mr neeraj - day 2 - aml kycmr neeraj - day 2 - aml kyc
mr neeraj - day 2 - aml kycNeeraj Verma
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Understanding your credit report
Understanding your credit reportUnderstanding your credit report
Understanding your credit reportrick zimmerman
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do listSandy Kleinhenz
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 

Semelhante a Police Report Vs. Incident Report (20)

Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
 
West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updated
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
 
Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
 
mr neeraj - day 2 - aml kyc
mr neeraj - day 2 - aml kycmr neeraj - day 2 - aml kyc
mr neeraj - day 2 - aml kyc
 
Check Your Credit Report
Check Your Credit ReportCheck Your Credit Report
Check Your Credit Report
 
ONLINE FRAUD GUIDE
ONLINE FRAUD GUIDEONLINE FRAUD GUIDE
ONLINE FRAUD GUIDE
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Understanding your credit report
Understanding your credit reportUnderstanding your credit report
Understanding your credit report
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Shelf Corps CPNs and Tradelines
Shelf Corps CPNs and TradelinesShelf Corps CPNs and Tradelines
Shelf Corps CPNs and Tradelines
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 

Mais de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mais de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Último (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Police Report Vs. Incident Report

  • 1. Police Report Vs. Incident Report A Resource for Identity Theft Victims
  • 2. Advocate Tip • Requesting a police and investigation is a not always available to victims of identity theft. • Victims are often left to gather facts from credit reports, statements and documented phone calls. • This document will provide a guideline on steps to take. • A well detailed police/incident report will always help your case and be an important key to resolve your identity theft case. • Not every identity theft case is the same. Use what you need. Don’t feel you have place a fraud alert and freeze after getting a wrong call about a debt.
  • 3. Police Report • Basically a police report is a description of facts detailing a crime written up by the officer or representative of a police department who was deployed to the scene. • A well-drafted report is an important tool in solving a crime. • It's important to make sure your report is detailed, factual and specific to what happened. • Police reports also require an investigation follow up. Generally by a detective. However that is not a guarantee your case will be investigated.
  • 4. Incident Report • Similar to Police Reports, an Incident Report is a victims statement regarding a crime. • Often bank statements, letters and other supporting documents are included. • These reports are generally not investigated and are for insurance purposes or businesses requesting a police report.
  • 5. Online Police Report • Many states offer the option to file an incident report online. Make sure you make a copy and keep any confirmation numbers for your records. • These may or may not be reviewed by an officer or investigated. • Generally this option does not allow documents to be submitted. • Follow up with supporting documents with your police department.
  • 6. Key Points – – – – How much money was stolen? When did you find out about the crime? Do you have a suspect? Which part of your identity was used: • Name only? • Social Security Number? – Have you reviewed your credit report? – Are you being contacted by a bank or debt collector? – Are you being accused of: Opening a checking account Taking out a loan or line of credit Committing a crime
  • 7. The Fair Credit Reporting Act (FCRA) • The Federal Trade Commission (FTC), the nation’s consumer protection agency, enforces the FCRA including this requirement, which is known as Section 609(e). • The law applies to a business that has provided credit, goods, or services to, accepted payment from, or otherwise entered into a transaction with someone who is believed to have fraudulently used another person’s identification. • Businesses Must Provide Victims and Law Enforcement with Transaction Records Relating to Identity Theft • http://www.business.ftc.gov/documents/bus66-businessesmust-provide-victims-and-law-enforcement-transactionrecords-relating-identity
  • 8. Common Types of Identity Theft • • • • • • • • Utility Fraud Tax Fraud Employment Fraud Driver’s License Identity Theft Synthetic Identity Theft Child Identity Theft Debt Tagging Data Breach • Criminal Fraud • Document - Benefit Fraud • Financial Fraud • Wire Fraud or HELOC • Check Fraud • Medical Identity Theft • Credit Card Fraud – New Account – Account Take Over
  • 9. Credit Reporting Agencies • All information that is considered part of the identity theft committed against you should be listed on your police/incident report. • It’s imperative to closely review your credit reports for inaccuracies: →Names not belonging to you →Addresses not belonging to you →Credit Accounts, including collection accounts
  • 10. Identity Theft Affidavit • The Federal Trade Commission is the agency to obtain your Identity Theft Affidavit. • This detailed report and your Police/Incident Report are the best tools to clear your good name. • Two ways to file your complaint – Online – Identity Theft Affidavit
  • 12. Credit Reporting Agencies National Reporting Agencies • • • • • Experian Equifax TransUnion Annual Credit Report IRS ! Remember ! If you are a victim of Identity Theft these reports are free! Specialty Reporting Agencies • • • • • • • • • ChexSystems Clarity Services TeleTrack C.L.U.E.® Report LexisNexis Personal Reports Innovis Medical Information Bureau Certegy TeleCheck
  • 13. Fraud Alerts • After you confirm fraudulent accounts or criminal charges have been filed against you. • Per The Fair and Accurate Credit Transactions Act you can order free credit reports and place fraud alerts to protect our credit files. • Financial institutions, Credit Bureaus and Collection Agencies may require a copy of your credit report. • Use caution and only provide one if required. • If mailing, send certified mail, receipt requested.
  • 14. Free Consumer Resources • Identity Theft Resource Center, Non-Profit Organization • Federal Trade Commission • OnGuardOnline • IRS • The Internet Crime Complaint Center (IC3) • Bureau of Consumer Protection Business Center • Consumer Protection
  • 15. Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free service for consumers to protect themselves and reduce their exposure to identity theft. Stay Safe, Stay Secure * THE FAIR CREDIT REPORTING ACT (FCRA) * IDENTITY THEFT RESOURCE CENTER, NON-PROFIT ORGANIZATION * FEDERAL TRADE COMMISSION