SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
SAFEGUARDING
YOUR CHILD’S FUTURE
Child Identity Theft
Child identity theft happens when someone uses a minor’s personal information to commit fraud. A thief may
steal and use a child’s information to get a job, government benefits, medical care, utilities, car loans, or a
mortgage. Avoiding, discovering, and undoing the damage resulting from the theft of a child’s identity can be
a challenge.
Adults can monitor their own credit reports every few months to see if someone has misused their information,
and order a fraud alert or freeze on their credit files to stymie further misuse. But most parents and guardians
don’t expect their youngster to have a credit file, and as a result, rarely request a child’s credit report, let alone
review it for accuracy. A thief who steals a child’s information may use it for many years before the crime
is discovered. The victim may learn about the theft years later, when applying for a loan, apartment, or job.

Protecting Your Child’s Identity
Keep Your Child’s Personal Information Safe
Parents do a lot to protect their children from physical harm, from teaching them to look both ways before
crossing the street to making sure they’re dressed warmly for a snowy day. Protecting their personal information
is important, too. Here’s how:
•	 Keep all documents that show a child’s personal information safely locked up. What is personal
information? At a minimum, it includes a child’s date of birth, Social Security number, and birth certificate.
Don’t carry your child’s Social Security card with you.
•	 Share your child’s Social Security number only when you know and trust the other party. If someone asks
for your child’s Social Security number, ask why they want it, how they’ll safeguard it, how long they’ll keep
it, and how they’ll dispose of it. If you’re not satisfied with the answers, don’t share the number. Ask to use
another identifier.
•	 Before you share personal information on the internet, make sure you have a secure connection.
A secure website has a lock icon in the address bar and a URL that begins with “https.”
•	 Use a computer with updated antivirus and firewall protection. Don’t send personal or financial information
– your child’s or your own, for that matter – through an unsecured wireless connection
in a public place.

May 2012

FEDERAL TRADE COMMISSION

FTC.GOV/IDTHEFT
2

•	 If you use a password to sign into a website, log out of the site when you’re done on that site.
•	 Limit the chances that your child’s information will be stolen or misused at school. Find out who has access
to your child’s personal information, and read the notices that schools are required to send explaining your
rights under the Family Educational Rights and Privacy Act (FERPA). That law protects the privacy of student
education records, and gives you the right to opt out of the release of directory information to third parties,
including other families.
Safely Dispose of Personal Information
Your trash could be a treasure trove of information for an identity thief. Before you get rid of information on
paper or online, make sure no one else can use it.
Shred letters, forms, and other papers that include your child’s personal information before you throw them out.
Delete electronic computer files that you no longer need, and empty your online trash or recycle bin.
Learn how to remove your personal or financial information that might be stored on your computer, cell phone,
or other device before you dispose of it.
Share Safety Tips With Your Child
Your computer can hold enormous amounts of information, and it’s crucial that it stays secure. Talk to your child
about best practices for computer security, including:
•	 using “strong” passwords – those with at least eight characters, as well as numbers and symbols
•	 keeping passwords private
•	 knowing the risks of sharing files through peer to peer software, which may include giving someone access
to more information on your computer than you want to share
•	 using anti-virus software that updates automatically
•	 being alert to phishing scams, where criminals send an email, text, or pop-up message that looks like it’s
from a legitimate organization. A phishing message asks the recipient to click on a link or call a phone
number, and to share personal information for a prize or some other benefit. The message to kids: delete
these messages without opening or responding.
Talk with your child regularly about the privacy settings on social media sites and what information and photos
to share on them. For example, it’s not a great idea to show photos with school or team uniforms, list birth dates
or specific locations, or show background settings that are easy to identify. One reason? Someone can use the
information posted on a social media profile to guess account passwords.

FEDERAL TRADE COMMISSION
3

Warning Signs of Child Identity Theft
Personal circumstances may increase the risk of child identity theft – an adult in financial hot water, for example,
may think “adopting” a child’s identity is a way to start over. But using someone else’s identity, regardless of the
reason, is a crime. Identity theft can be committed by a family member, a neighbor, or by someone you never met
who gets access to your child’s information. Several signs can tip you off to a problem:
•	 You get calls from collection agencies, bills from credit card companies or medical providers, or offers for
credit cards or bank account checks in your child’s name, even if your child has never applied for or used
these services.
•	 Your child, or your family, is denied government benefits because benefits are being paid to another
account that is using your child’s Social Security number.
•	 The Social Security Administration, Internal Revenue Service (IRS), or some other government agency asks
you to confirm that your child is employed, even though your child has never had a job.
•	 After you file a tax return listing your dependent child’s name and Social Security number, you get notice
from the IRS that the same information is listed on another tax return.
•	 Your child gets a notice from the IRS saying he or she failed to pay taxes on income, even though your child
has no income.

FTC.GOV/IDTHEFT
4

Does Your Child Have a Credit Report?
You may want to check whether your child has a credit report. Decide how often to check based on whether
you think information is at risk. For example, if you see warning signs, lost your child’s Social Security card, had a
break-in, or your child’s information was compromised in a data breach, you may want to check whether there is
a report using your child’s name or information. Check at least as often as the law entitles you to do it for free.
It’s a good idea to check whether your child has a credit report close to the child’s 16th birthday, which is
probably before the child applies for a tuition or car loan, apartment, or job. If you find a report with errors, you
can work on correcting the errors before the child needs credit.
There are three nationwide credit reporting companies: Equifax, Experian, and TransUnion. Contact each credit
reporting company and ask it to search to see if your child has a credit report. Each company will check for files
related to your child’s name and Social Security number, and also for files related only to the Social Security
number. You must provide the credit reporting companies with proof that you are the child’s parent or legal
guardian.

HOW TO CHECK FOR YOUR CHILD’S CREDIT REPORT
STEP BY STEP:



Contact each credit
reporting company.

NOTES:

Equifax
1‑800‑525‑6285

Experian
1‑888‑397‑3742

TransUnion
childidtheft@
transunion.com

 Ask each company to search for your child’s credit report.
 Ask for a manual search based only on the child’s Social Security
number.



Provide proof that you
are the child’s parent or
legal guardian.

Include a cover letter with the child’s full name, date of birth, and home
addresses for the last five years.
The credit reporting companies may require copies of:
 the child’s birth certificate listing the parents
 the child’s Social Security card
 your government-issued identification card, like a driver’s license or
military identification, or copies of documents proving you are the
child’s legal guardian
 proof of your address, like a utility bill, or a credit card or insurance
statement
Ask each company for its mailing address.

FEDERAL TRADE COMMISSION
5

YOUR CHILD’S IDENTITY
HAS BEEN STOLEN: WHAT NOW?
Sometimes, no matter how diligent you are about protecting personal information, it gets lost, stolen, or hacked.
If that happens, follow these steps:

Alert Each Credit Reporting Company
Contact each of the three nationwide credit reporting companies. Explain that your child is a minor, and can’t
legally enter into any type of contract. Ask each company for its mailing address. To prove that your child is a
minor, send the credit reporting companies a completed copy of the Uniform Minor’s Status Declaration (page 11).
Next, send a letter to each credit reporting company. Ask them to remove all accounts, account inquiries, and
collection notices from the credit file associated with your child’s name or personal information.

HOW TO ALERT THE CREDIT REPORTING COMPANIES
STEP BY STEP:



Contact each credit
reporting company.

NOTES:

Equifax
1‑800‑525‑6285

Experian
1‑888‑397‑3742

TransUnion
childidtheft@
transunion.com

 Explain to each company that your child is a minor.



Provide proof that your
child is a minor.

 Send each of the credit reporting companies a completed copy of the
Uniform Minor’s Status Declaration (page 11).
Ask each company for its mailing address.



Send a letter to each
Ask them to remove all items associated with your child’s name or personal
credit reporting company. information, including:
 accounts
 account inquiries
 collection notices

FTC.GOV/IDTHEFT
6

Place an Initial Fraud Alert
If a credit file was created for your child as a result of identity theft, consider placing an initial fraud alert on the
credit file. An initial fraud alert requires potential creditors to verify a person’s identity before extending credit.
When a creditor knows that a minor is involved, it will not ordinarily extend credit.
To place an initial fraud alert, contact any one of the three credit reporting companies. The company you contact
must contact the other two companies. All three will place an initial fraud alert on the file they have for your
child. After you place the initial fraud alert, the credit reporting company will explain your rights, including your
right to get a free copy of your child’s credit report from each credit reporting company.

HOW TO PLACE A FRAUD ALERT
STEP BY STEP:



Contact one credit
reporting company.

NOTES:

Equifax
1‑800‑525‑6285

Experian
1‑888‑397‑3742

TransUnion
1‑800‑680‑7289

 Ask the company to put a fraud alert on your child’s credit file.
 Confirm that the company you call will contact the other two
companies.
Placing the initial fraud alert is free. Give the credit reporting company
your contact information so they can reach you.



Learn about your rights.

Credit reporting company staff will explain that you can get a free copy of
your child’s credit report and other rights that you have.



Mark your calendar.

The initial fraud alert stays on your child’s file for 90 days. You can renew
it after 90 days if necessary.

FEDERAL TRADE COMMISSION
7

Consider Placing a Credit Freeze
If you place a credit freeze, potential creditors cannot get your child’s credit report, which makes it less likely an
identity thief can open new accounts. You must contact each of the three credit reporting companies directly to
place a freeze.
The credit reporting companies may request proof of your child’s Social Security number, a copy of the child’s
birth certificate, and proof that you are the child’s parent or legal guardian. Putting a freeze on a minor’s credit
file can be a useful deterrent to additional fraud. You must lift the freeze from the credit file before the minor
applies for student or auto loans, an apartment, or job. Once the child turns 18, he or she can ask to lift the freeze.

HOW TO REQUEST A CREDIT FREEZE
STEP BY STEP:



Contact each credit
reporting company.

NOTES:

Equifax
1‑800‑525‑6285

Experian
1‑888‑397‑3742

TransUnion
childidtheft@
transunion.com

 Report that your minor child is an identity theft victim.
 Ask each company to put a freeze on the child’s credit file.



Provide proof that you
are the child’s parent or
legal guardian.

The credit reporting companies may request copies of:
 the child’s birth certificate
 the child’s Social Security number
 documents proving you are the child’s parent or legal guardian
Ask each company for its mailing address.



Pay a fee.

 Pay any fee required by state law.



Mark your calendar.

Your state law determines how long the credit freeze lasts.

Monitoring a Credit Report
Some people find it convenient to pay a company for identity theft prevention and monitoring services.
Others find ways to monitor their credit files for free. Knowing your legal rights can help make it easier
for you to decide whether to buy these services. The bottom line: there’s little or nothing a commercial
company can do for you for a fee that you can’t do yourself for free.

FTC.GOV/IDTHEFT
8

File a Report With the FTC
File an identity theft report at www.ftc.gov or call 1-877-438-4338. Provide as many details about the theft as
possible. Save a copy of the completed complaint, which is called an Identity Theft Affidavit. If you file a police
report, give a copy of the Affidavit to the police.

ONLINE

HOW TO REPORT IDENTITY THEFT TO THE FTC
STEP BY STEP:

NOTES:



Complete the FTC’s
online complaint
form.

www.ftc.gov/complaint



Save or print
the completed
complaint.

 After you submit your information, print a copy of the completed
complaint or save it electronically. The completed complaint is
your Identity Theft Affidavit.



Update the
complaint.

 If you need to add details to your complaint, call the FTC and give
the complaint reference number.

 Fill out the complaint form. Include as many details as possible.
 When the form is complete, click “Submit.”
 After you submit your information, you will see a complaint
reference number. Save this number.

BY PHONE

OR
STEP BY STEP:



Call the FTC.

NOTES:

1-877-438-4338
 Tell the representative what happened.
The representative will give you a complaint reference number, and
an Affidavit password, and send you an email explaining how to get
your Affidavit.
 Follow the directions in the email. Print a copy of your completed
complaint and save it electronically. The completed complaint is
your Identity Theft Affidavit.



Update the
complaint.

 If you need to add details to your complaint, call the FTC and give
the complaint reference number.

FEDERAL TRADE COMMISSION
9

Consider Filing a Police Report
Usually, adults must file a police report about identity theft before they can use certain legal remedies to clear a
credit report. The situation may be different for children, because credit reporting companies may correct a child
victim’s credit file without a police report. Send credit reporting companies a Uniform Minor’s Status Declaration
(page 11) or a letter explaining that your child is a minor who cannot legally enter into a contract. After you
provide proof that the victim is a minor, credit reporting companies and businesses should correct the fraudulent
information that the identity thief created.
It’s important to file a police report if you need to resolve a child victim’s medical, tax-related, or other identity theft.

HOW TO FILE A POLICE REPORT
STEP BY STEP:



Go to your local police
department or the police
department where the
theft occurred.

NOTES:

 Bring a copy of your Identity Theft Affidavit and any other proof of the
theft.
 Complete a report about the theft.
 Get a copy of the report, or the report number.

Call Every Company Where an Account Was Fraudulently Opened or Misused
If you already know where your child’s information was misused, contact the company. Ask it to close the
fraudulent account and flag the account to show it is a result of identity theft.
Otherwise, when you receive your child’s credit report, review it for any accounts opened with the child’s name
or personal information. If you see a fraudulent account in your child’s name, contact the company where the
account was opened. Ask the company to close the fraudulent account and flag the account to show it is the
result of identity theft.
If your child has a college savings, bank, or credit union account, monitor the account statements. If you see an
account was misused, ask the financial institution’s fraud department to restore any erroneous withdrawals and
flag the account to show it was compromised by identity theft. For more help, contact the agency that oversees
the financial institution about your child’s rights. Get information at www.ffiec.gov/consumercenter/default.aspx.
After you contact a business, follow up in writing, and enclose a completed copy of the Uniform Minor’s Status
Declaration (page 11).

FTC.GOV/IDTHEFT
10

Should a Child Identity Theft Victim Get a New Social Security Number?
The Social Security Administration may assign a new Social Security number to your child if:
•	 the child is being harassed, abused, or is in grave danger when using the original number
•	 you can prove that someone has stolen the number and is using it illegally. You must provide evidence that
the number actually is being misused, and that the misuse is causing the child significant, continuing harm.
If you apply for a new Social Security number for your child, you must prove the child’s age, citizenship or lawful
immigration status, and identity.
Getting a new Social Security number probably won’t resolve all problems related to the theft of your child’s
identity. Government agencies and some businesses may keep records under the child’s original Social Security
number. In addition, because credit reporting companies use Social Security numbers and other personal
information to identify a person’s credit file, using a new number doesn’t guarantee a fresh start. But, by being
careful with your child’s personal information and monitoring credit reports for fraudulent activity, you can limit
the misuse. Learn more at www.socialsecurity.gov or call 1-800-772-1213.
Medical Identity Theft
A thief may use a child’s identity to get medical services. Read the explanation of benefits statements your
insurance company sends you each time it pays for service in your child’s name. If you get a statement for
services your child did not receive, contact the medical provider. Get a copy of the medical records, and ask the
medical provider to remove or segregate all charges and services that are not related to your child. Be sure that
the medical provider flags any of your child’s accounts that were compromised by identity theft. Follow up in
writing and enclose a completed copy of the Uniform Minor’s Status Declaration (page 11).
Tax-Related Identity Theft
If your child gets a notice from the IRS for unpaid taxes, even though he or she never earned income, or you get
a notice from the IRS saying your child’s name and Social Security number were listed on another return, your
child may be a victim of tax-related identity theft. If you or your child get such a notice, respond immediately to
the address included with the IRS notice. The IRS never makes a first contact with taxpayers by email, and doesn’t
ask for detailed personal information through email. If you get an email that claims to be from the IRS, call the IRS
(1-800-829-1040) and ask if they sent the message.
If you learn that an identity thief used your child’s Social Security number on a tax return, call the IRS Specialized
Identity Theft Protection Unit (1-800-908-4490).
If you think your child’s information may be at risk, you can ask the IRS to monitor the use of your child’s Social
Security number for suspicious activity. You will have to complete an IRS Identity Theft Affidavit (IRS Form 14039)
and send a copy of an identity document, like a Social Security card, passport, or driver’s license.

FEDERAL TRADE COMMISSION
UNIFORM MINOR’S STATUS DECLARATION
This is a voluntary declaration for establishing that a child is a minor. Use it for disputes with credit reporting
companies and creditors about identity theft-related problems.
ABOUT THE MINOR CHILD
Full Legal Name
First

Middle

Date of Birth

Last, Suffix
Social Security Number

mm/dd/yy
Current Street Address
City

State

Zip Code

The child has lived at
this address since
mm/dd/yy
All other addresses where the child has lived within the last five years:

ABOUT ME
Full Legal Name
First

Middle

Last, Suffix

State

Zip Code

Date of Birth
mm/dd/yy
Current Street Address
if different from the
child’s address
City
I have lived at this
address since
mm/dd/yy
Daytime Telephone

(

)

Evening Telephone (

)
DOCUMENTATION AND SIGNATURE
Attach COPIES, not originals, of the following documents with your Declaration:
•	 the child’s birth certificate or, for an adopted child without a birth certificate, a final adoption proceeding
order or certificate
•	 the child’s Social Security card
•	 your state identification card, like a driver’s license or military issued photo identification card that shows
your current address
•	 a utility bill that shows your current address
•	 for guardians: a copy of the court order or another proof of guardianship or legal representation of the
minor.

Sign and date the following paragraph:
I certify that, to the best of my knowledge and belief, all the information on and attached to this declaration is
true, correct, and complete and made in good faith. I further certify that I am the parent, adoptive parent, legal
guardian, or legal representative of the child named in this declaration. I understand that this declaration or
the information it contains may be made available to federal, state, and/or local law enforcement agencies for
such action within their jurisdiction as they deem appropriate. I understand that knowingly making a false or
fraudulent statement or representation to the government may constitute a violation of 18 U.S.C. § 1001 or other
federal, state, or local criminal statutes, and may result in imposition of a fine or imprisonment or both.

Signature

Date Signed

Mais conteúdo relacionado

Mais procurados

Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
Id Theft
Id TheftId Theft
Id Theftmojo_5
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Cyber Claims Insight
Cyber Claims InsightCyber Claims Insight
Cyber Claims InsightGraeme Cross
 
Id theft avoiding and detecting
Id theft avoiding and detectingId theft avoiding and detecting
Id theft avoiding and detectingscstatelibrary
 
Legislation That Internet Marketers Need to Know
Legislation That Internet Marketers Need to KnowLegislation That Internet Marketers Need to Know
Legislation That Internet Marketers Need to KnowKaley Perkins, MA
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 

Mais procurados (20)

Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
Id Theft
Id TheftId Theft
Id Theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
 
Cyber Claims Insight
Cyber Claims InsightCyber Claims Insight
Cyber Claims Insight
 
Guarding Vanderbilt information
Guarding Vanderbilt informationGuarding Vanderbilt information
Guarding Vanderbilt information
 
Protecting Vanderbilt Information
Protecting Vanderbilt InformationProtecting Vanderbilt Information
Protecting Vanderbilt Information
 
COPPA Compliance
COPPA ComplianceCOPPA Compliance
COPPA Compliance
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Id theft avoiding and detecting
Id theft avoiding and detectingId theft avoiding and detecting
Id theft avoiding and detecting
 
Legislation That Internet Marketers Need to Know
Legislation That Internet Marketers Need to KnowLegislation That Internet Marketers Need to Know
Legislation That Internet Marketers Need to Know
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 

Destaque

Law Enforcement Provisions Related to Computer Security
Law Enforcement Provisions Related to Computer SecurityLaw Enforcement Provisions Related to Computer Security
Law Enforcement Provisions Related to Computer Security- Mark - Fullbright
 
Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims - Mark - Fullbright
 
Raytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity SurveyRaytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity Survey- Mark - Fullbright
 
Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data SecurityFourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security- Mark - Fullbright
 
Elder Fraud - Preventing Senior Scams
Elder Fraud - Preventing Senior ScamsElder Fraud - Preventing Senior Scams
Elder Fraud - Preventing Senior Scams- Mark - Fullbright
 

Destaque (8)

Law Enforcement Provisions Related to Computer Security
Law Enforcement Provisions Related to Computer SecurityLaw Enforcement Provisions Related to Computer Security
Law Enforcement Provisions Related to Computer Security
 
Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims
 
Raytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity SurveyRaytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity Survey
 
Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data SecurityFourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security
 
Elder Fraud - Preventing Senior Scams
Elder Fraud - Preventing Senior ScamsElder Fraud - Preventing Senior Scams
Elder Fraud - Preventing Senior Scams
 
Children and Parents Media Use
Children and Parents Media UseChildren and Parents Media Use
Children and Parents Media Use
 
Mobile apps for kids
Mobile apps for kidsMobile apps for kids
Mobile apps for kids
 
Banking Basics
Banking BasicsBanking Basics
Banking Basics
 

Semelhante a Safeguarding Your Child's Future

Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftThe Identity Advocate
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Ensure your child’s credit isn’t stolen
Ensure your child’s credit isn’t stolenEnsure your child’s credit isn’t stolen
Ensure your child’s credit isn’t stolendenniskelly315
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SINEmilyMoar
 
Child identity-theft-101
Child identity-theft-101Child identity-theft-101
Child identity-theft-101LitvakLawFirm
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 
Protecting Children from Identity Theft
Protecting Children from Identity TheftProtecting Children from Identity Theft
Protecting Children from Identity TheftJohn Poster
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name- Mark - Fullbright
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameSpringboard
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 

Semelhante a Safeguarding Your Child's Future (20)

Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Ensure your child’s credit isn’t stolen
Ensure your child’s credit isn’t stolenEnsure your child’s credit isn’t stolen
Ensure your child’s credit isn’t stolen
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SIN
 
Child identity-theft-101
Child identity-theft-101Child identity-theft-101
Child identity-theft-101
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Phishing
PhishingPhishing
Phishing
 
Protecting Children from Identity Theft
Protecting Children from Identity TheftProtecting Children from Identity Theft
Protecting Children from Identity Theft
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
ID Theft
ID TheftID Theft
ID Theft
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 

Mais de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mais de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Último (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Safeguarding Your Child's Future

  • 1. SAFEGUARDING YOUR CHILD’S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor’s personal information to commit fraud. A thief may steal and use a child’s information to get a job, government benefits, medical care, utilities, car loans, or a mortgage. Avoiding, discovering, and undoing the damage resulting from the theft of a child’s identity can be a challenge. Adults can monitor their own credit reports every few months to see if someone has misused their information, and order a fraud alert or freeze on their credit files to stymie further misuse. But most parents and guardians don’t expect their youngster to have a credit file, and as a result, rarely request a child’s credit report, let alone review it for accuracy. A thief who steals a child’s information may use it for many years before the crime is discovered. The victim may learn about the theft years later, when applying for a loan, apartment, or job. Protecting Your Child’s Identity Keep Your Child’s Personal Information Safe Parents do a lot to protect their children from physical harm, from teaching them to look both ways before crossing the street to making sure they’re dressed warmly for a snowy day. Protecting their personal information is important, too. Here’s how: • Keep all documents that show a child’s personal information safely locked up. What is personal information? At a minimum, it includes a child’s date of birth, Social Security number, and birth certificate. Don’t carry your child’s Social Security card with you. • Share your child’s Social Security number only when you know and trust the other party. If someone asks for your child’s Social Security number, ask why they want it, how they’ll safeguard it, how long they’ll keep it, and how they’ll dispose of it. If you’re not satisfied with the answers, don’t share the number. Ask to use another identifier. • Before you share personal information on the internet, make sure you have a secure connection. A secure website has a lock icon in the address bar and a URL that begins with “https.” • Use a computer with updated antivirus and firewall protection. Don’t send personal or financial information – your child’s or your own, for that matter – through an unsecured wireless connection in a public place. May 2012 FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT
  • 2. 2 • If you use a password to sign into a website, log out of the site when you’re done on that site. • Limit the chances that your child’s information will be stolen or misused at school. Find out who has access to your child’s personal information, and read the notices that schools are required to send explaining your rights under the Family Educational Rights and Privacy Act (FERPA). That law protects the privacy of student education records, and gives you the right to opt out of the release of directory information to third parties, including other families. Safely Dispose of Personal Information Your trash could be a treasure trove of information for an identity thief. Before you get rid of information on paper or online, make sure no one else can use it. Shred letters, forms, and other papers that include your child’s personal information before you throw them out. Delete electronic computer files that you no longer need, and empty your online trash or recycle bin. Learn how to remove your personal or financial information that might be stored on your computer, cell phone, or other device before you dispose of it. Share Safety Tips With Your Child Your computer can hold enormous amounts of information, and it’s crucial that it stays secure. Talk to your child about best practices for computer security, including: • using “strong” passwords – those with at least eight characters, as well as numbers and symbols • keeping passwords private • knowing the risks of sharing files through peer to peer software, which may include giving someone access to more information on your computer than you want to share • using anti-virus software that updates automatically • being alert to phishing scams, where criminals send an email, text, or pop-up message that looks like it’s from a legitimate organization. A phishing message asks the recipient to click on a link or call a phone number, and to share personal information for a prize or some other benefit. The message to kids: delete these messages without opening or responding. Talk with your child regularly about the privacy settings on social media sites and what information and photos to share on them. For example, it’s not a great idea to show photos with school or team uniforms, list birth dates or specific locations, or show background settings that are easy to identify. One reason? Someone can use the information posted on a social media profile to guess account passwords. FEDERAL TRADE COMMISSION
  • 3. 3 Warning Signs of Child Identity Theft Personal circumstances may increase the risk of child identity theft – an adult in financial hot water, for example, may think “adopting” a child’s identity is a way to start over. But using someone else’s identity, regardless of the reason, is a crime. Identity theft can be committed by a family member, a neighbor, or by someone you never met who gets access to your child’s information. Several signs can tip you off to a problem: • You get calls from collection agencies, bills from credit card companies or medical providers, or offers for credit cards or bank account checks in your child’s name, even if your child has never applied for or used these services. • Your child, or your family, is denied government benefits because benefits are being paid to another account that is using your child’s Social Security number. • The Social Security Administration, Internal Revenue Service (IRS), or some other government agency asks you to confirm that your child is employed, even though your child has never had a job. • After you file a tax return listing your dependent child’s name and Social Security number, you get notice from the IRS that the same information is listed on another tax return. • Your child gets a notice from the IRS saying he or she failed to pay taxes on income, even though your child has no income. FTC.GOV/IDTHEFT
  • 4. 4 Does Your Child Have a Credit Report? You may want to check whether your child has a credit report. Decide how often to check based on whether you think information is at risk. For example, if you see warning signs, lost your child’s Social Security card, had a break-in, or your child’s information was compromised in a data breach, you may want to check whether there is a report using your child’s name or information. Check at least as often as the law entitles you to do it for free. It’s a good idea to check whether your child has a credit report close to the child’s 16th birthday, which is probably before the child applies for a tuition or car loan, apartment, or job. If you find a report with errors, you can work on correcting the errors before the child needs credit. There are three nationwide credit reporting companies: Equifax, Experian, and TransUnion. Contact each credit reporting company and ask it to search to see if your child has a credit report. Each company will check for files related to your child’s name and Social Security number, and also for files related only to the Social Security number. You must provide the credit reporting companies with proof that you are the child’s parent or legal guardian. HOW TO CHECK FOR YOUR CHILD’S CREDIT REPORT STEP BY STEP:  Contact each credit reporting company. NOTES: Equifax 1‑800‑525‑6285 Experian 1‑888‑397‑3742 TransUnion childidtheft@ transunion.com  Ask each company to search for your child’s credit report.  Ask for a manual search based only on the child’s Social Security number.  Provide proof that you are the child’s parent or legal guardian. Include a cover letter with the child’s full name, date of birth, and home addresses for the last five years. The credit reporting companies may require copies of:  the child’s birth certificate listing the parents  the child’s Social Security card  your government-issued identification card, like a driver’s license or military identification, or copies of documents proving you are the child’s legal guardian  proof of your address, like a utility bill, or a credit card or insurance statement Ask each company for its mailing address. FEDERAL TRADE COMMISSION
  • 5. 5 YOUR CHILD’S IDENTITY HAS BEEN STOLEN: WHAT NOW? Sometimes, no matter how diligent you are about protecting personal information, it gets lost, stolen, or hacked. If that happens, follow these steps: Alert Each Credit Reporting Company Contact each of the three nationwide credit reporting companies. Explain that your child is a minor, and can’t legally enter into any type of contract. Ask each company for its mailing address. To prove that your child is a minor, send the credit reporting companies a completed copy of the Uniform Minor’s Status Declaration (page 11). Next, send a letter to each credit reporting company. Ask them to remove all accounts, account inquiries, and collection notices from the credit file associated with your child’s name or personal information. HOW TO ALERT THE CREDIT REPORTING COMPANIES STEP BY STEP:  Contact each credit reporting company. NOTES: Equifax 1‑800‑525‑6285 Experian 1‑888‑397‑3742 TransUnion childidtheft@ transunion.com  Explain to each company that your child is a minor.  Provide proof that your child is a minor.  Send each of the credit reporting companies a completed copy of the Uniform Minor’s Status Declaration (page 11). Ask each company for its mailing address.  Send a letter to each Ask them to remove all items associated with your child’s name or personal credit reporting company. information, including:  accounts  account inquiries  collection notices FTC.GOV/IDTHEFT
  • 6. 6 Place an Initial Fraud Alert If a credit file was created for your child as a result of identity theft, consider placing an initial fraud alert on the credit file. An initial fraud alert requires potential creditors to verify a person’s identity before extending credit. When a creditor knows that a minor is involved, it will not ordinarily extend credit. To place an initial fraud alert, contact any one of the three credit reporting companies. The company you contact must contact the other two companies. All three will place an initial fraud alert on the file they have for your child. After you place the initial fraud alert, the credit reporting company will explain your rights, including your right to get a free copy of your child’s credit report from each credit reporting company. HOW TO PLACE A FRAUD ALERT STEP BY STEP:  Contact one credit reporting company. NOTES: Equifax 1‑800‑525‑6285 Experian 1‑888‑397‑3742 TransUnion 1‑800‑680‑7289  Ask the company to put a fraud alert on your child’s credit file.  Confirm that the company you call will contact the other two companies. Placing the initial fraud alert is free. Give the credit reporting company your contact information so they can reach you.  Learn about your rights. Credit reporting company staff will explain that you can get a free copy of your child’s credit report and other rights that you have.  Mark your calendar. The initial fraud alert stays on your child’s file for 90 days. You can renew it after 90 days if necessary. FEDERAL TRADE COMMISSION
  • 7. 7 Consider Placing a Credit Freeze If you place a credit freeze, potential creditors cannot get your child’s credit report, which makes it less likely an identity thief can open new accounts. You must contact each of the three credit reporting companies directly to place a freeze. The credit reporting companies may request proof of your child’s Social Security number, a copy of the child’s birth certificate, and proof that you are the child’s parent or legal guardian. Putting a freeze on a minor’s credit file can be a useful deterrent to additional fraud. You must lift the freeze from the credit file before the minor applies for student or auto loans, an apartment, or job. Once the child turns 18, he or she can ask to lift the freeze. HOW TO REQUEST A CREDIT FREEZE STEP BY STEP:  Contact each credit reporting company. NOTES: Equifax 1‑800‑525‑6285 Experian 1‑888‑397‑3742 TransUnion childidtheft@ transunion.com  Report that your minor child is an identity theft victim.  Ask each company to put a freeze on the child’s credit file.  Provide proof that you are the child’s parent or legal guardian. The credit reporting companies may request copies of:  the child’s birth certificate  the child’s Social Security number  documents proving you are the child’s parent or legal guardian Ask each company for its mailing address.  Pay a fee.  Pay any fee required by state law.  Mark your calendar. Your state law determines how long the credit freeze lasts. Monitoring a Credit Report Some people find it convenient to pay a company for identity theft prevention and monitoring services. Others find ways to monitor their credit files for free. Knowing your legal rights can help make it easier for you to decide whether to buy these services. The bottom line: there’s little or nothing a commercial company can do for you for a fee that you can’t do yourself for free. FTC.GOV/IDTHEFT
  • 8. 8 File a Report With the FTC File an identity theft report at www.ftc.gov or call 1-877-438-4338. Provide as many details about the theft as possible. Save a copy of the completed complaint, which is called an Identity Theft Affidavit. If you file a police report, give a copy of the Affidavit to the police. ONLINE HOW TO REPORT IDENTITY THEFT TO THE FTC STEP BY STEP: NOTES:  Complete the FTC’s online complaint form. www.ftc.gov/complaint  Save or print the completed complaint.  After you submit your information, print a copy of the completed complaint or save it electronically. The completed complaint is your Identity Theft Affidavit.  Update the complaint.  If you need to add details to your complaint, call the FTC and give the complaint reference number.  Fill out the complaint form. Include as many details as possible.  When the form is complete, click “Submit.”  After you submit your information, you will see a complaint reference number. Save this number. BY PHONE OR STEP BY STEP:  Call the FTC. NOTES: 1-877-438-4338  Tell the representative what happened. The representative will give you a complaint reference number, and an Affidavit password, and send you an email explaining how to get your Affidavit.  Follow the directions in the email. Print a copy of your completed complaint and save it electronically. The completed complaint is your Identity Theft Affidavit.  Update the complaint.  If you need to add details to your complaint, call the FTC and give the complaint reference number. FEDERAL TRADE COMMISSION
  • 9. 9 Consider Filing a Police Report Usually, adults must file a police report about identity theft before they can use certain legal remedies to clear a credit report. The situation may be different for children, because credit reporting companies may correct a child victim’s credit file without a police report. Send credit reporting companies a Uniform Minor’s Status Declaration (page 11) or a letter explaining that your child is a minor who cannot legally enter into a contract. After you provide proof that the victim is a minor, credit reporting companies and businesses should correct the fraudulent information that the identity thief created. It’s important to file a police report if you need to resolve a child victim’s medical, tax-related, or other identity theft. HOW TO FILE A POLICE REPORT STEP BY STEP:  Go to your local police department or the police department where the theft occurred. NOTES:  Bring a copy of your Identity Theft Affidavit and any other proof of the theft.  Complete a report about the theft.  Get a copy of the report, or the report number. Call Every Company Where an Account Was Fraudulently Opened or Misused If you already know where your child’s information was misused, contact the company. Ask it to close the fraudulent account and flag the account to show it is a result of identity theft. Otherwise, when you receive your child’s credit report, review it for any accounts opened with the child’s name or personal information. If you see a fraudulent account in your child’s name, contact the company where the account was opened. Ask the company to close the fraudulent account and flag the account to show it is the result of identity theft. If your child has a college savings, bank, or credit union account, monitor the account statements. If you see an account was misused, ask the financial institution’s fraud department to restore any erroneous withdrawals and flag the account to show it was compromised by identity theft. For more help, contact the agency that oversees the financial institution about your child’s rights. Get information at www.ffiec.gov/consumercenter/default.aspx. After you contact a business, follow up in writing, and enclose a completed copy of the Uniform Minor’s Status Declaration (page 11). FTC.GOV/IDTHEFT
  • 10. 10 Should a Child Identity Theft Victim Get a New Social Security Number? The Social Security Administration may assign a new Social Security number to your child if: • the child is being harassed, abused, or is in grave danger when using the original number • you can prove that someone has stolen the number and is using it illegally. You must provide evidence that the number actually is being misused, and that the misuse is causing the child significant, continuing harm. If you apply for a new Social Security number for your child, you must prove the child’s age, citizenship or lawful immigration status, and identity. Getting a new Social Security number probably won’t resolve all problems related to the theft of your child’s identity. Government agencies and some businesses may keep records under the child’s original Social Security number. In addition, because credit reporting companies use Social Security numbers and other personal information to identify a person’s credit file, using a new number doesn’t guarantee a fresh start. But, by being careful with your child’s personal information and monitoring credit reports for fraudulent activity, you can limit the misuse. Learn more at www.socialsecurity.gov or call 1-800-772-1213. Medical Identity Theft A thief may use a child’s identity to get medical services. Read the explanation of benefits statements your insurance company sends you each time it pays for service in your child’s name. If you get a statement for services your child did not receive, contact the medical provider. Get a copy of the medical records, and ask the medical provider to remove or segregate all charges and services that are not related to your child. Be sure that the medical provider flags any of your child’s accounts that were compromised by identity theft. Follow up in writing and enclose a completed copy of the Uniform Minor’s Status Declaration (page 11). Tax-Related Identity Theft If your child gets a notice from the IRS for unpaid taxes, even though he or she never earned income, or you get a notice from the IRS saying your child’s name and Social Security number were listed on another return, your child may be a victim of tax-related identity theft. If you or your child get such a notice, respond immediately to the address included with the IRS notice. The IRS never makes a first contact with taxpayers by email, and doesn’t ask for detailed personal information through email. If you get an email that claims to be from the IRS, call the IRS (1-800-829-1040) and ask if they sent the message. If you learn that an identity thief used your child’s Social Security number on a tax return, call the IRS Specialized Identity Theft Protection Unit (1-800-908-4490). If you think your child’s information may be at risk, you can ask the IRS to monitor the use of your child’s Social Security number for suspicious activity. You will have to complete an IRS Identity Theft Affidavit (IRS Form 14039) and send a copy of an identity document, like a Social Security card, passport, or driver’s license. FEDERAL TRADE COMMISSION
  • 11. UNIFORM MINOR’S STATUS DECLARATION This is a voluntary declaration for establishing that a child is a minor. Use it for disputes with credit reporting companies and creditors about identity theft-related problems. ABOUT THE MINOR CHILD Full Legal Name First Middle Date of Birth Last, Suffix Social Security Number mm/dd/yy Current Street Address City State Zip Code The child has lived at this address since mm/dd/yy All other addresses where the child has lived within the last five years: ABOUT ME Full Legal Name First Middle Last, Suffix State Zip Code Date of Birth mm/dd/yy Current Street Address if different from the child’s address City I have lived at this address since mm/dd/yy Daytime Telephone ( ) Evening Telephone ( )
  • 12. DOCUMENTATION AND SIGNATURE Attach COPIES, not originals, of the following documents with your Declaration: • the child’s birth certificate or, for an adopted child without a birth certificate, a final adoption proceeding order or certificate • the child’s Social Security card • your state identification card, like a driver’s license or military issued photo identification card that shows your current address • a utility bill that shows your current address • for guardians: a copy of the court order or another proof of guardianship or legal representation of the minor. Sign and date the following paragraph: I certify that, to the best of my knowledge and belief, all the information on and attached to this declaration is true, correct, and complete and made in good faith. I further certify that I am the parent, adoptive parent, legal guardian, or legal representative of the child named in this declaration. I understand that this declaration or the information it contains may be made available to federal, state, and/or local law enforcement agencies for such action within their jurisdiction as they deem appropriate. I understand that knowingly making a false or fraudulent statement or representation to the government may constitute a violation of 18 U.S.C. § 1001 or other federal, state, or local criminal statutes, and may result in imposition of a fine or imprisonment or both. Signature Date Signed