SlideShare a Scribd company logo
1 of 45
What is Identity Theft?
The theft or misuse of personal identifying
information in order to gain something of

value or facilitate other criminal activity
9.6 Million American Victims in 2010

2
ID Theft Affects Persons of All Incomes
and Backgrounds
GOAL TODAY
• HOW TO MINIMIZE THE CHANCES OF
BECOMIMG AN ID THEFT VICTIM
• HOW TO MINIMIZE DAMAGE SHOULD
YOU BECOME AN ID THEFT VICTIM
THERE IS NO FOOL-PROOF
WAY TO AVOID BEING A VICTIM OF ID THEFT

• WE ARE ALL VULNERABLE

• YOU MAY NEVER DISCOVER THE CAUSE
OF ID THEFT
• COULD BE HAPPENING TO YOU TODAY
WHAT DOES IT TAKE TO STEAL
YOUR IDENTITY?
• VERY LITTLE INFORMATION IS NEEDED FOR
YOUR IDENTITY TO BE STOLEN.
• ONCE INFORMATION IS OBTAINED, THE ID
THIEF CAN APPLY AND POSSIBLY OBTAIN A
NEW CREDIT CARD IN YOUR NAME AND
LEAVE YOU WITH THE BILLS.
• AN ID THIEF NEVER PAYS THE BILLS THAT HE
ACQUIRED IN YOUR NAME.
ID THEFT TAKES MANY FORMS
• ENGAGING IN A “PHISHING”
• DUMPSTER DIVING:
OR “VISHING” SCAM
RUMMAGING THROUGH
TRASH LOOKING FOR
BILLS OR OTHER PAPERS • STEALING BUSINESS
CONTAINING PERSONAL
INFORMATION
INFORMATION (BANK
STATEMENTS, ETC.)
• STEALING YOUR SOCIAL

• STEALING YOUR MAIL
• STEALING YOUR
WALLET, PURSE OR
OTHER IMPORTANT
PAPERS/ITEMS (PDA/
CELL PHONE/SOCIAL
SECURITY CARD/
MEDICARE CARD)

SECURITY INFORMATION
WHICH IS GOOD AS GOLD
• “ SHOULDER SURFING”WATCHES VICTIM PUNCH
IN CREDIT CARD # / PIN
#, ETC.
How is it Committed?
Without the:
1. Authorization;
2. Consent; or
3. Permission of the victim

AND with the intent to defraud or
benefit
Non-Financial Identity Theft


Criminal Identity Theft
 occurs when a person who has been
stopped by law enforcement falsely
supplies another person’s information in
place of his/her own.
 This results in tickets and warrants being
assigned to an innocent person.
Non-Financial Identity Theft
Medical Identity Theft
 Thief uses someone’s name & info (possibly

insurance info) to obtain medical services or
goods
 Can cause:
 Creation of false medical record
 False insurance billing
 Impact of diagnosis; healthcare errors
 Debt collections
Non-Financial Identity Theft

Employment Identity Theft
 Results in:
1. IRS Fraud
2. Social Security
Administration Fraud
Non-Financial Identity Theft
Governmental Fraud
 An imposter uses identity data
of another person
 supplies such data as part of an
interaction with governmental
agencies and databases.
Non-Financial Identity Theft
Governmental Fraud
 An imposter uses identity data
of another person
 supplies such data as part of an
interaction with governmental
agencies and databases.
Synthetic Identity Theft
• Use of only the victim’s Social Security
number, in combination with another
person’s name and birth date, to create a
new, fictitious identity.
• Victim experiences problems when the
new identity tracks back to the victim’s
credit or tax records.
Consequences of Identity Theft:
1. Denial of credit
2. Increased rates and financial
charges
3. Loss of employment
4. Inability to get a job
5. Bankruptcy
6. Arrest
7. Loss of money associated with
repairs
8. Missed opportunities
(housing, employment, educatio
n)
A Shock: How the Victim Discovers
Victim may find out when:
1. …bill collection agencies contact for overdue
debts never incurred.
2. …applying for a mortgage or car loan and
learning of problems with credit history.
3. …getting something in the mail about an
apartment never rented, a house never
bought, a job never held.
4. …being arrested for a crime NOT committed.
• Recovering victims spent an average of
$1,870 in out-of-pocket costs.
• Over 3 million experienced issues such as:
having utilities cut off
–being arrested
–finding erroneous claims on their health
records
–having child support garnished for kids they
never had
–being harassed by collection agencies
-----
How is information stolen?









Trash diving
Lost/stolen wallet/purse
Mail theft
Burglary
Skimming
Computer hacking
Data breach
Scams/fraud

18
Prevention
Documents, Credit Cards, and Mail:









Shred!
Ask why someone needs your SSN.
Lock mailbox or know when mail comes.
Take outgoing mail to a blue box or post office.
Opt out of credit card offers.
Carry only what you need.
Remove your SSN from your Medicare card.
Do not carry your Social Security Card

19
Prevention

Internet &Phone

Do:

Don’t:

Get on the do not
call list

 Give personal information unless

you see “https” or lock
 Donate to charity via email or phone
 wire transfer to someone you don’t

know – especially overseas
 respond to SPAM
 open email attachments from

someone you do not know
 call a phone number for a business

that is listed in an email

20
What is Fraud?
or Anatomy of a Scam
A Legal Definition:
–
–
–
–

A false representation of fact
Made knowingly
With the intention that the victim rely on it
To the victim’s detriment

In Plain English:
Fraud is telling a lie or omitting important
information to get a victim to do something
he or she would not otherwise do and that
causes the victim harm.
21
COMMON SCAMS
 The Nigerian scam
 Tale of woe by one claiming to be rich
 Who cannot get to money
 Promise of riches to you if . . .
 Wire transfer or money order to account

 The Lottery scam
 Victim has won or inherited large amount of

money
 Must pay taxes up front by wire transfer or
money order

23
COMMON PHONE SCAMS
 Scare tactic
 Caller pretends to be from trusted source
 Caller says something is wrong
 Caller asks that victim “verify” personal or

account information

 Fake charity
 Caller purports to be soliciting for a charity
 Caller takes credit card and personal

information for donation

24
DON’T FALL FOR THESE!
 Jury Duty
 Easy Credit – Pay in advance
 Foreign lotteries
 Work-at-home or investment schemes

 Fake ebay or craigslist sales
 Fake emails
 Internet dating scams

 Medicare Part D scams

25
26
27
How to Spot Dishonest Service
Providers
 Don’t tolerate service providers who:
 isolate you from friends and family
 ask about your Will or finances
 ask to be given power of attorney
 do not respect your privacy
 try to make you feel sorry for them

 Report to their boss, tell family members, or call

Lifespan for guidance, 244-8400 x 193.

28
Detection
Check your credit report regularly
Monitor bank & credit card statements
Be alert to mail that does not arrive
Do not ignore harassing phone calls or

collection letters
Check your Social Security Earnings record
Check your criminal history

29
Impact on Victims
 Take over of your most precious commodity –your








good name
Financial loss
Ruined credit
Recovery process can take untold hours of follow up
“ID theft investigation can take up to 500 hours.”
26% of victims: “Most affected by the emotional
impact of ID theft.” (FTC survey, 2006)
Defense
IMMEDIATE CONCERNS:
Stop impostor activity
Report the crime
Repair the damage

31
Stop Activity and Report the Crime
1. Order your credit report and place
fraud alert or freeze

2. Close accounts that have been
tampered with or opened by impostor
3. Report to law enforcement and FTC
32
Fraud Alert vs. Credit Freeze
 Call one bureau
 Creditors must take

“reasonable steps” to
verify identity
 Less effective
 90 days, 7 years

 Write each bureau
 No one can apply for

new credit – must thaw
the report
 More effective
 Fee if no police report

Neither will prevent new accounts with merchants that
do not check credit reports.
33
3 Things Needed to Enforce
Victim’s Rights Under
Federal Law


Proof of identity, i.e., copy of driver’s license or ID
card;



Police report + ID theft affidavit;



Complete description of account, debt, or other
item being disputed.

34
If it’s not in
writing,
it doesn’t
count!
35
Identity Theft Report
• Identity Theft Report is a report:
A. that alleges an ID theft,
B. that is a copy of an official, valid report filed by a
consumer with an appropriate Federal, State, or local law
enforcement agency, and
C. the filing of which subjects the person filing the report to
criminal penalties relating to the filing of false
information if, in fact, the information in the report is
false.
• Police Report & attached ID Theft Complaint and/or Affidavit
– The attachments provide the required detail in the Police
Report to make it an ID Theft Report
Step 4:
File a Police Report
• Call local police as soon as possible
• Request appt. for in-person report filing
• Take along completed FTC ID Theft Complaint
• Request copy of Official Police Report
• Officer may attach ID Theft Affidavit to police report, or department’s
own police report’s details may suffice
• Goal: to get an Identity Theft Report
• In NY, Mandatory Police Reports for ID Theft Victims:
• Executive Law: §646 - The law enforcement agency must take a police
report of the matter and provide the complainant with a copy of the
report at no charge.
Can’t Get Police Report?
1.

Provide Officer with:
– The Mandatory Police Report Law in NY
– The Memorandum to Police on Importance of Taking
Police Reports for Identity Theft

2. If unable to file in person, inquire about filing an “automated
report” online or via phone.
3. Seek a report from another jurisdiction, such as where the
thief misused info, or from a different law enforcement
agency, such as state police.
Step 3:
File a Complaint with the FTC
• FTC hotline phone counselors & web-based consumer guidance
to help victims recover
• File an ID Theft Complaint with FTC:
www.ftc.gov/idtheft
877-438-4338 or TTY: 866-653-4261
• Filing with FTC does not substitute for a report to criminal law
enforcement. FTC does not take enforcement actions
on behalf of individuals.

Remember: Victims need ID Theft Report for Blocking Info =
FTC ID Theft Complaint + Police Report
Identity Theft Affidavit
• Provides critical info in comprehensive, standardized
manner (less detailed than FTC ID Theft Complaint)
• Can be used in disputes with creditors, credit reporting
agencies – widely accepted
• Start with the FTC online complaint:
www.ftc.gov/idtheft
– Gather info first - credit reports, billing
statements, collection letters
– Include as much detail as possible
• Print complaint, “ID Theft Affidavit”
FAIR CREDIT REPORTING ACT
 Free credit report each year;
 Removal of first 5 digits of SSNs on request;
 Fraud alerts for 90 days / 7 years;
 Block of portions of credit reports attributable to

identity theft (4 days on written notification);
 Allows victims to get account documentation if

requested in writing;

43
FAIR CREDIT REPORTING ACT
 Written summary of rights upon request;
 Collection agencies must report ID theft to
creditors and provide information about the

alleged debt to the victim if requested in writing;
 Prevents a creditor from placing a debt for
collection after being notified that the debt was

incurred through ID theft.
44
Who can help?
Call your local police or Sheriff's

Department
Call Lifespan: 1-800-454-5030 x

193 for additional information
or further assistance.
45

More Related Content

What's hot

Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-researchJustin Saunders
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation nickski51
 
What Is Financial Exploitation
What Is Financial ExploitationWhat Is Financial Exploitation
What Is Financial ExploitationLisa Sosebee
 
Scams 0710
Scams 0710Scams 0710
Scams 0710KEIRO2
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedAdam Singer
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameSpringboard
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NCEmilyMoar
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SINEmilyMoar
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
 
Lottery scam
Lottery scamLottery scam
Lottery scamBrijeshR3
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Identity Theft: Protecting Our Seniors
Identity Theft: Protecting Our SeniorsIdentity Theft: Protecting Our Seniors
Identity Theft: Protecting Our SeniorsGlennerCenters
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 

What's hot (20)

Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Seminar Showcase 1
Seminar Showcase 1Seminar Showcase 1
Seminar Showcase 1
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
What Is Financial Exploitation
What Is Financial ExploitationWhat Is Financial Exploitation
What Is Financial Exploitation
 
Scams 0710
Scams 0710Scams 0710
Scams 0710
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updated
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NC
 
ID Theft
ID TheftID Theft
ID Theft
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SIN
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Lottery scam
Lottery scamLottery scam
Lottery scam
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Identity Theft: Protecting Our Seniors
Identity Theft: Protecting Our SeniorsIdentity Theft: Protecting Our Seniors
Identity Theft: Protecting Our Seniors
 
Frauds and Seniors
Frauds and SeniorsFrauds and Seniors
Frauds and Seniors
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Scams
ScamsScams
Scams
 
Senior Scams - Just say no!
Senior Scams - Just say no!Senior Scams - Just say no!
Senior Scams - Just say no!
 

Similar to Senior Audience Presentation

Similar to Senior Audience Presentation (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Avoiding ID Theft
Avoiding ID TheftAvoiding ID Theft
Avoiding ID Theft
 
Ftc Avoid Id Theft
Ftc Avoid Id TheftFtc Avoid Id Theft
Ftc Avoid Id Theft
 
Avoid ID Theft
Avoid ID TheftAvoid ID Theft
Avoid ID Theft
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
Training for Bank Employees
Training for Bank EmployeesTraining for Bank Employees
Training for Bank Employees
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Consumer fraud - Just Say No!
Consumer fraud - Just Say No!Consumer fraud - Just Say No!
Consumer fraud - Just Say No!
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Senior Audience Presentation

  • 1.
  • 2. What is Identity Theft? The theft or misuse of personal identifying information in order to gain something of value or facilitate other criminal activity 9.6 Million American Victims in 2010 2
  • 3. ID Theft Affects Persons of All Incomes and Backgrounds
  • 4. GOAL TODAY • HOW TO MINIMIZE THE CHANCES OF BECOMIMG AN ID THEFT VICTIM • HOW TO MINIMIZE DAMAGE SHOULD YOU BECOME AN ID THEFT VICTIM
  • 5. THERE IS NO FOOL-PROOF WAY TO AVOID BEING A VICTIM OF ID THEFT • WE ARE ALL VULNERABLE • YOU MAY NEVER DISCOVER THE CAUSE OF ID THEFT • COULD BE HAPPENING TO YOU TODAY
  • 6. WHAT DOES IT TAKE TO STEAL YOUR IDENTITY? • VERY LITTLE INFORMATION IS NEEDED FOR YOUR IDENTITY TO BE STOLEN. • ONCE INFORMATION IS OBTAINED, THE ID THIEF CAN APPLY AND POSSIBLY OBTAIN A NEW CREDIT CARD IN YOUR NAME AND LEAVE YOU WITH THE BILLS. • AN ID THIEF NEVER PAYS THE BILLS THAT HE ACQUIRED IN YOUR NAME.
  • 7. ID THEFT TAKES MANY FORMS • ENGAGING IN A “PHISHING” • DUMPSTER DIVING: OR “VISHING” SCAM RUMMAGING THROUGH TRASH LOOKING FOR BILLS OR OTHER PAPERS • STEALING BUSINESS CONTAINING PERSONAL INFORMATION INFORMATION (BANK STATEMENTS, ETC.) • STEALING YOUR SOCIAL • STEALING YOUR MAIL • STEALING YOUR WALLET, PURSE OR OTHER IMPORTANT PAPERS/ITEMS (PDA/ CELL PHONE/SOCIAL SECURITY CARD/ MEDICARE CARD) SECURITY INFORMATION WHICH IS GOOD AS GOLD • “ SHOULDER SURFING”WATCHES VICTIM PUNCH IN CREDIT CARD # / PIN #, ETC.
  • 8. How is it Committed? Without the: 1. Authorization; 2. Consent; or 3. Permission of the victim AND with the intent to defraud or benefit
  • 9. Non-Financial Identity Theft  Criminal Identity Theft  occurs when a person who has been stopped by law enforcement falsely supplies another person’s information in place of his/her own.  This results in tickets and warrants being assigned to an innocent person.
  • 10. Non-Financial Identity Theft Medical Identity Theft  Thief uses someone’s name & info (possibly insurance info) to obtain medical services or goods  Can cause:  Creation of false medical record  False insurance billing  Impact of diagnosis; healthcare errors  Debt collections
  • 11. Non-Financial Identity Theft Employment Identity Theft  Results in: 1. IRS Fraud 2. Social Security Administration Fraud
  • 12. Non-Financial Identity Theft Governmental Fraud  An imposter uses identity data of another person  supplies such data as part of an interaction with governmental agencies and databases.
  • 13. Non-Financial Identity Theft Governmental Fraud  An imposter uses identity data of another person  supplies such data as part of an interaction with governmental agencies and databases.
  • 14. Synthetic Identity Theft • Use of only the victim’s Social Security number, in combination with another person’s name and birth date, to create a new, fictitious identity. • Victim experiences problems when the new identity tracks back to the victim’s credit or tax records.
  • 15. Consequences of Identity Theft: 1. Denial of credit 2. Increased rates and financial charges 3. Loss of employment 4. Inability to get a job 5. Bankruptcy 6. Arrest 7. Loss of money associated with repairs 8. Missed opportunities (housing, employment, educatio n)
  • 16. A Shock: How the Victim Discovers Victim may find out when: 1. …bill collection agencies contact for overdue debts never incurred. 2. …applying for a mortgage or car loan and learning of problems with credit history. 3. …getting something in the mail about an apartment never rented, a house never bought, a job never held. 4. …being arrested for a crime NOT committed.
  • 17. • Recovering victims spent an average of $1,870 in out-of-pocket costs. • Over 3 million experienced issues such as: having utilities cut off –being arrested –finding erroneous claims on their health records –having child support garnished for kids they never had –being harassed by collection agencies -----
  • 18. How is information stolen?         Trash diving Lost/stolen wallet/purse Mail theft Burglary Skimming Computer hacking Data breach Scams/fraud 18
  • 19. Prevention Documents, Credit Cards, and Mail:         Shred! Ask why someone needs your SSN. Lock mailbox or know when mail comes. Take outgoing mail to a blue box or post office. Opt out of credit card offers. Carry only what you need. Remove your SSN from your Medicare card. Do not carry your Social Security Card 19
  • 20. Prevention Internet &Phone Do: Don’t: Get on the do not call list  Give personal information unless you see “https” or lock  Donate to charity via email or phone  wire transfer to someone you don’t know – especially overseas  respond to SPAM  open email attachments from someone you do not know  call a phone number for a business that is listed in an email 20
  • 21. What is Fraud? or Anatomy of a Scam A Legal Definition: – – – – A false representation of fact Made knowingly With the intention that the victim rely on it To the victim’s detriment In Plain English: Fraud is telling a lie or omitting important information to get a victim to do something he or she would not otherwise do and that causes the victim harm. 21
  • 22.
  • 23. COMMON SCAMS  The Nigerian scam  Tale of woe by one claiming to be rich  Who cannot get to money  Promise of riches to you if . . .  Wire transfer or money order to account  The Lottery scam  Victim has won or inherited large amount of money  Must pay taxes up front by wire transfer or money order 23
  • 24. COMMON PHONE SCAMS  Scare tactic  Caller pretends to be from trusted source  Caller says something is wrong  Caller asks that victim “verify” personal or account information  Fake charity  Caller purports to be soliciting for a charity  Caller takes credit card and personal information for donation 24
  • 25. DON’T FALL FOR THESE!  Jury Duty  Easy Credit – Pay in advance  Foreign lotteries  Work-at-home or investment schemes  Fake ebay or craigslist sales  Fake emails  Internet dating scams  Medicare Part D scams 25
  • 26. 26
  • 27. 27
  • 28. How to Spot Dishonest Service Providers  Don’t tolerate service providers who:  isolate you from friends and family  ask about your Will or finances  ask to be given power of attorney  do not respect your privacy  try to make you feel sorry for them  Report to their boss, tell family members, or call Lifespan for guidance, 244-8400 x 193. 28
  • 29. Detection Check your credit report regularly Monitor bank & credit card statements Be alert to mail that does not arrive Do not ignore harassing phone calls or collection letters Check your Social Security Earnings record Check your criminal history 29
  • 30. Impact on Victims  Take over of your most precious commodity –your      good name Financial loss Ruined credit Recovery process can take untold hours of follow up “ID theft investigation can take up to 500 hours.” 26% of victims: “Most affected by the emotional impact of ID theft.” (FTC survey, 2006)
  • 31. Defense IMMEDIATE CONCERNS: Stop impostor activity Report the crime Repair the damage 31
  • 32. Stop Activity and Report the Crime 1. Order your credit report and place fraud alert or freeze 2. Close accounts that have been tampered with or opened by impostor 3. Report to law enforcement and FTC 32
  • 33. Fraud Alert vs. Credit Freeze  Call one bureau  Creditors must take “reasonable steps” to verify identity  Less effective  90 days, 7 years  Write each bureau  No one can apply for new credit – must thaw the report  More effective  Fee if no police report Neither will prevent new accounts with merchants that do not check credit reports. 33
  • 34. 3 Things Needed to Enforce Victim’s Rights Under Federal Law  Proof of identity, i.e., copy of driver’s license or ID card;  Police report + ID theft affidavit;  Complete description of account, debt, or other item being disputed. 34
  • 35. If it’s not in writing, it doesn’t count! 35
  • 36. Identity Theft Report • Identity Theft Report is a report: A. that alleges an ID theft, B. that is a copy of an official, valid report filed by a consumer with an appropriate Federal, State, or local law enforcement agency, and C. the filing of which subjects the person filing the report to criminal penalties relating to the filing of false information if, in fact, the information in the report is false. • Police Report & attached ID Theft Complaint and/or Affidavit – The attachments provide the required detail in the Police Report to make it an ID Theft Report
  • 37. Step 4: File a Police Report • Call local police as soon as possible • Request appt. for in-person report filing • Take along completed FTC ID Theft Complaint • Request copy of Official Police Report • Officer may attach ID Theft Affidavit to police report, or department’s own police report’s details may suffice • Goal: to get an Identity Theft Report • In NY, Mandatory Police Reports for ID Theft Victims: • Executive Law: §646 - The law enforcement agency must take a police report of the matter and provide the complainant with a copy of the report at no charge.
  • 38. Can’t Get Police Report? 1. Provide Officer with: – The Mandatory Police Report Law in NY – The Memorandum to Police on Importance of Taking Police Reports for Identity Theft 2. If unable to file in person, inquire about filing an “automated report” online or via phone. 3. Seek a report from another jurisdiction, such as where the thief misused info, or from a different law enforcement agency, such as state police.
  • 39. Step 3: File a Complaint with the FTC • FTC hotline phone counselors & web-based consumer guidance to help victims recover • File an ID Theft Complaint with FTC: www.ftc.gov/idtheft 877-438-4338 or TTY: 866-653-4261 • Filing with FTC does not substitute for a report to criminal law enforcement. FTC does not take enforcement actions on behalf of individuals. Remember: Victims need ID Theft Report for Blocking Info = FTC ID Theft Complaint + Police Report
  • 40.
  • 41. Identity Theft Affidavit • Provides critical info in comprehensive, standardized manner (less detailed than FTC ID Theft Complaint) • Can be used in disputes with creditors, credit reporting agencies – widely accepted • Start with the FTC online complaint: www.ftc.gov/idtheft – Gather info first - credit reports, billing statements, collection letters – Include as much detail as possible • Print complaint, “ID Theft Affidavit”
  • 42.
  • 43. FAIR CREDIT REPORTING ACT  Free credit report each year;  Removal of first 5 digits of SSNs on request;  Fraud alerts for 90 days / 7 years;  Block of portions of credit reports attributable to identity theft (4 days on written notification);  Allows victims to get account documentation if requested in writing; 43
  • 44. FAIR CREDIT REPORTING ACT  Written summary of rights upon request;  Collection agencies must report ID theft to creditors and provide information about the alleged debt to the victim if requested in writing;  Prevents a creditor from placing a debt for collection after being notified that the debt was incurred through ID theft. 44
  • 45. Who can help? Call your local police or Sheriff's Department Call Lifespan: 1-800-454-5030 x 193 for additional information or further assistance. 45