SlideShare uma empresa Scribd logo
1 de 21
How Common is It?
Thirty Percent

1 in 40
Why Children Are Targeted
Clean credit histories
 Likely to go undetected
 Foster children at increased risk


 Personal information is more widely

distributed


Low income/desperation/lack of
access to credit
How It Happens
Child is issued a Social Security number that is
already in use
 Data Breaches
 Theft of personal identifying information
 Also susceptible to the same forms of ID theft
faced by adults:









Obtaining information shared on the internet
Dumpster diving
Stealing mail
Stealing a wallet or purse
Skimming devices
Phishing
Consequences of Identity
Theft:
1.
2.
3.
4.
5.
6.
7.

8.

Denial of credit
Increased rates and financial
charges
Loss of employment
Inability to get a job
Bankruptcy
Arrest
Loss of money associated
with repairs
Missed opportunities
(housing, employment, educat
ion)
 Recovering

victims spent an average of
$1,870 in out-of-pocket costs.
 Over 3 million experienced issues such as:
 having utilities cut off
 being arrested
 finding erroneous claims on their health

records
 being harassed by collection agencies
 Foster youth
 Isolation
 Lack of trust

face special challenges
How Does Identity Theft Affect
Victims?
53% of victims feel moderate to severe distress from
the identity theft
 Why did this happen to me?
 The police don’t care
 Anger/Frustration
 Vulnerable/Violated
 Helpless/Stressed
 Depressed
 Suicidal
For the National Crime Victimization Survey (NCVS), the definition of identity theft includes three general types of incidents:

unauthorized use or attempted use of existing credit cards

unauthorized use or attempted use of other existing accounts, such as checking accounts

misuse of personal information to obtain new accounts or loans, or to commit other crimes.
Protecting A Child’s Identity
Keep documents locked up
 Safeguard child’s Social Security number
 Check for secure websites
 Use antivirus and firewall protections
 Safely dispose of personal information
 Discuss internet safety:


 “strong” passwords, file sharing, privacy settings

on social media sites
Warning Signs of ID Theft







Child receives suspicious mail such as preapproved credit card offers
A credit report exists in child’s name
Calls from collection agencies, credit card
companies, or medical providers
Denial of government benefits due to
another account using the child’s Social
Security number
IRS or Social Security Administration
requesting confirmation that child is
employed or asking her to pay taxes, but
she is not working
When Identity Theft is
Discovered: Help Foster Youth
Will Need
 Prevention
 Monitoring accounts
 How to spot phishing

Close accounts
 Assist victim with creditors
 Assist with credit report
 Advise to complete an FTC
affidavit
 Advise to file a police report
 Provide appropriate referrals

Credit Monitoring
Have to provide verification that you have
legal authority to request the information
 Have to prove the youth is in foster care
 Have to provide youth’s last known
address, other birthdates, and nicknames


 But: Ask the CRA to run a report with SSN only

as well!


Each CRA has their own procedure for
making requests
Monitoring Credit Reports
Look for:
1. Accounts victim didn’t open
2. Activity on accounts victim had closed
or were dormant
3. Changes to personal info such as
name, address, DOB, SSN, employer
4. Credit inquiries from companies victim
didn’t contact
Recovery Steps



Step 1: Contact the CRA’s
Step 2: Fraud Alert
 Signals potential creditors that someone else is using

consumer’s identity
 Only have to contact one of the 3 CRAs
 Last 90 Days
 Creditor must take additional steps to confirm the
applicant’s identity before issuing new credit, raising
limit, etc.


Step 3: Consider a Credit Freeze





Must be requested with each CRA
Credit is frozen
PIN number to access/un-freeze
No fee for victims of identity theft
Recovery Steps, ctd.
4) Call Creditors
 5) File a report with the FTC
 6) File a police report
 7) Get an Identity Theft
Report
 8) Check for non-financial
ID theft

Non-Financial Identity Theft
Criminal Identity Theft
Medical Identity Theft
Governmental Fraud
 IRS tax fraud
 SSA
 Dept. of Social Services
 Synthetic Identity Theft
 ID Theft Assumption



Summary of Rights of Victims
of Identity Theft
Right to file identity theft report.
 Right to place fraud alert on credit report.
 Right to free credit report.
 Get documents relating to the identity theft.
 Right to a credit report free of fraudulent
accounts.
 Right to stop debt collectors from contacting
to collect on fraudulent debts.


*Fair Credit Reporting Act (FCRA), 15 U.S.C. § 1681 and FAIR AND ACCURATE CREDIT TRANSACTIONS ACT OF 2003
**THE FAIR DEBT COLLECTION PRACTICES ACT, as amended by Public Law 104-208, 110 Stat. 3009 (Sept. 30, 1996)
Solutions: Federal
New federal law requires all states to
run credit checks on older foster children
and help resolve ID theft cases
 Prohibit use of Social Security numbers
to identify foster children
 Record management policies
 Require credit reporting agencies to
allow searches of all entries that match
a Social Security number

Solutions: States
Maryland Child Identity Lock bill
 Utah: online child identity protection
service
 Trainings for foster youth and foster
families
 States adopt separate identifying
numbers

Solutions: Family
Teach kids not to share
personal information on the
Internet
 Run credit checks annually
once kids turn 16
 When child’s SSN is
requested, ask why
 Know the signs of child ID
theft

Online Training Course
• Identity Theft Victim Assistance Online
Training – Supporting Victims’ Financial
and Emotional Recovery
Resources
TransUnion: http://www.transunion.com/personalcredit/credit-disputes/fraud-victim-resources/childidentity-theft.page
 Safeguarding Your Child’s Future from the FTC:
http://www.transunion.com/personal-credit/creditdisputes/fraud-victim-resources/child-identitytheft.page
 Identity Theft Assistance Center:
http://www.identitytheftassistance.org/pageview.php?c
ateid=94
 Idaho Legal Aid’s Identity Theft Assistance Portal:
http://www.idaholegalaid.org/IdentityTheftPortal


Mais conteúdo relacionado

Mais procurados

Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisIT-oLogy
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition- Mark - Fullbright
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyGlass Jacobson
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect youIdentity Theft Protection
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 

Mais procurados (20)

Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Training for Bank Employees
Training for Bank EmployeesTraining for Bank Employees
Training for Bank Employees
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the Elderly
 
IDShield
IDShieldIDShield
IDShield
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
How to Detect and Prevent Money Scams
How to Detect and Prevent Money ScamsHow to Detect and Prevent Money Scams
How to Detect and Prevent Money Scams
 

Destaque

Destaque (20)

Portfolio
PortfolioPortfolio
Portfolio
 
互联网搜索技巧
互联网搜索技巧互联网搜索技巧
互联网搜索技巧
 
Pesquisa AvançAda Na Internet 2009
Pesquisa AvançAda Na Internet 2009Pesquisa AvançAda Na Internet 2009
Pesquisa AvançAda Na Internet 2009
 
Recherche
RechercheRecherche
Recherche
 
JSF Testing - Tools und Technics
JSF Testing - Tools und TechnicsJSF Testing - Tools und Technics
JSF Testing - Tools und Technics
 
Shanghai big tradeshow calendar 2014 collection by MARKYE@LIERJIA.CN
Shanghai big tradeshow calendar 2014 collection by MARKYE@LIERJIA.CN Shanghai big tradeshow calendar 2014 collection by MARKYE@LIERJIA.CN
Shanghai big tradeshow calendar 2014 collection by MARKYE@LIERJIA.CN
 
document
documentdocument
document
 
Bollean Search - NageshRao
Bollean Search - NageshRaoBollean Search - NageshRao
Bollean Search - NageshRao
 
Infolitigpart1
Infolitigpart1Infolitigpart1
Infolitigpart1
 
Attack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingAttack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_Modeling
 
Ticer2005
Ticer2005Ticer2005
Ticer2005
 
Daron Yöndem - ie8 Ebook Tr
Daron Yöndem - ie8 Ebook TrDaron Yöndem - ie8 Ebook Tr
Daron Yöndem - ie8 Ebook Tr
 
IoF South West Conference
IoF South West ConferenceIoF South West Conference
IoF South West Conference
 
GreenWater Stakeholders Package
GreenWater Stakeholders PackageGreenWater Stakeholders Package
GreenWater Stakeholders Package
 
IBM Web Content Management - Melhores práticas
IBM Web Content Management - Melhores práticasIBM Web Content Management - Melhores práticas
IBM Web Content Management - Melhores práticas
 
Clase2
Clase2Clase2
Clase2
 
Introduction to Ext JS 4
Introduction to Ext JS 4Introduction to Ext JS 4
Introduction to Ext JS 4
 
Logminingsurvey
LogminingsurveyLogminingsurvey
Logminingsurvey
 
Tomislav Capan - Muzika Hr (IT Showoff)
Tomislav Capan - Muzika Hr (IT Showoff)Tomislav Capan - Muzika Hr (IT Showoff)
Tomislav Capan - Muzika Hr (IT Showoff)
 
Google
GoogleGoogle
Google
 

Semelhante a Training for Foster Parents

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Training for Child Court Appointed Advocates
Training for Child Court Appointed AdvocatesTraining for Child Court Appointed Advocates
Training for Child Court Appointed Advocates- Mark - Fullbright
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionBayo Cary
 
Safeguarding Your Child's Future
Safeguarding Your Child's FutureSafeguarding Your Child's Future
Safeguarding Your Child's Future- Mark - Fullbright
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.PdfSanea
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 

Semelhante a Training for Foster Parents (20)

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Training for Child Court Appointed Advocates
Training for Child Court Appointed AdvocatesTraining for Child Court Appointed Advocates
Training for Child Court Appointed Advocates
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protection
 
Safeguarding Your Child's Future
Safeguarding Your Child's FutureSafeguarding Your Child's Future
Safeguarding Your Child's Future
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
 
Consumer fraud - Just Say No!
Consumer fraud - Just Say No!Consumer fraud - Just Say No!
Consumer fraud - Just Say No!
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 

Mais de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mais de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Pooja Nehwal
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja Nehwal
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Delhi Call girls
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Pooja Nehwal
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure servicePooja Nehwal
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfGale Pooley
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 

Último (20)

(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 

Training for Foster Parents

  • 1.
  • 2. How Common is It? Thirty Percent 1 in 40
  • 3. Why Children Are Targeted Clean credit histories  Likely to go undetected  Foster children at increased risk   Personal information is more widely distributed  Low income/desperation/lack of access to credit
  • 4. How It Happens Child is issued a Social Security number that is already in use  Data Breaches  Theft of personal identifying information  Also susceptible to the same forms of ID theft faced by adults:        Obtaining information shared on the internet Dumpster diving Stealing mail Stealing a wallet or purse Skimming devices Phishing
  • 5. Consequences of Identity Theft: 1. 2. 3. 4. 5. 6. 7. 8. Denial of credit Increased rates and financial charges Loss of employment Inability to get a job Bankruptcy Arrest Loss of money associated with repairs Missed opportunities (housing, employment, educat ion)
  • 6.  Recovering victims spent an average of $1,870 in out-of-pocket costs.  Over 3 million experienced issues such as:  having utilities cut off  being arrested  finding erroneous claims on their health records  being harassed by collection agencies  Foster youth  Isolation  Lack of trust face special challenges
  • 7. How Does Identity Theft Affect Victims? 53% of victims feel moderate to severe distress from the identity theft  Why did this happen to me?  The police don’t care  Anger/Frustration  Vulnerable/Violated  Helpless/Stressed  Depressed  Suicidal For the National Crime Victimization Survey (NCVS), the definition of identity theft includes three general types of incidents:  unauthorized use or attempted use of existing credit cards  unauthorized use or attempted use of other existing accounts, such as checking accounts  misuse of personal information to obtain new accounts or loans, or to commit other crimes.
  • 8. Protecting A Child’s Identity Keep documents locked up  Safeguard child’s Social Security number  Check for secure websites  Use antivirus and firewall protections  Safely dispose of personal information  Discuss internet safety:   “strong” passwords, file sharing, privacy settings on social media sites
  • 9. Warning Signs of ID Theft      Child receives suspicious mail such as preapproved credit card offers A credit report exists in child’s name Calls from collection agencies, credit card companies, or medical providers Denial of government benefits due to another account using the child’s Social Security number IRS or Social Security Administration requesting confirmation that child is employed or asking her to pay taxes, but she is not working
  • 10. When Identity Theft is Discovered: Help Foster Youth Will Need  Prevention  Monitoring accounts  How to spot phishing Close accounts  Assist victim with creditors  Assist with credit report  Advise to complete an FTC affidavit  Advise to file a police report  Provide appropriate referrals 
  • 11. Credit Monitoring Have to provide verification that you have legal authority to request the information  Have to prove the youth is in foster care  Have to provide youth’s last known address, other birthdates, and nicknames   But: Ask the CRA to run a report with SSN only as well!  Each CRA has their own procedure for making requests
  • 12. Monitoring Credit Reports Look for: 1. Accounts victim didn’t open 2. Activity on accounts victim had closed or were dormant 3. Changes to personal info such as name, address, DOB, SSN, employer 4. Credit inquiries from companies victim didn’t contact
  • 13. Recovery Steps   Step 1: Contact the CRA’s Step 2: Fraud Alert  Signals potential creditors that someone else is using consumer’s identity  Only have to contact one of the 3 CRAs  Last 90 Days  Creditor must take additional steps to confirm the applicant’s identity before issuing new credit, raising limit, etc.  Step 3: Consider a Credit Freeze     Must be requested with each CRA Credit is frozen PIN number to access/un-freeze No fee for victims of identity theft
  • 14. Recovery Steps, ctd. 4) Call Creditors  5) File a report with the FTC  6) File a police report  7) Get an Identity Theft Report  8) Check for non-financial ID theft 
  • 15. Non-Financial Identity Theft Criminal Identity Theft Medical Identity Theft Governmental Fraud  IRS tax fraud  SSA  Dept. of Social Services  Synthetic Identity Theft  ID Theft Assumption   
  • 16. Summary of Rights of Victims of Identity Theft Right to file identity theft report.  Right to place fraud alert on credit report.  Right to free credit report.  Get documents relating to the identity theft.  Right to a credit report free of fraudulent accounts.  Right to stop debt collectors from contacting to collect on fraudulent debts.  *Fair Credit Reporting Act (FCRA), 15 U.S.C. § 1681 and FAIR AND ACCURATE CREDIT TRANSACTIONS ACT OF 2003 **THE FAIR DEBT COLLECTION PRACTICES ACT, as amended by Public Law 104-208, 110 Stat. 3009 (Sept. 30, 1996)
  • 17. Solutions: Federal New federal law requires all states to run credit checks on older foster children and help resolve ID theft cases  Prohibit use of Social Security numbers to identify foster children  Record management policies  Require credit reporting agencies to allow searches of all entries that match a Social Security number 
  • 18. Solutions: States Maryland Child Identity Lock bill  Utah: online child identity protection service  Trainings for foster youth and foster families  States adopt separate identifying numbers 
  • 19. Solutions: Family Teach kids not to share personal information on the Internet  Run credit checks annually once kids turn 16  When child’s SSN is requested, ask why  Know the signs of child ID theft 
  • 20. Online Training Course • Identity Theft Victim Assistance Online Training – Supporting Victims’ Financial and Emotional Recovery
  • 21. Resources TransUnion: http://www.transunion.com/personalcredit/credit-disputes/fraud-victim-resources/childidentity-theft.page  Safeguarding Your Child’s Future from the FTC: http://www.transunion.com/personal-credit/creditdisputes/fraud-victim-resources/child-identitytheft.page  Identity Theft Assistance Center: http://www.identitytheftassistance.org/pageview.php?c ateid=94  Idaho Legal Aid’s Identity Theft Assistance Portal: http://www.idaholegalaid.org/IdentityTheftPortal 

Notas do Editor

  1. 1) Researchers estimate that as many as 30% of foster children may be the victims of identity theft, based on reviews of the credit reports of foster children.2) A recent study by Identity Theft Assistance Center found that, nationwide, 1 in 40 U.S. households with minor children had experienced child identity theft
  2. Thieves target children’s social security numbers b/c they are particularly valuable due to their clean histories – they can be paired with any name and birth date.Theft of a child’s identity may go undetected for years; most parents and children don’t discover the identity theft until the child is moving into adulthood and begins applying for loans or other credit accounts.Foster children face even higher risk of identity theft because their personal information passes through many hands such as caretakers, service providers, and schools, thus increasing the chances that their SSN’s could be obtained by an identity thief Low-income households are disproportionately affected by child identity theft.  As family income decreases, the risk of child identity fraud increases.  While 50 percent of households of child identity theft victims had incomes under $35,000, only ten percent of households of child identity theft victims had incomes of more than $100,000. http://www.identitytheftassistance.org/pageview.php?cateid=94 (2012 Child Identity Fraud Report)
  3. Social Security numbers are being sold on the street every day by the thousands – the SSN is made up and used by a thief, then down the road, that # is actually issued by the SSA to a child. For example, over 280,000 SSN’s were stolen from the Utah Department of Health’s Medicaid/CHIP database, including thousands of children’s SSN’s. Schools and hospitals are also vulnerable because of their massive databases, which are particularly appealing to ID thieves. Child’s Social Security number or other personal identifying information is stolen by someone with access to it such as a biological parent, foster parent, case worker, school official, or medical care provider. 27% of respondents to a recent survey by ITAC reported knowing the individual responsible for theft of a minor’s identity.
  4. Impact on credit is especially difficult for foster youth transitioning into adulthood. They face inability to get an apartment, student loans, or car loans; yet they may have no support network or safety net to help them while they attempt to recover from the id theft and repair their credit.
  5. (Langton, L. & Planty, M. (2010). Bureau of Justice Statistics Special Report, National Crime Victim Victimization Survey Supplement, Victims of Identity Theft 2008. Washington, D.C.: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. Through http://bjs.ojp.usdoj.gov/index.cfm?ty=tp&tid=42. 3) Especially where a foster child’s identity has been stolen by a biological parent, foster parent, case worker, or care provider – the foster youth will face additional emotional and mental health obstacles due to the associated feelings of betrayal, inability to trust anyone, and feelings of isolation.
  6. Langton, L. & Planty, M. (2010). Bureau of Justice Statistics Special Report, National Crime Victim Victimization Survey Supplement, Victims of Identity Theft 2008. Washington, D.C.: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. Through http://bjs.ojp.usdoj.gov/index.cfm?ty=tp&tid=42.
  7. Keep locked up all documents that show a child’s personal information such as date of birth, Social Security number, and birth certificate. Don’t carry your child’s Social Security card with you.If someone asks for your child’s Social Security number, ask why they want it, how they’ll safeguard it, how long they’ll keep it, and how they’ll dispose of it. If not satisfied that they have adequate safeguards in place, don’t share the number and ask to use another identifier instead. Before you share personal information on the internet, make sure you have a secure connection. A secure website has a lock icon in the address bar and a URL that begins with https. Ensure the computer you are using has updated antivirus software and firewall protection. Don’t send personal or financial information through an unsecured wireless connection. Shred any papers that include child’s personal information before throwing them out.
  8. 1) 2) Minor children do not have legal capacity to enter into contracts and therefore a credit report should not exist for a person younger than 18.
  9. Make sure your foster youth understand the importance of reviewing bank statements regularly. If enrolled in paperless statements, make sure to emphasize they still need to review at least monthly to ensure they catch any unusual activity as soon as possible. Explain how to spot phishing schemes. Make sure to get written documentation that the account is closedUsually will need to contact the fraud department to get started.4) Give foster youth information on how to order their free annual credit report and discuss how to review the report for fraudulent activity. Explain how to stagger reports so can check periodically. Discuss requesting a Fraud Alert. 5) Explain how to access and complete the FTC affidavit.6) Explain how to contact police and file a police report. Provide copies of any documents that will help the customer complete the affidavit and/or police report. Explain why a police report can be beneficial and make sure they understand what rights they may give up by choosing not to file a police report. Also make them aware of what tools are still available to them even without a police report. 7) If they need additional assistance, use ICAIT’s Resource and Referral guide to become educated on who you can refer victims to
  10. Such as a government agency badgeVia a court order or other such documentImportant to have a report run with SSN only, to catch instances where youth’s social was used with another person’s name, address, etc. This is called “synthetic identity” theft because a new, synthetic identity is created and is the most common way criminals use a child’s personal information and will not be detected if the CRA runs a report with the child’s name and SSN only.See Attachments B, C, and D to the Administration for Children and Families May 8, 2012 Instructions
  11. Free Credit Report: Look on credit report for indicators of identity theft:Accounts victim didn’t openActivity on accounts victim had closed or were dormantChanges to personal information, e.g., name, address, DOB, SSN, employerCredit inquiries from companies victim didn’t contactGuide on How to Read Credit Report available from Consumer Credit Counseling of Orange County at http://www.cccsoc.org/pages/credit_guide/credit_guide_05.phtml
  12. Contact the 3 major credit reporting agencies and explain that the child is a minor and cannot legally enter into any type of contract. Send proof of minor status via a birth certificate or court order that lists the child’s date of birth. Ask for the CRA to remove all accounts, application inquiries, and collection notices from the credit report associated with the child’s name or Social Security number.Fraud Alert: Fraud Alert signals potential creditors that someone else is using consumer’s identityOnly have to contact one of the 3 CRAsCreditor must take additional steps to confirm the applicant’s identity before issuing new credit, raising limit, etc.Entitles victim to free credit report:request fraud alert free credit report – not sent automatically3) A security freeze stops most access to your credit reporting file until you temporarily lift the freeze or you remove it. The freeze should prevent new account identity theft, because most businesses will not open credit accounts without first checking a consumer’s credit history. If your credit files are frozen, even someone who has your name and Social Security number probably will not be able to open new credit accounts in your name. In order to get a security freeze, you must contact each consumer reporting agency separately.The consumer reporting agency is not allowed to charge any fees to victims of identity theft for placing, removing or temporarily lifting a security freeze on a credit report. To prove you are a victim, you must also send a valid copy of a police report, investigative report, or a complaint to a law enforcement agency about unlawful use of your personal information by another person. (ID Theft Report).Each consumer reporting agency to whom you make a request must place the freeze no later than three (3) business days after receiving your request. Within five (5) business days from placing the freeze on your account, each consumer reporting agency from whom you requested a security freeze must send you a confirmation letter containing a unique PIN (personal identification number) or password. Keep this PIN or password in a safe place.
  13. 4) Call every company where an account was fraudulently opened or misused. Explain to the business that he individual is a minor; ask that the account be closed and flagged to show it was a result of identity theft. Ask for written confirmation that the company has closed the disputed accounts and has discharged the fraudulent debts. 5) Go to www.ftc.gov and complete the Identity Theft Affidavit; print a copy for your records6) Minor child may not necessarily need a police report in order to get fraudulent accounts out of their name because proof that the victim is a minor should be sufficient on its own. However, can still be a good idea to file a police report, especially if dealing with non-financial identity theft issues. 7) Identity Theft Report – Under the Fair Credit Reporting Act, an identity theft victim can use an identity theft report to block erroneous charges from appearing on their credit reports and to get ocpies of documents such as applications and contracts. An Identity Theft report consists of the ID theft affidavit from the FTC plus a police report.8) Obtain copies of the youth’s EOB’s from Medicaid or insurance provider and review for anything out of the ordinary; if find errors, immediately contact the physician who performed the procedure and ask for a copy of the medical records (do not disclose that you suspect ID theft). Review medical records and alert the physician and insurance company of any fraud and demand that your medical record be corrected as required by HIPAA. Check Idaho Repository for any criminal charges in the youth’s name and if find any, contact public defender’s office or a criminal law attorney.
  14. Criminal Identity Theft: Criminal identity theft occurs when someone uses the victim’s name and information as his own during an investigation, issuance of a ticket, or arrest by law enforcement. This may lead to the issuance of warrants or the entrance of guilty pleas in the victim’s name. Medical Identity Theft: In cases of medical identity theft, thieves use a victim’s name, and possibly insurance information to obtain medical services or goods. The victim is then saddled with proving she is not responsible for costly medical bills, or may find that the thief has exhausted the victim’s insurance coverage. Even worse, medical identity theft can have serious health consequences if the thief’s real or fictitious medical information is added to the victim’s medical records. Governmental Fraud An imposter uses identity data of another person supplies such data as part of an interaction with governmental agencies and databases.Synthetic Identity Theft: Each of the types of identity theft listed above involves the thief impersonating the victim to obtain benefits. In some cases the thief does not steal the victim’s entire identity, but rather uses only the victim’s Social Security number, in combination with another person’s name and birth date, to create a new, fictitious identity. As a result, the victim may experience problems when the new identity tracks back to the victim’s credit or tax records. Because this type of fraud may not be reflected on a consumer’s credit report, it may not be discovered by the victim until many years later. ID Theft Assumption: The impersonation of another person on the Internet with the “intent to obtain a benefit or injure or defraud another.” Federal Laws Not specifically criminalized under federal lawState laws Only 2 states have laws against internet impersonation:CANYHowever, recently NJ court broadly defined state ID theft law to include internet impersonation with the intent to harm the victim
  15. On September 30, 2011, a new law was signed by President Obama that requires every state to run credit checks on all older foster children, age 16-18, and help resolve id theft cases before the children age out of the system. Agencies were required to submit plans showing compliance with the new federal requirement by August 13, 2012. One issue being faced in implementation is the different policies Transunion, Experian, and Equifax have taken re: the process to request records, and the charges. Rep James Langevin, a democrat from Rhode Island, introduced the Foster Youth Financial Security Act that would prohibit states from using Social Security numbers to identify foster children.Uniform and strict record management policies at foster agencies Foster children will need to be able to see all accounts using their social security number, even where a different name was used.
  16. 1) Allow parents and legal guardians to place a preemptive freeze on their child’s credit report starting in January of 2013. The freeze prevents thieves from applying for credit in a child’s name. 2) Utah AG’s office is piloting an online child identity protection service that allows parents to register their children, free of charge, for protection through the credit rating agency TransUnion. 3) Regular information security trainings incorporated into a financial literacy program for all foster youth and foster families4) States could choose, on the state level, to implement a separate numbering system to protect the social security numbers of foster youth5) Require statewide tracking of data losses/data breaches by companies, agencies, schools, hospitals, etc.
  17. Online Training:Developed by the Office for Victims of Crime (OVC)Online training to provide advocates & other allied professionals with the tools they will need to better understand the rights and needs of victims and to help assist victims of identity theft in their financial and emotional recoveryIncludes case studies and exercises