Cyber safety and ID Theft Assistant Attorney General Jack Zurlini Washington State Attorney General’s Office.

Slides:



Advertisements
Similar presentations
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Advertisements

Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
IDENTITY THEFT AND FRAUD CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
BALANCING LIFE’S ISSUES, INC. Identity Theft Protection, Prevention and Self Help.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams Stevie's Scam School videos
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
COMPUTER SECURITY RISKS. PHISHING EXAMPLES: –“We suspect an unauthorized transaction on your account. To ensure that your account is not compromised,
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
Internet safety By Lydia Snowden.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
April 25, 2014 Entry task: What does APR stand for? What does it mean? Target: Select a credit card based on terms and conditions.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Protecting Your Information Assets
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Identity Theft Tiffany Setzer & Cassie Conkwright.
Jeff loses his identity! Lesson 8: Identity Theft.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
November 20, 2015 Entry task: List two do’s and two don’ts for credit card use. Target: Identify how to use credit cards properly to establish good credit.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
IDENTITY THEFT. WHAT IS IDENTITY THEFT? Identity theft refers to stealing someone else’s personal information in order to obtain credit or other benefits.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Jeff loses his identity! Lesson 5: Identity Theft.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Risky Business Week Protecting Your Identity: What to Know, What to Do Legal Division CSAA Insurance Group, a AAA Insurer.
Identity Theft It’s a crime!
April 17, 2015 Entry task: What does APR stand for? What does it mean?
Protect Your Computer Against Harmful Attacks!
Protecting Your Identity:
Protecting Your Credit
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Tip of the Day!.
Presentation transcript:

Cyber safety and ID Theft Assistant Attorney General Jack Zurlini Washington State Attorney General’s Office

Agenda Consumer Protection & the changing marketplace Up close: spam, spyware, & phishing Safeguarding against ID Theft

Consumer Protection Division Enforces Consumer Protection Act - ensures that the marketplace is free of unfair and deceptive practices Tools: informal mediation, litigation, education Consumer Resource Centers: –4 throughout state –89,000 calls in 2006 –Returned about $5.75 million to consumers

Enforcement Actions $3.5 million total recoveries $2.2 million fees and costs $450,000 restitution to consumers $468,000 cy pres $307,000 civil penalties

Some Traditional CP Issues Unfair or deceptive acts or practices –Car repair, leasing and purchase –Contractors –Foreclosure rescue scams –Cell phone bills –Charities –Predatory lending –Credit cards –Telemarketers –Collections

Consumer Protection Lawsuits TargetSettlement Ford Motor Co. $51.5M L.A. Weight Loss $875,000 Ameriquest $325M Trilegiant $14.5M

The Changing Marketplace Networks are now integral to the marketplace When consumer trust is compromised, Internet commerce is at risk Consumer Protection has adapted to digital deception and unfairness

Old Retailing Fraud, New Media Auctions Credit Cards Pyramids Biz Oppty’s Health Care Products & Services Travel/Vacation Investments

Old Fraud, New Media Foreign lottery Sweepstake scam 419 or Advanced Fee Fraud Wire transfer fraud

New High-Tech Fraud SPAM Spyware Phishing –Smishing –Vishing Pharming Typosquatting

High-Tech Deception or Unfairness Examples of an unfair or deceptive practice: –Using image that, when clicked on, doesn’t “x” out –Obstructing the use of a consumer’s computer with recurrent pop-ups –Negative option billing at the end of a free trial offer

High-Tech Deception or Unfairness Failure to disclose material facts: –A person might not download freeware if they knew there were getting spyware –Misrepresentations, such as making a download box for spyware look like a Microsoft Security Alert –Or failure to uninstall despite representing that the program will be uninstalled

Unconscionable practices: –Use of incessant pop-up billing reminders –For instance, holding consumers hostage with a barrage of pop-ups until they provide payment for a service they never ordered –No meaningful choice of terms, i.e. exceedingly unfair terms such as continued surveillance forever or choice of forum for arbitration High-Tech Deception or Unfairness

SPAM Unsolicited bulk Widely used for committing financial institution fraud, credit card fraud, and identity theft Violation of CAN-SPAM Act and WA law Forward to Common Spam Scams: –Nigerian –Phishing –Work-at-Home –Weight Loss Claims –Foreign Lotteries –Cure-All Products –Check Overpayment –Pay-in-Advance Credit Offer –Debt Relief –Investment Schemes

Spam Example

Spyware Installed without consent, spyware monitors or controls your computer use Violation of Washington’s anti-spyware law Effect: –Pop-up ads –Redirect computer to websites –Monitor Internet surfing –Record keystrokes

Spyware Example

Search tools Spam Adware Net send messages Spyware Example

Insert Video of Secure Computer example here (Henderson)

Phishing Fraudulently obtaining an individual’s personal or financial information Forward to If you believe you’ve been scammed, file a complaint with the FTC

If we do not get a new credit card by the end of the business day, your account will be canceled… Any invalid information will result in a $50 processing fee.

Best Practices For PC Users Technology Practices: Use anti-virus and anti-spyware software, as well as a firewall, and update them all regularly Set up your browser and operating system properly, and update them regularly Back up important information

Best Practices For PC Users Personal Behavior Practices: Protect your personal information: It’s valuable Know who you are dealing with Protect your passwords Choose the safest payment method Know who to contact if you have a problem

Best Practices For PC Users Download software only from sites you know and trust. Don’t click on links inside pop-up windows or in spam that claim to offer anti-spyware software or anything else. Don’t reply to or pop-up messages that ask for personal or financial information.

Identity Theft Checklist Call and write to: law enforcement, credit card issuers, banks, creditors, debt collectors, credit reporting agencies. Follow up phone calls in writing. Keep a log.

Checklist, con’t Contact police and file report. Contact FTC and file an affidavit at it/affidavit.pdf it/affidavit.pdf Police report or affidavit entitles you to copies of application and transaction forms of accounts opened in your name.

Checklist, con’t Contact credit reporting agencies: tell them you’re disputing debts and why. Inaccurate or fraudulent information on credit report should be blocked per Fair Credit Reporting Act.

Checklist, con’t Contact creditors’ fraud department to alert them of fraud. Existing accounts: close accounts or get new account numbers. New accounts: contact creditor and get copies of application and transaction documents.

Fraud Alerts and Security Freezes Fraud Alert places statement on credit report for 90 days requiring new creditor to call you before extending credit. Security Freeze blocks potential creditor’s access to credit report. Current law requires victim of id theft or of computerized data security breach.

New Security Freeze Law No need to first be a victim. Free if 65 or over; $10 fee to freeze and $30 to thaw. 15 minute thaw to open accounts. Credit reports still accessible to consumer and existing creditors. Effective September 2008.

Reporting Internet Fraud Washington Attorney General: FTC: www.ftc.gov To forward spam:

Reporting Internet Fraud con’t Identity theft: FBI/Internet Fraud Center: Anti-Phishing Working Group: Local law enforcement, internet service provider, or site operator

Additional Information Free credit reports: or call Security freeze or fraud alert: Do not call list or Opt-out list or

Contact Information Consumer Resource Center – – Jack G. Zurlini, Jr., AAG –