Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.

Slides:



Advertisements
Similar presentations
Identity Theft If you are a victim of identity theft, take the following four steps as soon as possible!
Advertisements

The Supplemental Nutrition Assistance Program (SNAP)
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Managing Your Credit 2014/2015 Office of Student Financial Assistance.
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up © 2009.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
G Personal Finance G  Almost 31% of an individual’s paycheck is deducted  Taxes are the largest expense most individuals will have 
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
NEW JERSEY’S PERSPECTIVE ON REDUCING IMPROPER BENEFIT PAYMENTS.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
What Can YOU Do to Prevent Healthcare Fraud? Funded by: This project is supported in part by grant numbers 90MP0026 and 90MP0127 from the U.S. Administration.
What You Need to Know Customer Service 1 08/09/2012.
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
NEW YORK STATE DEPARTMENT OF LABOR
NEW YORK STATE DEPARTMENT OF LABOR Shared Work Program Employee/Claimant Presentation.
October 14,  Benefit Year Earnings Root Causes Identified:  Agency Causes’  System deficiencies  Insufficient BPC staff  Oversight of issues.
Outreach Overview of Retirement Services. 2 Outreach Overview Agenda Review of Customer Services Overview of OPM Website and Services Online application.
Understanding Your Paycheck and Tax Forms
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
October 13, W E WILL IDENTIFY, ANALYZE, AND ACT ON THE ROOT CAUSES OF IMPROPER PAYMENTS BY BUILDING UPON AND IMPROVING PRACTICES ALREADY IN PLACE.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
State Presentation:VIRGINIA October 14,  Separations (SEPs): Root Causes Identified:  Agency Causes  Communication Deficiencies / Internal and.
Identity Theft.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
Identity Theft Project Erin L. Caraway Jacob Locke.
October 14,  Benefit Year Earnings (BYE): Root Causes Identified:  Agency Causes  Failure to properly investigate earnings in a timely manner.
WHO’s IN YOUR “WALLET” WHO’s IN YOUR “WALLET” YOU BETER “RECOGNIZE” YOU BETER “RECOGNIZE” STEPPING $2o0 $300 $400 $500 $400 $300 $200 $500 $400 $300.
State Presentation: OCTOBER 24,2011. Overpayments by Cause* 2010 Review Description$ AmountPercentage of Total Unreported Earnings $ 27,104, %
NATIONAL DIRECTORY OF NEW HIRES Office of Child Support Enforcement Administration for Children and Families Department of Health and Human Services.
Unemployment Insurance Workshop September 2015 Leah Reeder, UI Technical Services Specialist Tyler Smith, UI Technical Services Specialist.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Center for Workforce Information & Analysis PAHIRES ( ) New Hire Reporting.
1 Identity Theft Prevention and the Red Flag Rules.
Arizona’s Shared Work Program. The Shared Work Program:  Is an alternative to employers who are facing reduction in the work force.  Allows employers.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
October 28,  Benefit Year Earnings (BYE): Root Causes Identified:  Agency Causes  Failure to properly investigate earnings in a timely manner.
Identity Theft How bad people get good credit. Lindsey Bertugli.
IDENTITY THEFT.
Pub 4491 Pub 4012 TaxSlayer Manual
Managing Your Credit Office of Student Financial Assistance.
Protecting Your Credit
Red Flags Rule An Introduction County College of Morris
Balancing Anti-Fraud Efforts and Due Process in Indiana
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
Protecting Your Credit Identity
BRENTWOOD POLICE IDENTITY FRAUD / THEFT INFORMATION PACKET
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson

the “Everyone Own The Georgia Department of Labor has adopted the “Everyone Owns Integrity” concept. We aim to maintain the integrity of the Unemployment Insurance program through prevention and early detection of improper payment of UI benefits.

St  In 2010, Georgia ranked no. 4 on the Consumer Sentinel Network State Complaint Rates list:  9, 404 complaints of identity theft filed  31% of the complaints were because of fraudulent use of government documents or benefits  7% Employment-related fraud  Five of GA’s largest metropolitan areas are in the top 50 rankings for identity theft-related consumer complaints Statistical Data for 2010

UI claim filed by someone other than the owner of the SSN Individuals working under a stolen SSN State/National Directory of New Hires Wages reported incorrectly Tips and leads Out of State wages Some Identity Theft Detection Points

Affidavit to Verify Lawful Presence in the U. S. Reporting Fraud and Abuse website application Fraud and Identity Theft Prevention

AFFIDAVIT PROCESS Georgia law, one-time requirement Deterrent for committing fraud Valid government-issued picture identification UI benefits are not paid until the requirement is satisfied Failure to meet affidavit requirements result in a disqualification of benefits

Reporting Fraud and Abuse Online form is available on the Georgia Department of Labor website to report fraud and identity theft. fraud_and_abuse.htm Forms are forwarded to the UI Integrity Unit for investigation

Reporting Fraud and Abuse Individuals complete the Reporting Suspected Unemployment Insurance Fraud and Identity Theft form when someone is using their SSN or they are aware of someone using another individual’s SSN to file a fraudulent UI claim and/or receiving UI benefits. Forms are sent to the UI Integrity Unit

Created in 2008 to spearhead statewide leadership in detecting and investigating identity theft and enforce fraud prevention related to the UI program. UI INTEGRITY UNIT

Claimant attempts to file a UI claim and a claim already exists using his/her SSN and the wages do not belong to the individual attempting to file Non-claimants report use of his/her SSN to earn wages in the state of Georgia Direct deposits erroneously made to an unknown bank account Reports of forgery of Georgia Department of Labor checks Types of Investigations

Integrity Investigation Investigator requests that the complainant submit a written and signed statement detailing the complaint Statement must include the full name, date of birth, social security number, mailing address and telephone number. Must provide a copy of the SSN and government issued picture ID

Individuals are advised to file a police report and notify the Federal Trade Commissioner when reporting identity theft: Online: Telephone: ID-THEFT ( ) Mail: Identity Theft Clearinghouse, Federal Trade Commission, Washington, DC Integrity Investigation

Verify the wages reported under the SSN in question are correct Request a certified copy of SSN Request verification of assignment from the Social Security Administration If SSN belongs to the complainant, benefits are suspended until investigation is complete If SSN belongs to the claimant, claimant must report in person to the Career Center to provide a copy of the social security card and a government issued picture ID and a statement regarding date and location SSN was obtained Individual Attempts to File for UI Claim already exists

Verify the wages reported under the SSN in question are correct Request a certified copy of Social Security card Request verification of assignment from the Social Security Administration If SSN belongs to the complainant, Wage Investigation Group updates the wage record accordingly If SSN does not belong to the complainant, notification of results are sent. Investigation is closed. Non-Claimant reports use of SSN to work and earn GA wages

Establishment of overpayment if SSN of perpetrator can be located. Fraud penalties for misrepresentation Disqualification for the remaining quarter plus four additional quarters. Consequences of Investigation

Transaction to maintain a database of social security numbers reported for identity theft and fraud from all sources – When claims are filed and run in nightly processing, the claims check the database and flag claims filed Implement real time SSA Verifications Future Developments

For more information or questions: Please contact Chief of UI Integrity Unit, Lloyd Romans at UI INTEGRITY UNIT