October 27, 2010.  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.

Slides:



Advertisements
Similar presentations
Presented (insert date) By (insert organizations name)
Advertisements

Avoid Identity Theft TCU Technology Resources
Identity Theft A CyberAngels Quick Tutorial A CyberAngels Quick Tutorial Adapted from the Federal Trade Commission Website Press the Next Button to Continue.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
A person or company to whom a debt is owed.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft “When Bad Things Happen To Your Good Name” El Camino Community College Police Department Sgt. Kirk Johnston Josh Armstrong.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft. MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Identity Theft: FTC’s Program for Victim Assistance.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
IDENTITY THEFT Presented By: Harry Kohal Past President Wisconsin Association Computer Crime Investigators
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Clean Up © 2011.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Protecting Yourself Against Identity Theft By Sierra Monif Next.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Identity Theft Project Erin L. Caraway Jacob Locke.
Understanding and Preventing.  Acquiring someone’s identifying information and impersonating them for gain.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Presented By Plano Police Department Crime Prevention Unit.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Identity Theft One of America's fastest growing crimes.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Identity Theft!!! Bill Ketjen Matt Grodhaus Two forms of crime IDENTITY THEFT  Using personal information for deception IDENTITY FRAUD  Using personal.
Identity Theft The fastest growing type of fraud..
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Fraud: Identity Theft G.1 List and explain consumer protection laws, including credit reporting, debt collection, and privacy. G.2 Define common, unfair.
Identity Theft How bad people get good credit. Lindsey Bertugli.
IDENTITY THEFT.
Identity Theft It’s a crime!
Protecting Your Identity:
Protecting Your Identity:
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Identity Theft and Credit Safety
Presentation transcript:

October 27, 2010

 According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing an average nearly 40 percent per year for the past several years.  The Privacy Rights Clearinghouse estimates that each year 700,000 people in the United States are victims of identity theft.

 Older people make appealing financial targets because they typically have higher credit lines, greater home equity and more financial resources than younger populations.  Incidents of identity theft over the age of 60 increased by 218 percent in 2001 (5,802 victims) over reported figures in 2000 (1,821 victims).

 Identity theft happens when someone accesses essential elements of a person’s identifying information in order to commit theft.  This information includes name, social security number, date of birth and mother’s maiden name. Source:Citi Identity Theft Solutions

Who is at risk?

Types of Identity Theft  Use of personal information  Fraudulent charges on existing accounts  Creating new accounts

 Dumpster Diving  Shoulder Surfing  Social Engineering  Phishing  Providing Info to Legit Business with Criminal Employees  Online Social Websites (Facebook, MySpace, etc)

 SPAM  Theft  Mailbox  Internet  Change of address without your knowledge

 Run up existing accounts  Create new accounts  Get loans  Credit card fraud  Apply for utilities

 Strangers  In some cases, desperate family members  Terrorists – an emerging group

 Financial gain  Poor credit  Avoid trouble  Revenge

 Denied credit  Receive bills you do not recognize  Stop receiving monthly bills, bank statements, etc.  Collection calls and letters for unknown debts

 To reduce or minimize the risk of becoming a victim of identity theft or fraud, there are some basic steps you can take. For starters, just remember the word "SCAM":

 S Be stingy about giving out your personal information to others unless you have a reason to trust them, regardless of where you are.  C Check your financial information regularly, and look for what should be there and what shouldn't.

 A Ask periodically for a copy of your credit report. Your credit report should list all bank and financial accounts under your name, and will provide other indications of whether someone has wrongfully opened or used any accounts in your name.  M Maintain careful records of your banking and financial accounts.

 Considered an “easy” target by criminals  May not use credit cards regularly  May not receive/review their own mail  Unfamiliar with computers/online activity  Overly trusting (family, friends, caregivers)  May not know they are a victim for some time

 If victimized, they may not report crime for fear of embarrassment  Be wary of solicitations  Don’t offer personal information to those you don’t know  “Family” member in need of help

 Place passwords on your credit card, bank and phone accounts (don’t use obvious ones).  Secure personal information in your home.  Shred financial and personal documents  Ask about information security procedures in your workplace.

 Be Alert ◦ Mail or bills that don’t arrive ◦ Denials of credit for no reason  Inspect your credit report ◦ Law entitles you to one free report per year from each nationwide credit reporting agency ◦  Inspect your financial statements ◦ Look for charges you didn’t make

 Contact the fraud department at the three major credit bureaus – Equifax, Experian and Trans Union and request that a fraud alert be placed on your account  Obtain a current credit report and review it  Close out fraudulent accounts  File reports with the police and the FTC  Keep a log of all you do  BE PERSISTENT!!!

 The Identity Theft and Assumption Deterrence Act of 1998 – enacted in October 1998  Establishes that the person whose identity was stolen is a true victim. Previously only creditors who incurred monetary losses were considered victims.  Provides penalties up to 15 years imprisonment  Maximum fine of $250,000

 Rhode Island General Law Identity Fraud – enacted in July 2000  Mirrors Federal Act  Penalties ◦ 1 st conviction – imprisoned not more than 3 years and fined not more than $5000 or both ◦ 2 nd conviction – imprisoned not less than 3 years nor more than 5 years and fined not more than $10,000 ◦ 3 rd conviction – imprisoned not less than 5 years nor more than 10 years and fined not more than $15,000

 Victims are scared. They are confused. Their ability to trust anyone has been severely tested.  Many victims report that financial, emotional and criminal assault on their good names has either permanently impacted their lives or has continued for years.

 Call the 3 credit reporting agencies, obtain copies of the credit reports, place a fraud alert, identify open fraudulent accounts and inquiries from companies that have received fraudulent applications.  Notify affected credit card companies and banks, etc. and obtain account numbers and other pertinent information if possible. Try to get copies of all documents and conversations associated with the account.  Identify fraudulent home addresses and other information on your credit report.

Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it.

  

 Rhode Island State Police Financial Crimes Unit  Telephone (401) 