Identity Theft Philippa Lawson Canadian Internet Policy and Public Interest Clinic University of Ottawa www.cippic.ca.

Slides:



Advertisements
Similar presentations
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Advertisements

What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
Parachute Neighborhood Watch Presentation February 9, 2010.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft “When Bad Things Happen To Your Good Name” El Camino Community College Police Department Sgt. Kirk Johnston Josh Armstrong.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft. MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to.
TCLEOSE Course No th Legislature SB – 473; SECTION 8. Section , Occupations Code, is amended by adding Subsection (i) to read as follows:
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 7.2 October 24, 2011.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft.
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Presented By The Plano Police Department Crime Prevention Unit.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
© 2004 TransUnion LLC. All Rights Reserved. August 10, 2005 Seven Easy Steps to Fraud Prevention Northwestern University Clifton M. O’Neal Director, Corporate.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Protect Yourself from Identity Theft
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Protecting Your Identity While Attending College.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
By: Asfa Khan and Huda Mukhtar
Jeff loses his identity! Lesson 8: Identity Theft.
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 6.1 March 1, 2010 Identity Theft & Credit Card Fraud 6.1 March 1, 2010.
Presented By Plano Police Department Crime Prevention Unit.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
Protecting Your Identity:
When you get caught for Identity Theft
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Identity Theft Philippa Lawson Canadian Internet Policy and Public Interest Clinic University of Ottawa

Definitions (Archer/Sproule) Identity theft: The unauthorized collection, possession, transfer, replication or other manipulation of another person’s personal information for the purpose of committing fraud or other crimes that involve the use of a false identity. Identity fraud: the gaining of money, goods, services, other benefits, or the avoidance of obligations, through the use of a false identity.

Archer/Sproule Conceptual Model

Most Useful Info Account numbers/details –Bank, credit card, mortgage, phone, etc. Passwords, PINs ID documents/numbers –SIN, health, drivers licence, passport, birth cert. –employee, student, member Credit reports Home address Date of birth Employment details Biometric information

Techniques of ID Theft taking/stealing from individuals: –finders keepers: trash, used computer equip, lost wallet –theft of wallet, chequebook, credit card, mail –pretexting by phone or in person –scams: employment, surveys, contests…. –phishing, vishing, pharming –skimming - via ATMs, hidden machines –wireless eavesdropping –malware: keystroke loggers, etc.

Techniques of ID Theft taking from public sources: –personal websites, social networking sites –online resumes –employer/association websites –online public records –post-disaster missing person sites –obituaries

Techniques of ID Theft taking/stealing from organizations: –dumpster diving –used computer equipment –corrupt employees –pretexting (duped employees) purchase/subscribe (e.g., credit reports) –hacking; taking advantage of security holes

Intermediate Stages ID data trafficking –buy and sell personal information ID document “breeding” –create counterfeit documents –apply for new documents, ID numbers (forgery) Submit change of address to post office –divert victim’s mail

Purpose: ID Fraud use credit card, phone credit withdraw from bank account open new accounts (bank, utility, phone…) obtain loans mortgage/sell property (mortgage/title fraud) steal cars; order goods online using drop-site get insurance or government benefits get employment/hide criminal record create cover for other criminals/terrorists

What to do? 1.Prevention -Data Protection/Security -Deterrence 2.Early detection -Mitigation -Prosecution 3.Victim Assistance

Individuals should…. keep ID/account info secure shred records not post detailed personal information online not respond to questionable solicitations, s keep an eye on debit/credit cards install up-to-date computer firewall, virus protection use different passwords, change frequently understand risk of activities and decide accordingly check credit report annually (detection)

Organizations should… Prevent theft: –minimizing collection/retention/disclosure –avoiding giant databases of personal info –encrypting data –redacting personal info in public records –carefully screen, train, monitor employees –taking care when outsourcing

Organizations should… Prevent Fraud: –adopting strong authentication methods access requests applications for documents change of address notices (Canada Post) –issuing tamper-proof ID documents

Control Points Individuals: –limited control / ability to assess risk Organizations: –Service providers Online services, electronic banking, magnetic stripe cards, wireless communications, … –Software/hardware vendors/manufacturers –Data holders (government + private sector) –Public records (government) –Social networking sites

Priorities 1.Incentives for Organizations 2.Victim Assistance 3.Deterrence (Thieves)

Incentives for Organizations Data Protection Laws –enforce! –Privacy Act, PIPEDA – gaps? Data Breach Notification –risk of reputational damage; cost of notification Civil Liability for Failure to Protect –leading to ID theft (or risk thereof?) –rights to sue manufacturers of hardware/software that exposes data to ID theft?

Privacy Act no minimum collection/retention rule no requirement to report data breaches no clear guidelines re: posting public records online; making personal information available electronically

Victim Assistance data breach notification letters credit bureaus – fraud alerts, security freezes centralized assistance/forms getting new ID documents right to copy of police report process for establishing innocence and ordering corrected records

Deterrence (thieves) Criminal law -penalties for ID fraud crimes -police resources to pursue -criminal code amendments?

Criminal Law Existing ID Theft/Fraud crimes –fraud, forgery, personation, computer misuse –mere possession is not a crime; no deprivation Possible new ID Theft crimes –possession of [multiple] ID with intent to defraud remove deprivation requirement rebuttable presumption of intent (multiple ID, spec.data) –fraudulently obtaining personal info (Bill C-299) –trafficking in ID info/cards recklessly or knowingly –breach of trust (employee theft) –fraudulently redirecting mail