Utah Office of the Attorney Genera l Kirk Torgensen.

Slides:



Advertisements
Similar presentations
Identity Theft If you are a victim of identity theft, take the following four steps as soon as possible!
Advertisements

Isn’t it Romantic?. Arranged or Forced? Divide into 2 groups –Group 1 – define “arranged marriage” –Group 2 – define “forced marriage” Share.
The Grooming Process. Trafod Sexual Abuse and Trauma Centre.
Presented By Drexel and FMFCU.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
It’s Time to Upgrade Your Thinking Q1 & Q2 Cyber Breaches Source: Identity Theft Resource Center, 7/2/ breaches with over 8.5 million records.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Oklahoma’s Personal Financial Literacy Passport © Oklahoma State Department of Education. All rights reserved. 1 Teacher Presentation Series 9 Standard.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up © 2009.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
About ONLINE Industry leader for more than 50 years Headquartered in North Carolina Originally a small merchant credit bureau In 1997, focus shifted from.
1 Information and Systems Security/Compliance Security Day The Information and Systems Security/Compliance Program Dave Kovarik.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Idaho Coalition Against Identity Theft  Idaho Legal Aid was one of the 10 groups awarded a grant under the National Project  The Idaho Coalition: Serving.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
DEAD MAN WALKING? Identity Theft Through Death Certificate Issuance Application Review Processes Presenter Sue Bordeaux Oklahoma Center for Health Statistics.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
The Reality of Identity Theft Dan Clements CardCops CBAI Sept 26, 2009.
Programs Involving Children Policy University Office of Public Safety.
Improving Security, Systems, and Statistics San Diego, CA June 4 th – 8 th, 2006 I AM NOT DEAD Janet Rainey Acting Director and State Registrar Virginia.
Preventing Financial Exploitation of Vulnerable Adults in Missouri Preventing Financial Exploitation of Vulnerable Adults in Missouri Missouri Department.
Who is involved with the Executive Branch? The President, Vice President and Cabinet members.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
CYBER CRIME.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Meeting the Demands for Vital Statistics: The Challenges of Collecting, Preparing, and Promoting Baltimore, MD May 31 st – June 4 th, 2009 A Second Chance.
$200 $300 $400 Final Jeopardy $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 FFDCPACategory.
CLICKCEOP : MSN Messenger Live CLICKCEOP : Bebo.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
INFORMATIONAL INTERVIEW BY: ROSA GARZA. Valerie Garay MSW Title: Facility Investigator Department of Licensed Resources Works for: Child Protective Services.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
What constitutes Abuse? Child Protection Training Hillcrest August 2015 This resource was produced by Lucy Darwin when completing the Pivotal Education's.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
M M U U L L T T I I - - Q Q ! ! Multi- Q Introd uction I Safe’s Internet Safety Review Game M M U U L L T T I I - - Q Q ! ! Welcome to … Skip Rules.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
Learn how you can provide effective assistance to identity theft victims in your community.
Identity Theft:“Taking on another person’s persona for illegal purposes. Usually includes the use of Social Security.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
By: Asfa Khan and Huda Mukhtar
Jeff loses his identity! Lesson 8: Identity Theft.
TAX-AIDE Identity Theft Pub 4491 – Part 1 – Pages 1 – 5 Pub 4012 – Page P – 1.
Identity Theft By: Michael Jones and Sarah Trent.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
UNITED STATES CITIZENSHIP The basics and definitions.
Pennsylvania Homeless Children’s Initiative
By: Katelyn Nelson. What are child laws?  In China, there is a huge population of about 1.3 billion.  They have to enforce laws about how many children.
Legal Rights of Teenage Mothers and Fathers Presented by the Franklin County Child Support Enforcement Agency Monika C. Cooley, Paternity Coordinator &
Rank the following people. Number 1 will be the person you find the most reprehensible and 5 will be the least objectionable.
1 Identity Theft Prevention and the Red Flag Rules.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
CIVICS/CITIZENSHIP. What are civics? The study or science of the privileges and obligations of citizens.
Pub 4491 Pub 4012 TaxSlayer Manual
#1 Consumer Fraud Complaint – 5th straight year!
Identity Theft Prevention Program Training
GPS technology and children. What is GPS? GPS is an abbreviation for Global Positioning System. It is a technology used to identify the position of the.
Presentation transcript:

Utah Office of the Attorney Genera l Kirk Torgensen

Over 3,000 Reports of ID Theft Over 200 Utah Investigators Over 50% of Reports SSN Related Over 1,000 Reports of Child ID Theft Over 11,000 Kids Protected

Online Reporting Law Enforcement Crime Mapping

6 year old boy with two assumed names working since 2005 in Utah. 4 year old boy who has had seven jobs since What Do These Children Have In Common?

4 year old girl from Utah working since 2003 at various locations and using at least two different names. Answer: Social Security Number misused on average 4 years before their DOB. What Do These Children Have In Common?

Jennifer Andrushko says she worries about the long-term consequences for her 5-year old son, Carter after the theft of his Social Security Number Carter’s Social Security Number was being used illegally five years before he was born

Parent/Guardian Validation Protect Kids Identity Removed at 17 Years of Age

Kids Protected At TransUnion Kids info enrolled in High Risk Fraud Alert database If credit file is found, it will be suppressed and parents may be contacted Customers of TransUnion receive an alert when attempting to acquire a credit report using enrolled kids info Kids information automatically removed at 17

Utah Department of Work Force Services Letter to Victims

Thank You! Kirk Torgensen