Download presentation
Presentation is loading. Please wait.
Published byMargery Banks Modified over 8 years ago
1
Identity Theft: How Vulnerable are you? Ronald J. Leach
7
Identity Theft Use of existing accounts – easiest to fix Use of existing accounts – easiest to fix Takeovers of existing accounts – can limit your access to your money Takeovers of existing accounts – can limit your access to your money New accounts – you may not be notified New accounts – you may not be notified
8
Check credit reports yearly Its free, free, free! Its free, free, free! AnnualCreditReport.com AnnualCreditReport.com
9
Case study - “ A ” Had checkbook stolen Had checkbook stolen Took many hours to stop continued cashing of checks, even after account was closed! Took many hours to stop continued cashing of checks, even after account was closed!
10
Case study – “ B ” Had Medical Identity stolen Had Medical Identity stolen
11
Case study – ‘ B ” Card number, Social Security Number copied, given to others, possibly by a clerk Card number, Social Security Number copied, given to others, possibly by a clerk Learned about collection notices asking for a credit report before getting married Learned about collection notices asking for a credit report before getting married
12
Case study – ‘ B ” Many judgments Many judgments A helicopter transfer to a hospital for $19,000! A helicopter transfer to a hospital for $19,000!
13
Case study – “ P ” Had wallet stolen Had wallet stolen Lost checkbook Lost checkbook Lost driver ’ s license Lost driver ’ s license Lost medical cards Lost medical cards
14
Case study - “ SG ” Had computer email account hacked Had computer email account hacked Everyone in mailbox was sent multiple convincing messages Everyone in mailbox was sent multiple convincing messages
15
Case study - “ SG ” Others had their computer email account hacked Others had their computer email account hacked “ P ” “ P ” “ S ” “ S ” “ JF ” “ JF ” “ H&B ” “ H&B ” Others Others
16
Hackers got his information:
17
from a wireless connection at an Internet café Did you use a hotel ’ s wireless? Was it protected?
18
18
21
Case study – “ W ” Had mortgage placed on house Had mortgage placed on house Mortgage company began foreclosure Mortgage company began foreclosure
22
Case study – “ W ” His house His house
23
Case study – “ W ” His house – not! His house – not!
24
How could crooks get access to W? Land records Land records Stolen mail Stolen mail
25
Case study – me and a credit card Had phone message at work, asked me to call an 800 number about my card Had phone message at work, asked me to call an 800 number about my card Got an uneasy feeling Got an uneasy feeling
26
Case study – me and a credit card Back of card had correct number. Back of card had correct number. The telephone call had a different number The telephone call had a different number Call was spurious, so was 800 number Call was spurious, so was 800 number No problems with card No problems with card Whew! Whew!
27
Case study – me and broker Show me the money Show me the money –My money! Don ’ t show me his money Don ’ t show me his money
28
Case study – me and broker Previous user ’ s data still on screen Previous user ’ s data still on screen Poor software – didn ’ t clear screen Poor software – didn ’ t clear screen My transaction went through – I was notified by mail My transaction went through – I was notified by mail Also notified of his transactions by mail Also notified of his transactions by mail
29
Case study – me and broker Called broker about error – did not get confirmation by mail Called broker about error – did not get confirmation by mail Got three additional confirmation letters Got three additional confirmation letters
30
Case study – me and broker Called broker about error – did not get confirmation by mail Called broker about error – did not get confirmation by mail Got three additional confirmation letters on his account! Got three additional confirmation letters on his account!
31
Case study – me and broker Called person ’ s home phone Called person ’ s home phone The wife was unaware of his transferring funds The wife was unaware of his transferring funds The wife ’ s reaction The wife ’ s reaction
33
What is the most valuable item you have? Credit Card? Credit Card? Checkbook? Checkbook? Driver ’ s License? Driver ’ s License? Social Security Card? Social Security Card? Membership card? Membership card? Ship ID card? Ship ID card? Passport ? Passport ?
34
How long would it take you to replace the stolen item – a few days/months/years? Credit Card? Credit Card? Checkbook? Checkbook? Driver ’ s License? Driver ’ s License? Social Security Card? Social Security Card? Membership card? Membership card? Ship ID card? Ship ID card? Passport ? Passport ?
35
Passports can be the most difficult to replace if you are abroad
37
How long would it take you to replace the stolen item? 1. Passport 2. Social Security Number
38
How much does an annual credit report cost?
39
T is for Trespass
40
Do you read your credit card statement?
41
How much does an annual credit report cost? Nothing! AnnualCreditReport.com AnnualCreditReport.com
45
Thank you!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.