Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identity Theft: How Vulnerable are you? Ronald J. Leach.

Similar presentations


Presentation on theme: "Identity Theft: How Vulnerable are you? Ronald J. Leach."— Presentation transcript:

1 Identity Theft: How Vulnerable are you? Ronald J. Leach

2

3

4

5

6

7 Identity Theft Use of existing accounts – easiest to fix Use of existing accounts – easiest to fix Takeovers of existing accounts – can limit your access to your money Takeovers of existing accounts – can limit your access to your money New accounts – you may not be notified New accounts – you may not be notified

8 Check credit reports yearly Its free, free, free! Its free, free, free! AnnualCreditReport.com AnnualCreditReport.com

9 Case study - “ A ” Had checkbook stolen Had checkbook stolen Took many hours to stop continued cashing of checks, even after account was closed! Took many hours to stop continued cashing of checks, even after account was closed!

10 Case study – “ B ” Had Medical Identity stolen Had Medical Identity stolen

11 Case study – ‘ B ” Card number, Social Security Number copied, given to others, possibly by a clerk Card number, Social Security Number copied, given to others, possibly by a clerk Learned about collection notices asking for a credit report before getting married Learned about collection notices asking for a credit report before getting married

12 Case study – ‘ B ” Many judgments Many judgments A helicopter transfer to a hospital for $19,000! A helicopter transfer to a hospital for $19,000!

13 Case study – “ P ” Had wallet stolen Had wallet stolen Lost checkbook Lost checkbook Lost driver ’ s license Lost driver ’ s license Lost medical cards Lost medical cards

14 Case study - “ SG ” Had computer email account hacked Had computer email account hacked Everyone in mailbox was sent multiple convincing messages Everyone in mailbox was sent multiple convincing messages

15 Case study - “ SG ” Others had their computer email account hacked Others had their computer email account hacked “ P ” “ P ” “ S ” “ S ” “ JF ” “ JF ” “ H&B ” “ H&B ” Others Others

16 Hackers got his information:

17 from a wireless connection at an Internet café Did you use a hotel ’ s wireless? Was it protected?

18 18

19

20

21 Case study – “ W ” Had mortgage placed on house Had mortgage placed on house Mortgage company began foreclosure Mortgage company began foreclosure

22 Case study – “ W ” His house His house

23 Case study – “ W ” His house – not! His house – not!

24 How could crooks get access to W? Land records Land records Stolen mail Stolen mail

25 Case study – me and a credit card Had phone message at work, asked me to call an 800 number about my card Had phone message at work, asked me to call an 800 number about my card Got an uneasy feeling Got an uneasy feeling

26 Case study – me and a credit card Back of card had correct number. Back of card had correct number. The telephone call had a different number The telephone call had a different number Call was spurious, so was 800 number Call was spurious, so was 800 number No problems with card No problems with card Whew! Whew!

27 Case study – me and broker Show me the money Show me the money –My money! Don ’ t show me his money Don ’ t show me his money

28 Case study – me and broker Previous user ’ s data still on screen Previous user ’ s data still on screen Poor software – didn ’ t clear screen Poor software – didn ’ t clear screen My transaction went through – I was notified by mail My transaction went through – I was notified by mail Also notified of his transactions by mail Also notified of his transactions by mail

29 Case study – me and broker Called broker about error – did not get confirmation by mail Called broker about error – did not get confirmation by mail Got three additional confirmation letters Got three additional confirmation letters

30 Case study – me and broker Called broker about error – did not get confirmation by mail Called broker about error – did not get confirmation by mail Got three additional confirmation letters on his account! Got three additional confirmation letters on his account!

31 Case study – me and broker Called person ’ s home phone Called person ’ s home phone The wife was unaware of his transferring funds The wife was unaware of his transferring funds The wife ’ s reaction The wife ’ s reaction

32

33 What is the most valuable item you have? Credit Card? Credit Card? Checkbook? Checkbook? Driver ’ s License? Driver ’ s License? Social Security Card? Social Security Card? Membership card? Membership card? Ship ID card? Ship ID card? Passport ? Passport ?

34 How long would it take you to replace the stolen item – a few days/months/years? Credit Card? Credit Card? Checkbook? Checkbook? Driver ’ s License? Driver ’ s License? Social Security Card? Social Security Card? Membership card? Membership card? Ship ID card? Ship ID card? Passport ? Passport ?

35 Passports can be the most difficult to replace if you are abroad

36

37 How long would it take you to replace the stolen item? 1. Passport 2. Social Security Number

38 How much does an annual credit report cost?

39 T is for Trespass

40 Do you read your credit card statement?

41 How much does an annual credit report cost? Nothing! AnnualCreditReport.com AnnualCreditReport.com

42

43

44

45 Thank you!


Download ppt "Identity Theft: How Vulnerable are you? Ronald J. Leach."

Similar presentations


Ads by Google