Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identity Theft Solutions. ©SHRM 20082 Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.

Similar presentations


Presentation on theme: "Identity Theft Solutions. ©SHRM 20082 Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the."— Presentation transcript:

1 Identity Theft Solutions

2 ©SHRM 20082 Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the top of the list since that time according to the Federal Trade Commission. As a result, many employers have taken action to limit the information they provide to others, both internal and external, regarding records they maintain on employees. The federal government and state governments are also legislating privacy laws and regulations on the use and display of important personal data, i.e., Social Security numbers, employee health information and the destruction of some forms of employee records in the face of escalating identity theft problems. This presentation provides an overview of the importance of maintaining the confidentiality of personal information. This is a sample presentation that must be customized to include and match the employer’s own policies and practices.

3 ©SHRM 20083 Objective To educate everyone to become “aware” as consumers Help everyone understand the importance of maintaining “confidentiality” of their personal information Identify resources available to assist in the event of ID theft

4 ©SHRM 20084 Common Perils Data thieves are smart and resourceful Dumpster diving Accessing credit reports Phishing/Skimming Spying – PIN entry Stealing/redirecting mail Scams leading to ID theft can be done anywhere, any time

5 ©SHRM 20085 Typical Outcomes - $$$$$$$$$$$$$ Charging to YOUR current accounts and opening new ones Writing stolen or fake or altering checks Siphoning checking/savings accounts Borrowing for large ticket items

6 ©SHRM 20086 Protecting Personal Information Keep personal information safe Use complex passwords (alpha-numeric) Protect mail Use extreme caution in sharing any personal information online and on phones Promptly take action on reporting discrepancies Never carry your Social Security Card unless absolutely necessary

7 ©SHRM 20087 Protect Credit/Debit Card Information Review statements received and shred statements at appropriate intervals and all unsolicited offers Opt out of offers Close unused accounts Carry only cards to be used

8 ©SHRM 20088 Checking Accounts Keep check book/checks in secure locations Check/balance statements Don’t provide checking account info - online - over the phone

9 ©SHRM 20089 Protect Computer Update virus protection Don’t open files from unknown sources Look for lock icon and “https” before entering information Use complex passwords Use a firewall Erase computer hard drive before disposing of computers and destroy peripheral storage devices before disposal

10 ©SHRM 200810 Consumer Protection Laws Fair Credit Reporting Act - provides limited access to credit reports - requires credit bureaus to accuracy FACT Act - provides for free credit reports - ensures improved safeguards from ID theft and disclosure

11 ©SHRM 200811 Credit Protection Services Fee-based services or insurance can be valuable but be wary of scams ID theft insurance services Weigh cost v. benefit

12 ©SHRM 200812 ID Theft Recovery Practices Review statements Promptly contact financial institution(s) to note errors/discrepancies Close or cancel accounts Stop payments on outstanding checks Establish new account numbers and passwords

13 ©SHRM 200813 ID Theft Recovery Practices (continued) Report crime to local police Get a copy of the police report Notify postal service if mail was involved Notify Social Security Administration if SSN was used Notify DMV if driver’s license number was used

14 ©SHRM 200814 ID Theft Recovery Practices (continued) Obtain credit bureau reports Place fraud alerts on reports Check reports at least quarterly for a period of one year and later, annually Promptly dispute any discrepancies

15 ©SHRM 200815 ID Theft Recovery-Recordkeeping Keep records/notes/copies of all contact information - names - dates - follow up notes Maintain copies of all documentation

16 ©SHRM 200816 Online Resources Federal Trade Commission ID Theft Page http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/in dex.html http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/in dex.html National Conference of State Legislatures (links to state laws) http://www.ncsl.org/IssuesResearch/BankingInsuranceFina ncialServices/IdentityTheftStateStatutes/tabid/12538/Defaul t.aspx Privacy Rights Clearinghouse FAQ’s http://www.privacyrights.org/fs/fs17d-FAQ-IdTheft- 070510.htm

17 ©SHRM 200817 Questions?Comments?

18 ©SHRM 200818 Course Evaluation Please be sure to complete and leave the evaluation sheet you received with your handouts. Thank you for your attention and interest!


Download ppt "Identity Theft Solutions. ©SHRM 20082 Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the."

Similar presentations


Ads by Google