Download presentation
Presentation is loading. Please wait.
Published byTiffany Kennedy Modified over 9 years ago
1
Identity Theft
2
MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to prevent n What if it happens n US Laws on Identity Theft and Privacy n Organization that help
3
MIS Training Institute, Inc.Section X - Slide 3CS1 053 ©Network Security Services, LLC What is Identity Theft n Fastest growing crime in America n Affect everyone regardless of age, gender race, or status n Almost 10 million American victimized last year u 41% increase over the last year u Cost to the economy $53 Billion
4
MIS Training Institute, Inc.Section X - Slide 4CS1 053 ©Network Security Services, LLC What is Identity Theft (Cont.) Two classes of crime related to identify theft 1. Account takeover l Thief acquires person’s existing credit l Used to purchase products and services l Victim discovers on monthly statement 2. Identity theft (Application fraud / true name fraud) l Thief uses SSN etc. to open new accounts l Used to purchase products and services l Victim unaware for extended periods of time
5
MIS Training Institute, Inc.Section X - Slide 5CS1 053 ©Network Security Services, LLC Methods Used n Dumpster diving n Stealing mail n Fraudulent access of credit files n Work place access n Shoulder surfing at ATM, phone booths n Personal data from online sources
6
MIS Training Institute, Inc.Section X - Slide 6CS1 053 ©Network Security Services, LLC Three most important things 1. Carefully check your credit report twice a year 2. Sign-up for credit monitoring service 3. Regularly check your public records Government Records Google search
7
MIS Training Institute, Inc.Section X - Slide 7CS1 053 ©Network Security Services, LLC Sources of Risk n Know your personal information u Personal Identification y Number (e.g., USA SSN) u Driver’s license u Credit cards u Bank account u Mothers maiden name u Address and phone number u Anything else that helps impersonate you
8
MIS Training Institute, Inc.Section X - Slide 8CS1 053 ©Network Security Services, LLC Key Elements n Personal Identifier (SSN) is the key to many accounts u Release SSN only when necessary u Do not carry SSN card in your wallet u Avoid putting SSN on checks and drivers license u Don’t allow merchants to add it to checks by hand u If asked for SSN, ask if there is an alternative u If government asks, look for privacy notice u Don’t use it for PINs and Passwords
9
MIS Training Institute, Inc.Section X - Slide 9CS1 053 ©Network Security Services, LLC Things You Can Do 1. Remove your name from marketing lists of the three main credit bureaus Equifax, Experian, Trans Union by calling (800) 5- OPTOUT Limit pre-approved credit offers If tossed into garbage – gold mine for ID theft 2.Install a locked mailbox at your home Limit postal theft
10
MIS Training Institute, Inc.Section X - Slide 10CS1 053 ©Network Security Services, LLC Things You Can Do (Cont.) 3. Use SSL or other encryption when shopping on-line (www) 4. Phone calls Never give SSN, Credit card number, personal data over the phone. Scams - Today is your lucky day 5. Document Storage Store personal information security in your home (safe)
11
MIS Training Institute, Inc.Section X - Slide 11CS1 053 ©Network Security Services, LLC Make Your Data Secure n Encrypt electronic data when possible n Shred or otherwise destroy paper copies n When shopping – take credit card receipts u Never toss them in public trash cans u Carry receipts in wallet not the bag u Avoid business that are careless with your data n Avoid using credit cards where the risk is high u Some web sites
12
MIS Training Institute, Inc.Section X - Slide 12CS1 053 ©Network Security Services, LLC If It Happens n Act quickly n Assess the situation n Trace the problem n Call the credit card company or credit bureau u They will have a fraud department to advise you
13
MIS Training Institute, Inc.Section X - Slide 13CS1 053 ©Network Security Services, LLC If It Happens (Cont.) n Log all conversations u Credit card companies u Law enforcement n Include dates, names and phone number n Note time spent and expenses incurred n Send critical correspondence by certified mail with return receipt requested.
14
MIS Training Institute, Inc.Section X - Slide 14CS1 053 ©Network Security Services, LLC If It Happens (Cont.) n Ask credit bureaus for names of credit grantors of fraudulent accounts n Ask, in writing, to remove inquiries generated due to fraud n Get copy of credit report every few months for the next year n Contact, in writing and via phone, all creditors involved in fraud n Get replacement credit cards
15
MIS Training Institute, Inc.Section X - Slide 15CS1 053 ©Network Security Services, LLC If It Happens (Cont.) n Report crime to your local police n Contact the passport office n May need legal help, consumer law if: u Debtors won’t respond u Credit bureaus will not help n Contact bank u Stolen check, fraudulent bank accounts n Post office u If thief has filed change of address form
16
MIS Training Institute, Inc.Section X - Slide 16CS1 053 ©Network Security Services, LLC U.S. Laws and Regulations n 18 U.S.C. 1028 "The Identity Theft and Assumption Deterrence Act of 1998" n State Laws: http://www.lawresearch.com/private/identit ytheft-State-Law.htm n California: Civil Code 1798.29 –Residents Civil Code 1798.82 – Business u Requires reporting database break-ins
17
MIS Training Institute, Inc.Section X - Slide 17CS1 053 ©Network Security Services, LLC In Short n Know you are at risk n Take positive actions to prevent identity theft n If it happens, act quickly n Know your rights n Document your steps
18
MIS Training Institute, Inc.Section X - Slide 18CS1 053 ©Network Security Services, LLC Additional Resources n http://identitytheft911.com n http://www.privacyrights.org n http://www.usdoj.gov/criminal/fraud/idtheft.html n http://www.identitytheft.org/ n http://www.idtheftcenter.com/index.shtml
19
MIS Training Institute, Inc.Section X - Slide 19CS1 053 ©Network Security Services, LLC Magazines To Stay Current n SC Magazine: www.scmagazine.com n Disaster Recovery Journal: www.DRJ.com n Information Security www.infosecutitymag.com n Access Control & Security Systems: u www.securitysolutions.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.