Download presentation
Presentation is loading. Please wait.
Published byBethanie Richards Modified over 9 years ago
1
IDENTITY THEFT
2
Identity Theft Defined When someone uses another person’s name, address, social security number, bank or credit card account number, or other identifying information to commit fraud or other crimes.
3
Consequences of Identity Theft Generally, the loss of credit, reputation, and erroneous information included in a person’s credit report and/or police file are more significant than the actual loss of money.Generally, the loss of credit, reputation, and erroneous information included in a person’s credit report and/or police file are more significant than the actual loss of money. We should all strive to prevent identity theft because once it happens, it is difficult, expensive and time consuming to investigate and resolve it.We should all strive to prevent identity theft because once it happens, it is difficult, expensive and time consuming to investigate and resolve it.
4
Common activities of identity theft perpetrators include the following: Buys big-ticket items like big-screen TV’s, etc.Buys big-ticket items like big-screen TV’s, etc. Takes out car/home/other loansTakes out car/home/other loans Establishes phone/cell phone/internet service in the victim’s nameEstablishes phone/cell phone/internet service in the victim’s name Opens a new bank account and then “bounce” checksOpens a new bank account and then “bounce” checks Files bankruptcy so the victim won’t know about the new “unpaid” accountsFiles bankruptcy so the victim won’t know about the new “unpaid” accounts Gives the victim’s name to police when arrested and then skips bailGives the victim’s name to police when arrested and then skips bail Opens new credit card accountsOpens new credit card accounts Changes mailing addresses on current credit card accountsChanges mailing addresses on current credit card accounts
5
Fraudster’s Get Personal Information By Posing as a legitimate employee, government official, or representative of an organizationPosing as a legitimate employee, government official, or representative of an organization Rummaging through consumers’ trashRummaging through consumers’ trash Skimming credit cards when victims pay their bills (involves using an information storage device to gain access to credit card information when processing your credit card)Skimming credit cards when victims pay their bills (involves using an information storage device to gain access to credit card information when processing your credit card) Stealing information from an employer, hacking into a company’s computers or bribing an employee with access to confidential recordsStealing information from an employer, hacking into a company’s computers or bribing an employee with access to confidential records
6
Fraudster’s Get Personal Information By Stealing wallets/pursesStealing wallets/purses Sneaking into victims’ homes to steal informationSneaking into victims’ homes to steal information Completing a “change of address form” and having the victims’ mail delivered to either a PO box or the fraudsters’ addressCompleting a “change of address form” and having the victims’ mail delivered to either a PO box or the fraudsters’ address PhishingPhishing –http://www.chase.com/ccp/index.jsp?pg_name=ccpm app/shared/assets/page/example_messages http://www.chase.com/ccp/index.jsp?pg_name=ccpm app/shared/assets/page/example_messageshttp://www.chase.com/ccp/index.jsp?pg_name=ccpm app/shared/assets/page/example_messages
7
Minimize the Risk Guard your mail from theft – have the post office hold your mail when you’re out of townGuard your mail from theft – have the post office hold your mail when you’re out of town Opt out of pre-approved credit cards (call 1-888- 567-8688)Opt out of pre-approved credit cards (call 1-888- 567-8688) Guard Social Security cards and numbersGuard Social Security cards and numbers Safeguard all personal informationSafeguard all personal information Guard trash from theft (shred receipts, bank & credit card statements, etc.)Guard trash from theft (shred receipts, bank & credit card statements, etc.) Protect your home, wallet, and other valuablesProtect your home, wallet, and other valuables Protect passwords/personal computersProtect passwords/personal computers
8
After Identity Theft Occurs 1.Immediately contact the Federal Trade Commission (FTC) at 1-877-438-4338 2.Call the local FBI office and/or Secret Service agency 3.Call the local police 4.For tax related matters, call the IRS at 1-800- 829-0433 5.Notify the Social Security Administration at 1- 800-269-0271 6.Notify your bank, credit card companies, etc.
9
Federal Trade Commission Identify Theft website: http://www.consumer.gov/idtheft Identify Theft website: http://www.consumer.gov/idtheft http://www.consumer.gov/idtheft
10
Chase Websites Chase Identify Theft Kit Website: http://www.chase.com/ccpmweb/shared/document/Identity_Theft_Kit.pdfChase Identify Theft Kit Website: http://www.chase.com/ccpmweb/shared/document/Identity_Theft_Kit.pdf http://www.chase.com/ccpmweb/shared/document/Identity_Theft_Kit.pdf Chase definition of “Phishing” http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/PhishingChase definition of “Phishing” http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/Phishing http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/Phishing http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/Phishing Chase email warnings http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/fraud_e-mailsChase email warnings http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/fraud_e-mails http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/fraud_e-mails http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/fraud_e-mails Chase email “Phishing” examples http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/example_messagesChase email “Phishing” examples http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/example_messages http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/example_messages http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/example_messages Chase: Identify Theft FAQ http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/Report_FraudChase: Identify Theft FAQ http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/Report_Fraud http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/Report_Fraud http://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/ page/Report_Fraud
11
References Fraud Examination (2 nd ed) by Albrecht, Albrecht, and Albrecht, pgs 486-495Fraud Examination (2 nd ed) by Albrecht, Albrecht, and Albrecht, pgs 486-495 Chase websitesChase websites FTC websiteFTC website
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.