1 / 14

IT COULD BE YOU

IT COULD BE YOU. Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime, Identity Crime is now recognized as a security breach that may have enormous consequences for our nation.”.

chugh
Télécharger la présentation

IT COULD BE YOU

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT COULD BE YOU

  2. Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime, Identity Crime is now recognized as a security breach that may have enormous consequences for our nation.”

  3. What is Identity Theft Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. I

  4. Identify theft video 4min http://www.youtube.com/watch?v=zBheC5afBfc

  5. ID Theft Types Theft or Misuse of Personal or Financial Identifiers to Obtain Something of Value or Facilitate Other Criminal Activity. Identity Theft Credit Card Fraud Access Device Fraud Check Fraud Bank Fraud False Identification Fraud Passport/Visa Fraud

  6. Scope of the Problem Since 1990: 33 million victims in US Perceived low risk and high profit Further facilitates other crimes Increasing gang/organized crime involvement 53% of victims do not notify police

  7. How Identity Thieves Work Here are some ways that identity thieves work: • They open a new credit card account, using your name, date of birth, and Social Security number. • When they use the credit card and don’t pay the bills, the delinquent account is reported on your credit report.They call your credit card issuer and, pretending to be you, change the mailing address on your credit card account. Then, your imposter runs up charges on your account. • They establish cellular phone service in your name.They open a bank account in your name and write bad checks on that account. • They can establish a Drivers license with your information on it.

  8. Electronic Pickpocketing • http://www.youtube.com/watch?v=GJbtMclbatU

  9. Equifax 800-685-1111 800-525-6285 www.equifax.comExperian 888-EXPERIAN (397-3742) 888- www.experian.comTrans Union 800-916-8800 800-680-7289 www.tuc.com PREVENTION # If you are a victim of identity theft, there are three basic actions you can take. First, contact each of the three major credit bureaus and have a "fraud alert" placed on your file.

  10. Federal Trade Commission (FTC) 877-438-4338 U. S. Postal Inspection Service 800-275-8777 Social Security Administration 800-772-1213 To Report Check Fraud Check Rite 800-766-2748 Chex Systems 800-328-5121 NPC 800-526-5380 Tele-Check 800-366-2425 PREVENTION Second, contact the creditors for any accounts that have been tampered with or opened fraudulently and then established passwords for those accounts you currently have. Contact these numbers

  11. Minimize Your Risk While you probably can't prevent identity theft entirely, you can minimize your risk. By managing your personal information wisely, cautiously and with an awareness of the issue, you can help guard against identity theft: • Make a police report. • Never respond to unsolicited requests for your Social Security number, financial data etc. • Pay attention to your billing cycles. • Keep items with personal information in a safe place. Before discarding, shred everything with personal information on it • Check credit card and bank statements for accuracy. • Obtain a credit report annually for accuracy.

  12. Minimize Your Risk • Guard your mail from theft. • Put passwords on your credit card, bank and phone accounts. Avoid using easily available information like your birth date, the last four digits of your SSN etc. • Minimize the identification information and the number of cards you carry to what you'll actually need. • Don’t carry your social security card with you. *As an employee, you are responsible to minimize the risk of customers personal information. If violated, the employee is violating the Privacy Act of 1974 and can be penalized.

  13. FEDERAL LAW • Identity Theft and Assumption Deterrence Act • In October 1998, Congress passed the Identity Theft and Assumption Deterrence Act of 1998 (Identity Theft Act) to address the problem of identity theft. Specifically, the Act amended 18 U.S.C. § 1028 to make it a federal crime when anyone: Knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law.

  14. GO TO YOU LEGISLATURE TO ENSURE IDENTITY THEFT LAWS ARE MORE SEVERE • Federal To ensure that all credit card companies are liable for approving credit card applications. To ensure that full credit card numbers are not placed on receipts. To ensure that children do not receive social security number until they get a job State (NJ www.njleg.state.nj.us PA www.state.pa.us ) To ensure that businesses identify you (I.E. drivers license) when using a credit card or MAC card for purchases. If not obeyed, businesses would be penalized at the discretion of the state. Reference: For more information on identity theft laws in your state go to: www.consumer.gov/idtheft/index.html

More Related