1 / 31

Identity Theft: A Good Name Gone Bad

Identity Theft: A Good Name Gone Bad. www.idthedtcenter.org. Consider who might look you up:. College administrators Current employers Prospective employers Students Colleagues Peers Scam artists and crooks. Professional and personal are being fused together thanks to….

maia-watts
Télécharger la présentation

Identity Theft: A Good Name Gone Bad

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity Theft:A Good Name Gone Bad www.idthedtcenter.org

  2. Consider who might look you up: • College administrators • Current employers • Prospective employers • Students • Colleagues • Peers • Scam artists and crooks

  3. Professionaland personalare being fused together thanks to…

  4. Social networking particularly has changed the way we interact…

  5. Identity now extends to… • Your friends; who they are / what they do • Your personal life / interests

  6. You are Bob Smith… • You sign up to social networking site • Youadd your colleagues • You also add your friend • You keep it professional / managed • Your friend finds a pic he took a couple of years ago and adds it to his page tagging it “Bob Smith – night to remember…” http://www.flickr.com/photos/bre/532019377/

  7. This could be you!

  8. Going for a Job Interview You only get one chance to make a first impression!

  9. What is Identity Theft? • When someone obtains and illegally uses your identity information, such as name, address, date of birth, social security number (SSN), or mother’s maiden name to: • Open new credit card accounts • Drain your bank accounts • Purchase automobiles • Apply for loans • Open utility services • File for bankruptcy

  10. How Can This Impact You? • Damaged credit report & score • Loss of job opportunities • Refused loans: education, housing, or cars • Spend months or years cleaning up the mess • Mean fraud amount per victim: 2007: $5,720 2006: $6383 2005: $5,993 • Number of hours spent resolving problems: 2007: 25 hours 2006: 40 hours 2005: 28 hours • Worst case scenario: Victim is arrested

  11. Signs of Identity Theft/Fraud • Denied credit • Failure to receive expected mail • Unsolicited “Change of Address” notice • Receiving credit cards that you didn’t apply for • Receiving calls or letters from debt collectors • Newly opened accounts on your credit report • Increased insurance rates as a result of a lower credit score • Offered less favorable credit terms, like a high interest rate

  12. How Do Crooks Get Information? • Stealing wallets and purses • Stealing Mail • “Dumpster Diving” • Getting Credit Reports illegally by posing as an employer, loan officer or landlord • Hacking personal computers or customer files for social security numbers • Stealing PIN’s by shoulder surfing at ATM’s and phone booths

  13. A Crook Has Your Profile Date: Now What? • Open’s a new account in your name • Changes the billing address • Rings up charges before your e-mail catches up to you • Takes out a loan for a car, establishes phone service, buys a flat screen TV, etc. • Authorizes electronic transfers on charge accounts • Drains your account • Files for bankruptcy to avoid payments • Pretends to be you during an arrest

  14. Equipment being installed on front of existing bank card slot. The equipment as it appears installed over the normal ATM bank slot. The PIN reading camera being installed on the ATM is housed in an innocent looking leaflet enclosure The camera shown installed and ready to capture PINs by looking down on the keypad as you enter your PIN.

  15. Key Catcher Attached to ATM Point of Sale Skimmer 2” Hand Held Skimmer

  16. What is Phishing? Luring victims to a safe website through spam

  17. What is Vishing? • Practice used to convince people over the to give up personal information by claiming they are a representative pf your financial institution. • Can be done by: • Land Phone • E-Mail • Letter • Texting

  18. What is Pharming?

  19. Spoofing Creating a replica of a legitimate website to fool you into submitting personal, financial, or password data.

  20. If You Suspect Fraud • File a Police Report • Review your Credit Report annually • Contact the 3 credit bureaus immediately • Place a Fraud Alert on your accounts • Initial • Extended • Active military alert

  21. The 3 D’s of Protection • Deteridentity thieves by safeguarding your personal information. • Detectsuspicious activity by routinely monitoring your financial accounts and billing statements. • Defendagainst identity theft as soon as you suspect a problem.

  22. Protect Yourself • Shop “safely” online • Shop only with companies you know • Pay only with credit cards • Track online purchases • Use a secure browser • Avoid providing personal information • Hang up on telemarketer, if uncomfortable • Shred old receipts, checks and mail

  23. How to Protect Your Identity: • Don’t carry extra credit cards, social security card, birth certificate or passport or their “NUMBERS.” • Keep important papers in a safe deposit box or lockable file at home. • Guard your mail: Install locked mailbox to avoid mail theft. • Don’t have new checks mailed to your house, pick them up. • Place paid bills inside a post office, not in your mailbox. • NEVER give out your social security number. • Keep your credit card receipts. Don’t toss them! • Keep your eye on cards at restaurants, retail stores, gas stations, etc.

  24. Resources to Help You • Request a FREE Credit report annually • Call (877) 322-8228 • Online at www.annualcreditreport.com • NO CALL Program Call (866) 966-2255Online www.nocall.wisconsin.gov • Opt Out of credit card offers Call (888)567-8688 or Online at www.optoutprescreen • Office of Privacy Protection Call • (800) 422-7128 • Or (608) 224-5163 • Online www.privacy.wi.gov

  25. Credit Reporting Agencies • Equifax Fraud Division • 800-525-6285 • P.O. Box 740241 • Atlanta, GA 30374-0241 • www.equifax.com • Experian Fraud Division • 888-397-3742 • P.O. Box 9532 • Allen, TX 75013 • www.experian.com • TransUnion Fraud Division • 800-680-7289 • P.O. Box 6790 • Fullerton, CA 92834-6790 • www.transunion.com

  26. But It Shouldn’t

More Related