1 / 32

Identity Smarts: A Behind the Scenes Look at Identity Theft

Identity Smarts: A Behind the Scenes Look at Identity Theft. This educational unit is developed in partnership with LifeLock, ETPRO and the C3 Conference. Complement to the LifeLock Identity Smart: A Guide for Consumers against Identity Theft. Today’s Objectives. Identity Theft 101

nardo
Télécharger la présentation

Identity Smarts: A Behind the Scenes Look at Identity Theft

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity Smarts: A Behind the Scenes Look at Identity Theft This educational unit is developed in partnership with LifeLock, ETPRO and the C3 Conference Complement to the LifeLock Identity Smart: A Guide for Consumers against Identity Theft

  2. Today’s Objectives Identity Theft 101 Statistics Methods of Identity Theft

  3. Identity Theft 101 Definitions and scenarios to help better understand identity theft

  4. Identity Theft vs. Identity Fraud • Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. • Identity Theft: Someone uses your personal identifying information to establish new credit. • Examples: Opens up a new credit card, cell phone, purchases a home in your name • Identity Fraud: Someone uses your existing credit to commit fraud. • Examples: Makes purchases with your credit card, takes money out of your bank account Source: The U.S. Department of Justice http://www.justice.gov/criminal/fraud/websites/idtheft.html

  5. Personal Identifying Information (PII) • What is Personal Identifying Information? • Social Security Number • Birth Date (full) • Current and Previous Address • Current and Previous Phone Number • Account Information • Mother’s Maiden Name • Pet’s Name • Health Insurance Information • Usernames, PINS and Passwords Source: The U.S. Department of Justice http://www.justice.gov/criminal/fraud/websites/idtheft.html

  6. Identity Theft Today Identity theft cost American’s $18 Billion in 2011 Javelin Strategy & Research. “2012 Identity Fraud Survey Report.” February 2012. #1 Consumer Complaint in 2011 2012 FTC Report Over11.6 Million Adult Victims of Identity Theft Javelin Strategy & Research. “2012 Identity Fraud Survey Report.” February 2012. Federal Trade Commission. “Consumer Sentinel Network Data Book for January – December 2011.” February 2012. *The Bureau of Justice Statistics Report, November 2011

  7. A friend, family member or co-worker • - Those with access to your personal information • A stranger with an agenda • - Posing as someone from a well-known business • or your bank or utility company Who are Identity Thieves? *The Bureau of Justice Statistics Report, November 2011

  8. Points of Compromise Name places where you willingly give your personal information?

  9. Points of Compromise • Restaurants • Credit bureaus • Daycare/babysitter • Video stores • Elementary schools • Colleges & Universities • Credit Card companies • Solicitations • Real estate offices • Utility companies • Burglaries-house/car • Others? • Public records • Internet shopping sites • Doctor’s offices • Car dealerships • Driver’s license offices • Postal services/mail boxes • Relatives • Check cashing companies • Banks

  10. Need to Know? Ask yourself “why does this person/company need to know this information?” before you give it out. • Social Security Number • Birthday • Account Numbers and Information • Addresses • Phone Numbers • Mother’s Maiden Name • Health Insurance Information • Usernames and Passwords • Account information • Pets’ names • Anniversaries

  11. Statistics Local & National

  12. National Statistics Source: Federal Trade Commission. “Consumer Sentinel Network Data Book for January – December 2011.” February 2012.

  13. Local Statistics

  14. Methods of Identity Theft

  15. Which of these items can be used in Identity Theft?

  16. “Old School” Identity Theft • Dumpster diving • Theft of wallet, purse • Change of address cards • Info in your home or vehicle • Shoulder surfing • Check washing

  17. Skimmers Skimmer placed over ATM card reader ATM looks to be un-tampered Hand held credit card skimmers can be used at restaurants Photos courtesy of: jasonwillison.wordpress.com and www.onlinesellersunited.com

  18. ATM Overlays Small video camera or ATM overlay used to capture pin Thieves clone cards with your credit card number Photos courtesy of: www.networkworld.com and Wayne Ivey

  19. Social Networking Peer to Peer Networks (P2P)

  20. Daily Risks/Scams - Secure Shopping - Phishing Emails - RFID Chips

  21. Identity Theft: By the Numbers • In just one year there were 11.6 million adult victims of identity fraud • Account takeover fraud costs victims around $3500.00 on • average • In 2011, identity fraud costs Americans $18 billion • 13% of fraud victims indicated that their identity was • stolen by a family member, friend or co-worker

  22. New Ways

  23. Who is immune from Identity Theft?

  24. What do thieves want with your identity?

  25. To Catch an ID Thief

  26. What is Personal Information? • Social Security Number • Birth Date (full) • Current and Previous Address • Current and Previous Phone Number • Account Information • Mother’s Maiden Name • Pet’s Name • Health Insurance Information • Usernames, PINS and Passwords

  27. How Do I Protect My Identity Information? In the Mail Shopping Online Credit and Debit Cards At the Bank In Your Wallet/At Your Home The Last Line of Defense

  28. Need to Know • Ask yourself “why does this person/company need to know this information?” before you give it out. • Social Security Number • Birthday • Account Numbers and Information • Addresses • Phone Numbers • Mother’s Maiden Name • Health Insurance Information • Usernames and Passwords • Account information • Pets’ names • Anniversaries

  29. Sites to Explore • Shouldichangemypassword.com • Monitors sites that have been hacked. Allows users to enter their email address to see if their usernames and passwords have been published online. • FTC Theft Affidavit • Document to use if your identity has been stolen • FTC On Guard Online Identity Theft • Federal Trade Commission site for help if your identity has been stolen or for prevention tips. • Last Pass • Password Managing software that creates a safe for passwords • Identity Theft Resource Site for Mobile Devices

  30. What do I do if my Identity has been Stolen? • File a police report • Check credit and bank accounts • Alert the companies of the identity theft • Close any accounts which have been stolen • Contact all Three Credit Reporting Agencies • Contact with Your Creditors • Report the Details to the Federal Trade Commission (FTC)

  31. Stay Secure When Reporting Your Identity Theft • Report the theft as soon as possible to ensure that you and your personal • information are protected. • • Keep a copy or record of any and all correspondence with the authorities, • your financial institutions and any credit reporting agencies. • • Avoid using originals of any personal documents when possible; use • notarized and certified copies instead. • • Follow-up with all requests and actions, and be persistent in clearing your • name and securing your information.

More Related