Identity Theft
Identity Theft
Occurs when someone uses your personal Occurs when someone uses your personal
information without your permission for information without your permission for
personal gain. personal gain.
Someone uses your personal information to Someone uses your personal information to
open a department store credit account and
open a department store credit account and
buy furniture.
buy furniture.
This account reported to credit bureau in your This account reported to credit bureau in your
name.
name.
When the bill is not paid, your credit score will be When the bill is not paid, your credit score will be
damaged.
Identity Theft
Identity Theft
Some consumers victimized by identity Some consumers victimized by identity
theft may lose out on job opportunities, or theft may lose out on job opportunities, or be denied loans for education, housing or be denied loans for education, housing or
cars because of negative information on cars because of negative information on
their credit reports. In rare cases, they their credit reports. In rare cases, they
may even be arrested for crimes they may even be arrested for crimes they
Identity Theft Tactics
Identity Theft Tactics
Shoulder SurfingShoulder Surfing
Occurs when someone in a public place skims Occurs when someone in a public place skims
personal information to use against you by
personal information to use against you by
overhearing your conversation or viewing your
overhearing your conversation or viewing your
personal information.
personal information.
Be cautious when someone seems to be standing too close Be cautious when someone seems to be standing too close when you are on a public computer or at a department store
when you are on a public computer or at a department store
when you are paying.
when you are paying.
Dumpster DivingDumpster Diving
Identity thieves have been known to go through a Identity thieves have been known to go through a
person’s trash to gather information.
person’s trash to gather information.
Make sure you shred documents such as bank statements, Make sure you shred documents such as bank statements, credit card bills, and receipts before throwing them away.
Identity Theft Tactics con’t
Identity Theft Tactics con’t
SkimmingSkimming
Involves simply copying your credit card or Involves simply copying your credit card or
debit card numbers from your cards.
debit card numbers from your cards.
Very often skimmers may be temporary employees Very often skimmers may be temporary employees
of certain businesses.
of certain businesses.
Highly advanced skimmers can even attach card Highly advanced skimmers can even attach card
reading devices to ATMs to get your bank account
reading devices to ATMs to get your bank account
numbers and PIN.
Identity Theft Tactics con’t
Identity Theft Tactics con’t
PretextingPretexting
Occurs when someone improperly accesses Occurs when someone improperly accesses
your personal information by posing as
your personal information by posing as
someone who needs data for one reason or
someone who needs data for one reason or
another.
another.
Con artist may pose as a business or someone Con artist may pose as a business or someone
conducting a survey in order to get your
conducting a survey in order to get your
information.
Identity Theft Tactics con’t
Identity Theft Tactics con’t
PhishingPhishing
When When pretextingpretexting occurs online.occurs online.
Common Common phishingphishing techniques include etechniques include e--mailing you and mailing you and asking you to verify account information.
asking you to verify account information.
PharmingPharming
Uses eUses e--mail viruses to redirect you from a legitimate mail viruses to redirect you from a legitimate
web site to an official
web site to an official--looking web site designed to looking web site designed to obtain your personal information.
obtain your personal information.
Identity Safeguards
Identity Safeguards
Secure your wallet or purse by removing Secure your wallet or purse by removing
anything with Social Security number or anything with Social Security number or
PIN numbers for bank or credit cards. PIN numbers for bank or credit cards.
Keep a list of all credit cards and bank Keep a list of all credit cards and bank
accounts. accounts.
Use a document shredder for receipts and Use a document shredder for receipts and
credit card offers. credit card offers.
Don’t print your Social Security number on Don’t print your Social Security number on
Identity Safeguards con’t
Identity Safeguards con’t
Remove name and address from local Remove name and address from local
phone directories. phone directories.
Use a locked mailbox.Use a locked mailbox.
Shop online only on secure sites.Shop online only on secure sites.
Don’t verify any information over the Don’t verify any information over the
phone or e
phone or e--mail unless you initiate contact.mail unless you initiate contact.
Mail all bills at the post office.Mail all bills at the post office.
Monitor your bank and credit card Monitor your bank and credit card
Identity Safeguards con’t
Identity Safeguards con’t
Be cautious about giving credit card Be cautious about giving credit card
information over a cell phone. information over a cell phone.
Monitor your expected deliveries on credit Monitor your expected deliveries on credit
card purchases. card purchases.
Never have checks delivered to your Never have checks delivered to your
home. home.
Install firewalls and virus software on your Install firewalls and virus software on your
computer. computer.
Are you a victim?
Are you a victim?
The best way to find out is to monitor your accounts and The best way to find out is to monitor your accounts and
bank statements each month, and check your credit
bank statements each month, and check your credit
report on a regular basis.
report on a regular basis.
Unfortunately, many consumers learn that their identity Unfortunately, many consumers learn that their identity
has been stolen after some damage has been done.
has been stolen after some damage has been done.
You many find out when bill collection agencies contact You many find out when bill collection agencies contact
you for overdue debts you never incurred.
you for overdue debts you never incurred.
You may find out when you apply for a mortgage or car You may find out when you apply for a mortgage or car
loan and learn that problems with your credit history are
loan and learn that problems with your credit history are
holding up the loan.
holding up the loan.
You may find out when you get something in the mail You may find out when you get something in the mail
about an apartment you never rented, a house you never
about an apartment you never rented, a house you never
bought, or a job you never held.
Resolving the Theft
Resolving the Theft
If you detect a sign of identity theft, ACT If you detect a sign of identity theft, ACT
QUICKLY! QUICKLY!
Filing a police report, checking your credit Filing a police report, checking your credit
reports, notifying creditors, and disputing reports, notifying creditors, and disputing
any unauthorized transactions are some of any unauthorized transactions are some of
the steps you must take immediately to the steps you must take immediately to
Resolving the Theft con’t
Resolving the Theft con’t
When you find inaccuracies, contact the three When you find inaccuracies, contact the three
main credit reporting bureaus and file a dispute
main credit reporting bureaus and file a dispute
related to the inaccurate information.
related to the inaccurate information.
Equifax, Credit Information Services, Consumer Equifax, Credit Information Services, Consumer
Fraud
Fraud
www.credit.equifax.comwww.credit.equifax.com
ExperianExperian, National Consumer Assistance, National Consumer Assistance
www.experian.comwww.experian.com
TransUnionTransUnion, Fraud Victim Assistance Department, Fraud Victim Assistance Department
Determining Your Risk
Determining Your Risk
It is always important to assess your level It is always important to assess your level
of preparedness to defend against identity of preparedness to defend against identity
theft. theft.
How prepared are you? Log on to How prepared are you? Log on to
www.privacyrights.org
www.privacyrights.org and click on the link and click on the link for “identity theft.”