• No results found

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain.

N/A
N/A
Protected

Academic year: 2021

Share "Identity Theft. Occurs when someone uses your personal information without your permission for personal gain."

Copied!
14
0
0

Loading.... (view fulltext now)

Full text

(1)
(2)

Identity Theft

Identity Theft



 Occurs when someone uses your personal Occurs when someone uses your personal

information without your permission for information without your permission for

personal gain. personal gain.



 Someone uses your personal information to Someone uses your personal information to

open a department store credit account and

open a department store credit account and

buy furniture.

buy furniture.



 This account reported to credit bureau in your This account reported to credit bureau in your

name.

name.



 When the bill is not paid, your credit score will be When the bill is not paid, your credit score will be

damaged.

(3)

Identity Theft

Identity Theft



 Some consumers victimized by identity Some consumers victimized by identity

theft may lose out on job opportunities, or theft may lose out on job opportunities, or be denied loans for education, housing or be denied loans for education, housing or

cars because of negative information on cars because of negative information on

their credit reports. In rare cases, they their credit reports. In rare cases, they

may even be arrested for crimes they may even be arrested for crimes they

(4)

Identity Theft Tactics

Identity Theft Tactics



 Shoulder SurfingShoulder Surfing



 Occurs when someone in a public place skims Occurs when someone in a public place skims

personal information to use against you by

personal information to use against you by

overhearing your conversation or viewing your

overhearing your conversation or viewing your

personal information.

personal information.



 Be cautious when someone seems to be standing too close Be cautious when someone seems to be standing too close when you are on a public computer or at a department store

when you are on a public computer or at a department store

when you are paying.

when you are paying.



 Dumpster DivingDumpster Diving



 Identity thieves have been known to go through a Identity thieves have been known to go through a

person’s trash to gather information.

person’s trash to gather information.



 Make sure you shred documents such as bank statements, Make sure you shred documents such as bank statements, credit card bills, and receipts before throwing them away.

(5)

Identity Theft Tactics con’t

Identity Theft Tactics con’t



 SkimmingSkimming



 Involves simply copying your credit card or Involves simply copying your credit card or

debit card numbers from your cards.

debit card numbers from your cards.



 Very often skimmers may be temporary employees Very often skimmers may be temporary employees

of certain businesses.

of certain businesses.



 Highly advanced skimmers can even attach card Highly advanced skimmers can even attach card

reading devices to ATMs to get your bank account

reading devices to ATMs to get your bank account

numbers and PIN.

(6)

Identity Theft Tactics con’t

Identity Theft Tactics con’t



 PretextingPretexting



 Occurs when someone improperly accesses Occurs when someone improperly accesses

your personal information by posing as

your personal information by posing as

someone who needs data for one reason or

someone who needs data for one reason or

another.

another.



 Con artist may pose as a business or someone Con artist may pose as a business or someone

conducting a survey in order to get your

conducting a survey in order to get your

information.

(7)

Identity Theft Tactics con’t

Identity Theft Tactics con’t



 PhishingPhishing



 When When pretextingpretexting occurs online.occurs online.



 Common Common phishingphishing techniques include etechniques include e--mailing you and mailing you and asking you to verify account information.

asking you to verify account information.



 PharmingPharming



 Uses eUses e--mail viruses to redirect you from a legitimate mail viruses to redirect you from a legitimate

web site to an official

web site to an official--looking web site designed to looking web site designed to obtain your personal information.

obtain your personal information.



(8)

Identity Safeguards

Identity Safeguards



 Secure your wallet or purse by removing Secure your wallet or purse by removing

anything with Social Security number or anything with Social Security number or

PIN numbers for bank or credit cards. PIN numbers for bank or credit cards.



 Keep a list of all credit cards and bank Keep a list of all credit cards and bank

accounts. accounts.



 Use a document shredder for receipts and Use a document shredder for receipts and

credit card offers. credit card offers.



 Don’t print your Social Security number on Don’t print your Social Security number on

(9)

Identity Safeguards con’t

Identity Safeguards con’t



 Remove name and address from local Remove name and address from local

phone directories. phone directories.



 Use a locked mailbox.Use a locked mailbox. 

 Shop online only on secure sites.Shop online only on secure sites. 

 Don’t verify any information over the Don’t verify any information over the

phone or e

phone or e--mail unless you initiate contact.mail unless you initiate contact.



 Mail all bills at the post office.Mail all bills at the post office. 

 Monitor your bank and credit card Monitor your bank and credit card

(10)

Identity Safeguards con’t

Identity Safeguards con’t



 Be cautious about giving credit card Be cautious about giving credit card

information over a cell phone. information over a cell phone.



 Monitor your expected deliveries on credit Monitor your expected deliveries on credit

card purchases. card purchases.



 Never have checks delivered to your Never have checks delivered to your

home. home.



 Install firewalls and virus software on your Install firewalls and virus software on your

computer. computer.



(11)

Are you a victim?

Are you a victim?



 The best way to find out is to monitor your accounts and The best way to find out is to monitor your accounts and

bank statements each month, and check your credit

bank statements each month, and check your credit

report on a regular basis.

report on a regular basis.



 Unfortunately, many consumers learn that their identity Unfortunately, many consumers learn that their identity

has been stolen after some damage has been done.

has been stolen after some damage has been done.



 You many find out when bill collection agencies contact You many find out when bill collection agencies contact

you for overdue debts you never incurred.

you for overdue debts you never incurred.



 You may find out when you apply for a mortgage or car You may find out when you apply for a mortgage or car

loan and learn that problems with your credit history are

loan and learn that problems with your credit history are

holding up the loan.

holding up the loan.



 You may find out when you get something in the mail You may find out when you get something in the mail

about an apartment you never rented, a house you never

about an apartment you never rented, a house you never

bought, or a job you never held.

(12)

Resolving the Theft

Resolving the Theft



 If you detect a sign of identity theft, ACT If you detect a sign of identity theft, ACT

QUICKLY! QUICKLY!



 Filing a police report, checking your credit Filing a police report, checking your credit

reports, notifying creditors, and disputing reports, notifying creditors, and disputing

any unauthorized transactions are some of any unauthorized transactions are some of

the steps you must take immediately to the steps you must take immediately to

(13)

Resolving the Theft con’t

Resolving the Theft con’t



 When you find inaccuracies, contact the three When you find inaccuracies, contact the three

main credit reporting bureaus and file a dispute

main credit reporting bureaus and file a dispute

related to the inaccurate information.

related to the inaccurate information.



 Equifax, Credit Information Services, Consumer Equifax, Credit Information Services, Consumer

Fraud

Fraud



 www.credit.equifax.comwww.credit.equifax.com



 ExperianExperian, National Consumer Assistance, National Consumer Assistance



 www.experian.comwww.experian.com



 TransUnionTransUnion, Fraud Victim Assistance Department, Fraud Victim Assistance Department



(14)

Determining Your Risk

Determining Your Risk



 It is always important to assess your level It is always important to assess your level

of preparedness to defend against identity of preparedness to defend against identity

theft. theft.



 How prepared are you? Log on to How prepared are you? Log on to

www.privacyrights.org

www.privacyrights.org and click on the link and click on the link for “identity theft.”

References

Related documents

Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to

Identity theft occurs when someone uses your personal information, like your credit card number or name and Social Security number, without your permission, to commit fraud or

up or shred credit card statements; ABM, credit, or debit card receipts; bank deposit receipts; loan solicitations; and other documents that contain personal financial

• Purchase a shredder and destroy unneeded credit card offers, receipts, bank statements, credit card bills, and any other documents that contain personal information that

up or shred credit card statements; ATM, credit, or debit card receipts; bank deposit receipts; loan solicitations; and other documents that contain personal financial

thief, who may pick through your trash or recycling bins, from stealing your personal information, make sure you tear up or shred your credit card receipts, copies of

• Shred pre-approved credit offers, statements, bills, and other documents with personal or financial information.. ID

Identity theft is a serious crime that occurs when someone uses your personal information such as your name, Social Security number, credit card number or other information without