• No results found

Identity Theft. Officer Rob Romey IPD Crime Prevention Officer.

N/A
N/A
Protected

Academic year: 2021

Share "Identity Theft. Officer Rob Romey IPD Crime Prevention Officer."

Copied!
15
0
0
Show more ( Page)

Full text

(1)

Identity Theft

Identity Theft

Officer Rob Romey

Officer Rob Romey

IPD Crime Prevention Officer

IPD Crime Prevention Officer

816

816

-

-

325

325

-

-

7643

7643

crimeprevention@indepmo.org

(2)

What Is Identity Theft?

What Is Identity Theft?

Identity theft occurs when someone

possesses or uses your name, address,

Social Security number (SSN), bank or

credit card account number, or other

identifying information without your

(3)

How can someone steal my

How can someone steal my

identity?

identity?

• They get information from businesses or institutions by stealing records from employer, bribing, conning, or hacking into computers.

• They rummage through your trash, the trash of

businesses, or dumps in a practice known as "dumpster diving."

(4)

How can someone steal my

How can someone steal my

identity?

identity?

(5)

How can someone steal my

How can someone steal my

identity?

identity?

(6)

How can someone steal my

How can someone steal my

identity?

identity?

They complete a "change of address form" to

divert mail to another location.

They steal personal information from your home.

They scam information from you by posing as a

legitimate business person or government

official.

(7)

What is "

What is "

pretexting

pretexting

" and how

" and how

does it relate to identity theft?

does it relate to identity theft?

• Pretexting is the practice of getting your personal

information under false pretenses. Pretexters sell your information to people who may use it to get credit in your name, steal your assets, or to investigate or sue you.

Pretexting is against the law.

• A pretexter may call, claim he's from a survey firm, and ask you a few questions.

– He pretends to be you or someone with authorized access to your account.

(8)

What is "

What is "

pretexting

pretexting

" and how

" and how

does it relate to identity theft?

does it relate to identity theft?

• Pretexter may use a fraudulent web-site to extract

information

– www.bankofamerica.com

(9)

What are the consequences of

What are the consequences of

identity theft?

identity theft?

• Open a new credit card account, using your name, date of birth and SSN. When they don't pay the bills, the delinquent account is

reported on your credit report.

• Change the mailing address on your credit card account. The

imposter then runs up charges on the account. Because the bills are being sent to the new address, it may take some time before you realize there's a problem.

• Take out auto loans in your name.

(10)

What are the consequences of

What are the consequences of

identity theft

identity theft

Counterfeit checks or debit cards, and drain your

bank account.

Open a bank account in your name and write

bad checks on that account.

Give your name to the police during an arrest. If

they are released and don't show up for their

(11)

How can I tell if I'm a victim of

How can I tell if I'm a victim of

identity theft?

identity theft?

• Failing to receive bills or other mail. Follow up with

creditors if your bills don’t arrive on time. A missing bill could mean an identity thief has taken over your account and changed your billing address to cover his tracks.

• Receiving credit cards that you didn’t apply for.

• Being denied credit, or being offered less favorable credit terms, like a high interest rate, for no apparent reason.

(12)

How can I tell if I'm a victim of

How can I tell if I'm a victim of

identity theft?

identity theft?

• To order your free annual report from one or all the national consumer reporting companies, visit:

www.annualcreditreport.com; call toll-free: 1-877-322- 8228; or complete the Annual Credit Report Request Form and mail it to: Annual Credit Report Request

Service, P.O. Box 105281, Atlanta, GA 30348-5281. You can print the form from ftc.gov/credit. Do not contact the three nationwide consumer reporting companies

(13)

Identity Theft

Identity Theft

Victims should not delay in correcting their

records and contacting all companies that

opened fraudulent accounts. The longer

the inaccurate information goes

uncorrected, the longer it will take to

resolve the problem.

(14)

Protect Yourself

Protect Yourself

Don

Don

t give your personal information to

t give your personal information to

anyone over the telephone until you are

anyone over the telephone until you are

sure you know who you are talking to.

sure you know who you are talking to.

Shred all personal information before

Shred all personal information before

discarding it.

discarding it.

Do not respond to e

Do not respond to e

-

-

mails asking for

mails asking for

updated information.

updated information.

(15)

The End,

References

Related documents

Despite a massive recent proliferation of Special Economic Zones (SEZs), there is virtually no quantitative research on what drives their dynamism. The aim of this

Dti under review of credit card offers specific people of your personal credit one just did you can i saved thousands of my cards online application is a person.. An update with

Summer Medical and Dental Education Program (SMDEP) is focused on improving access to information and resources and preparing incoming sophomore and junior college students

Identity theft occurs when criminals steal your personal information—including, but not limited to Social Security Number, credit card and bank account numbers, medical insurance

• Destroy all sensitive information, including convenience checks and pre- approved credit offers from credit card co’s, insurance information, monthly statements, etc. old

If an identity thief has stolen your mail to get new credit cards, bank and credit card statements, pre-screened credit offers or tax informa- tion, or if an identity thief

If an identity thief has stolen your mail to get new credit cards, bank or credit card state- ments, pre-screened credit offers or tax information, has falsified

If an identity thief has stolen your mail to get new credit cards, bank or credit card state- ments, pre-screened credit offers or tax information, has falsified

Identity thieves sometimes steal mail from unlocked mailboxes, looking for credit card statements, tax forms or other financial and personal information..

Report identity crime, and the theft of any credit cards or credit card numbers, to each credit reporting agency (contact information for the agencies is on page three of

mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax

Identity Theft is a very personal crime that occurs when someone uses information such as your name, Social Insurance Number, credit card number or other identifying information

An identity thief can obtain your identifying information by stealing credit card applications, bank statements, or checks from your trash or mail, finding your lost or stolen

• Shred pre-approved credit offers, statements, bills, and other documents with personal or financial information.. ID

• Simple theft – This involves stealing wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information.. •

If a thief has stolen your mail or made unauthorized address changes to get credit cards, bank and credit card statements, pre-screened credit offers or tax infor- mation, you

Equipment required: Mechanical Equivalent of Heat Tube (ET-8781), DataStudio software, computer interface (PASPORT or ScienceWorkshop ), Temperature Sensor.. Note: The Heat

tannins) and hypericin with strong antioxidant activities. Noteworthy, root extracts from H. perforatum demonstrated satisfactory amounts of various groups of

The asthma control measures also had good discrimina- tive properties when compared with AQLQ scores at Week 12 (Figure 3a) and change in AQLQ scores from baseline to Week 52

As the electrolyte pH is increased, hydrogen and hydroxide adsorption shift to lower absolute potentials (or equivalently the potential of zero charge shifts to more positive

We found that the response to 5 mg of salbutamol was impaired after 1 week of regular formot- erol use, indicating that patients using long-acting beta- agonists are likely to

Joint biplots. On the other hand, the fit of the reduced model is always less than or equal to the model with more components. One way to assess how many components are

The proposed architecture provides implementation of Suricata intrusion detection system to secure virtualized server in cloud platform and validated intrusion