450 likes | 453 Views
IDENTITY THEFT. Tom Behn Willie Johnson Mike Kellen. Who is the easiest target?. YOU! Teenagers and young adults Most vulnerable due to lack of established credit Less likely to check credit records Many do not find out until well after theft has occurred. Identity Theft. Definition
E N D
IDENTITY THEFT Tom Behn Willie Johnson Mike Kellen
Who is the easiest target? • YOU! • Teenagers and young adults • Most vulnerable due to lack of established credit • Less likely to check credit records • Many do not find out until well after theft has occurred
Identity Theft • Definition • History • Types • Government Action • Statistics • Prevention and Recovery
What is Identity Theft? • Identity theft occurs when someone else uses your personal information to assume your identity. • Can be used to commit fraud or other crimes • Examples: • Your name • Social Security number • Credit card number • http://www.youtube.com/watch?v=kn_kJADfKng&feature=related
History of Identity Theft
History • Early History • I.D. Theft as been around for as long as there has been identities to steal. • The old, common practice was to kill a person and just assume their name.
History • Modern History • Phone Scams • Dumpster Diving • Fraudulent websites
Types of Identity Theft
Types • Character • Someone can commit a crime in your name • Social Security Number • Someone uses your number to gain a job • You pay their income taxes • Medical • Someone gaining medical insurance in your name. False information could leave you helpless.
Types • Driver’s License • Someone commits traffic violations in your name. • When they fail to appear in court, warrants are issued for you. • Credit • Someone uses your credit to obtain loans or goods, and leaves you with the bill.
How are they getting your information? • Dumpster Diving • Not actually a Crime • Phone Scams • Phishing
Sources of Identity Theft
Bank Statement 1 2 3
Credit or Debit Card(Back) This will vary depending on issuer of Credit or Debit card
Personal Checks 1 2
Driver’s License 1 2 3
How secure is your computer? • Phishing • Using Phony websites and installing spyware to track your every move. • Be careful where you enter your information!
Government Action on Identity Theft
Previous Legislation • Identity Theft Victims Assistance Act of 2002 • Nation Wide Process for victims to obtain records to facilitate correction of records, and catch thieves. • Expanded the Role of the Federal Coordinating Committee • Expanded the Statute of Limitations for the Fair Credit Reporting Act to five years, up from two. • Required agencies to block reporting of bad credit.
Previous Legislation • Identity Theft Prevention Act of 2001 • Increased the penalties for anyone who commits: • “Aggravated Identity Theft” • Purpose of a terrorist act or serious federal offence • Including: Immigration violations and false citizenships • Made Identity Theft easier to prove • Increased term of imprisonment for ordinary Identity Theft
Statistics of Identity Theft
Monetary Losses • $221 billion a year are lost worldwide • Victims lose an average of $1,800 to $14,000 in wages when dealing with ID theft • Victims spend an average of $850 to $1400 in expenses recovering
Uses of Stolen Information • 33% of victims report fraud to checking account • 66% report a new credit card account has been opened in their name • 28% report a new cell phone account has been activated • 12% report having warrants issued in their name for crimes they did not commit
Prevention and Recovery of Identity Theft
3 “D’s” of Identity Theft • DETER • Prevent thieves from accessing your personal information • DETECT • Discover fraud occurring before serious damage is done • DEFEND • Fix the accounts and information thieves have stolen
Deter/Prevention • Personal Information • Finances • Physical Documents • Internet
Deter/Prevention • Personal Information • “Need to know” approach • Ask Why and Who • Limited personal information that is “out there” • www.optoutprescreen.com • www.donotcall.gov
Deter/Prevention • Finances • Less information on personal checks • Convert bill paying to automatic deductions online • Use Cash • If using “plastic,” use Credit Card. Debit Cards are tied into checking accounts
Deter/Prevention • Physical Documents • Shred all documents with personal information • Have photocopies of all your important cards and documents • United States Postal Service • Use the post office to mail bills and important documents • P.O. Boxes are securest mailboxes.
Deter/Prevention • Internet • Know your friends AND enemies • Facebook, MySpace, Dating Sights • 43% of victims know who stolen their identity • Do not make passwords and PIN numbers obvious • Do NOT use birthdays, anniversaries, social security number, etc
Passwords • 73% use bank passwords EVERYWHERE • 65% use a bank user ID on another website • Have three “families” of passwords • Financial sites (banks, stock market) • Personal Information (email, FAFSA, Facebook) • Generic log-ins (game sites, website memberships) • Carefully consider on-line shopping sites when selecting passwords. They store credit card information • Use AT LEAST 8 characters • Random Capitalization
Detect/Monitor • Know when bills and statements usually come • Review thoroughly • Request your free credit reports yearly • Equifax, Experian and Trans Union • One every 4 months • Social Security number is not monitored on your credit reports
Detect/Monitor • When encountering “pop-ups” from websites, if they ask you to verify your personal information, do NOT fill out the form • Most well-known affiliates will ask for this information BEFORE the transaction is completed • YOU can do the best job monitoring your ID, not insurance companies • i.e. Lifelock
Defend/Recovery • File a police report • Some credit agency require a hard copy • Prevents payment resulting from fraudulent charges • Copy needed to file an “extended fraud alert” on credit report • Close all tampered or new accounts opened • For credit cards, notify in writing. Collection agencies need written proof
Defend/Recovery • Notify the credit reporting agencies • “Extended fraud alert” • Monitors you credit reports • Agencies call when new accounts are opened without your approval • “Security Freeze” • File a complaint with the FTC • List of previous offenders • Know companies that may have history of fraud
Recovery Numbers • Time to Recover • 3 hours to 240+ days • Average is about 2 weeks • This is spent over a span of 4 months to 1 year
Are You at Risk for Identity Theft? Test Your “Identity Quotient” • I receive pre-approved credit cards, etc every week (5) • I do NOT shred the pre-approved offers (5) • I carry my Social Security card with me (10) • I use a computer and do NOT have update anti-virus, anti-spyware and firewall protection (must have all 3) (10) • I do NOT ALWAYS lock my house/apartment/room (10) • I have NOT ordered a copy of my credit report in the last 2 years (20) • I use my personal mailbox to send letters (10)
Are You at Risk for Identity Theft? Test Your “Identity Quotient” • I do NOT have a P.O. Box or locked mailbox (5) • I throw away old credit or debit cards WITHOUT shredding them up (5) • I do NOT shred bank or credit card statements up (10) • I use an ATM WITHOUT checking for signs of tampering (5) • I provide my SSN WITHOUT asking why it is need (for example, on applications) (10) • I leave my purse or wallet in the car (10)
Are You at Risk for Identity Theft? Test Your “Identity Quotient” • I have my Drivers License number or SSN printed on my checks (10) • I believe my trash is “secure.” (10) • I do NOT look at my monthly statement of all major bills and financial statement FOR FRAUD (This includes bank, credit card, cell phone, utilities and investments) (20)
Results • 0-49 points = You have a high “ID theft IQ,” Congratulations • 50-99 points = Your chance of being a victim are about average • 100 + points = You are at high-risk for ID theft • Bottom line, most of us are at risk for ID theft