Identity Theft
Protecting Your Credit Identity August 19, 2016
Presented by: Sgt. John Wittkowski
All costs for this presentation were underwritten by: Pine Rest Christian Mental Health Services Employee Assistance and Church Assistance Program and a donation from Meijer.
The Changing Face of Identity Theft
How Big is the Problem 332,646 Americans reported to the FTC that they
were a victim of Identity Fraud in 2014 Florida has the highest rate of ID Fraud in the
country Some of the largest corporations in America have
had security breaches that have resulted in consumer’s personal and financial information being compromised Anthem Target Morgan Stanley U.S Postal Service
Almost 1 in 4 consumers who received a data breach notification became a fraud victim
Identity Theft Identity theft occurs when someone
wrongfully acquires and uses someone’s personal identification, credit or account information.
Personal Information Includes
Name Address and telephone number Social Security Number Driver’s license number Bank Account numbers Credit Card numbers Passwords Bills
How Information Can Be Used
To get a new driver’s license Open a new bank account Apply for credit cards or open new store
accounts Obtain cash from credit cards To get a job To rent an apartment To make retail purchases
Impact on Victims
Damaged credit record Harassing collection efforts Loss of job opportunities Loan rejection for education, housing and
automobiles Assumption of a criminal record Time spent resolving ID theft problem –
average of 12 hours
Identity Theft and Account Fraud
Medical ID Theft Criminal ID Theft Deceased Person ID Theft Child ID Theft
How Do Thieves Get Your Information
Theft of Valuables – purses, wallets, FTDs, cell phones Dumpster Dive – rummage through trash looking for receipts and
statements Mail Theft – change of address Business Record Theft – customer, employee or patient Posing as a landlord or employer to obtain credit reports Internet Search – File sharing Fraudulent Email – Phishing or Vishing Phone Records Eavesdropping / “Shoulder Surfing” Trick you into revealing information – scams Skimming Devices Just plain lax with personnel information – unsecured sites, social media,
open pages
Credit Reports
How theft occurs Thief fraudulently orders a credit report Prevention Order credit reports each year Don’t leave credit reports laying around
3 Credit Reporting Agencies
Equifax P.O. box 105873
Atlanta, GA 30348
Report order: 1-800-685-1111
Fraud Hotline:
1-800-525-6285
www.equifax.com
Experian P.O. Box 2104
Allen, TX 75013-2104
Report Order: 1-888-397-3742
Fraud Hotline:
1-888-397-3745
www.experian.com
Trans Union P.O. Box 390
Springfield, P.A. 19064-0390
Report Order: 1-800-888-4213
Fraud Hotline:
1-800-680-7289
www.tuc.com
How theft occurs Thief steals account numbers and personal
information
Prevention Deposit outgoing mail in mailbox Don’t leave mail in mailbox If on vacation, put mail on hold
Wallets and Pocketbooks
How it occurs Thief steals wallet or pocketbook
Prevention Don’t put it in plain sight Don’t hang it on the back of the chair Use a purse that closes securely Carry only what is necessary Utilize a “Muggers” wallet
Bills
How theft occurs Bills contain personal information, account
numbers May use information to start a new account
Prevention Don’t leave bills laying around Pay attention to billing cycle
Calling Cards
How theft occurs If thief has calling card and id number, can
make long distance calls anywhere
Prevention Use only card that have an id number Protect from those who are watching over your
shoulder
Passwords How theft occurs Thief watches you or comes across your list Prevention Don’t give passwords to anyone Don’t write passwords down Use different passwords for each account
Work/Medical Records
How theft occurs Thief may access work records, SS#, bank
records
Prevention Ensure work records are locked with
security from employees or others
Pre-Approved Credit Cards
How theft occurs Activate accounts from pre-approved
cards Prevention Shred credit card offers Cut up pre-approved credit cards
Bank Account Information
How theft occurs With bank account routing number, thief can
make checks, withdraw money, or access savings
Prevention Don’t leave statements lying around Use passwords Don’t have checks mailed. Pick them up.
Social Security Number
How theft occurs This is the key to your identity
Prevention Never give out social security number Don’t carry social security card Ask for alternate number
ATM, Credit, Debit Cards
How theft occurs Some locations ask for card and PIN
number Credit and Debit cards are easy to use
because most businesses don’t ask for additional ID
Easy to use over internet and phone
ATM, Credit, and Debit Cards
Prevention Don’t leave cards laying around Only carry those cards you will use Use debit cards that require a PIN Write on back of card “Ask for ID” in
signature blank Carry cards in separate holder
Cards, cont.
Have a list of account numbers and cards Don’t give out numbers unless you are
making a purchase Keep track of all receipts Destroy papers with account numbers on it Check statements for fraudulent activity
How Do You Know If Your Identify Has Been Stolen
Fraudulent charges Mistakes on accounts or your Explanation of Medical benefits Denied credit Regular bills go missing or you receive no mail for several days Calls from debt collectors for debts that aren’t yours – loans, utilities,
phone bills and credit cards Notice from the IRS – fraudulent returns
“Student Tax” scam
Calls or mail about accounts in your minor child’s name or a deceased loved one
You have a warrant for your arrest
What to Do if Identity Theft Happens
Prevention & Resolution
Credit Card Liability
Truth in Lending Act limits liability for unauthorized charges to $50.00 per card. A letter must be received within 60 days of the
first bill containing the error. The dispute must be resolved within 90 days
of the creditor receiving the letter.
ATM, Debit, and Credit Cards
The Electronic Funds Transfer Act limits your liability
-Within 2 days, $50 -Within 60 days, $500 -After that you are responsible for whole amount To report a loss call the financial institution and
follow up in writing Get new bank numbers, PIN, and passwords
Check Liability
Contact the financial institution and stop payment.
Notify the check verification service. Most states hold the financial institution
responsible for losses of a forged check
Protect Your Personal Information
Do not leave valuables unattended Keep your important papers secure – account numbers, passports, S/S
cards, vehicle titles Review all statements regularly – check for unauthorized charges or
suspicious activity Be careful with your mail – �locked boxes Shred sensitive documents Pick up new checks from your financial institution Utilize on-line bill pay and direct deposit of income Do not over-share on social networking sites Do not authorize payment over the phone Password protect your computer and accounts – remember or secure PINs Keep you account information up to date & check your credit report at
least once a year!!....www.annualcreditreports.com
Don’t Take The Bait ! Beware of messages that:
Use generic greetings Refer to an urgent problem State that your account will be shut down unless you supply
them with personal information Urge you to click on a link with a message you were not
expecting Do not reply to suspicious emails Be wary of unusual pop-up screens Contact companies directly through their phone or their web
addresses Avoid emailing personal or financial information
Repairing the Damage Act immediately! Keep a detailed record of correspondence and phone records. Put a fraud alert on your credit report Check your credit reports Contact credit reporting agencies Put a credit freeze on your reports Contact the FTC - 1 (877) 438-4338 Contact the IRS – 1 (800) 366-4484 File a police Report – GRPD (616) 456-3400 Send creditors a copy of your ID theft report Change all account passwords Contact the Social Security fraud hot line
What Else Can You Do Protect your computer
Ensure your anti-virus/malware software is up-to-date Protect your mobile device Use only “reputable” web sites
Use a single credit card of all Internet transactions “Lock” icon encryption
Keep computer hardware secure (dispose of properly) Close inactive accounts Limit your exposure Be DILIGENT
Stay Alert!
Be Careful!
Be Smart!