3.1.g1 © family economics & financial education – revised october 2004 – consumer...

25
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman Protecting Your Credit Identity Identity Theft

Upload: poppy-martin

Post on 27-Dec-2015

217 views

Category:

Documents


4 download

TRANSCRIPT

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Protecting Your Credit Identity

Identity Theft

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.

Identity Theft

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Identity Theft• Consumers spent 26 billion dollars

online.

• The dollar loss suffered because of identity theft from consumers was 343 million in 2002.

• The number of identity theft complaints filed in 2002 was 380,000 almost double from the 204,000 complaints in 2001.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

• Name• Address and Telephone Number• Social Security number• Driver’s license number• Bank account numbers• Credit card numbers• Passwords• Bills

Personal Identification Information Includes

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

• Wallet/Purse Loss or Theft - Information is taken from a lost or stolen wallet/purse (most common method).

• Mail and Phones - Information is taken from mailboxes, a change of address form is completed, or personal information is solicited by phone.

• “Dumpster Diving” - Personal information is discarded carelessly either at home or by businesses and thieves remove it from the trash.

• “Insider Access” - Dishonest employees steal the information and either sell it or use it.

• Internet - Personal data taken off the Internet• Credit Reports – A credit report containing personal

information may be obtained fraudulently. Check credit report annually.

Ways Identity Thieves Acquire Information

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

• To apply for a new driver’s license• To open new bank accounts• To apply for credit cards or store

credit accounts• To obtain cash with bank cards• To get a job• To rent an apartment• To make retail purchases

How Information Can Be Used

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Credit Reports

How Theft Occurs:• Thief fraudulently orders a credit

report. – Credit Reports – include all the accounts a

person has, social security number, & personal information.

Prevention:• Check credit report once per year.• Don’t leave reports lying around.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Mail

How Theft Occurs:• Thief steals mail to learn account

numbers and personal information.Prevention:• Deposit outgoing mail in post office

collection boxes not unsecured mailboxes.

• Promptly remove mail from mailboxes.• If on vacation, put a hold on mail.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Wallets and Pocketbooks

How Theft Occurs:• Thief steals a wallet or pocketbook

containing a wealth of personal information.

Prevention:• Don’t leave it in plain site.• Don’t hang from chair at public place.• Use a purse which closes securely.• Carry only what is absolutely needed.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Bills

How Theft Occurs:• A thief may steal bills containing

consumer’s name, address, phone number, bank or credit account numbers, or social security.

• May use information to open new accounts.

Prevention:• Don’t leave statements lying around.• Pay attention to billing cycles and follow

up if bill does not arrive on time.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Passwords

How Theft Occurs:• If a thief has access to passwords,

he/she can access accounts, send messages, and sell or purchase items.

Prevention:• Don’t give password to anyone.• Don’t write passwords down where

others may find them.• Create unique passwords using a

combination of numbers and letters.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Work Records

How Theft Occurs:• A thief who has access to work

records may have a person’s personal information, social security numbers, or bank information.

Prevention:• Ensure personal records are locked

securely with limited access by employees.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Pre-Approved Credit Cards

How Theft Occurs:• A thief may activate credit cards

using pre-approved credit card offers and have the statements sent to a different address.

Prevention:• Shred any credit card offers

received and not used.• Cut up any pre-approved credit

cards not used.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Bank Account Information

How Theft Occurs:• If a thief has a person’s bank

account and routing number, he/she may create fake checks, withdraw money, or access savings accounts.

Prevention:• Don’t leave statements lying around.• Use passwords.• Don’t have checks mailed home.

Pick them up at the bank.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Social Security Number

How Theft Occurs:• A social security number is the key to a

person’s identity. It opens new accounts, obtain driver’s license, file bankruptcy, etc.

Prevention:• Never give our social security number.• Ask for alternate number on driver’s

license, insurance cards, and other materials.

• Do not carry social security card unless necessary.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

ATM, Credit, and Debit CardsHow Theft Occurs:• A thief may withdraw money with

both an ATM card and PIN number.• Credit and debit cards are easy to

use because most stores do not compare cards with another form of identification.

– Can easily be used to purchase merchandise over the phone or internet.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

ATM, Credit and Debit Cards

Prevention:• Don’t leave cards lying around.• Carry only those which will be used.• Use debit cards which require a PIN

number.– Do not write PIN number down in same

place debit card is kept.• Carry cards in separate holder from

wallet.• Sign back of cards stating “Please see

I.D.”

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

ATM, Credit and Debit Cards

Prevention cont.:• Have a list of all cards and account

numbers.• Don’t give out account number unless

making a purchase.• Keep track of all receipts.• Destroy papers with card numbers on

them.• Check statements for unauthorized

charges.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Identity Theft

What to Do if

Identity Theft

Happens

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Immediate Steps

1. Act immediately!2. Keep a detailed record of correspondence and

phone records.3. Contact the three major credit bureaus and

request a “fraud alert.” Equifax, Experian, Trans Union

1. Follow with a letter sent by certified mail.

4. Close all accounts which have been tampered with or opened fraudulently.

5. File a police report.6. File a complaint with the Federal Trade

Commission.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Credit Card Liability

• Truth in Lending Act limits liability for unauthorized charges to $50.00 per card.– A letter must be received within 60

days of the first bill containing the error.

– The dispute must be resolved within 90 days of the creditor receiving the letter.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

ATM & Debit Cards, Electronic Transfers

• The Electronic Funds Transfer Act provides protection.

• The amount a person is liable depends upon how quickly the loss is reported.– Within two days is a maximum of $50.00.– Within sixty days is a maximum of $500.00.– After sixty days a person may be liable for

everything.

• To report a loss call the financial institution and follow up in writing.

• Get new bank numbers, personal identification numbers, and passwords.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

Check Liability

Checks• Contact the financial institution and

stop payment.• Notify the check verification service.• Most states hold the financial

institution responsible for losses of a forged check.

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman

STAY ALERTBE CAREFULBE SMART

Identity Theft

3.1.G1

© Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity TheftFunded by a grant from Take Charge America, Inc. to the Department of Health and Human Development at Montana State University – Bozeman