identity theft

58
Identity Theft TACTYC Conference Georgia Perimeter College May 19, 2006

Upload: quon-blevins

Post on 03-Jan-2016

30 views

Category:

Documents


0 download

DESCRIPTION

Identity Theft. TACTYC Conference Georgia Perimeter College May 19, 2006. Who Is at Risk?. You Are!!!. Identity Theft. What is it? Who commits it? How does it happen? What are the possible consequences? How can I prevent it? What must I do if it happens to me?. What Is Identity Theft?. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Identity Theft

Identity Theft

TACTYC Conference

Georgia Perimeter College

May 19, 2006

Page 2: Identity Theft

Who Is at Risk?

You Are!!!

Page 3: Identity Theft

Identity Theft

What is it?

Who commits it?

How does it happen?

What are the possible consequences?

How can I prevent it?

What must I do if it happens to me?

Page 4: Identity Theft

What Is Identity Theft?

n : the co-option of another person's personal information (e.g., name, social security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge

-- dictionary.com

Page 5: Identity Theft

Federal Identity Theft and Assumption Deterrence Act18 U.S.C. § 1028(a)(7)

Federal law passed in 1998

Prohibits “knowingly transfer[ring] or us[ing], without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law.”

Page 6: Identity Theft

Other Related Federal Statutes

18 U.S.C. § 1028 – identification fraud

18 U.S.C. § 1029 – credit card fraud

18 U.S.C. § 1030 – computer fraud

18 U.S.C. § 1341 – mail fraud

18 U.S.C. § 1343 – wire fraud

18 U.S.C. § 1344 – financial institution fraud

Page 7: Identity Theft

Georgia Statute §16-9-121. Identity Fraud Law

“A person commits the offense of identity fraud when without the authorization or permission of a person with the intent unlawfully to appropriate resources of or cause physical harm to that person, or of any other person, to his or her own use or to the use of a third party he or she: (1) Obtains or records identifying information of a person which would assist in accessing the resources of the other person; or(2) Accesses or attempts to access the resources of the other person through the use of identifying information.”

Page 8: Identity Theft

Identifying Information (Partial List)

Names (current or former)

Social Security numbers

Driver’s license numbers

Bank account/credit card numbers

Birth dates

Tax identification numbers

Medical identifications

Page 9: Identity Theft

Statistics

Source: Federal Trade Commission Identity Theft Data Clearinghouse reportOver 635,000 consumer identity theft &

fraud complaints received in 200461% classified as fraud, 39% identity theft.Reported losses of over $547 million.

27,300,000 million victims in past 5 years

Page 10: Identity Theft

Statistics (cont.)

Source: GA Stop ID Theft Network2,592 victims reported in Georgia in 2001

Seventh-highest in nation

Atlanta was 11th among major cities for reported identity theft in 2004 according to FTC

Page 11: Identity Theft

Statistics (cont.)

Source: ChoicePoint Data Disclosures Report, 2005

As of Nov. 15, 125 data disclosure incidents this year57 million people potentially affected

Page 12: Identity Theft

Statistics (cont.)

Losses to banks and final institutionsEstimated $48 billion in 2003

Average loss per business victim$10,200

Average loss to individual victims$1,180175 or more hours resolving problems over

two or more years

Page 13: Identity Theft

Who Commits Identity Theft?

Professional thieves

Strangers

Employees of businesses

Family members and relatives

Friends/acquaintances

Page 14: Identity Theft

Who Commits Identity Theft?

An estimated nine percent of ID theft cases involve family

Another ten percent of ID theft cases involve someone with another form of personal relationship (friend/ acquaintance, co-worker, etc.)

Page 15: Identity Theft

How Does Identity Theft Occur?

Non-technological methods still used for the majority of cases “Dumpster diving”Dishonest employeesMail theft/interceptionMasquerading and “Social hacking” “Shoulder surfers”Telemarketing scams

Page 16: Identity Theft

How Does Identity Theft Occur? (cont.)

Technology usage is growing rapidlyWireless communication interceptionCamera phonesSoftware toolsCredit card “skimming”ATM spy cameras “Phishing” and “Pharming” schemes

Page 17: Identity Theft

Potential Consequences to Victims

Financial lossesCivil issuesCriminal problems

Page 18: Identity Theft

Financial Consequences

Direct monetary losses Credit/ATM/Debit cards Checks

Indirect monetary losses Lost time/wages Out-of-pocket expenditures Legal fees

Credit Denial of credit Increased rates for loans/mortgages

Page 19: Identity Theft

Civil Consequences

LawsuitsLoss of current jobFailure to be hired for new job

Page 20: Identity Theft

Criminal Consequences

Approximately 15% of victims obtain a criminal record due to identity theftAlmost impossible to completely remove criminal record once it is in law enforcement databases

Page 21: Identity Theft

How Can I Prevent It?

Total prevention is impossible!

Minimize risks as much as possible

Protect four primary areas InformationPropertyDocumentsTechnology

Page 22: Identity Theft

Protect Your Information

Do not give out information unless you must!

Ask why a piece of information is neededYou can refuse to give information, but you

may not receive the service in returnDo not use your Social Security number as

an identification numberNeeded by IRS, SSA

Page 23: Identity Theft

Protect Your Information (cont.)

Make sure you know who is requesting the informationAre they legitimate?

Do not give out personal information unless you initiate the call/email

Page 24: Identity Theft

Protect Your Information (cont.)

Be especially cautious with the “big three”:Social Security numberPassport numberBank/credit account numbers

Page 25: Identity Theft

Protect Your Information (cont.)

Check your credit reports regularlyEvery four months, request one credit report

from one credit bureau

Federal law allows you one free copy of each bureau’s credit report annually

See http://www.annualcreditreport.com/ for information

Each credit bureau must be dealt with individually

Page 26: Identity Theft

Protect Your Information (cont.)

Should you use a credit monitoring service? In most cases, noException is if you are already a victim of

identity fraud

Note: credit bureaus will try to sell you credit monitoring when you request free reports. Be aware!

Page 27: Identity Theft

Protect Your Information (cont.)

Run a public records search annuallyAvailable free from ChoicePointAllows you to check publicly available data

about yourself for accuracyCan provide clues that identity fraud has

occurred

Page 28: Identity Theft

Protect Your Information (cont.)

Guard PINs and other identifiers from spying

Consider using electronic bill delivery/ bill paying services Removes possibility of mail theft Allows earlier detection of unauthorized activity Encourages more careful monitoring of financial

activity

Page 29: Identity Theft

Protect Your Information (cont.)

Keep a record of all bank/credit account numbers along with phone numbers

Keep a photocopy of your wallet contents and passport in a safe place

Page 30: Identity Theft

Protect Your Information (cont.)

Omit personal identifying information from resumes and job applicationsYou will eventually have to provide this if

hiredShould not be needed until late in hiring

process If demanded early, do you really want to

work there?

Page 31: Identity Theft

Protect Your Property

Keep property secured at all times

Carry only necessary items in purse/walletMinimize number of credit cardsDo not routinely carry Social Security card,

passport, birth certificate, or any document with bank routing information

Page 32: Identity Theft

Protect Your Mail

Use a locked mailbox, or pick up mail promptly

Place all outgoing mail in secured mailbox

Keep track of billing cycles

Make sure all expected mail is actually received

Page 33: Identity Theft

Protect Your Documents

Store identifying documents in a safe, locked place

Critical because of business liabilityGeorgia law – up to $10,000 fine PLUS

unlimited civil liability

Page 34: Identity Theft

Protect Your Documents (cont.)

Shred any personal or business document with identifying information before throwing away

Page 35: Identity Theft

Protect Your Technology

Control access to computers

Minimize storage of sensitive data on laptop computers and centralized network storage

Keep safeguards up to dateOperating system updatesSecurity program updates

Page 36: Identity Theft

I’m a Victim – What Do I Do Now?

Some measures apply to all cases

Others only for certain situations

Page 37: Identity Theft

Record-keeping

Send all correspondence Certified mail Return receipt requested

Document EVERYTHING Log all phone contacts

Company name, contact name, date, time Keep copies of all correspondence you send

forever File ANYTHING you receive that MAY relate to the

situation

Page 38: Identity Theft

File a Police Report

Contact local law enforcement

Georgia law requires thatLaw enforcement must take reportReport must be forwarded to Governor’s

Office of Consumer AffairsConsumer Affairs will forward to Georgia

Crime Information Center

Page 39: Identity Theft

File a Police Report (cont.)

Get copies of the law enforcement reportKeep for your recordsSend copies to creditors when reporting

fraudulent activity

Page 40: Identity Theft

Notify Credit Bureaus

All three credit bureaus should be alerted

Call first, follow up in writing

Request fraud alerts on your files

Normal duration of fraud alert is 90 – 180 days Request, in writing, extension for seven

years

Page 41: Identity Theft

Notify Creditors

Call first, follow up in writingNotify ALL creditorsBanksCredit card companiesOther lendersPhone companiesUtilities ISPs and other service providers

Page 42: Identity Theft

Notify Creditors

Existing creditorsReport fraudulent activity immediatelyCancel existing accountRequest replacement cards with new

account numbers

Page 43: Identity Theft

Notify Creditors

Fraudulently obtained accountsTake action as soon as you discover

existence of accountState that you never requested accountProvide with copy of police report and

fraud affadavitRequest that account be closedGet confirmation in writing

Page 44: Identity Theft

Get Credit Reports

Should be automatically sent at no charge when fraud alert is filedReview carefully for inaccurate informationRemember that some inaccurate

information may predate the crime

Dispute all inaccurate information in writing

Page 45: Identity Theft

Report the Crime

Federal Trade Commissionhttp://www.consumer.gov/Fill out FTC’s ID Theft Affidavit

Many companies will accept as documentationOthers insist on their own paperwork

Page 46: Identity Theft

Additional Agencies

U.S. State Department (passport agency)

Social Security Administration

U.S. Postal Inspection Service/local Post OfficeDepartment of Motor VehiclesInternal Revenue Service/Georgia Department of Revenue

Check approval agencies

Page 47: Identity Theft

When Criminal Activity is Involved

You MUST take additional steps

Failure to do this could result in ArrestJail timeSignificant expense to repeatedly clear

your record

Page 48: Identity Theft

When Criminal Activity is Involved (cont.)

Have local law enforcement confirm your identityFingerprintsPhotographCopies of identifying information

Have them send information to other jurisdictions involved as well

Page 49: Identity Theft

When Criminal Activity is Involved (cont.)

Request a “key name switch” in databasesEntry should be under impostor’s actual

name If not known, as “John/Jane Doe”

Make sure your name is listed as an alias, not as real name

Include local, state, federal databases

Page 50: Identity Theft

When Criminal Activity is Involved (cont.)

Obtain a clearance document Called by different names:

Clearance letter – Mis IDCertificate of release

Make multiple copies of this documentCarry a copy with you at ALL timesMake sure a trusted friend/family member has

a copy

Page 51: Identity Theft

Long-Term Damage Control

Do NOT pay any fraudulent charges/bills/ checks per Fair Credit Reporting Act provisions

Continue to get credit reports regularly (at least every six months)

Carefully monitor all financial activity

Carefully monitor mail

Do NOT change your Social Security number

Page 52: Identity Theft

Resources -- Federal Agencies

Federal Trade Commission http://www.consumer.gov/idtheft/

Department of Justice http://www.usdoj.gov/criminal/fraud/idtheft.html

Social Security Administration http://www.ssa.gov/pubs/idtheft.htm

U.S. Postal Inspection Service http://www.usps.com/postalinspectors/welcome2.htm

Page 53: Identity Theft

Resources – State Agencies

Georgia Stop Identity Theft Networkhttp://www.stopidentitytheft.org/

Page 54: Identity Theft

Resources -- Nonprofit Organizations

Better Business Bureauhttp://www.bbbonline.org/IDTheft/

Identity Theft Resource Centerhttp://www.idtheftcenter.org/index.shtml

Privacy Rights Clearinghousehttp://www.privacyrights.org/identity.htm

Page 55: Identity Theft

Credit Bureaus

Equifax – http://www.equifax.com/

Experian – http://www.experian.com

TransUnion – http://www.transunion.com

Page 56: Identity Theft

Check Approval Companies

CheckRite: (800) 766-2748

Chexsystems: (800) 428-9623

CheckCenter/CrossCheck: (800) 843-0760

Certigy/Equifax: (800) 437-5120

International Check Services: (800) 526-5380

SCAN: (800) 262-7771

TeleCheck: (800) 710-9898

Page 57: Identity Theft

Opt-Out Resources

Pre-screened credit offers 1-888-5-OPTOUT

Credit Bureau marketing lists

Write each credit bureau individually

Telemarketing offers http://www.donotcall.gov/

Direct mail marketing http://www.the-dma.org/ consumers/offmailinglist.htm

Email marketing http://www.dmaconsumers.org/offemaillist.html

Page 58: Identity Theft

In Closing

This presentation is available online athttp://www.gpc.edu/~jbenson/presentations/idtheft.ppt