SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Seniors Identity Theft
Protection Guide

1.866.436.5461
www.idtheftsupportcentre.org
Canadian Identity Theft Support Centre
Preventing Identity Theft:
A Guide for Seniors

							
Page
	
• Introduction							
1
• What Is Identity Theft						
1
• What Do Identity Thieves Want?				
2
• How Do Identity Thieves Get Information
About Their Victims?						
2
• How Do Identity Thieves Use This Information
To Commit Identity Fraud?					
3
• Who Are Identity Thieves?					
4
• Reducing The Risk: How Can I Avoid
Becoming A Victim?						
4
	
• Caregivers and Powers of Attorney			
4
	
• At Home						
4
	
• Out And About						
5
	
• Transacting With Other People
	 And Business						5
	
• Protecting Your Computer				
6
	
• Online Activity						
6
	
• Online Shopping					
7
	
• Smartphones						
7
• Preventing Identity Theft: Tips for Seniors			
8

Canadian Identity Theft Support Centre
1.866.436.5461
www.idtheftsupportcentre.org

entity
theft
Introduction

What is identity theft?

Identity theft is not confined to any
particular demographic group - people
of all ages can become victims. But just
as with other forms of fraud and financial
exploitation, seniors may be targeted by
identity thieves because they are seen
as vulnerable and potentially lucrative
targets. It is therefore important that
seniors and those who may be caring for
them are aware of the danger of identity
theft and the ways it is perpetrated, and
that they take the necessary precautions
to avoid it.

We use the term “identity theft” to mean not
just the stealing of personal information,
but also the fraudulent use of that
information to access your bank account,
credit card or other account without your
authorization, to obtain loans, services,
government benefits, employment or
other benefits in your name, or to evade
authorities by assuming your identity.
Both “identity theft” and “identity fraud”
are criminal offences in Canada. Related
activities such as redirecting mail and
selling fraudulent identity documents are
also criminal offences.

Older adults living in residential facilities
or under the care of someone else are
at particular risk because the caretakers
have access to the senior’s personal
records. This creates a situation which
allows unscrupulous individuals to exploit
those in their care. If you are a friend or
family member concerned about potential
exploitation of an elderly person, the
following information and advice will be
helpful.
Note: Seniors need to take the same
precautions as everyone else against
identity theft. This ‘Guide for Seniors’
replicates information provided in CITSC’s
general Guide to Preventing Identity Theft
and provides a few more tips specific to
the elderly.

1

The damage to victims of identity theft
varies widely, from mere inconvenience
such as having to replace a credit card,
to financial and personal devastation.
Victims may even be arrested for crimes
committed by an impostor. Given the
potential consequences of identity theft,
it is worth making an effort to avoid
becoming a victim.
What do identity thieves
want?
Most identity thieves want money. Some
want employment or free services. Others
want to evade authorities. In all cases,
identity thieves pretend to be other people
in order to achieve their goals.
The types of information most useful to
identity thieves are:
1. Full Name and Address
2. Date of birth
3. Social Insurance Number
4. Drivers Licence number
5. Passport number
6. Other government-issued ID numbers
7. Student ID numbers
8. Credit card, debit card, bank account
and other financial account numbers
9. Typical passwords or security question
answers – e.g., mother’s maiden name
10. Information about your family, work
and personal life

How do identity thieves
get information about
their victims?
Identity thieves use many methods to
gather personal information about their
victims that they can then use to commit
identity fraud. These methods include:
1. Stealing your wallet, purse, cheques or
mail
2. Gathering information from records in
your home
3. Sifting through your trash to find useful
information such as account details
4. Posing as a legitimate company by
email, over the phone or at your door and
asking you for your account information
(this is called “pretexting”, or if done by
email, “phishing”)
5. Taking your credit card or debit card
out of your sight and “skimming” it (i.e,
capturing the information on it via a
special device)
6. Watching you enter your pin or
password
7. Eavesdropping on insecure wireless
communications
8. Gathering information about you from
social networking sites, blogs, online
‘payday loan’ applications, and other
online sources
9. Hacking into your computer via a virus
or other method

2
10. Surreptitiously installing spyware on
your computer that gathers information
such as your passwords
Thieves can also gather your information
from other sources that you cannot
control, such as:
1. The garbage of corporations with whom
you do business or government agencies
2. The computers and databases of
corporations and governments
3. Unintentional security breaches of
corporations and governments
4. Websites that have information about
you posted on them
5. Employees of corporations or
government who are fooled into providing
your information to the imposter
6. Employees of corporations or
government who are part of a criminal
ring or who are bribed to provide your
information to criminals

How do identity thieves
use this information to
commit identity fraud?
Once they have enough information to
pretend to be you, identity thieves can
do all sorts of damage to you and your
financial and personal reputation. Such
damage includes (but is not limited to):
1. Making purchases on your credit card
or debit card (bank account)
2. Using, altering, or copying your
cheques and drawing money from your
bank account
3. Opening up new credit card, cell phone
or other accounts in your name and
running up bills without paying them
4. Sending a change of address to
creditors to divert your mail so that
you don’t notice the unauthorized bills
mounting up
5. Obtaining loans (even mortgages!) In
your name
6. Transferring title to property from you
to them
7. Getting a tax refund or other benefit in
your name
8. Leasing an apartment in your name or
getting a job in your name
9. Pretending to be you when arrested by
police

3
Who are identity thieves?
Just as there is no typical victim of identity
theft, people who engage in this criminal
activity range from family members with
no criminal history to international crime
organizations. Depending on the nature
of the crime, the fraudster could be
someone you know or an anonymous
criminal operating from another part of
the world.
In the case of the elderly, especially those
reliant on others for their care, there is
a higher than normal risk of caregivers,
family members or others with access to
the senior’s records to take advantage of
the elderly person. The perpetrators may
even rationalize such exploitation (e.g.,
obtaining credit in the elderly person’s
name) on the grounds that they are
somehow entitled to the funds.

REDUCING THE RISK:
How can I avoid becoming
a victim?
There are many things that seniors and
their caregivers can do to minimize the
risk of identity theft.

Caregivers and Powers of
Attorney
1. Before hiring a caregiver, do a
thorough background check (including a
police check and at least three reference
checks) and have trusted friends or family
help make the hiring decision.
2. Do not leave cheques or other financial
documents lying around the home.

3. When an elderly person becomes
unable to manage his or her own
finances, ensure that a financial Power of
Attorney is provided to someone who is
100% trustworthy.

At Home
1. Keep cheques and identification
documents in a safe (preferably locked)
place at home and only take them with
you when you need them. Consider
storing important documents that you use
infrequently in a safety deposit box at a
bank. Keep copies of your passport, birth
certificate and other government-issued
ID in separate files (for reference if you
lose the original).
2. Never leave strangers unattended in
your home.
3. If you have an unsecured mailbox,
pick up your mail as soon as possible
after delivery. If you are going away, stop
delivery or arrange for someone to pick
up your mail.
4. Be aware of when your bills normally
arrive in the mail and if they don’t arrive,
contact the bank or creditor and find out
what happened.
5. Review your bank and credit card
statements carefully when they arrive and
immediately report any activity you do not
recognize as your own.
6. Keep financial records in a safe, secure
place. Don’t leave them lying around the
house.
7. Shred (or burn) old records once you
know that you won’t need them for tax or

4
other purposes. Use a cross-shredder to
ensure that thieves cannot piece together
any information from the garbage.
8. Order a copy of your credit file from
the two Canadian credit bureaus (Equifax
and TransUnion) annually and review it
carefully to confirm that no one has been
applying for credit or incurring debts in
your name.

Out and About
1. Don’t carry identification documents
(e.g., birth certificate, passport, SIN card,
health card) or blank cheques in your
wallet, purse or otherwise with you unless
you need them.
Checklist of documents you
should keep secure
• Credit card statements
• Bank and other financial
statements
• Insurance policies
• Medical documents
• Tax records
• Government benefit statements
• Passport
• Legal documents
• Wills
2. Don’t store unnecessary personal
information on your smartphone or other
handheld device. Password-protect your
mobile devices with a strong password
that can’t be guessed by someone else.

5

Transacting with other people and
businesses
1. Don’t give any information about
yourself or your accounts to anyone over
the phone, through the mail or over the
Internet unless you initiated the contact.
Unsolicited requests for your personal
information are likely to be scams. If
the caller (or message) asking you for
information purports to be from your bank
or another institution with which you do
business, hang up and call the institution
yourself using the phone number on your
account statements, and ask if they were
trying to contact you.
2. Don’t give your Social Insurance
Number unless it is required by your
employer, financial institution or the
government.
Other businesses don’t
need it and cannot legally insist that you
provide it.
3. Never use a cheque to pay someone
you don’t know and trust. Instead, use
cash, credit card, debit card, money order
or bank draft.
4. Don’t let your debit card or credit card
out of your sight when using them to
pay for services. Cover the pad when
entering your PIN.
5. When selecting service providers to
whom you will be entrusting your personal
information, look into their privacy policies
and their track records with respect to
data security. Don’t do business with
a company you can’t trust to keep your
personal information confidential and
secure. Let companies know that this is
important to you.
Protecting Your Computer
1. Set up your computer with a username
and password that you have to enter each
time the computer is turned on and after a
certain period of inactivity. Only let people
you trust know your password.
2. Do not store passwords on your
computer. Keep a list of your passwords
somewhere out of sight. Disclose this
location only to people you fully trust.
3. If it is hooked up to the Internet, ensure
Passwords should be at least 8
characters long and include a mix
of upper- and lower-case letters,
numbers, and/or non-alphabetical
characters.
Do not use easilyavailable information such as your
mother’s maiden name or your birth
date.
that your computer is protected by a
firewall and anti-virus software that is kept
up-to-date and that scans your computer
regularly (e.g., weekly) for viruses and
spyware.
4. Turn off your computer when it is not
in use. When your computer is shut off
it is also disconnected from the Internet,
preventing access to potential thieves.

Online Activity
1. Use strong passwords to protect your
financial accounts if you access them
online.
2. Do not open e-mail messages or
attachments if you do not recognize
the name of the sender. Delete them

immediately. Even messages from people
you know can be dangerous if they are
caused by computer viruses. If the
message seems strange, do not respond
to it. Attachments are most dangerous
– they can carry spyware that lodges in
your computer and sends your personal
data back to the criminal who can then
use it to perpetrate identity theft.
3. Do not download files unless you
are certain that they are safe (e.g., by
running them through your anti-virus
software). Other people’s computers may
be infected and used to send harmful
viruses and spyware to your computer
through email or downloads, even if the
other person is unaware of the infection.
4. Do not activate “pop-up” windows
that appear unexpectedly on your
computer. Just like email attachments
and downloads, they may contain viruses
or other malicious software.
5. Don’t post information on your blog,
social network profile or website that
could be useful to an identity thief. See
above for a list of information most useful
to identity thieves.
6. If you engage in social networking
online (e.g., Facebook, MySpace), set
your privacy settings to the highest level;
don’t just accept the default settings.
Use a nickname rather than your official
name. Don’t accept invitations to connect
with people you don’t know.
7. Read the fine-print of Applications
(“Apps”) before you install them on your
computer. If the App requires access to
more personal information that it needs,
reconsider whether you really want to

6
install it.
8. Connect only to wireless (Wi-Fi)
networks that you absolutely trust. If/
when you use a wireless network, make
sure that your communication is secure
and disconnect from the network when
you stop using it.
9. Limit your activities while using public
Wi-Fi.  Avoid making online purchases
or accessing email while using a public
Wi-Fi zone.  Public Wi-Fi hotspots are
targeted by hackers since they can give
the hacker direct access to your mobile
device.

Online Shopping
1. Make purchases only from businesses
that you know are legitimate. Some
websites are designed for the sole
purpose of stealing your personal
information, especially credit card
numbers. If you are unsure about the
legitimacy of the business, research it via
the Internet (to see what others say about
it), call and ask questions to determine its
legitimacy, or contact the Better Business
Bureau to find out if it is a member.
2. Place orders only through secure
websites. You can tell if a site is secure:
the web address will begin with
“https://” and the web browser will display
a locked padlock icon.
3. Pay for online purchases only with a
credit card or secure online system such
as PayPal. Never pay with a cheque as
cheques are easily copied and contain
too much personal information.
4. Don’t store your credit card information

7

or other personal information on shopping
sites. While this makes future purchases
from that site easier (because you won’t
have to enter the same information each
time), it puts your information at risk of
being stolen from the site or exposed
unintentionally through a security breach.
5. Read the fine print. Confirm that the
business does not share your personal
information with other businesses, or
opt out of such sharing if necessary.
You are legally entitled to “opt-out” of all
non-essential use and sharing of your
personal information.

Smartphones
1. Use the same precautions as when
using your home computer online (see
above). Install security software specially
designed for mobile devices and update
it regularly. Double check URLs for
accuracy. Don’t open suspicious links.
Read the fine-print of applications before
installing them. Make sure a site is
secure (https) before giving any billing or
personal information.
2. Install a backup/wiping program that
will back up the information on your
mobile device to your home computer and
“wipe” your phone if it is lost or stolen so
that no data remains on the device itself.
These services are available through
device manufacturers and wireless
service providers.  iPhones have a built-in
“wipe” feature that if turned on will wipe
the phone after 10 failed log-on attempts.
For more information and tips on
Computer/Online protection, see the
companion
CITSC
guide
entitled
“Protecting Yourself from Online Identity
Theft”.
Preventing Identity Theft: Tips for Seniors
Keep a minimum number of identity documents and payment cards in your wallet.
Be especially careful with cheques, Social Insurance Numbers, Passports and Birth
Certificates. Do not carry these documents in your purse, wallet or car unless you need
them that day.
Treat all unsolicited communications - whether by phone, mail, email or in person - as
suspicious.
Never give your full name, SIN, account numbers or passwords to strangers who
contact you, whether by phone, internet, email or at the door. If you think the request
was legitimate, call the company yourself using the telephone number from your billing
statements or the phone book.
Check your financial statements regularly. If you notice any suspicious activity on your
accounts or bill, contact the bank or company immediately.
Store identity documents, cheques and financial statements in a secure place at home
(or in a safety box at the bank if you need them only rarely). Do not leave them lying
around at home.
Destroy old records that are no longer needed using a cross-cut shredder.
Order a copy of your credit reports from Equifax and TransUnion annually and review
them carefully. If you see any suspicious activity, contact the creditor involved and
determine the nature and source of the activity. If it wasn’t you, treat it as a case of
identity theft – see CITSC’s Identity Theft Victim Toolkit.
If hiring a caregiver, do a thorough background check first. Have someone you trust
help you with this important task.

8

Contenu connexe

Tendances

Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims- Mark - Fullbright
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionBayo Cary
 

Tendances (20)

Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity theft
Identity theftIdentity theft
Identity theft
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protection
 

En vedette

Understanding and Preventing Provider Medical Identity Theft
Understanding and Preventing Provider Medical Identity TheftUnderstanding and Preventing Provider Medical Identity Theft
Understanding and Preventing Provider Medical Identity Theft- Mark - Fullbright
 
Identity Theft Resource Center - 3/11/2014
Identity Theft Resource Center - 3/11/2014Identity Theft Resource Center - 3/11/2014
Identity Theft Resource Center - 3/11/2014- Mark - Fullbright
 
Stopping Affinity Fraud in Your Community
Stopping Affinity Fraud in Your CommunityStopping Affinity Fraud in Your Community
Stopping Affinity Fraud in Your Community- Mark - Fullbright
 
Protect your Pocketbook Tips to Avoid Financial Exploitation
Protect your Pocketbook Tips to Avoid Financial ExploitationProtect your Pocketbook Tips to Avoid Financial Exploitation
Protect your Pocketbook Tips to Avoid Financial Exploitation- Mark - Fullbright
 
Young Canadians in a Wired World Phase III - Talking to Youth and Parents ab...
Young Canadians in a Wired World  Phase III - Talking to Youth and Parents ab...Young Canadians in a Wired World  Phase III - Talking to Youth and Parents ab...
Young Canadians in a Wired World Phase III - Talking to Youth and Parents ab...- Mark - Fullbright
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center- Mark - Fullbright
 
Teaching Your Children Safe Surfing Habits
Teaching Your Children Safe Surfing HabitsTeaching Your Children Safe Surfing Habits
Teaching Your Children Safe Surfing Habits- Mark - Fullbright
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014- Mark - Fullbright
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
Bank Secrecy Act BSA Anti-Money Laundering
Bank Secrecy Act BSA Anti-Money LaunderingBank Secrecy Act BSA Anti-Money Laundering
Bank Secrecy Act BSA Anti-Money Laundering- Mark - Fullbright
 

En vedette (14)

Chronology of Data Breaches
Chronology of Data BreachesChronology of Data Breaches
Chronology of Data Breaches
 
Understanding and Preventing Provider Medical Identity Theft
Understanding and Preventing Provider Medical Identity TheftUnderstanding and Preventing Provider Medical Identity Theft
Understanding and Preventing Provider Medical Identity Theft
 
Identity Theft Resource Center - 3/11/2014
Identity Theft Resource Center - 3/11/2014Identity Theft Resource Center - 3/11/2014
Identity Theft Resource Center - 3/11/2014
 
Stopping Affinity Fraud in Your Community
Stopping Affinity Fraud in Your CommunityStopping Affinity Fraud in Your Community
Stopping Affinity Fraud in Your Community
 
Protect your Pocketbook Tips to Avoid Financial Exploitation
Protect your Pocketbook Tips to Avoid Financial ExploitationProtect your Pocketbook Tips to Avoid Financial Exploitation
Protect your Pocketbook Tips to Avoid Financial Exploitation
 
Young Canadians in a Wired World Phase III - Talking to Youth and Parents ab...
Young Canadians in a Wired World  Phase III - Talking to Youth and Parents ab...Young Canadians in a Wired World  Phase III - Talking to Youth and Parents ab...
Young Canadians in a Wired World Phase III - Talking to Youth and Parents ab...
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center
 
Teaching Your Children Safe Surfing Habits
Teaching Your Children Safe Surfing HabitsTeaching Your Children Safe Surfing Habits
Teaching Your Children Safe Surfing Habits
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
 
Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Bank Secrecy Act BSA Anti-Money Laundering
Bank Secrecy Act BSA Anti-Money LaunderingBank Secrecy Act BSA Anti-Money Laundering
Bank Secrecy Act BSA Anti-Money Laundering
 

Similaire à Seniors Guide to Preventing Identity Theft

Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.PdfSanea
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftCost U Less Direct
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pntjessmc1
 

Similaire à Seniors Guide to Preventing Identity Theft (20)

Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity Theft
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Trilegiant 1
Trilegiant 1Trilegiant 1
Trilegiant 1
 

Plus de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Plus de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Dernier

Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 

Dernier (20)

Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 

Seniors Guide to Preventing Identity Theft

  • 1. Seniors Identity Theft Protection Guide 1.866.436.5461 www.idtheftsupportcentre.org
  • 2. Canadian Identity Theft Support Centre Preventing Identity Theft: A Guide for Seniors Page • Introduction 1 • What Is Identity Theft 1 • What Do Identity Thieves Want? 2 • How Do Identity Thieves Get Information About Their Victims? 2 • How Do Identity Thieves Use This Information To Commit Identity Fraud? 3 • Who Are Identity Thieves? 4 • Reducing The Risk: How Can I Avoid Becoming A Victim? 4 • Caregivers and Powers of Attorney 4 • At Home 4 • Out And About 5 • Transacting With Other People And Business 5 • Protecting Your Computer 6 • Online Activity 6 • Online Shopping 7 • Smartphones 7 • Preventing Identity Theft: Tips for Seniors 8 Canadian Identity Theft Support Centre 1.866.436.5461 www.idtheftsupportcentre.org entity theft
  • 3. Introduction What is identity theft? Identity theft is not confined to any particular demographic group - people of all ages can become victims. But just as with other forms of fraud and financial exploitation, seniors may be targeted by identity thieves because they are seen as vulnerable and potentially lucrative targets. It is therefore important that seniors and those who may be caring for them are aware of the danger of identity theft and the ways it is perpetrated, and that they take the necessary precautions to avoid it. We use the term “identity theft” to mean not just the stealing of personal information, but also the fraudulent use of that information to access your bank account, credit card or other account without your authorization, to obtain loans, services, government benefits, employment or other benefits in your name, or to evade authorities by assuming your identity. Both “identity theft” and “identity fraud” are criminal offences in Canada. Related activities such as redirecting mail and selling fraudulent identity documents are also criminal offences. Older adults living in residential facilities or under the care of someone else are at particular risk because the caretakers have access to the senior’s personal records. This creates a situation which allows unscrupulous individuals to exploit those in their care. If you are a friend or family member concerned about potential exploitation of an elderly person, the following information and advice will be helpful. Note: Seniors need to take the same precautions as everyone else against identity theft. This ‘Guide for Seniors’ replicates information provided in CITSC’s general Guide to Preventing Identity Theft and provides a few more tips specific to the elderly. 1 The damage to victims of identity theft varies widely, from mere inconvenience such as having to replace a credit card, to financial and personal devastation. Victims may even be arrested for crimes committed by an impostor. Given the potential consequences of identity theft, it is worth making an effort to avoid becoming a victim.
  • 4. What do identity thieves want? Most identity thieves want money. Some want employment or free services. Others want to evade authorities. In all cases, identity thieves pretend to be other people in order to achieve their goals. The types of information most useful to identity thieves are: 1. Full Name and Address 2. Date of birth 3. Social Insurance Number 4. Drivers Licence number 5. Passport number 6. Other government-issued ID numbers 7. Student ID numbers 8. Credit card, debit card, bank account and other financial account numbers 9. Typical passwords or security question answers – e.g., mother’s maiden name 10. Information about your family, work and personal life How do identity thieves get information about their victims? Identity thieves use many methods to gather personal information about their victims that they can then use to commit identity fraud. These methods include: 1. Stealing your wallet, purse, cheques or mail 2. Gathering information from records in your home 3. Sifting through your trash to find useful information such as account details 4. Posing as a legitimate company by email, over the phone or at your door and asking you for your account information (this is called “pretexting”, or if done by email, “phishing”) 5. Taking your credit card or debit card out of your sight and “skimming” it (i.e, capturing the information on it via a special device) 6. Watching you enter your pin or password 7. Eavesdropping on insecure wireless communications 8. Gathering information about you from social networking sites, blogs, online ‘payday loan’ applications, and other online sources 9. Hacking into your computer via a virus or other method 2
  • 5. 10. Surreptitiously installing spyware on your computer that gathers information such as your passwords Thieves can also gather your information from other sources that you cannot control, such as: 1. The garbage of corporations with whom you do business or government agencies 2. The computers and databases of corporations and governments 3. Unintentional security breaches of corporations and governments 4. Websites that have information about you posted on them 5. Employees of corporations or government who are fooled into providing your information to the imposter 6. Employees of corporations or government who are part of a criminal ring or who are bribed to provide your information to criminals How do identity thieves use this information to commit identity fraud? Once they have enough information to pretend to be you, identity thieves can do all sorts of damage to you and your financial and personal reputation. Such damage includes (but is not limited to): 1. Making purchases on your credit card or debit card (bank account) 2. Using, altering, or copying your cheques and drawing money from your bank account 3. Opening up new credit card, cell phone or other accounts in your name and running up bills without paying them 4. Sending a change of address to creditors to divert your mail so that you don’t notice the unauthorized bills mounting up 5. Obtaining loans (even mortgages!) In your name 6. Transferring title to property from you to them 7. Getting a tax refund or other benefit in your name 8. Leasing an apartment in your name or getting a job in your name 9. Pretending to be you when arrested by police 3
  • 6. Who are identity thieves? Just as there is no typical victim of identity theft, people who engage in this criminal activity range from family members with no criminal history to international crime organizations. Depending on the nature of the crime, the fraudster could be someone you know or an anonymous criminal operating from another part of the world. In the case of the elderly, especially those reliant on others for their care, there is a higher than normal risk of caregivers, family members or others with access to the senior’s records to take advantage of the elderly person. The perpetrators may even rationalize such exploitation (e.g., obtaining credit in the elderly person’s name) on the grounds that they are somehow entitled to the funds. REDUCING THE RISK: How can I avoid becoming a victim? There are many things that seniors and their caregivers can do to minimize the risk of identity theft. Caregivers and Powers of Attorney 1. Before hiring a caregiver, do a thorough background check (including a police check and at least three reference checks) and have trusted friends or family help make the hiring decision. 2. Do not leave cheques or other financial documents lying around the home. 3. When an elderly person becomes unable to manage his or her own finances, ensure that a financial Power of Attorney is provided to someone who is 100% trustworthy. At Home 1. Keep cheques and identification documents in a safe (preferably locked) place at home and only take them with you when you need them. Consider storing important documents that you use infrequently in a safety deposit box at a bank. Keep copies of your passport, birth certificate and other government-issued ID in separate files (for reference if you lose the original). 2. Never leave strangers unattended in your home. 3. If you have an unsecured mailbox, pick up your mail as soon as possible after delivery. If you are going away, stop delivery or arrange for someone to pick up your mail. 4. Be aware of when your bills normally arrive in the mail and if they don’t arrive, contact the bank or creditor and find out what happened. 5. Review your bank and credit card statements carefully when they arrive and immediately report any activity you do not recognize as your own. 6. Keep financial records in a safe, secure place. Don’t leave them lying around the house. 7. Shred (or burn) old records once you know that you won’t need them for tax or 4
  • 7. other purposes. Use a cross-shredder to ensure that thieves cannot piece together any information from the garbage. 8. Order a copy of your credit file from the two Canadian credit bureaus (Equifax and TransUnion) annually and review it carefully to confirm that no one has been applying for credit or incurring debts in your name. Out and About 1. Don’t carry identification documents (e.g., birth certificate, passport, SIN card, health card) or blank cheques in your wallet, purse or otherwise with you unless you need them. Checklist of documents you should keep secure • Credit card statements • Bank and other financial statements • Insurance policies • Medical documents • Tax records • Government benefit statements • Passport • Legal documents • Wills 2. Don’t store unnecessary personal information on your smartphone or other handheld device. Password-protect your mobile devices with a strong password that can’t be guessed by someone else. 5 Transacting with other people and businesses 1. Don’t give any information about yourself or your accounts to anyone over the phone, through the mail or over the Internet unless you initiated the contact. Unsolicited requests for your personal information are likely to be scams. If the caller (or message) asking you for information purports to be from your bank or another institution with which you do business, hang up and call the institution yourself using the phone number on your account statements, and ask if they were trying to contact you. 2. Don’t give your Social Insurance Number unless it is required by your employer, financial institution or the government. Other businesses don’t need it and cannot legally insist that you provide it. 3. Never use a cheque to pay someone you don’t know and trust. Instead, use cash, credit card, debit card, money order or bank draft. 4. Don’t let your debit card or credit card out of your sight when using them to pay for services. Cover the pad when entering your PIN. 5. When selecting service providers to whom you will be entrusting your personal information, look into their privacy policies and their track records with respect to data security. Don’t do business with a company you can’t trust to keep your personal information confidential and secure. Let companies know that this is important to you.
  • 8. Protecting Your Computer 1. Set up your computer with a username and password that you have to enter each time the computer is turned on and after a certain period of inactivity. Only let people you trust know your password. 2. Do not store passwords on your computer. Keep a list of your passwords somewhere out of sight. Disclose this location only to people you fully trust. 3. If it is hooked up to the Internet, ensure Passwords should be at least 8 characters long and include a mix of upper- and lower-case letters, numbers, and/or non-alphabetical characters. Do not use easilyavailable information such as your mother’s maiden name or your birth date. that your computer is protected by a firewall and anti-virus software that is kept up-to-date and that scans your computer regularly (e.g., weekly) for viruses and spyware. 4. Turn off your computer when it is not in use. When your computer is shut off it is also disconnected from the Internet, preventing access to potential thieves. Online Activity 1. Use strong passwords to protect your financial accounts if you access them online. 2. Do not open e-mail messages or attachments if you do not recognize the name of the sender. Delete them immediately. Even messages from people you know can be dangerous if they are caused by computer viruses. If the message seems strange, do not respond to it. Attachments are most dangerous – they can carry spyware that lodges in your computer and sends your personal data back to the criminal who can then use it to perpetrate identity theft. 3. Do not download files unless you are certain that they are safe (e.g., by running them through your anti-virus software). Other people’s computers may be infected and used to send harmful viruses and spyware to your computer through email or downloads, even if the other person is unaware of the infection. 4. Do not activate “pop-up” windows that appear unexpectedly on your computer. Just like email attachments and downloads, they may contain viruses or other malicious software. 5. Don’t post information on your blog, social network profile or website that could be useful to an identity thief. See above for a list of information most useful to identity thieves. 6. If you engage in social networking online (e.g., Facebook, MySpace), set your privacy settings to the highest level; don’t just accept the default settings. Use a nickname rather than your official name. Don’t accept invitations to connect with people you don’t know. 7. Read the fine-print of Applications (“Apps”) before you install them on your computer. If the App requires access to more personal information that it needs, reconsider whether you really want to 6
  • 9. install it. 8. Connect only to wireless (Wi-Fi) networks that you absolutely trust. If/ when you use a wireless network, make sure that your communication is secure and disconnect from the network when you stop using it. 9. Limit your activities while using public Wi-Fi.  Avoid making online purchases or accessing email while using a public Wi-Fi zone.  Public Wi-Fi hotspots are targeted by hackers since they can give the hacker direct access to your mobile device. Online Shopping 1. Make purchases only from businesses that you know are legitimate. Some websites are designed for the sole purpose of stealing your personal information, especially credit card numbers. If you are unsure about the legitimacy of the business, research it via the Internet (to see what others say about it), call and ask questions to determine its legitimacy, or contact the Better Business Bureau to find out if it is a member. 2. Place orders only through secure websites. You can tell if a site is secure: the web address will begin with “https://” and the web browser will display a locked padlock icon. 3. Pay for online purchases only with a credit card or secure online system such as PayPal. Never pay with a cheque as cheques are easily copied and contain too much personal information. 4. Don’t store your credit card information 7 or other personal information on shopping sites. While this makes future purchases from that site easier (because you won’t have to enter the same information each time), it puts your information at risk of being stolen from the site or exposed unintentionally through a security breach. 5. Read the fine print. Confirm that the business does not share your personal information with other businesses, or opt out of such sharing if necessary. You are legally entitled to “opt-out” of all non-essential use and sharing of your personal information. Smartphones 1. Use the same precautions as when using your home computer online (see above). Install security software specially designed for mobile devices and update it regularly. Double check URLs for accuracy. Don’t open suspicious links. Read the fine-print of applications before installing them. Make sure a site is secure (https) before giving any billing or personal information. 2. Install a backup/wiping program that will back up the information on your mobile device to your home computer and “wipe” your phone if it is lost or stolen so that no data remains on the device itself. These services are available through device manufacturers and wireless service providers.  iPhones have a built-in “wipe” feature that if turned on will wipe the phone after 10 failed log-on attempts. For more information and tips on Computer/Online protection, see the companion CITSC guide entitled “Protecting Yourself from Online Identity Theft”.
  • 10. Preventing Identity Theft: Tips for Seniors Keep a minimum number of identity documents and payment cards in your wallet. Be especially careful with cheques, Social Insurance Numbers, Passports and Birth Certificates. Do not carry these documents in your purse, wallet or car unless you need them that day. Treat all unsolicited communications - whether by phone, mail, email or in person - as suspicious. Never give your full name, SIN, account numbers or passwords to strangers who contact you, whether by phone, internet, email or at the door. If you think the request was legitimate, call the company yourself using the telephone number from your billing statements or the phone book. Check your financial statements regularly. If you notice any suspicious activity on your accounts or bill, contact the bank or company immediately. Store identity documents, cheques and financial statements in a secure place at home (or in a safety box at the bank if you need them only rarely). Do not leave them lying around at home. Destroy old records that are no longer needed using a cross-cut shredder. Order a copy of your credit reports from Equifax and TransUnion annually and review them carefully. If you see any suspicious activity, contact the creditor involved and determine the nature and source of the activity. If it wasn’t you, treat it as a case of identity theft – see CITSC’s Identity Theft Victim Toolkit. If hiring a caregiver, do a thorough background check first. Have someone you trust help you with this important task. 8