SlideShare a Scribd company logo
1 of 16
Information Security Lesson 4 What to do if your identity  Is stolen
Close compromised accounts Call the security or fraud department Of each company – close the account Follow up the request in writing –  send supporting documents Send all correspondence to your companies by certified mail with return receipt
Set Fraud Alerts What is a fraud alert? Helps prevent an identity thief  from opening any more accounts in  your name Two types: Initial – 90 days Fraudulent accounts, credit card theft Extended – 7 years Child id theft, criminal activity
Set Fraud Alerts Consumer reporting companies 1-800-680-7289 www.transunion.com 1-888-experian (397-3742) www.experian.com 1-800-525-6285 www.equifax.com
Freeze  your credit Fraud and freeze:  what’s the difference?  Fraud  alert: ,[object Object], new accounts ,[object Object], existing accounts
Freeze  your credit Freeze alert: ,[object Object],  From accessing your credit report at all ,[object Object],  Existing relationship with may access your    Credit report
Contact the authorities local authorities Federal bureau  Of investigation www.fbi.gov Federal trade Commission www.ftc.gov
File a complaint with FTC Step 1: go to the official fTC Identity theft website http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/filing-a-report.html Step 2: click on the link to file a complaint
File a complaint with FTC Step 3: fill out the complaint form  (follow the prompts)
File an Identity theft report with the Police 1. Call the police department and let them know      you identity has been stolen (follow their instructions) 2. If possible attach a copy of your fTC ID theft complaint 3. When finished Ask for a copy of the police report 4. Keep all records in a safe and memorable place
File a report with the FBI Go to the fbi website and find a  local field office http://www.fbi.gov/contact-us/field
More specifics Credit card/debit card theft ,[object Object], Losses limited to $50 ,[object Object], Losses limited to $500 ,[object Object],[object Object]
More specifics Child identity theft ,[object Object]
 contact local authorities, including the ftc
 follow the same procedures as if your identity was stolen,[object Object]
Identity theft wrap -up Detecting identity theft Removing potential identity theft opportunities  Protecting information on your computer What to do if your identity is stolen Don’t be worried, but be alert!

More Related Content

What's hot

Training for Child Court Appointed Advocates
Training for Child Court Appointed AdvocatesTraining for Child Court Appointed Advocates
Training for Child Court Appointed Advocates- Mark - Fullbright
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Id Theft & Phishing2
Id Theft & Phishing2Id Theft & Phishing2
Id Theft & Phishing2Jeffavery99
 
Id Theft & Phishing2
Id Theft & Phishing2Id Theft & Phishing2
Id Theft & Phishing2Jeffavery9
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P Ptawnygsu
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Economic and social council
Economic and social councilEconomic and social council
Economic and social councilvalkica
 
Forensics 2012_ UCT lecturing post
Forensics 2012_ UCT lecturing postForensics 2012_ UCT lecturing post
Forensics 2012_ UCT lecturing postDeolinda Delcarme
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
The Checklist for Tax Fraud Victims
The Checklist for Tax Fraud VictimsThe Checklist for Tax Fraud Victims
The Checklist for Tax Fraud VictimsTax Defense Network
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
Steps to check application status
Steps to check application statusSteps to check application status
Steps to check application statuspassportindia
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidanceDavid Atkinson
 
Steps to apply for Passport Services
Steps to apply for Passport ServicesSteps to apply for Passport Services
Steps to apply for Passport Servicespassportindia
 

What's hot (20)

Training for Child Court Appointed Advocates
Training for Child Court Appointed AdvocatesTraining for Child Court Appointed Advocates
Training for Child Court Appointed Advocates
 
Five Tax Scams to Avoid
Five Tax Scams to AvoidFive Tax Scams to Avoid
Five Tax Scams to Avoid
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Id Theft & Phishing2
Id Theft & Phishing2Id Theft & Phishing2
Id Theft & Phishing2
 
Id Theft & Phishing2
Id Theft & Phishing2Id Theft & Phishing2
Id Theft & Phishing2
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Economic and social council
Economic and social councilEconomic and social council
Economic and social council
 
Forensics 2012_ UCT lecturing post
Forensics 2012_ UCT lecturing postForensics 2012_ UCT lecturing post
Forensics 2012_ UCT lecturing post
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
The Checklist for Tax Fraud Victims
The Checklist for Tax Fraud VictimsThe Checklist for Tax Fraud Victims
The Checklist for Tax Fraud Victims
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
Steps to check application status
Steps to check application statusSteps to check application status
Steps to check application status
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
Steps to apply for Passport Services
Steps to apply for Passport ServicesSteps to apply for Passport Services
Steps to apply for Passport Services
 

Viewers also liked

Lecture 1--Research Theory & Philosophy
Lecture 1--Research Theory & PhilosophyLecture 1--Research Theory & Philosophy
Lecture 1--Research Theory & PhilosophyBrittany Milbourn
 
Lecture 5--Research Questions II
Lecture 5--Research Questions IILecture 5--Research Questions II
Lecture 5--Research Questions IIBrittany Milbourn
 
Lesson2 removing opportunities
Lesson2 removing opportunitiesLesson2 removing opportunities
Lesson2 removing opportunitiesRob Johnson
 
Lecture 10 between groups designs
Lecture   10   between groups designsLecture   10   between groups designs
Lecture 10 between groups designsBrittany Milbourn
 
Lecture 12 unobtrusive designs and data collection
Lecture   12   unobtrusive designs and data collectionLecture   12   unobtrusive designs and data collection
Lecture 12 unobtrusive designs and data collectionBrittany Milbourn
 

Viewers also liked (9)

Lecture 1--Research Theory & Philosophy
Lecture 1--Research Theory & PhilosophyLecture 1--Research Theory & Philosophy
Lecture 1--Research Theory & Philosophy
 
Lecture 5--Research Questions II
Lecture 5--Research Questions IILecture 5--Research Questions II
Lecture 5--Research Questions II
 
Periodismo
PeriodismoPeriodismo
Periodismo
 
Lecture 6 measurement i
Lecture   6   measurement iLecture   6   measurement i
Lecture 6 measurement i
 
Lesson2 removing opportunities
Lesson2 removing opportunitiesLesson2 removing opportunities
Lesson2 removing opportunities
 
Lecture 11 survey research
Lecture   11   survey researchLecture   11   survey research
Lecture 11 survey research
 
Lecture 10 between groups designs
Lecture   10   between groups designsLecture   10   between groups designs
Lecture 10 between groups designs
 
Lecture 7 measurement ii
Lecture   7   measurement iiLecture   7   measurement ii
Lecture 7 measurement ii
 
Lecture 12 unobtrusive designs and data collection
Lecture   12   unobtrusive designs and data collectionLecture   12   unobtrusive designs and data collection
Lecture 12 unobtrusive designs and data collection
 

Similar to Lesson 4 What to do if your Identity Is Stolen

Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do listSandy Kleinhenz
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 

Similar to Lesson 4 What to do if your Identity Is Stolen (20)

Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Idt
IdtIdt
Idt
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 

Lesson 4 What to do if your Identity Is Stolen

  • 1. Information Security Lesson 4 What to do if your identity Is stolen
  • 2. Close compromised accounts Call the security or fraud department Of each company – close the account Follow up the request in writing – send supporting documents Send all correspondence to your companies by certified mail with return receipt
  • 3. Set Fraud Alerts What is a fraud alert? Helps prevent an identity thief from opening any more accounts in your name Two types: Initial – 90 days Fraudulent accounts, credit card theft Extended – 7 years Child id theft, criminal activity
  • 4. Set Fraud Alerts Consumer reporting companies 1-800-680-7289 www.transunion.com 1-888-experian (397-3742) www.experian.com 1-800-525-6285 www.equifax.com
  • 5.
  • 6.
  • 7. Contact the authorities local authorities Federal bureau Of investigation www.fbi.gov Federal trade Commission www.ftc.gov
  • 8. File a complaint with FTC Step 1: go to the official fTC Identity theft website http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/filing-a-report.html Step 2: click on the link to file a complaint
  • 9. File a complaint with FTC Step 3: fill out the complaint form (follow the prompts)
  • 10. File an Identity theft report with the Police 1. Call the police department and let them know you identity has been stolen (follow their instructions) 2. If possible attach a copy of your fTC ID theft complaint 3. When finished Ask for a copy of the police report 4. Keep all records in a safe and memorable place
  • 11. File a report with the FBI Go to the fbi website and find a local field office http://www.fbi.gov/contact-us/field
  • 12.
  • 13.
  • 14. contact local authorities, including the ftc
  • 15.
  • 16. Identity theft wrap -up Detecting identity theft Removing potential identity theft opportunities Protecting information on your computer What to do if your identity is stolen Don’t be worried, but be alert!