SlideShare a Scribd company logo
1 of 50
ID THEFT PREVENTION
AND ID THEFT INSURANCE
PAT CROW
KEEPMYID.ORG
pat@keepmyID.org
www.keepmyID.org
1-800-664-5936
IDENTITY THEFT AND
INSURANCE
• (1) THE PROBLEM:
WHY IS THIS A CONCERN?
• (2) HOW DOES IT AFFECT ME?
• (3) CURRENT CLIMATE: A GROWING CONCERN
CORPORATE AMERICA…THE WAVE
BEGINS
THE PROBLEM
• THOSE WHO DO NOT STUDY HISTORY…ARE
DOOMED TO REPEAT IT.
• WE ARE REPEATING IT….
THE PROBLEM
• HISTORY OF ID THEFT
THE PROBLEM
SPREADING LIKE A VIRUS
• FBI, US Postal, Secret Service, FTC all agree:
“ID Theft Is The Fastest Growing Crime In The
United States.”
THE PROBLEM
• 2011: 11.6 Million Victims
• 2012: 12.6 Million Victims
• 2013: 13.1 Million Victims
 Your Chances: 1 in 3 every year.
 Your Average Cost If Victimized: $3,000.
 Each victim will spend (on average): 331 HOURS trying to
correct the problems.
• Note: You will still have problems on your credit 71% of the time
 1.152 Million Arrest Warrants were issued for the wrong
people due to ID theft in just one year.
ID Theft:
FBI STATISTICS
• Do you have automobile insurance?
• 1 in 88 chance of an automobile accident
• Do you have a homeowner’s policy for fire?
• 1 in 728 chance of a house fire
• Do you have Identity (ID) Theft insurance?
• 1 in 3 chance of becoming an ID theft victim
ID Theft:
It Won’t Happen To Me!
2013 VICTIMS:
•The Chief Justice of the Supreme Court
•The First Lady
•The Vice President
•Beyonce
•Mark Cuban
•Think You Are Better Protected Than Them?
ID Theft:
It Won’t Happen To Me!
THE OTHER HALF OF ID THEFT
• FINANCIAL ID THEFT = 51% OF ID
THEFT
• WHAT ELSE???
• THE OTHER 49% OF ID THEFT:
– TAX
– MEDICAL
– EMPLOYMENT
– BENEFITS
– CHILD/ELDERLY
– CRIMINAL
– FAMILY FRAUD
WHAT ELSE: TAX ID THEFT
• SOMEONE FILES A TAX RETURN IN
YOUR NAME
• TAX ID THEFT HAS TRIPLED
• > 938,000 FALSE TAX RETURNS IN 2012
• OVER 1 MILLION EXPECTED THIS YEAR
WHAT ELSE: MEDICAL ID
THEFT
• A PERSON GETS A MEDICAL
PROCEDURE/SURGERY IN YOUR NAME
• MEDICAL ID THEFT: UP 24%
• PROBLEMS: MEDICAL CHART ERRORS
WHAT ELSE: MEDICAL ID
THEFT
• The Michael Weatherford Case: Kenneth
Marshall took his DL
• Used the stolen DL to obtain medical
treatment by identifying himself as
Weatherford
• > $345,000 at Ohio State Wexner Medical
WHAT ELSE: EMPLOYMENT
FRAUD
• Someone gets a job in your name
• Illegal aliens, felons, people with bad credit
• Why you ask….
Common Examples
• Open New Credit Cards
• Obtain Vehicle Loans
• Open New Checking/Savings Accounts
• Lease Apartments, Vehicles, or Equip.
• Obtain Mortgages
• Employment-IRS/SSA
• Telephone, Cable, and Electric service
WHAT ELSE: BENEFITS FRAUD
• Social Security fraud
• Benefits fraud
WHAT ELSE: CHILD ID THEFT/
ELDERLY ID THEFT
• 35x MORE LIKELY NOW
• THE PERFECT VICTIM – They never check
their credit.
CHILD ID THEFT EXAMPLE
• Olivia McNamara: ID stolen at 9 YOA
• Freshman Year: $1.5 million in fraudulent
debt.
• 42 fraudulent accounts opened in her name
WHAT ELSE: CRIMINAL
LIABILITY
• Thieves will get arrested in your name.
• Over 1 Million warrants issued for the wrong
people every year due to ID Theft.
WHAT ELSE: CRIMINAL
LIABILITY
• “Stancy Nesby of Oakland has been arrested,
jailed or detained 11 times in 15 months, all
because of bogus bench warrants issued in San
Francisco….” by Michael Maloney / San
Francisco Chronicle
WHAT ELSE: FAMILY FRAUD
• “My credit is terrible…let’s use Junior’s”
• ID Analytic Study:
– In 2011: > 500,000 children under 18 years of age
had their ID stolen by their parents.
WHAT ELSE: FAMILY FRAUD
• 2011: > 2 million elderly parents were
victimized by their adult children.
• Compared to the last three years, this crime is
up by 47%.
WHO YA GONNA CALL:
Help Police!!
• The Identity Theft Statute became law in Texas on September
1, 1999
• A person commits an offense if the person obtains, possesses,
transfers, or uses identifying information of another person
without the other person’s consent and with intent to harm or
defraud another.
Help Police!!
• THE ENTIRE ID THEFT UNIT FOR ALL OF DALLAS…..
Help Police!!
Help Police!!
•One person!
•CONCLUSION:
•You are on your own!
WHO YA GONNA CALL?
• THE CREDIT CARD COMPANY WILL
PROTECT ME….
• They ONLY cover their account…that is it.
• A credit card in kindergarten: Priceless
• Sun-Times News Group
CLIFFORD HAS ID STOLEN
BUT I’M REALLY CAREFUL
• I PROTECT MY INFORMATION
• I CROSS SHRED
• I LOCK UP MY SS CARD
THEY HAVE YOUR
INFORMATION
• YES YOU, READING THIS RIGHT NOW
• 5 MINUTE CHALLENGE: Anyone who
knows where to look can find your SS#,
DOB, and address in under 5 minutes on the
Internet.
• Write me at brandon@keepmyid.org
anytime and put me to the test.
WHY IS IT SO RAMPANT?
• WHY??? IT’S EASY!
• Death Master File
• Lexis/Nexis
• Spokeo.com
• Public Mortgage Documents
• Deed Records
• And dozens of others…
WHY IS IT SO RAMPANT?
WHY IS IT SO RAMPANT?
• “…if you know where to look; SSNs can be
bought in bulk for $1 each on private online
forums, and a specific person’s SSN can
reportedly be had for as little as $3.80.”
– Adrianne Jeffries from The Verge
DO THEY GET CAUGHT?
• WE STILL CATCH THE DUMB ONES…
Altered Check (A little greedy?)
Check the math?
Fake ID
ALMOST ALL ID THIEVES GET AWAY WITH IT.
• POLICE
• CREDIT CARD COMPANIES
• FTC
• IRS
• FBI
• POSTAL
• LITTLE TO NO SUPPORT
AN UNFORTUNATE TRUTH
RELYING ON GOVERNMENT AGENCIES IS
USELESS.
YOU MUST GET YOUR OWN
COVERAGE.
FORTUNE MAGAZINE 2013: “…a standard employee
benefit”
CORPORATE AMERICA: THE WAVE
BEGINS
• Today more than 300 companies,
including T-Mobile, Ford, Toyota, and
Google offer ID theft protection as an
employee benefit.
By Dinah Eng@FortuneMagazine
June 13, 2013
THE WAVE BEGINS
WHY DO THEY CARE?
•#1 – Lost productivity. 1/3 of their
workforce will get victimized x 331 hours.
•#2 – Nice Employee (and Family) Benefit.
Helps Rankings.
Corporate America
• #3 – Liability!
• “The potential for data breach liability is
a financial risk that many companies and
public entities are just beginning to
recognize and address. Unfortunately, for
too many, the significant financial liability
they can incur becomes apparent only
when it is too late.”
– FMG Law.
IF YOU COLLECT IT…YOU MUST PROTECT IT.
• VERDICTS ALL OVER THE COUNTRY
• 2005: $275,000 against Michigan Union
• Michigan Court of Appeals became the first
appellate court to allow the victims of identity
theft to recover damages (totaling $275,000) from
an organization that failed to adequately safeguard
personal information that was subsequently used
for identity theft.
CURRENT CLIMATE: A GROWING
CONCERN
IF YOU COLLECT IT…YOU MUST PROTECT IT.
• $18.58 MILLION VERDICT 2013: Equifax
• See:
http://gigaom.com/2009/12/30/rockyou-sued-over-user-data-breach
CURRENT CLIMATE: A GROWING
CONCERN
•WHO ARE THEY GOING TO LOOK
TO….
•TARGET…NEIMANS…
MICHAELS…AND ON AND ON
•HAVE YOU GOT AN ANSWER
FOR THEM?
CURRENT CLIMATE: A GROWING
CONCERN
1. BLOCK ID THEFT
“Credit Monitoring” = RUN!
2. COVER ALL ID THEFT
51% = Financial
49% = Tax, Criminal, Employment, Benefits,
Child/Elderly, and Medical
3. THERE IS NO 100% PROTECTION SO…
GET 100% RECOVERY SERVICES: GET A TEAM
TO DO THE WORK
THE SOLUTION
Patrick Crow
1-800-664-5936
Email: pat@keepmyID.org
 
 

More Related Content

Viewers also liked

Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
16 estrategias director ponal
16 estrategias director ponal16 estrategias director ponal
16 estrategias director ponalcolegionusefa
 
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL Ministerio TIC Colombia
 
Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...
Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...
Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...Ministerio TIC Colombia
 
Estrategia contra el hurto de celulares policía nacional
Estrategia contra el hurto de celulares policía nacional Estrategia contra el hurto de celulares policía nacional
Estrategia contra el hurto de celulares policía nacional Ministerio TIC Colombia
 

Viewers also liked (6)

Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
Handset Theft - A Case Study
Handset Theft  - A Case StudyHandset Theft  - A Case Study
Handset Theft - A Case Study
 
16 estrategias director ponal
16 estrategias director ponal16 estrategias director ponal
16 estrategias director ponal
 
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
 
Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...
Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...
Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...
 
Estrategia contra el hurto de celulares policía nacional
Estrategia contra el hurto de celulares policía nacional Estrategia contra el hurto de celulares policía nacional
Estrategia contra el hurto de celulares policía nacional
 

Similar to Identity theft protection company keepmy id.org

Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect youIdentity Theft Protection
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Medical Identity Theft
Medical Identity TheftMedical Identity Theft
Medical Identity TheftTrasie Phan
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity TheftIDT911
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 

Similar to Identity theft protection company keepmy id.org (20)

ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Medical Identity Theft
Medical Identity TheftMedical Identity Theft
Medical Identity Theft
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
Idt workshop group benefits
Idt workshop group benefitsIdt workshop group benefits
Idt workshop group benefits
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 

Recently uploaded

一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 

Recently uploaded (20)

一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 

Identity theft protection company keepmy id.org

  • 1. ID THEFT PREVENTION AND ID THEFT INSURANCE PAT CROW KEEPMYID.ORG pat@keepmyID.org www.keepmyID.org 1-800-664-5936
  • 2. IDENTITY THEFT AND INSURANCE • (1) THE PROBLEM: WHY IS THIS A CONCERN? • (2) HOW DOES IT AFFECT ME? • (3) CURRENT CLIMATE: A GROWING CONCERN CORPORATE AMERICA…THE WAVE BEGINS
  • 3. THE PROBLEM • THOSE WHO DO NOT STUDY HISTORY…ARE DOOMED TO REPEAT IT. • WE ARE REPEATING IT….
  • 5. THE PROBLEM SPREADING LIKE A VIRUS • FBI, US Postal, Secret Service, FTC all agree: “ID Theft Is The Fastest Growing Crime In The United States.”
  • 6. THE PROBLEM • 2011: 11.6 Million Victims • 2012: 12.6 Million Victims • 2013: 13.1 Million Victims
  • 7.  Your Chances: 1 in 3 every year.  Your Average Cost If Victimized: $3,000.  Each victim will spend (on average): 331 HOURS trying to correct the problems. • Note: You will still have problems on your credit 71% of the time  1.152 Million Arrest Warrants were issued for the wrong people due to ID theft in just one year. ID Theft: FBI STATISTICS
  • 8. • Do you have automobile insurance? • 1 in 88 chance of an automobile accident • Do you have a homeowner’s policy for fire? • 1 in 728 chance of a house fire • Do you have Identity (ID) Theft insurance? • 1 in 3 chance of becoming an ID theft victim ID Theft: It Won’t Happen To Me!
  • 9. 2013 VICTIMS: •The Chief Justice of the Supreme Court •The First Lady •The Vice President •Beyonce •Mark Cuban •Think You Are Better Protected Than Them? ID Theft: It Won’t Happen To Me!
  • 10. THE OTHER HALF OF ID THEFT • FINANCIAL ID THEFT = 51% OF ID THEFT • WHAT ELSE??? • THE OTHER 49% OF ID THEFT: – TAX – MEDICAL – EMPLOYMENT – BENEFITS – CHILD/ELDERLY – CRIMINAL – FAMILY FRAUD
  • 11. WHAT ELSE: TAX ID THEFT • SOMEONE FILES A TAX RETURN IN YOUR NAME • TAX ID THEFT HAS TRIPLED • > 938,000 FALSE TAX RETURNS IN 2012 • OVER 1 MILLION EXPECTED THIS YEAR
  • 12. WHAT ELSE: MEDICAL ID THEFT • A PERSON GETS A MEDICAL PROCEDURE/SURGERY IN YOUR NAME • MEDICAL ID THEFT: UP 24% • PROBLEMS: MEDICAL CHART ERRORS
  • 13. WHAT ELSE: MEDICAL ID THEFT • The Michael Weatherford Case: Kenneth Marshall took his DL • Used the stolen DL to obtain medical treatment by identifying himself as Weatherford • > $345,000 at Ohio State Wexner Medical
  • 14. WHAT ELSE: EMPLOYMENT FRAUD • Someone gets a job in your name • Illegal aliens, felons, people with bad credit • Why you ask….
  • 15. Common Examples • Open New Credit Cards • Obtain Vehicle Loans • Open New Checking/Savings Accounts • Lease Apartments, Vehicles, or Equip. • Obtain Mortgages • Employment-IRS/SSA • Telephone, Cable, and Electric service
  • 16. WHAT ELSE: BENEFITS FRAUD • Social Security fraud • Benefits fraud
  • 17. WHAT ELSE: CHILD ID THEFT/ ELDERLY ID THEFT • 35x MORE LIKELY NOW • THE PERFECT VICTIM – They never check their credit.
  • 18. CHILD ID THEFT EXAMPLE • Olivia McNamara: ID stolen at 9 YOA • Freshman Year: $1.5 million in fraudulent debt. • 42 fraudulent accounts opened in her name
  • 19. WHAT ELSE: CRIMINAL LIABILITY • Thieves will get arrested in your name. • Over 1 Million warrants issued for the wrong people every year due to ID Theft.
  • 20. WHAT ELSE: CRIMINAL LIABILITY • “Stancy Nesby of Oakland has been arrested, jailed or detained 11 times in 15 months, all because of bogus bench warrants issued in San Francisco….” by Michael Maloney / San Francisco Chronicle
  • 21. WHAT ELSE: FAMILY FRAUD • “My credit is terrible…let’s use Junior’s” • ID Analytic Study: – In 2011: > 500,000 children under 18 years of age had their ID stolen by their parents.
  • 22. WHAT ELSE: FAMILY FRAUD • 2011: > 2 million elderly parents were victimized by their adult children. • Compared to the last three years, this crime is up by 47%.
  • 23. WHO YA GONNA CALL: Help Police!! • The Identity Theft Statute became law in Texas on September 1, 1999 • A person commits an offense if the person obtains, possesses, transfers, or uses identifying information of another person without the other person’s consent and with intent to harm or defraud another.
  • 24. Help Police!! • THE ENTIRE ID THEFT UNIT FOR ALL OF DALLAS…..
  • 27. WHO YA GONNA CALL? • THE CREDIT CARD COMPANY WILL PROTECT ME…. • They ONLY cover their account…that is it.
  • 28. • A credit card in kindergarten: Priceless • Sun-Times News Group
  • 29. CLIFFORD HAS ID STOLEN
  • 30. BUT I’M REALLY CAREFUL • I PROTECT MY INFORMATION • I CROSS SHRED • I LOCK UP MY SS CARD
  • 31. THEY HAVE YOUR INFORMATION • YES YOU, READING THIS RIGHT NOW • 5 MINUTE CHALLENGE: Anyone who knows where to look can find your SS#, DOB, and address in under 5 minutes on the Internet. • Write me at brandon@keepmyid.org anytime and put me to the test.
  • 32. WHY IS IT SO RAMPANT? • WHY??? IT’S EASY! • Death Master File • Lexis/Nexis • Spokeo.com • Public Mortgage Documents • Deed Records • And dozens of others…
  • 33. WHY IS IT SO RAMPANT?
  • 34. WHY IS IT SO RAMPANT? • “…if you know where to look; SSNs can be bought in bulk for $1 each on private online forums, and a specific person’s SSN can reportedly be had for as little as $3.80.” – Adrianne Jeffries from The Verge
  • 35. DO THEY GET CAUGHT? • WE STILL CATCH THE DUMB ONES…
  • 36. Altered Check (A little greedy?)
  • 39. ALMOST ALL ID THIEVES GET AWAY WITH IT. • POLICE • CREDIT CARD COMPANIES • FTC • IRS • FBI • POSTAL • LITTLE TO NO SUPPORT AN UNFORTUNATE TRUTH
  • 40. RELYING ON GOVERNMENT AGENCIES IS USELESS. YOU MUST GET YOUR OWN COVERAGE.
  • 41. FORTUNE MAGAZINE 2013: “…a standard employee benefit” CORPORATE AMERICA: THE WAVE BEGINS
  • 42. • Today more than 300 companies, including T-Mobile, Ford, Toyota, and Google offer ID theft protection as an employee benefit. By Dinah Eng@FortuneMagazine June 13, 2013 THE WAVE BEGINS
  • 43. WHY DO THEY CARE? •#1 – Lost productivity. 1/3 of their workforce will get victimized x 331 hours. •#2 – Nice Employee (and Family) Benefit. Helps Rankings. Corporate America
  • 44. • #3 – Liability! • “The potential for data breach liability is a financial risk that many companies and public entities are just beginning to recognize and address. Unfortunately, for too many, the significant financial liability they can incur becomes apparent only when it is too late.” – FMG Law.
  • 45. IF YOU COLLECT IT…YOU MUST PROTECT IT. • VERDICTS ALL OVER THE COUNTRY • 2005: $275,000 against Michigan Union • Michigan Court of Appeals became the first appellate court to allow the victims of identity theft to recover damages (totaling $275,000) from an organization that failed to adequately safeguard personal information that was subsequently used for identity theft. CURRENT CLIMATE: A GROWING CONCERN
  • 46. IF YOU COLLECT IT…YOU MUST PROTECT IT. • $18.58 MILLION VERDICT 2013: Equifax • See: http://gigaom.com/2009/12/30/rockyou-sued-over-user-data-breach CURRENT CLIMATE: A GROWING CONCERN
  • 47. •WHO ARE THEY GOING TO LOOK TO…. •TARGET…NEIMANS… MICHAELS…AND ON AND ON •HAVE YOU GOT AN ANSWER FOR THEM? CURRENT CLIMATE: A GROWING CONCERN
  • 48. 1. BLOCK ID THEFT “Credit Monitoring” = RUN! 2. COVER ALL ID THEFT 51% = Financial 49% = Tax, Criminal, Employment, Benefits, Child/Elderly, and Medical 3. THERE IS NO 100% PROTECTION SO… GET 100% RECOVERY SERVICES: GET A TEAM TO DO THE WORK THE SOLUTION
  • 50.    

Editor's Notes

  1. Business Can not have their Identity Stolen (Other offense)
  2. Business Can not have their Identity Stolen (Other offense)
  3. Business Can not have their Identity Stolen (Other offense)
  4. Business Can not have their Identity Stolen (Other offense)
  5. Business Can not have their Identity Stolen (Other offense)
  6. Business Can not have their Identity Stolen (Other offense)
  7. Business Can not have their Identity Stolen (Other offense)
  8. Car Dealerships/Auto Loans-Texas DL Electric/Phone- Not the resident( Bad Credit or Illegal Immigrant)
  9. Business Can not have their Identity Stolen (Other offense)
  10. Business Can not have their Identity Stolen (Other offense)
  11. Business Can not have their Identity Stolen (Other offense)
  12. Business Can not have their Identity Stolen (Other offense)
  13. Business Can not have their Identity Stolen (Other offense)
  14. Business Can not have their Identity Stolen (Other offense)
  15. Business Can not have their Identity Stolen (Other offense)
  16. Business Can not have their Identity Stolen (Other offense)
  17. Business Can not have their Identity Stolen (Other offense)
  18. Business Can not have their Identity Stolen (Other offense)
  19. Business Can not have their Identity Stolen (Other offense)