SlideShare une entreprise Scribd logo
1  sur  20
CHRISTY HOROWITZ & SANFORD HOROWITZCHRISTY HOROWITZ & SANFORD HOROWITZ
ATTORNEYS AT LAWATTORNEYS AT LAW
HOROWITZ LAWHOROWITZ LAW
1032 SANTA BARBARA STREET1032 SANTA BARBARA STREET
SANTA BANTA BARBARA, CA 93101SANTA BANTA BARBARA, CA 93101
(805) 452-7214(805) 452-7214
CHRIS@HOROWITZFORLAW.COMCHRIS@HOROWITZFORLAW.COM
SANDY@HOROWITZFORLAW.COMSANDY@HOROWITZFORLAW.COM
WWW.HOROWITZFORLAW.COMWWW.HOROWITZFORLAW.COM
Protecting Against Identity Theft
What is Identity Theft?
 Identity theft occurs when someone
represents that he/she is you…
 by using your personal information;
 Obtained without your consent; and
 Does so for either fraudulent or other unlawful,
improper purpose.
What is Identity Theft?
 In an "account takeover," the person gains
access to an existing, legitimate account using
your personal information.
 Someone who uses your personal information
to avoid prosecution commits "criminal"
identity theft.
Where do they get your personal
information?
 Although computer "hacking" gets the biggest
headlines, mail theft, dumpster diving, and
theft of company records by employees
continue to be the most common ways of
obtaining personal information.
 Obtaining personal information such as:
passwords, social security numbers, birth
certificates, and taxes.
Fraudulent Tax ReturnsFraudulent Tax Returns
 During tax season, identity theft is mostDuring tax season, identity theft is most
common in fraudulent tax returns.common in fraudulent tax returns.
 In this manner, identity theft occurs through aIn this manner, identity theft occurs through a
stolen social security numberstolen social security number that is filed on a taxthat is filed on a tax
return claiming areturn claiming a fraudulent refundfraudulent refund..
 Protect your personal information upon receivingProtect your personal information upon receiving
tax advice while viewing e-mails or receivingtax advice while viewing e-mails or receiving
telephone calls.telephone calls.
 Give your social security number only when it isGive your social security number only when it is
required.required.
What laws are used to prosecute
cases of Identity Theft?
 In California, Penal Code section 530.5, Using
Personal Information of Another, is perhaps
the most common law charged in connection
with Identity Theft.
 It can be charged as a misdemeanor or a felony.
 Punishments include a fine, jail time not
exceeding one year (misdemeanor), or up to 3
years in county jail (felony).
What laws are used to prosecute
cases of Identity Theft?
 It is commonly charged in
conjunction with other
charges including grand theft,
credit card fraud, perjury, and
burglary statutes.
 PC 487, Grand Theft
 PC 484f(e), Access Card Fraud
 PC 459, Burglary
What should I do if I am a victim
of Identity Theft?
 Be sure to report the crime to your local law
enforcement agency and obtain a copy of the
police report.
 Contact the three major credit reporting
companies.
 Ask them to place a fraud alert on your credit
report and to indicate on your reports…
 "My ID has been used to apply for credit fraudulently.
Contact me at [telephone number] to verify all
applications."
What should I do if I am a victim
of Identity Theft?
 Ask the credit bureaus to remove inquiries
generated due to the fraudulent accounts and
to remove the items that are due to the
criminal activity of the identity thief.
 Ask the IRS to issue an Identity Protection PINs
(IP PINs).
 These pins are assigned annually to victims of
identity theft for unresolved cases when filing
their federal tax return.
What should I do if I am a victim
of Identity Theft?
 Here’s where to write or call:
 Equifax, P.O. Box 740241, Atlanta, GA 30374, 1-
888-766-0008
 Experian, P.O. Box 2104, Allen, TX 75013, 1-888-
397-3742
 TransUnion, P.O. Box 6790, Fullerton, CA 92834,
1-800-680-7289
Protect Yourself from Identity
Theft
Protect Yourself from Identity
Theft
 The safest way to protect yourself from being a
victim of identity theft is to shred papers
containing your personal information before
throwing it way in the trash.
 Ask your credit cards to freeze your accounts
when any suspicious activity arises.
 Let your banks know in advance of any new
business or loans.
Protect yourself from IdentityProtect yourself from Identity
TheftTheft
 Limit access to your accountsLimit access to your accounts
 Change passwords and logins monthlyChange passwords and logins monthly
 Check your accounts regularlyCheck your accounts regularly
 Monitor your credit reportsMonitor your credit reports
Protect yourself from IdentityProtect yourself from Identity
TheftTheft
 Pay for online purchases with a credit cardPay for online purchases with a credit card
rather than a debit cardrather than a debit card
 Be alert for “phishing,”Be alert for “phishing,”
 Never give out personal information over theNever give out personal information over the
phone, emails, and on unsecure websitesphone, emails, and on unsecure websites
Protect yourself from IdentityProtect yourself from Identity
TheftTheft
 A thief's effort toA thief's effort to
steal Rep. Jimsteal Rep. Jim
Renacci's identityRenacci's identity
to secure ato secure a
fraudulent IRSfraudulent IRS
refund hasrefund has
prompted Renacciprompted Renacci
to introduceto introduce
legislation tolegislation to
combat identitycombat identity
theft at IRS.theft at IRS.
Protect yourself from IdentityProtect yourself from Identity
TheftTheft
 A criminal's effort toA criminal's effort to
impersonate Rep. Jimimpersonate Rep. Jim
Renacci and file aRenacci and file a
bogus tax return in hisbogus tax return in his
name has promptedname has prompted
the Wadsworththe Wadsworth
Republican toRepublican to
introduce Internalintroduce Internal
Revenue ServiceRevenue Service
reforms to thwartreforms to thwart
identity theft.identity theft.
Protect yourself from IdentityProtect yourself from Identity
TheftTheft
 The fake return boreThe fake return bore
Renacci's and hisRenacci's and his
wife's actual Socialwife's actual Social
Security numbers andSecurity numbers and
a dummied-up W2a dummied-up W2
form for hisform for his
congressional income.congressional income.
Now, as the IRS investigates, Renacci is focusing on reforms to prevent
future fraud. "Last year, 52,000 Ohioans were victims of identity theft in all
forms," says Renacci.
Resources
 https://www.identitytheft.gov/https://www.identitytheft.gov/
 Wall Street Journal,Wall Street Journal, Identity Theft & CreditIdentity Theft & Credit
Card Fraud- How to Protect Yourself.Card Fraud- How to Protect Yourself.
 IRS,IRS, Identity Theft a Major Concern on the IRSIdentity Theft a Major Concern on the IRS
Annual “Dirty Dozen” List of Tax Scams toAnnual “Dirty Dozen” List of Tax Scams to
Avoid.Avoid.
CHRISTY HOROWITZ & SANFORD HOROWITZCHRISTY HOROWITZ & SANFORD HOROWITZ
ATTORNEYS AT LAWATTORNEYS AT LAW
HOROWITZ LAWHOROWITZ LAW
1032 SANTA BARBARA STREET1032 SANTA BARBARA STREET
SANTA BANTA BARBARA, CA 93101SANTA BANTA BARBARA, CA 93101
(805) 452-7214(805) 452-7214
CHRIS@HOROWITZFORLAW.COMCHRIS@HOROWITZFORLAW.COM
SANDY@HOROWITZFORLAW.COMSANDY@HOROWITZFORLAW.COM
WWW.HOROWITZFORLAW.COMWWW.HOROWITZFORLAW.COM
Protecting Against Identity Theft

Contenu connexe

Tendances

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 

Tendances (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
 
Identity Theft Investigator Training
Identity Theft Investigator TrainingIdentity Theft Investigator Training
Identity Theft Investigator Training
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Victim of tax refund fraud? Here's what to do
Victim of tax refund fraud? Here's what to doVictim of tax refund fraud? Here's what to do
Victim of tax refund fraud? Here's what to do
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Civil RICO - Racketeer Influenced and Corruption Organizations Act
Civil RICO - Racketeer Influenced and Corruption Organizations ActCivil RICO - Racketeer Influenced and Corruption Organizations Act
Civil RICO - Racketeer Influenced and Corruption Organizations Act
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 

Similaire à Identity theft- Horowitz Law

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Randall Chesnutt
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 
Scams 0710
Scams 0710Scams 0710
Scams 0710
KEIRO2
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
Lisa Sosebee
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft business
Matt Smith
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
jwnollet
 

Similaire à Identity theft- Horowitz Law (19)

Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Scams 0710
Scams 0710Scams 0710
Scams 0710
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
Ten things to know about identity theft
Ten things to know about identity theftTen things to know about identity theft
Ten things to know about identity theft
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft business
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Advice iq safeguards against id theft
Advice iq safeguards against id theftAdvice iq safeguards against id theft
Advice iq safeguards against id theft
 

Plus de Sanford Horowitz

Plus de Sanford Horowitz (8)

Information for witnesses in criminal cases
Information for witnesses in criminal casesInformation for witnesses in criminal cases
Information for witnesses in criminal cases
 
Child and spousal support
Child and spousal supportChild and spousal support
Child and spousal support
 
Protecting Our Schools Against Cyber Crime
Protecting Our Schools Against Cyber CrimeProtecting Our Schools Against Cyber Crime
Protecting Our Schools Against Cyber Crime
 
Investigation & Prosecution of Domestic Violence
Investigation & Prosecution of Domestic ViolenceInvestigation & Prosecution of Domestic Violence
Investigation & Prosecution of Domestic Violence
 
Investigation and Prosecution of Hate Crimes
Investigation and Prosecution of Hate CrimesInvestigation and Prosecution of Hate Crimes
Investigation and Prosecution of Hate Crimes
 
Famous Santa Barbara Criminal Cases- Horowitz For Law
Famous Santa Barbara Criminal Cases- Horowitz For LawFamous Santa Barbara Criminal Cases- Horowitz For Law
Famous Santa Barbara Criminal Cases- Horowitz For Law
 
Horowitz Law- The Anatomy Of A DUI Investigation
Horowitz Law- The Anatomy Of A DUI InvestigationHorowitz Law- The Anatomy Of A DUI Investigation
Horowitz Law- The Anatomy Of A DUI Investigation
 
Divorce, Child Support, Rape? An Introduction to California Courts
Divorce, Child Support, Rape? An Introduction to California CourtsDivorce, Child Support, Rape? An Introduction to California Courts
Divorce, Child Support, Rape? An Introduction to California Courts
 

Dernier

Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
PoojaGadiya1
 

Dernier (20)

Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 

Identity theft- Horowitz Law

  • 1. CHRISTY HOROWITZ & SANFORD HOROWITZCHRISTY HOROWITZ & SANFORD HOROWITZ ATTORNEYS AT LAWATTORNEYS AT LAW HOROWITZ LAWHOROWITZ LAW 1032 SANTA BARBARA STREET1032 SANTA BARBARA STREET SANTA BANTA BARBARA, CA 93101SANTA BANTA BARBARA, CA 93101 (805) 452-7214(805) 452-7214 CHRIS@HOROWITZFORLAW.COMCHRIS@HOROWITZFORLAW.COM SANDY@HOROWITZFORLAW.COMSANDY@HOROWITZFORLAW.COM WWW.HOROWITZFORLAW.COMWWW.HOROWITZFORLAW.COM Protecting Against Identity Theft
  • 2. What is Identity Theft?  Identity theft occurs when someone represents that he/she is you…  by using your personal information;  Obtained without your consent; and  Does so for either fraudulent or other unlawful, improper purpose.
  • 3. What is Identity Theft?  In an "account takeover," the person gains access to an existing, legitimate account using your personal information.  Someone who uses your personal information to avoid prosecution commits "criminal" identity theft.
  • 4. Where do they get your personal information?  Although computer "hacking" gets the biggest headlines, mail theft, dumpster diving, and theft of company records by employees continue to be the most common ways of obtaining personal information.  Obtaining personal information such as: passwords, social security numbers, birth certificates, and taxes.
  • 5. Fraudulent Tax ReturnsFraudulent Tax Returns  During tax season, identity theft is mostDuring tax season, identity theft is most common in fraudulent tax returns.common in fraudulent tax returns.  In this manner, identity theft occurs through aIn this manner, identity theft occurs through a stolen social security numberstolen social security number that is filed on a taxthat is filed on a tax return claiming areturn claiming a fraudulent refundfraudulent refund..  Protect your personal information upon receivingProtect your personal information upon receiving tax advice while viewing e-mails or receivingtax advice while viewing e-mails or receiving telephone calls.telephone calls.  Give your social security number only when it isGive your social security number only when it is required.required.
  • 6.
  • 7. What laws are used to prosecute cases of Identity Theft?  In California, Penal Code section 530.5, Using Personal Information of Another, is perhaps the most common law charged in connection with Identity Theft.  It can be charged as a misdemeanor or a felony.  Punishments include a fine, jail time not exceeding one year (misdemeanor), or up to 3 years in county jail (felony).
  • 8. What laws are used to prosecute cases of Identity Theft?  It is commonly charged in conjunction with other charges including grand theft, credit card fraud, perjury, and burglary statutes.  PC 487, Grand Theft  PC 484f(e), Access Card Fraud  PC 459, Burglary
  • 9. What should I do if I am a victim of Identity Theft?  Be sure to report the crime to your local law enforcement agency and obtain a copy of the police report.  Contact the three major credit reporting companies.  Ask them to place a fraud alert on your credit report and to indicate on your reports…  "My ID has been used to apply for credit fraudulently. Contact me at [telephone number] to verify all applications."
  • 10. What should I do if I am a victim of Identity Theft?  Ask the credit bureaus to remove inquiries generated due to the fraudulent accounts and to remove the items that are due to the criminal activity of the identity thief.  Ask the IRS to issue an Identity Protection PINs (IP PINs).  These pins are assigned annually to victims of identity theft for unresolved cases when filing their federal tax return.
  • 11. What should I do if I am a victim of Identity Theft?  Here’s where to write or call:  Equifax, P.O. Box 740241, Atlanta, GA 30374, 1- 888-766-0008  Experian, P.O. Box 2104, Allen, TX 75013, 1-888- 397-3742  TransUnion, P.O. Box 6790, Fullerton, CA 92834, 1-800-680-7289
  • 12. Protect Yourself from Identity Theft
  • 13. Protect Yourself from Identity Theft  The safest way to protect yourself from being a victim of identity theft is to shred papers containing your personal information before throwing it way in the trash.  Ask your credit cards to freeze your accounts when any suspicious activity arises.  Let your banks know in advance of any new business or loans.
  • 14. Protect yourself from IdentityProtect yourself from Identity TheftTheft  Limit access to your accountsLimit access to your accounts  Change passwords and logins monthlyChange passwords and logins monthly  Check your accounts regularlyCheck your accounts regularly  Monitor your credit reportsMonitor your credit reports
  • 15. Protect yourself from IdentityProtect yourself from Identity TheftTheft  Pay for online purchases with a credit cardPay for online purchases with a credit card rather than a debit cardrather than a debit card  Be alert for “phishing,”Be alert for “phishing,”  Never give out personal information over theNever give out personal information over the phone, emails, and on unsecure websitesphone, emails, and on unsecure websites
  • 16. Protect yourself from IdentityProtect yourself from Identity TheftTheft  A thief's effort toA thief's effort to steal Rep. Jimsteal Rep. Jim Renacci's identityRenacci's identity to secure ato secure a fraudulent IRSfraudulent IRS refund hasrefund has prompted Renacciprompted Renacci to introduceto introduce legislation tolegislation to combat identitycombat identity theft at IRS.theft at IRS.
  • 17. Protect yourself from IdentityProtect yourself from Identity TheftTheft  A criminal's effort toA criminal's effort to impersonate Rep. Jimimpersonate Rep. Jim Renacci and file aRenacci and file a bogus tax return in hisbogus tax return in his name has promptedname has prompted the Wadsworththe Wadsworth Republican toRepublican to introduce Internalintroduce Internal Revenue ServiceRevenue Service reforms to thwartreforms to thwart identity theft.identity theft.
  • 18. Protect yourself from IdentityProtect yourself from Identity TheftTheft  The fake return boreThe fake return bore Renacci's and hisRenacci's and his wife's actual Socialwife's actual Social Security numbers andSecurity numbers and a dummied-up W2a dummied-up W2 form for hisform for his congressional income.congressional income. Now, as the IRS investigates, Renacci is focusing on reforms to prevent future fraud. "Last year, 52,000 Ohioans were victims of identity theft in all forms," says Renacci.
  • 19. Resources  https://www.identitytheft.gov/https://www.identitytheft.gov/  Wall Street Journal,Wall Street Journal, Identity Theft & CreditIdentity Theft & Credit Card Fraud- How to Protect Yourself.Card Fraud- How to Protect Yourself.  IRS,IRS, Identity Theft a Major Concern on the IRSIdentity Theft a Major Concern on the IRS Annual “Dirty Dozen” List of Tax Scams toAnnual “Dirty Dozen” List of Tax Scams to Avoid.Avoid.
  • 20. CHRISTY HOROWITZ & SANFORD HOROWITZCHRISTY HOROWITZ & SANFORD HOROWITZ ATTORNEYS AT LAWATTORNEYS AT LAW HOROWITZ LAWHOROWITZ LAW 1032 SANTA BARBARA STREET1032 SANTA BARBARA STREET SANTA BANTA BARBARA, CA 93101SANTA BANTA BARBARA, CA 93101 (805) 452-7214(805) 452-7214 CHRIS@HOROWITZFORLAW.COMCHRIS@HOROWITZFORLAW.COM SANDY@HOROWITZFORLAW.COMSANDY@HOROWITZFORLAW.COM WWW.HOROWITZFORLAW.COMWWW.HOROWITZFORLAW.COM Protecting Against Identity Theft