SlideShare une entreprise Scribd logo
1  sur  26
1
Identity Theft:
What You Need to Know
2
What is Identity Theft?
3
Assess Your Identity Theft Risk
Answer the 20 questions
Total your score
What are your greatest risk exposures?
4
Identity Theft
Identity theft is a crime of stealing key pieces of
someone’s identifying information, such as:
name,
address,
Social Security number,
birth date, and
mother’s maiden name
5
Common Forms of Identity Theft
Credit card fraud
Communications services fraud
Bank fraud
Fraudulent loans
Internet fraud
6
How Identity Theft Occurs
Identity thieves…
steal wallets and purses containing your ID
steal your mail
complete false “change of address” forms
rummage through trash (“dumpster diving”)
pose fraudulently as someone else to get
your information
7
More Ways Identity Theft Occurs
Identity thieves…
steal business or personnel records at your
workplace.
find personal info in your home.
use info you put on the Internet.
buy personal info from “inside sources.”
“shoulder surf” at ATMs and telephones.
8
Technology Scams:
Phishing,
Fraudulent E-mails, etc.
9
Look-Alike (Fake) Web Sites
Spoof e-mail messages sent to “verify” or
“update” account info
Appears to come from reputable company
• Example: eBay, Best Buy, banks, merchants
Looks “legitimate”
Scam is called “phishing”
• Get people to disclose sensitive data
• Data used to commit identity theft
10
Red Flags of a Phishing Scam
E-mails that direct users to a Web site to
“validate” or “update” info
E-mails warning accounts will be closed
Grammatical errors and typos
References to 9-11, the Patriot Act, etc.
Return addresses at yahoo.com, juno.com
Words Like “Urgent” and “Important”
11
Steps To Avoid Phishing
Be cautious: African refugees with $10
million, suspended FDIC insurance, etc.
Realize that banks never ask for account info,
especially in an e-mail
Don’t click on any links in suspicious e-mails
Report suspicious e-mails to companies
D-E-L-E-T-E
12
Newest Scam: Medicare-
Approved Drug Discount Cards
Helpful callers or e-mails or door-to-door
fraudsters offer to help seniors get a
Medicare-approved drug discount card
Fraudsters request SS # for ID
Victims’ personal info used for:
• Identity theft crimes
• Medicare fraud crimes
13
Recommended Technology Fraud
Risk-Reduction Practices
NEVER click on unsolicited pop-up ads
Avoid putting your e-mail address on public
Web pages (can be harvested by spammers)
Don’t use “good” e-mail address in chat rooms
Avoid short addresses like “John101”
Keep virus software & patches up to date
Never forward chain letters & virus warnings
14
Interesting Fact
58% of e-mail messages in
2003 were spam
Source: Kiplinger’s Personal
Finance, March 2004
15
How Identity Thieves
Use Your Information
Change mailing addresses on credit card accounts.
Open new credit card accounts.
Establish phone or wireless service in your name.
Open new bank accounts and write bad checks.
File for bankruptcy under your name.
Counterfeit checks or debit cards.
Buy and take out car loans in your name.
16
Reducing the Risk of Identity
Theft
Destroy credit card applications, receipts,
bank, and billing statements.
Avoid giving your SSN unless it’s
absolutely necessary -- use other
identifiers.
Pay attention to billing cycles.
Guard your mail from theft.
Put passwords on credit card, bank, and
phone accounts.
17
More Ways to
Reduce the Risk of Identity Theft
Carry as little identification information as
possible.
Limit the number of credit cards you carry.
Don’t give personal identification on the phone
unless you initiate the call.
Be cautious with personal info in your home.
Check on who has access to your personal info
at work.
18
Still More Ways to
Reduce the Risk of Identity Theft
Don’t carry your SS card.
Save ATM and credit card receipts to check
against statements.
Alert family members to dangers of pretexting.
Be informed about your financial institutions’
policies of sharing information.
Make sure your credit reports are accurate.
19
How to Get Your Credit Reports
Equifax -- www.equifax.com
To order: 800-685-1111
To report fraud: 800-525-6285
Experian -- www.experian.com
To order: 888-EXPERIAN
To report fraud: 888-EXPERIAN
Trans Union -- www.tuc.com
To order: 800-916-8800
To report fraud: 800-680-7289
New Jersey residents can receive one free credit report
per year from each credit reporting agency
20
If You’re a Victim...
1. Contact the fraud departments of the three major
credit bureaus.
2. Contact creditors or financial institutions for any
accounts that have been tampered with.
3. File a report with local police or police where the
theft took place.
21
Summary
Minimize the amount of information that can be
stolen from you.
Reduce the amount of personal information
“out there.”
Add extra security protection to your account.
Identity theft is a crime that must be reported.
Act immediately to stop further use of your
identity.
22
ID Theft Study
Purpose
• To understand what actions consumers are taking to reduce
the risk of identity theft
Data collected from an online self-assessment tool
(sample bias)
20 questions; 1 (never) to 5 (always)
Higher score: more frequent use of risk reduction
practices
Data from 287 respondents in 2003
23
Web Site Address For The
Online Identity Theft Quiz
www.rce.rutgers.edu/money/identitytheft/default.asp
The online quiz provides both
personalized feedback to users and
a database for ongoing research
24
Findings
Mean scores range from 2.1 to 4.4
Three least frequently reported practices:
• Checking credit report annually from 3 bureaus
• Post office box or locked mailbox-incoming mail
• Carrying SS card or ID card with SS number
25
Checking Credit Reports
Least frequently performed risk reduction
practice (score of 2.1)
Almost a third of sample had respondents
from the six states that mandate free reports
• CO, GA, MD, MA, NJ, and VT
Two groups of respondents compared
No difference found between groups
Cost may not be a primary barrier
26
Summary
Majority of sample used many risk
reduction practices
Indication of consciousness-raising
• From government and non-profit agency info
• From media reports about identity theft
• From knowing a crime victim (1 in 50 people)
Not giving out SS and bank account # and
having mail held: most frequently done

Contenu connexe

Tendances

Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautionsquentinz52
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect youIdentity Theft Protection
 

Tendances (20)

Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
ID Theft
ID TheftID Theft
ID Theft
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 

En vedette

En vedette (6)

Final presentation fema
Final presentation femaFinal presentation fema
Final presentation fema
 
Sky Lab
Sky Lab Sky Lab
Sky Lab
 
Fitodepurazione
FitodepurazioneFitodepurazione
Fitodepurazione
 
Presentacion clase 2 trigo
Presentacion clase 2 trigoPresentacion clase 2 trigo
Presentacion clase 2 trigo
 
Autonome voertuigen
Autonome voertuigenAutonome voertuigen
Autonome voertuigen
 
Autonome voertuigen
Autonome voertuigenAutonome voertuigen
Autonome voertuigen
 

Similaire à Id theft-phishing-research

Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention- Mark - Fullbright
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca- Mark - Fullbright
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims- Mark - Fullbright
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
 

Similaire à Id theft-phishing-research (20)

Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 

Dernier

The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 
The Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfThe Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfGale Pooley
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfGale Pooley
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Pooja Nehwal
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja Nehwal
 
Indore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfIndore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfSaviRakhecha1
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 

Dernier (20)

The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
The Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfThe Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdf
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdf
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
 
Indore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfIndore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdf
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 

Id theft-phishing-research

  • 3. 3 Assess Your Identity Theft Risk Answer the 20 questions Total your score What are your greatest risk exposures?
  • 4. 4 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such as: name, address, Social Security number, birth date, and mother’s maiden name
  • 5. 5 Common Forms of Identity Theft Credit card fraud Communications services fraud Bank fraud Fraudulent loans Internet fraud
  • 6. 6 How Identity Theft Occurs Identity thieves… steal wallets and purses containing your ID steal your mail complete false “change of address” forms rummage through trash (“dumpster diving”) pose fraudulently as someone else to get your information
  • 7. 7 More Ways Identity Theft Occurs Identity thieves… steal business or personnel records at your workplace. find personal info in your home. use info you put on the Internet. buy personal info from “inside sources.” “shoulder surf” at ATMs and telephones.
  • 9. 9 Look-Alike (Fake) Web Sites Spoof e-mail messages sent to “verify” or “update” account info Appears to come from reputable company • Example: eBay, Best Buy, banks, merchants Looks “legitimate” Scam is called “phishing” • Get people to disclose sensitive data • Data used to commit identity theft
  • 10. 10 Red Flags of a Phishing Scam E-mails that direct users to a Web site to “validate” or “update” info E-mails warning accounts will be closed Grammatical errors and typos References to 9-11, the Patriot Act, etc. Return addresses at yahoo.com, juno.com Words Like “Urgent” and “Important”
  • 11. 11 Steps To Avoid Phishing Be cautious: African refugees with $10 million, suspended FDIC insurance, etc. Realize that banks never ask for account info, especially in an e-mail Don’t click on any links in suspicious e-mails Report suspicious e-mails to companies D-E-L-E-T-E
  • 12. 12 Newest Scam: Medicare- Approved Drug Discount Cards Helpful callers or e-mails or door-to-door fraudsters offer to help seniors get a Medicare-approved drug discount card Fraudsters request SS # for ID Victims’ personal info used for: • Identity theft crimes • Medicare fraud crimes
  • 13. 13 Recommended Technology Fraud Risk-Reduction Practices NEVER click on unsolicited pop-up ads Avoid putting your e-mail address on public Web pages (can be harvested by spammers) Don’t use “good” e-mail address in chat rooms Avoid short addresses like “John101” Keep virus software & patches up to date Never forward chain letters & virus warnings
  • 14. 14 Interesting Fact 58% of e-mail messages in 2003 were spam Source: Kiplinger’s Personal Finance, March 2004
  • 15. 15 How Identity Thieves Use Your Information Change mailing addresses on credit card accounts. Open new credit card accounts. Establish phone or wireless service in your name. Open new bank accounts and write bad checks. File for bankruptcy under your name. Counterfeit checks or debit cards. Buy and take out car loans in your name.
  • 16. 16 Reducing the Risk of Identity Theft Destroy credit card applications, receipts, bank, and billing statements. Avoid giving your SSN unless it’s absolutely necessary -- use other identifiers. Pay attention to billing cycles. Guard your mail from theft. Put passwords on credit card, bank, and phone accounts.
  • 17. 17 More Ways to Reduce the Risk of Identity Theft Carry as little identification information as possible. Limit the number of credit cards you carry. Don’t give personal identification on the phone unless you initiate the call. Be cautious with personal info in your home. Check on who has access to your personal info at work.
  • 18. 18 Still More Ways to Reduce the Risk of Identity Theft Don’t carry your SS card. Save ATM and credit card receipts to check against statements. Alert family members to dangers of pretexting. Be informed about your financial institutions’ policies of sharing information. Make sure your credit reports are accurate.
  • 19. 19 How to Get Your Credit Reports Equifax -- www.equifax.com To order: 800-685-1111 To report fraud: 800-525-6285 Experian -- www.experian.com To order: 888-EXPERIAN To report fraud: 888-EXPERIAN Trans Union -- www.tuc.com To order: 800-916-8800 To report fraud: 800-680-7289 New Jersey residents can receive one free credit report per year from each credit reporting agency
  • 20. 20 If You’re a Victim... 1. Contact the fraud departments of the three major credit bureaus. 2. Contact creditors or financial institutions for any accounts that have been tampered with. 3. File a report with local police or police where the theft took place.
  • 21. 21 Summary Minimize the amount of information that can be stolen from you. Reduce the amount of personal information “out there.” Add extra security protection to your account. Identity theft is a crime that must be reported. Act immediately to stop further use of your identity.
  • 22. 22 ID Theft Study Purpose • To understand what actions consumers are taking to reduce the risk of identity theft Data collected from an online self-assessment tool (sample bias) 20 questions; 1 (never) to 5 (always) Higher score: more frequent use of risk reduction practices Data from 287 respondents in 2003
  • 23. 23 Web Site Address For The Online Identity Theft Quiz www.rce.rutgers.edu/money/identitytheft/default.asp The online quiz provides both personalized feedback to users and a database for ongoing research
  • 24. 24 Findings Mean scores range from 2.1 to 4.4 Three least frequently reported practices: • Checking credit report annually from 3 bureaus • Post office box or locked mailbox-incoming mail • Carrying SS card or ID card with SS number
  • 25. 25 Checking Credit Reports Least frequently performed risk reduction practice (score of 2.1) Almost a third of sample had respondents from the six states that mandate free reports • CO, GA, MD, MA, NJ, and VT Two groups of respondents compared No difference found between groups Cost may not be a primary barrier
  • 26. 26 Summary Majority of sample used many risk reduction practices Indication of consciousness-raising • From government and non-profit agency info • From media reports about identity theft • From knowing a crime victim (1 in 50 people) Not giving out SS and bank account # and having mail held: most frequently done

Notes de l'éditeur

  1. In the course of an ordinary, busy day, you may write a check at the dry cleaner, charge tickets to a concert, reserve a hotel room, mail your bills, call your doctor on your cell phone, order new checks, or apply for a bank loan. Chances are you don’t give these everyday transactions a second thought. But others may. In the 1990s, a new variety of crime called identity theft became rampant and it involves everyday transactions. Each transaction requires you to share personal information: your bank and credit card account numbers; your Social Security number (SSN); and your name, address, and phone numbers. An identity thief steals some piece of your personal information and uses it without your knowledge to commit fraud or theft. An all-too-common example is the act of using your personal information to open a credit card account in your name. The FBI says identity theft is the nation’s fastest-growing white-collar crime. An estimated 500,000 Americans have their identities stolen each year. A sign of the times: at least four insurance companies now offer ID-theft policies. The Privacy Rights Clearinghouse, which works with identity theft victims, says it takes an average victim of identity theft two years to clear his or her credit rating. Can you completely prevent identity theft from occurring? Generally no, especially if someone is determined to commit the crime. But you can minimize your risk of being ripped off by managing your personal information with a greater awareness and with heightened sensitivity.
  2. Identity theft happens when someone steals your personal identifying information in order to open new charge accounts, order merchandise, or borrow money. Review list of identifying information in the slide. A person targeted by an identity thief usually doesn’t know he or she has been victimized until the thief fails to pay the bills or repay the loans, and collection agencies begin hounding the person (whose identity has been stolen) for payment of accounts that he/she didn’t even know he had. Other fraudulent activities that identity thieves perpetrate are: taking over the victim’s financial accounts, opening new bank accounts, applying for Social Security benefits, renting apartments, and establishing services with utility and phone companies.
  3. According to the Federal Trade Commission (FTC), the most common forms of identity theft are: Credit Card Fraud. These are situations where a new credit card account is opened with a victim’s name and address or an existing credit card account is “taken over” by a fraudster, who charges items using a victim’s name and account number with no intention of paying the bill. Communications Services Fraud. This is where identity theft starts telephone, cellular, or other utility service in the victim’s name. Bank Fraud. This is where a fraudster opens a checking or savings account in a victim’s name, and/or writes fraudulent checks. Fraudulent Loans. These cases involve the identity thief procuring a loan, such as a car loan, in a victim’s name. Internet Fraud. Here an identity thief uses Web sites, e-mail and off-line methods to try to steal someone’s identity and make off with their assets. Once an ID theft is in the works, the Internet can make the job considerably easier.
  4. Despite your best efforts to take precautions with accessibility to your personal information or to keep it private, skilled fraudsters may use a variety of methods -- low- and high-tech -- to gain access to your data and your life. According to the FTC, this is how identity thieves get your personal information: They steal wallets and purses containing your identification and credit cards, and ATM cards. They steal mail from your mailbox, including your bank and credit card statements, bills from retail stores, pre-approved credit offers, telephone calling cards, as well as tax information. They fill out a “change of address forms” to divert your mail to another location. They rummage through garbage cans or the refuse of businesses for personal data that has been discarded in a practice known as “dumpster diving.” They commit fraud to obtain your credit report by posing as a landlord, employer, or someone else who may have a legitimate need for and legal right to -- the information.
  5. Here are several more ways you can have your identity stolen by fraudsters: They get your business or personnel records at work. This is usually an “inside job,” done sometimes by a disgruntled employee. They find personal information in your home -- perhaps they are sharing an apartment with you. They use personal information you share on the Internet. Web sites, particularly e-commerce sites, collect a lot of data from visitors. If you buy a book or a CD at a bookstore and pay cash, there will be no record linking you to the purchase. But the books, magazines, music, and movies you buy online are all linked to you by name. Web retailers are collecting a sizable database of information on individual purchases (e.g., who’s buying certain prescription drugs or books). E-commerce sites routinely share your information, or sell it. If an e-commerce site you bought from goes bankrupt, it could be legally required to sell your data to the highest bidder as a company asset. Also, sites routinely sell or exchange your personal information. Privacy advocates are seeking federal legislation requiring Web sites to let users “opt out” of sharing data, as has recently happened in financial services. Sometimes identity thieves buy your personal information from “inside” sources. For example, an identity thief may pay a store employee for information about you that appears on an application for goods, services or credit. Identity thieves also do some of their best work just by looking over your shoulder (a.k.a., “shoulder surfing”) as you dial your telephone calling card number or punch in your account number or PIN at an automated teller machine (ATM). To avoid having account data stolen in this manner, shield the key pads with your hand whenever you use a public phone or ATM.
  6. Once identity thieves have secured a piece of your personal identification, it is relatively easy to use it to wreak havoc on your life. They may use it for a number of illegal activities such as: Calling your credit card issuer and pretending to be you. They then ask to change the mailing address on your credit card account. Next, they run up charges on your account. Because your bills are being sent to the new address, it make take some time before you realize there’s a problem. Opening a new credit card account using your name, date of birth, and Social Security number. When they use the credit card and don’t pay the bills, the account now in default is reported on your credit report. Establishing phone, cable, or wireless service in your name. Again, these bills go unpaid until service providers contact the victim looking for payment. Opening a bank checking account in your name and writing bad checks on it. Filing for bankruptcy under your name to avoid paying debts they’ve run up under your name, or to avoid eviction from their apartment. Counterfeiting checks or debit cards, and draining your bank account. Getting access to a PIN number and draining your retirement account. Buying cars by taking out auto loans in your name. Buying other big ticket items and charging them on store accounts, then never making a payment.
  7. The Federal Trade Commission acknowledges that, while you probably can’t prevent identity theft entirely, you can lessen your risk. By managing your personal information wisely, cautiously, and with an awareness of the dangers, you can help protect against identity theft. Here are the best ways to minimize your risk: Store items with personal information in a safe place. To foil an identity thief who may pick through your trash to retrieve personal information, tear up charge receipts, copies of credit applications, insurance forms, physicians’ statements, and bank checks and statements that you are discarding, as well as expired charge cards and credit offers you get in the mail. Better still, purchase an inexpensive shredder. Give your Social Security number (SSN) only when absolutely necessary. Ask to use other types of identifiers when possible. Pay attention to your billing cycles. Call your creditors if your bills don’t arrive on time. A missing credit card bill could mean a fraudster has taken over your credit card account and changed your billing address to cover his tracks. Guard your mail from theft. Deposit outgoing mail in post office collection boxes or at your local post office. Don’t leave mail unattended at your residence mail box to be picked up. Promptly remove mail from your mailbox after is has been delivered. If you’re planning to be away from home and can’t pick up your mail, call your local post office to request a vacation hold. The Postal Service will hold your mail at your local post office until you can pick it up. Ask to establish passwords on your credit card, bank and phone accounts. Avoid using easily available information like your mother’s maiden name, your birth date or your spouse’s, the last four digits of your SSN or your phone number, or a series of consecutive numbers, like 1, 2, 3, 4.
  8. Here are some additional identity theft precautions: Carry as little identification information and as few credit cards on your person as possible. Carry only what you’ll actually need and leave the rest at home. Do not give out personal information on the phone, through the mail, or over the Internet unless you have initiated the contact or know who you’re dealing with. Identity thieves often pose as representatives of banks, Internet service providers, and even government agencies, to persuade you to reveal your Social Security number, financial account number, and other identifying information. Legitimate organizations with whom you do business already have the information they need and will not ask you for it. Be cautious about where you leave personal information in your home, especially if you share an apartment with roommates, employ housekeeping or outside help, or are having service work done in your home. Be aware of who has access to your personal information at work and verify that the records are kept in a secure location. This is particularly important if you are in a position where you may have dealings with disgruntled employees.
  9. Here are several more ways to protect your personal information: Don’t carry your SSN card in your wallet; leave it in a secure place at home. Save your ATM and credit card receipts to check against your bank and credit statements. Review them carefully and promptly. Alert family members to the dangers of pretexting. Tell them that only you, or someone you authorize, should provide personal information to others. Before you reveal any personally identifying information, find out how it will be used and whether it will be shared with others. Ask for their specific policies about sharing information. Can you choose to have it kept confidential? Order a copy of your credit report from each of the three major credit reporting agencies every year. Make sure that it’s accurate and includes only those accounts and credit transactions that you’ve authorized. One credit report per year is free from each of the major credit bureaus for New Jersey residents. A credit file request form is available on the Rutgers Cooperative Extension MONEY 2000 Web site at www.rce.rutgers.edu/money2000.
  10. By law, in New Jersey, you are able to receive one free copy of your credit report from each of the three major credit reporting agencies every year. Free reports are also available for identity fraud victims, persons on welfare, and the unemployed. Otherwise, the law allows credit bureaus to charge you up to $8.50 for a copy of your credit report. Your credit report contains information on where you work and live, the credit accounts that have been opened in your name, how you pay your bills , who has made inquiries about you over the past two years, and whether you’ve been sued, arrested or you have filed for bankruptcy. Checking your report on a regular basis can help you catch mistakes and fraud before they destroy your credit rating. Take advantage of your rights as a consumer and order by mail, phone, or Internet your free credit report from each of the three major credit bureaus -- Equifax, Experian (formerly TRW), and Trans Union. Equifax -- www.equifax.com -- To order your report, call: 800-685-1111or write: PO Box 740241, Atlanta, GA 30374-0241. To report fraud, call: 800-525-6285 and write: PO Box 740241, Atlanta, GA 30364-0241 Experian -- www.experian.com -- To order your report call: 888-EXPERIAN (397-3742) or write: PO Box 2104, Allen TX 75013. To report fraud, call 888-EXPERIAN (397-3742) and write: PO Box 9532, Allen TX 75013 Trans Union -- www.tuc.com -- To order your report, call: 800-916-8800 or write: PO Box 1000, Chester, PA 19022. To report fraud, call: 800-680-7289 and write Fraud Victim Assistance Division, PO Box 6790, Fullerton, CA 92634
  11. It is possible that an identity thief can strike even though you’ve been very careful about keeping your personal information protected. If you suspect that your personal information has been stolen and used to commit fraud or theft, take action immediately, and keep a record of your conversations and correspondence. The steps you should take to protect yourself will depend on your situation and how your identity has been misused. However, the Federal Trade Commission (FTC) states that three basic actions are appropriate in almost every case: First, contact the fraud departments of each of the three major credit bureaus. -- Tell them that you’re an identity theft victim. Ask them to place a “fraud alert” in your file, as well as a victim’s statement asking that all creditors call you before opening any new accounts or changing your existing accounts. This can hinder an identity thief from opening more accounts in your name. At the same time, order copies of your credit reports from the three credit bureaus. Credit bureaus must give you a free copy of your report if your report is inaccurate because of fraud, and you ask for it in writing. Go over your reports with a fine tooth comb to make sure no additional illegal accounts have been opened in your name or unauthorized changes made to your existing accounts. Also, check the section of your report that lists “inquiries.” Where these “inquiries” appear from the company(ies) that opened the fraudulent account(s), ask that these “inquiries” be removed from your report. In a few months, order new copies of your reports to verify your corrections and changes, and to make sure no new fraudulent activity has occurred. Second, contact creditors for any accounts that have unauthorized fraudulent activity or have been opened illegally, both by telephone and in writing. Close accounts that have been tampered with and open new ones with new Personal Identification Numbers (PINs) and passwords. Third, file a report with your local police or police in the community where the identity theft took place. Secure a copy of the police report in case the bank, credit card company, or others need proof of the crime. Even if the police can’t prosecute the identity thief in your case, having a copy of the police report can assist you when dealing with creditors.
  12. To minimize the amount of information a thief can steal, do not carry extra credit cards, your Social Security card, a birth certificate or a passport in your wallet or purse, except when needed. To reduce the amount of personal information that is “out there,” consider removing your name from the marketing lists of the three credit reporting bureaus. This will limit the number of pre-approved offers of credit that your receive. * Sign up for the Direct marketing Association’s Mail Preference Service and the Telephone Preference Service. Your name is added to computerized name deletion lists used by nationwide marketers. * Have your name and address removed from the phone book and reverse directories (i.e., directories that list people by their addresses rather than their names). * Don’t put your Social Security number on checks. Ask your financial institution to add extra security protection to your account. Most will allow you to use an additional code (a number or word) when accessing our account. If you become a victim of identity theft, report the crime to the police immediately. Give them as much documented evidence as possible, and get a copy of the police report. Credit card issuers, banks, and the insurance company may require you to show the report in order to verify the crime. Then report your case to the federal authorities. The Federal Trade Commission has a special identity theft hotline to provide information to consumers and take complaints from victims by phone (1-877-438-4338) or online (www.consumer.gov/idtheft). As soon as possible, call the fraud units of the three major credit bureaus. Ask to have a fraud alert placed on your credit report -- this will let companies know that someone else has been using your information and that you wish to be informed by phone before any new credit is granted. Close the accounts and get replacement cards with new account numbers.