28
IDENTITY THEFT: What to do if it happens to you Copyright © 1997-2003. Utility Consumers' Action Network / Privacy Rights Clearinghouse and CALPIRG Charitable Trust. Released Jan. 1997. Revised April 2003. A Joint Publication of the Privacy Rights Clearinghouse and CALPIRG This guide provides victims of identity theft with the major resources to contact. Unfortunately, at this time victims themselves are burdened with resolving the problem. You must act quickly and assertively to minimize the damage. In dealing with the authorities and financial institutions, keep a log of all conversations, including dates, names, and phone numbers. Note time spent and expenses incurred in case you are able to seek restitution in a later judgement or conviction against the thief, if you itemize tax deductions for theft-related expenses (consult your accountant). Confirm conversations in writing. Send correspondence by certified mail, return receipt requested. Keep copies of all letters and documents. 1. Credit bureaus. Immediately report the situation to the fraud units of the of the three credit reporting companies—Experian (formerly TRW), Equifax and TransUnion. As of April 2003, if you notify one bureau that you are a victim of identity theft, it will notify the other two. Report that your identifying information is being used by another person to obtain credit fraudulently in your name. Ask that your file be flagged with a fraud alert. Add a victim's statement to your report. ("My ID has been used to apply for credit fraudulently. Contact me at [your phone number] to verify all applications.") Each credit bureau will mail you a free credit report once you have called them to flag your file with a fraud alert. Fraud alerts are usually placed for 90-180 days. You will want to extend the time period to seven years. Do so in writing following the directions sent in the credit report you receive. You may cancel fraud alerts at any time. In all communications with the credit bureaus, you will want to refer to the unique number assigned to your credit report and use certified, return receipt mail. Be sure to save all credit reports as part of your fraud documentation. Ask the credit bureaus for names and phone numbers of credit grantors with whom fraudulent accounts have been opened if this information is not included on the credit report. Ask the credit bureaus in writing to remove inquiries that have been generated due to the fraudulent access. You may also ask the credit bureaus to notify those who have received your credit report in the last six months in order to alert them to the disputed and erroneous information (two years for employers). Under California law, when you provide your police report to the credit bureaus, they must remove the fraudulent accounts from your credit report (Calif. Civil Code 1785.16(k). (see #3 below.) Be aware that these measures will not entirely stop new fraudulent accounts from being opened by the imposter. Credit issuers are not required by law to observe fraud alerts. Request a free copy of your credit report every few months so you can monitor for fraud. Under a new California law, victims are able to receive one free report each month for the first 12 months upon request. (California Civil Code 1785.15.3, effective July 1, 2003.) In other states, you may be charged after the first report. Still it is important to check your credit report about every three months during the active phase of the crime. California law now enables individuals to place a "security freeze" on their credit reports. This essentially prevents anyone from accessing your credit file for any reason, until and unless you instruct the credit bureaus to unfreeze or "thaw" your report. It provides more protection than a fraud alert. If your identity thief is particularly aggressive and gives no indication of ceasing to use your identity to obtain credit, and if you live in California, you should consider using the security freeze to curtail access to your credit file. The security freeze is free to victims of identity theft. Non-victims who wish to use the security freeze for prevention purposes must pay a fee to activate the freeze. The web site of the California Office of Privacy Protection provides information on how to establish a security freeze, www.privacy.ca.gov/financial/cfreeze.htm. 2. Creditors.—New Accounts-Contact all creditors immediately with whom your name has been used fraudulently, by phone and in writing. You will see evidence of these accounts on your credit reports. Creditors will likely ask you to fill out fraud affidavits. The Federal Trade Commission provides a uniform affidavit form that most creditors accept. (Web:www.consumer.gov/idtheft/affidavit.htm). No law requires affidavits to be notarized at your own expense. You may choose to substitute witness signatures for notarization if creditors require verification of your signature. Ask the credit grantors to furnish you and your investigating law enforcement agency copies of the documentation, such as the application and transaction records, showing the fraudulent transactions. In California, they are required by law to give you these copies (California Penal Code 530.8). The California Office of Privacy Protection provides instructions and sample letters on how to obtain documentation from credit grantors, www.privacy.ca.gov/fair.htm.

· 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

IDENTITY THEFT: What to do if it happens to you Copyright © 1997-2003. Utility Consumers' Action Network / Privacy Rights Clearinghouse and CALPIRG Charitable Trust. Released Jan. 1997. Revised April 2003. A Joint Publication of the Privacy Rights Clearinghouse and CALPIRG

This guide provides victims of identity theft with the major resources to contact. Unfortunately, at this time victims themselves are burdened with resolving the problem. You must act quickly and assertively to minimize the damage.

In dealing with the authorities and financial institutions, keep a log of all conversations, including dates, names, and phone numbers. Note time spent and expenses incurred in case you are able to seek restitution in a later judgement

or conviction against the thief, if you itemize tax deductions for theft-related expenses (consult your accountant). Confirm conversations in writing. Send correspondence by certified mail, return receipt requested. Keep copies of all

letters and documents. 1. Credit bureaus. Immediately report the situation to the fraud units of the of the three credit reporting companies—Experian (formerly TRW), Equifax and TransUnion. As of April 2003, if you notify one bureau that you are a victim of identity theft, it will notify the other two. Report that your identifying information is being used by another person to obtain credit fraudulently in your name. Ask that your file be flagged with a fraud alert. Add a victim's statement to your report. ("My ID has been used to apply for credit fraudulently. Contact me at [your phone number] to verify all applications.") Each credit bureau will mail you a free credit report once you have called them to flag your file with a fraud alert. Fraud alerts are usually placed for 90-180 days. You will want to extend the time period to seven years. Do so in writing following the directions sent in the credit report you receive. You may cancel fraud alerts at any time. In all communications with the credit bureaus, you will want to refer to the unique number assigned to your credit report and use certified, return receipt mail. Be sure to save all credit reports as part of your fraud documentation. Ask the credit bureaus for names and phone numbers of credit grantors with whom fraudulent accounts have been opened if this information is not included on the credit report. Ask the credit bureaus in writing to remove inquiries that have been generated due to the fraudulent access. You may also ask the credit bureaus to notify those who have received your credit report in the last six months in order to alert them to the disputed and erroneous information (two years for employers). Under California law, when you provide your police report to the credit bureaus, they must remove the fraudulent accounts from your credit report (Calif. Civil Code 1785.16(k). (see #3 below.) Be aware that these measures will not entirely stop new fraudulent accounts from being opened by the imposter. Credit issuers are not required by law to observe fraud alerts. Request a free copy of your credit report every few months so you can monitor for fraud. Under a new California law, victims are able to receive one free report each month for the first 12 months upon request. (California Civil Code 1785.15.3, effective July 1, 2003.) In other states, you may be charged after the first report. Still it is important to check your credit report about every three months during the active phase of the crime. California law now enables individuals to place a "security freeze" on their credit reports. This essentially prevents anyone from accessing your credit file for any reason, until and unless you instruct the credit bureaus to unfreeze or "thaw" your report. It provides more protection than a fraud alert. If your identity thief is particularly aggressive and gives no indication of ceasing to use your identity to obtain credit, and if you live in California, you should consider using the security freeze to curtail access to your credit file. The security freeze is free to victims of identity theft. Non-victims who wish to use the security freeze for prevention purposes must pay a fee to activate the freeze. The web site of the California Office of Privacy Protection provides information on how to establish a security freeze, www.privacy.ca.gov/financial/cfreeze.htm. 2. Creditors.—New Accounts-Contact all creditors immediately with whom your name has been used fraudulently, by phone and in writing. You will see evidence of these accounts on your credit reports. Creditors will likely ask you to fill out fraud affidavits. The Federal Trade Commission provides a uniform affidavit form that most creditors accept. (Web:www.consumer.gov/idtheft/affidavit.htm). No law requires affidavits to be notarized at your own expense. You may choose to substitute witness signatures for notarization if creditors require verification of your signature. Ask the credit grantors to furnish you and your investigating law enforcement agency copies of the documentation, such as the application and transaction records, showing the fraudulent transactions. In California, they are required by law to give you these copies (California Penal Code 530.8). The California Office of Privacy Protection provides instructions and sample letters on how to obtain documentation from credit grantors, www.privacy.ca.gov/fair.htm.

Page 2: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

2a. Creditors.—Existing Accounts-If your existing credit accounts have been used fraudulently, get replacement cards with new account numbers. Ask that old accounts be processed as "account closed at consumer's request" (better than "card lost or stolen" because it can be interpreted as blaming you.) Monitor your mail and bills for evidence of new fraudulent activity. Report it immediately to creditor grantors. Add passwords to all accounts. This should not be your mother's maiden name or a word that is easily guessed. 3. Debt collectors. If debt collectors attempt to require you to pay the unpaid bills on fraudulent credit accounts, ask for the name of the company, the name of the person contacting you, phone number, and address. Tell the collector that you are a victim of fraud and are not responsible for the account. Ask the collector for the name and contact information for the referring credit issuer, the amount of the debt, account number, and dates of the charges. Ask if they need you to complete their fraud affidavit form or if you can use the Federal Trade Commission form (see #2 above). Follow up in writing to the debt collector explaining your situation. Ask that they confirm in writing that you do not owe the debt and that the account has been closed. (For additional information on dealing with debt collectors, read Fact Sheet No. 116 of the Identity Theft Resource Center, www.idtheftcenter.org under "Victim Resources.") 4. Law enforcement. Report the crime to your local police or sheriff's department. You might also need to report it to police departments where the crime occurred. Give them as much documented evidence as possible. Make sure the police report lists the fraud accounts. Get a copy of the report. Keep the phone number of your investigator handy and give it to creditors and others who require verification of your case. Credit card companies and banks may require you to show the report in order to verify the crime. It is a violation of federal law (18 USC 1028) and the laws of many states (such as Calif. Penal Code 530.5) to assume someone's identity for fraudulent purposes. (Web site for state laws: www.consumer.gov/idtheft/statelaw.htm). Some police departments don't write reports on such crimes, so be persistent! Also report to the Federal Trade Commission (see end of guide). 5. Stolen checks. If you have had checks stolen or bank accounts set up fraudulently, report it to the appropriate check verification companies (see end). Your bank branch should be able to provide you with a fraud affidavit. Put stop payments on any outstanding checks that you are unsure of. Cancel your checking and savings accounts and obtain new account numbers. Give the bank a secret password for your account (not mother's maiden name). If your own checks are rejected at stores where you shop, contact the check verification company that the merchant uses (see end of guide). 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number, and password. Do not use your old password. When creating a password, don't use common numbers like the last four digits of your Social Security Number (SSN) or your birth date. Monitor your account statement. You may be liable if fraud is not reported quickly. Be sure to read the debit card contract for liability. Some cards are better protected in cases of fraud than others. 7. Fraudulent change of address.Notify the local Postal Inspector if you suspect an identity thief has filed a change of your address with the post office or has used the mail to commit fraud. (Call the U.S. Post Office to obtain the phone number, (800) 275-8777.) Find out where fraudulent credit cards were sent. Notify the local Postmaster for that address to forward all mail in your name to your own address. You may also need to talk with the mail carrier. (Web: www.usps.gov/websites/depart/inspect) 8. Secret Service jurisdiction. The Secret Service has jurisdiction over financial fraud. But, based on U.S. Attorney guidelines, it usually does not investigate individual cases unless the dollar amount is high or you are one of many victims of a fraud ring. To interest the Secret Service in your case, you may want to ask the fraud department of the credit card companies and/or banks, as well as the police investigator, to notify the Secret Service agent they work with. (Web: www.treas.gov/usss) 9. Social Security Number (SSN) misuse. Contact the Social Security Administration (SSA) to report fraudulent use of your SSN such as welfare or Social Security benefit fraud. They do not handle cases of financial or criminal identity theft. (See contact information at the end of this guide.) As a last resort, you might try to change your number, although we don't recommend it except for very serious cases. The SSA will only change the number if you fit their fraud victim criteria. See Fact Sheet 113 ("Victim Resources") at www.idtheftcenter.org for more information on this topic. (Web: www.ssa.gov) 10. Passports. Whether you have a passport or not, write the passport office to alert them to anyone ordering a passport fraudulently (see address at end). (Web: www.travel.state.gov/passport_services.html)

Page 3: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

11. Phone service. Provide a password which must be used any time your local, cell, and long distance accounts are changed. In California, SBC/Pacific Bell's fraud hotline is (877) 202-4558. If your calling card has been stolen or there are fraudulent charges, cancel it and open a new account. 12. Driver's license number misuse. You may need to change your driver's license number if someone is using yours as ID on bad checks or for other types of fraud. Call the state office of the Department of Motor Vehicles (DMV) to see if another license was issued in your name. Put a fraud alert on your license if your state's DMV provides a fraud alert process. Go to your local DMV to request a new number. Fill out the DMV's complaint form to begin the investigation process. Send supporting documents with the completed form to the nearest DMV investigation office. Web: www.aamva.org/links/mnu_linkJurisdictions.asp. 13. Victim statements. If the imposter is apprehended by law enforcement and stands trial, write a victim impact letter to the judge handling the case. Contact the victim-witness assistance program in your area for further information on how to make your voice heard in the legal proceedings. (Read Fact Sheet 111 on victim impact statements at www.idtheftcenter.org under "Victim Resources.") 14. False civil and criminal judgments. Sometimes victims of identity theft are wrongfully accused of crimes committed by the imposter. If a civil judgment is entered in your name for your imposter's actions, contact the court where the judgment was entered and report that you are a victim of identity theft. If you are wrongfully arrested or prosecuted for criminal charges, contact the police department and the court in the jurisdiction of the arrest. Also contact the state Department of Justice and the FBI. Ask how to clear your name. See PRC Fact Sheet 17g, www.privacyrights.org/fs/fs17g-CrimIdTheft.htm. 15. Legal help. You may want to consult an attorney to determine legal action to take against creditors and/or credit bureaus if they are not cooperative in removing fraudulent entries from your credit report or if negligence is a factor. Call the local Bar Association, or Legal Aid office in your area (for low-income households), or the National Association of Consumer Advocates (www.naca.net/resources.htm) to find an attorney who specializes in consumer law, the Fair Credit Reporting Act and the Fair Credit Billing Act. If you are a senior citizen or take care of a dependent adult, be sure to look under Elder Law or Aging and Independent Services for referral centers. 16. Other forms of identity theft. If a deceased relative's information is being used to perpetrate identity theft, or if you personally know the thief, additional information about how to address these situations is available in other fact sheets. See www.idtheftcenter.org/vguides.shtml 17. Dealing with emotional stress. Psychological counseling may help you deal with the stress and anxiety commonly experienced by victims. Know that you are not alone. Contact the Identity Theft Resource Center for information on how to network with other victims and deal with the impact of this crime. Web: www.idtheftcenter.org (Fact Sheet 108, "Victim Resources") 18. Making change. Write to your state and federal legislators. Demand stronger privacy protection and prevention efforts by creditors and credit bureaus. 19. Don't give in. Do not pay any bill or portion of a bill that is a result of fraud. Do not cover any checks that were written or cashed fraudulently. Do not file for bankruptcy. Your credit rating should not be permanently affected. No legal action should be taken against you. If any merchant, financial company or collection agency suggests otherwise, restate your willingness to cooperate, but don't allow yourself to be coerced into paying fraudulent bills. Report such attempts to government regulators immediately.

Credit Reporting Bureaus Equifax: P.O. Box 105069, Atlanta, GA 30348 www.equifax.com Report fraud: Call (800) 525-6285 and write to the address above. Order credit report: (800) 685-1111 TDD: (800) 255-0056 Web: www.equifax.com

Page 4: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

Experian (formerly TRW): P.O. Box 9532, Allen, Texas 75013 Report fraud: Call (888) EXPERIAN (888-397-3742) and write to address above. Order credit report: (888) EXPERIAN To report fraud: 888-397-3742 TDD: Use relay to fraud number above Web: www.experian.com TransUnion: P.O. Box 6790, Fullerton, CA 92834. Report fraud: (800)-680-7289 and write to address above. Order credit report: (800) 888-4213 TDD:(877)-553-7803 E-mail (fraud victims only): [email protected] Web: www.transunion.com

• To opt out of pre-approved offers of credit for all three bureaus, call (888) 5OPTOUT (888-567-8688). You may choose a two-year opt-out period or permanent opt-out status. • Remember, you are entitled to a free credit report if you are a victim of identity theft, if you have been denied credit, if you receive welfare benefits, or if you are unemployed. Social Security Administration • Order Earnings & Benefits Statement: (800) 772-1213. The SSA automatically mails it to individuals three months before the birthday. Web: www.ssa.gov/online/ssa-7004.html • Report fraud: (800) 269-0271. Web: www.ssa.gov/oig/public_fraud_reporting/index.htm Or write to: Social Security Administration, Office of the Inspector General,:P.O. Box 17768, Baltimore, MD 21355. U.S. State Department, Passport Office • U.S. Dept. of State, Passport Services, Consular Lost/Stolen Passport Section, 1111 19th St., NW, Suite 500, Washington, DC 20036 To remove your name from mail and phone marketing lists • Direct Marketing Association Mail Preference Service, P.O. Box 643, Carmel, NY 10512. Web: www.dmaconsumers.org. Online opt-out program costs $5.00. It is free by mail. • FTC's telemarketing Do Not call registry (888) 382-1222 Online registration: www.donotcall.gov See PRC Fact Sheets No. 4 and No. 5 on reducing junk mail and telemarketing calls Web: www.privacyrights.org/fs/fs4-junk.htm and www.privacyrights.org/fs/fs5-tmkt.htm To report fraudulent use of your checks • CheckRite: (800) 766-2748 • Chexsystems:(800) 428-9623 • CheckCenter/CrossCheck: (800) 843-0760 • Certigy/Equifax: (800) 437-5120 • International Check Services: (800) 526-5380 • SCAN: (800) 262-7771 • TeleCheck: (800) 710-9898

Page 5: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

Other useful resources

• Federal Trade Commission (FTC). The FTC offers information for victims. File your case with the FTC Consumer Response Center. Include your police report number. Use the FTC uniform affidavit form. (877) IDTHEFT Web: www.consumer.gov/idtheft

• Privacy Rights Clearinghouse (PRC), 3100 - 5th Ave., Suite B, San Diego, CA 92103. Phone: (619) 298-3396. E-mail: [email protected]. Web: www.privacyrights.org.

• Identity Theft Resource Center, P.O. Box 26833, San Diego, CA 92196. Lists regional victim support groups on its web site. Offers many guides for victims. (858) 693-7935 Web: www.idtheftcenter.org. E-mail: [email protected]

• FBI Internet Fraud Complaint Center, Web: www.ifccfbi.gov

• U.S. Dept. Of Justice, identity theft information. Web: www.usdoj.gov/criminal/fraud/idtheft.html

• Identity Theft Survival Kit. Phone: (800) 725-0807. Web: www.identitytheft.org

This guide is a project of the Privacy Rights Clearinghouse and CALPIRG, nonprofit consumer advocacy organizations. We thank Linda Foley of the Identity Theft Resource Center and Mari Frank, Esq. for their assistance.

Page 6: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

IDENTITY THEFT: Online Shopping Tips ����������� �������������������������������� ���������������� ���������� ������������!������"�#���������������!��$��!"�����������%��������#�������������������� ���������������� ������ ��

&������������������������ ��������������� ������ ����'��� ���� ����������!"��$������� ��������$������(��)��*+++$������,-*++*��*-*++.$��

������������� ������� ������������������������������� ���������������� �������� ����������������� ���� ��� ������� ���� ���� �� �� ��������� ����� �������������� ��������������� ���������������� ��������� �� ���������������� ����������� ���� ���������� �� ��������� ����������� ���������������� �������� �������������� ���������� ��� ����������������������� ������������� ��������� ���

With just a click of the mouse, shoppers can buy nearly any product online - from groceries to cars, from insurance policies to home loans. The world of electronic commerce, also known as e-commerce, enables consumers to shop at thousands of online stores and pay for their purchases without leaving the comfort of home. For many, the Internet has taken the place of Saturday afternoon window shopping at the mall. The same things can go wrong shopping in cyberspace as in the real world. Sometimes it is simply a case of a computer glitch or poor customer service. Other times, shoppers are cheated by clever cybercrooks. This guide offers advice on how to make your online shopping experiences enjoyable and safe. 1. Shop at Secure Web Sites How can you tell if a web site is secure? It uses encryption technology to transfer information from your computer to the online merchant's computer. Encryption scrambles the information you send, such as your credit card number, in order to prevent computer hackers from obtaining it en route. The only people who can unscramble the code are those with legitimate access privileges. You can tell when you are dealing with a secure web site in several ways.

• First, if you look at the top of your screen where the web site address is displayed, you should see https://. The "s" that is displayed after "http" indicates that web site is secure. Often, you do not see the "s" until you actually move to the order page on the web site.

• Another way to determine if a web site is secure is to look for a closed padlock displayed at the bottom of your screen. If that lock is open, you should assume it is not a secure site.

• The third symbol that indicates you are on a secure site is an unbroken key.

Of course, transmitting your data over secure channels is of little value to you if the merchant stores the data unscrambled. You should try to find out if the merchant stores the data in encrypted form. If a hacker is able to intrude, it cannot obtain your credit data and other personal information. Be sure to read the merchant's privacy and security policies to learn how it safeguards your personal data on its computers. (See tip 3 below.) 2. Research the Web Site before You Order Do business with companies you already know. If the company is unfamiliar, do your homework before buying their products. If you decide to buy something from an unknown company, start out with an inexpensive order to learn if the company is trustworthy. Reliable companies should advertise their physical business address and at least one phone number, either customer service or an order line. Call the phone number and ask questions to determine if the business is legitimate. Even if you call after hours, many companies have a "live" answering service, especially if they don't want to miss orders. Ask how the merchant handles returned merchandise and complaints. Find out if it offers full refunds or only store credits. You can also research a company in Internet yellow pages, through the Better Business Bureau (see listing below), or a government consumer protection agency like the district attorney's office or the Attorney General. Perhaps friends or family members who live in the city listed can verify the validity of the company. Remember, anyone can create a web site. 3. Read the Web Site's Privacy and Security Policies Every reputable e-commerce web site offers information about how it processes your order. It is usually listed in the section entitled Privacy Policy. You can find out if they intend to share your information with a third party or affiliate company. Do they require these companies to refrain from marketing to their customers? If not, you can expect to receive "spam" (unsolicited e-mail) and even mail or phone solicitations from these companies. You can also learn what type of information is gathered by the web site, and how it is, or is not, shared with others. The online merchant's data security practices are also often explained in the Privacy Policy, or perhaps a separate Security Policy. Look for online merchants who are members of a seal-of-approval program that sets voluntary guidelines for privacy-related practices. TRUSTe (www.truste.org) and BBBonline (www.bbbonline.org) are two such programs. Be aware that a strong privacy policy and membership in a web seal program do not guarantee that the web merchant will protect your privacy for all of time. Policies can change. The company can file for bankruptcy and sell its customer database. The web merchant might be purchased by another company with a weaker privacy policy. And the company's data can be subpoenaed for law enforcement investigations or civil cases. You have little control over the use of your customer data in such matters.

Page 7: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

Given all of these uncertainties, you will want to think about the sensitivity of the data that is being compiled about you when you shop online. We cannot prescribe the best approach to take. Each consumer has a different interpretation of what is considered "sensitive." 4. What's Safest: Credit Cards, Debit Cards, Cash, or Checks? The safest way to shop on the Internet is with a credit card. In the event something goes wrong, you are protected under the federal Fair Credit Billing Act. You have the right to dispute charges on your credit card, and you can withhold payments during a creditor investigation. When it has been determined that your credit was used without authorization, you are only responsible for the first $50 in charges. You are rarely asked to pay this charge. We recommend that you obtain one credit card that you use only for online payments to make it easier to detect wrongful credit charges. E-commerce shopping by check leaves you vulnerable to bank fraud. And sending a cashier's check or money order doesn't give you any protection if you have problems with the purchase. Make sure your credit card is a true credit card and not a debit card, a check card, or an ATM card. As with checks, a debit card exposes your bank account to thieves. Your checking account could be wiped out in minutes. Further, debit and ATM cards are not protected by federal law to the extent that credit cards are. 5. Never Give Out Your Social Security Number Providing your Social Security number is not a requirement for placing an order at an e-commerce web site. There is no need for the merchant to ask for it. Giving out your Social Security number could lead to having your identity stolen. (See PRC Fact Sheet 17, "Coping with Identity Theft," www.privacyrights.org/fs/fs17-it.htm.) 6. Disclose Only the Bare Facts When You Order When placing an order, there is certain information that you must provide to the web merchant such as your name and address. Often, a merchant will try to obtain more information about you. They may ask questions about your leisure lifestyle or annual income. This information is used to target you for marketing purposes. It can lead to "spam" or even direct mail and telephone solicitations. Don't answer any question you feel is not required to process your order. Often, the web site will mark which questions need to be answered with an asterisk (*). Should a company require information you are not comfortable sharing, leave the site and find a different company for the product you seek. 7. Keep Your Password Private Most reputable e-commerce web sites require the shopper to log-in before placing or viewing an order. The shopper is usually required to provide a username and a password. Never reveal your password to anyone. When selecting a password, do not use commonly known information, such as your birthdate, mother's maiden name, or numbers from your driver's license or Social Security number. Do not reuse the same password for other sites. The best password has at least eight characters and includes numbers and letters. 8. Check the Web Site Address Above the web site at the top of your screen is a rectangular window that contains the web site address (also called the URL, or Uniform Resource Locator). By checking that address, you can make sure that you are dealing with the correct company. Cyber-thieves have created web sites that look convincingly like the web sites of well-known companies. These sites capture the credit card numbers of unwary shoppers. The thieves then use the stolen credit card numbers to make fraudulent purchases in the shopper's name. If these shoppers had checked the URL at the top of the screen, they would have noticed that it was not the same address as the real company. 9. Always Print Copies of Your Orders After placing an order online, you should receive a confirmation page that reviews your entire order. It should include the costs of the order, your customer information, product information, and the confirmation number. We recommend you print out at least one copy of the web page(s) describing the item you ordered as well as the page showing company name, postal address, phone number, and legal terms, including return policy. Keep it for your own records for at least the period covered by the return/warranty policy. Often you will also receive a confirmation message that is e-mailed to you by the merchant. Be sure to save and/or print this message as well as any other e-mail correspondence with the company. 10. Shop with Companies Located in the United States When you shop within the U.S., you are protected by state and federal consumer laws. You might not get the same protection if you place an order with a company located in another country. 11. Pay Attention to Shipping Facts Under the law, a company must ship your order within the time stated in its ad. If no time frame is stated, the merchant must ship the product in 30 days or give you an "Option Notice." This gives you an opportunity to cancel the order and receive a prompt refund, or agree to the delay. Here are key shipping questions to ask:

Page 8: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

• Does the site tell you if there are geographic or other restrictions for delivery? • Are there choices for shipping? • Who pays the shipping cost? • What does the site say about shipping insurance? • What are the shipping and handling fees, and are they reasonable?

12. Learn the Merchant's Cancellation, Return and Complaint-Handling Policies Even under the best of circumstances, shoppers sometimes need to return merchandise. Check the web site for cancellation and return policies.

• Who pays for shipping? • Is there a time limit or other restrictions to the return or cancellation? • Is there a restocking charge if you need to cancel or return the order? • Do you get a store credit, or will the company fully refund your charges to your credit card? If the merchant only offers store credits,

find out the time restriction for using this credit.

Don't expect less customer service just because a company operates over the Internet. This is especially important if you are buying something that may need to be cleaned or serviced on occasion.

• Does the merchant post a phone number and/or e-mail address for complaints? • How long has the company been in business? • Will they still be around when you need them? • Is there an easy, local way for you to get repairs or service? • Is there a warranty on the product, and who honors that guarantee? • What are the limits, and under what circumstances can you exercise your warranty rights?

13. Use Shopper's Intuition Look at the site with a critical eye. And heed the old adage, "If it looks too good to be true, it probably is."

• Are there extraordinary claims that you question? • Do the company's prices seem unusually low? • Does it look like the merchant is an amateur? • Are there a lot of spelling or grammar errors? • Does the company's phone go unanswered?

The use of a post office box might not send up a red flag, but a merchant who does not also provide the company's physical address might be cause for concern. If any of these questions trigger a warning bell in your head, you will be wise to find another online merchant.

14. Be Wary of Identity Theft As e-commerce becomes more common, there will be more cases of identity theft committed over the Internet. Imposters are likely to obtain their victims' identifying information using low-tech means like dumpster diving, mail theft, or workplace access to SSNs. But they are increasingly using the web to apply for new credit cards and to purchase goods and services in their victims' names. The same advice for avoiding low-tech identity theft applies to shopping on the Internet. Many are mentioned in the above tips. Most important: Be aware of who you are buying from. And use true credit cards for purchases, not debit cards. We recommend that you check your credit card bills carefully for several months after purchasing on the Internet. Look for purchases you did not make. If you find some, immediately contact the credit card company and file a dispute claim. Order your credit reports at least once a year and check for accounts that have been opened without your permission. (See PRC Fact Sheet 17a , "Identity Theft: What to Do if It Happens to You," www.privacyrights.org/fs/fs17a.htm .) 15. Be Cautious with "Electronic Signatures" A recent federal law enables shoppers to verify online purchases with merchants using an "electronic signature." Usually, this process is nothing more than clicking on a box that says you accept the terms of the order. The Electronic Signatures in Global and National Commerce Act, also known as the E-Sign Act, is a complex law. It states that electronic signatures and electronic records used in interstate and foreign commerce will not be denied validity just because they are in electronic form. Further, the law says that online purchases do not need to be accompanied by the more traditional handwritten signature on a paper document.

Page 9: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

Consumer advocates opposed the law because it lacks important safeguard against fraud. For example, the law does not require online merchants to comply with such standards as message integrity (security and accuracy in transmission), privacy of customer data, and authentication of sender. The faults of the E-Sign Act require you the customer to shop cautiously on the Internet. The tips offered in this guide will help you make sure the online companies you choose are secure and honest.

Page 10: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

IDENTITY THEFT: Identity Theft & Children Written by: Linda Foley, Identity Theft Resource Center Executive Director and Charles Nelson, Ph.D., Family Treatment Institute, San Diego CA Resource Material of: www.idtheftcenter.org Email: [email protected] Copyright: Identity Theft Resource Center, Inc., August 2003 All rights reserved. The text of this copyrighted document may not be altered without express authorization of the Identity Theft Resource Center. This fact sheet should not be used in place of psychological or legal advice.

Child Identity Theft occurs when a child's identity is used by another person for the imposter's personal gain. The perpetrator may be a family member or someone known by the family. It could also be a stranger who purposely targets children because of the lengthy time between the theft of the information and the discovery of the crime. There are some cases that appear to be identity theft but are not. Receiving a pre-approved credit card offer in your child's name might upset you as a parent. However, it might only be an innocent marketing tool sent by an affiliate of your bank because you opened a college fund for your child. A quick check of credit reports will help you sort out the truth. Currently, all three reporting agencies are automated systems. You should call them (numbers at end) and request a credit report for your child. If you are told that there is no credit report, this is probably not a case of financial identity theft. Please be aware that this guide is a work-in-progress, as this specific crime has not yet been well documented. Additionally, as with most identity theft cases, each situation is unique and each person faces a slightly different set of circumstances. Many of the choices you will make will depend on your personal preferences and needs. Each case that ITRC works on also helps us to clarify this misunderstood and relatively underreported crime. In some of the topic areas we will be dividing the discussion by victim types. They are:

• Adults who found out that their identity was stolen as a child (adult/child victims) • Children who have a relative who finds out about the crime (child victims)

ABOUT THIS CRIME: Typically identity theft falls into three categories:

• Financial identity theft: This most commonly occurs when the Social Security number (SSN) and name is used to establish new lines of credit. What most people do not understand is that credit issuers may not have a way to verify the age of the applicant. The information on the application is typically taken at face value. This is particularly true in telephone and Internet applications. In person, few credit issuers request proof of identity, a driver's license for instance. Even then, many clerks have not been trained on how to recognize counterfeited or altered licenses. For these reasons and others, issuers often will not know the true age of the applicant. This is a fault within our system that needs to be rectified. A second mistaken concept is that the credit reporting agencies (CRAs) know that this application must be fraudulent because the applicant is a minor. Unfortunately, there is little, if any, sharing of information about the age of a person with Equifax, TransUnion and Experian. The age of the applicant becomes "official" with the first credit application. Therefore, if the first application indicates that the applicant is 24, the credit agencies believe that person is 24 until a dispute is filed and proven.

• Criminal identity theft: This typically occurs when a person "borrows" the information of the minor to get a driver's license. This person may be an illegal immigrant who bought the information or a relative who has had a license suspended or revoked.

• Identity Cloning: Most frequently, profilers have people in positions where they are able to collect information about minors and then sell it on the black market. The most frequent purchasers of this information, in our experience, are illegal immigrants or people who are trying to "restart" their lives and avoid arrest. It is also an open door to terrorists. Clones might also take advantage of the death of an infant or child. They go back into old newspaper records or death certificates (often found on the Internet) and find a person who would match the current imposter's age. Then either counterfeit documents are made up or legitimate birth certificates are purchased through normal channels. Unfortunately, when a person dies, few, if any, county recorders then mark birth certificates as "deceased." This allows thieves to purchase birth certificates of a person who has died and use it for identity theft. The ease in purchasing birth certificates depends on state laws. You should make sure your state is a "closed access" state, meaning that a limited number of people are allowed access to this information. For details on "Identity Theft and the Deceased" please go to the ITRC information guide on that topic.

Page 11: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

MOMENT OF DISCOVERY: Adult/Child Victims: These victims typically find out in the same manner as adult victims of identity theft. They:

• Are denied credit, mortgage or loan for a vehicle or college tuition • Are unable to open a bank or checking account • Receive collection notices in the mail or by telephone • Are denied tenancy, utility or phone service • Are denied driver's license renewal • Are discharged from a job or continually and unexplainably denied employment • Are quoted higher than normal insurance rates • Have been receiving bills or credit cards they never requested, perhaps for years • Are notified by a law enforcement agency investigating a large case in which they happen to be a part of • Are arrested for an activity they never committed • Are denied SSI or welfare services

Child Victims: Parents or relatives are usually the first to notice something is not quite right. Some of these cases involve split families (one of the parents is the perpetrator and the crime is exposed by the other, unoffending parent). Discovery often comes:

• When attempting to open a savings account or college fund for the child. In this scenario, an unoffending parent discovers that there is already an account with that SSN or that the new account is denied due to a bad check record

• When numerous pre-approved credit card offers come in the mail in the name of the child • When credit cards, checks, bills or bank statements (not opened by a unoffending parent as a joint holder) are sent in the name of the

child • When collection agencies call or send letters about accounts not opened by the child • When a teen is denied the right to get a driver's license because another person has a license with that SSN as ID. The imposter may

even have accumulated tickets or citations in the child's name • While going through papers during a divorce or while straightening up the house (Parental identity theft) • When law enforcement comes to the door with a warrant for an arrest of the child

POTENTIAL IMPACT: Perhaps these examples will help to explain the problem more clearly. Situation One: Adult/Child Victim In this case, the perpetrator may be a relative or a stranger. The former seven-year old doesn't find out until he or she eventually applies for a college loan, a driver's license, an apartment, a job or credit after reaching adulthood. It may be 10 -15 years from the time the information is stolen until the crime is discovered. By that point, the crime trail is cold and the devastation to this child's credit record is great. Almost all accounts have gone to collection. The original account may have gone through several hands with company mergers and sell-outs. It is difficult to track down original application and transaction records, so that this now adult/child can find out what happened and how. Usually the criminal will have used the information until the credit history is destroyed and he/she can no longer get credit or drive using that identity. The child has not checked his/her credit report because he/she didn't even know one existed. The reality is that a credit report should not have existed until that child's first usage as an adult. The potential impact: The inability to get a college loan, driver's license, apartment, car, house, credit card or even several nights spent in jail while trying to prove one's innocence. Situation Two: Parental Identity Theft- the Child Victim The parent has destroyed his/her own credit or driving record. Instead of repairing the damage done to his or her own records, this parent begins to use the information of the child he or she should be protecting. This person may even convince himself/herself that the all the bills will be paid on time and that this action will not impact the child. Rarely does this happen. Not only do these imposters not clean up their own records, but they usually fall behind on the bills under the "new" information. Both the eventual financial burden and the emotional impact on this child are great. Unfortunately, most law enforcement agencies hesitate to get involved, believing that this type of case falls into the jurisdiction of "family law." It does not. We will discuss the emotional impact of a case like this later in this guide.

Page 12: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

Situation Three: Profiler and the Child Victim The parent finds out about the problem and is faced with the tedious task of proving that his or her child did not open the accounts. In fact, they may often have to prove that the child is a child. They are placed in the position of being the primary investigator in the case and find out where the breach occurred while cleaning up the mess. RECORD CLEARANCE AND DO I NEED THE HELP OF AN ATTORNEY? Adult/child Victims:

1. Follow the procedures found on Victim Guide 17A (in the victim guide section) which includes contacting the three credit reporting agencies, reporting the crime to the police (see #11 below) and notifying the credit issuers so you can clear your records.

2. Only speak with fraud investigators when contacting credit issuers or collection agencies. 3. Keep a detailed log. This log should the name, phone number, and title of each person with whom you speak and summary of the

conversation. You may want to use ITRC's "Organizing Your Case" victim guide to help you. 4. For accounts that have gone to collection, use the ITRC guide designed to help you in that situation. 5. Point out that you were a minor at the time the account was opened, and by law were not permitted to enter into a contract. In many

situations, you will need to submit a copy of your birth certificate; so if you don't have a copy of it, get one now. 6. Ask to have all accounts, application inquiries and collection notices removed (or blocked) immediately from your credit report. You can

do this via the credit issuer or through a dispute process with the credit reporting agencies. ITRC recommends that you make the request of both groups. In the end, the credit issuer is the final decision maker as to whether or not to accept your claim of fraud.

7. Request copies of all application and transaction records still available. Make copies and provide those to the police investigating the case. You may find out how this crime occurred. Some states now require businesses to provide this information (as of Aug. 2003- CA, WA, LA). Even if your state does not, it never hurts to ask.

8. If this is a case of criminal identity theft, please use the ITRC victim guide specifically written for that purpose. 9. Do you need an attorney? Each case is unique and the situation will dictate the need for an attorney. However, in many cases an

attorney is not able to do anything you cannot do for yourself. There are always exceptions to this rule, so please feel free to contact us with any of your questions. We will let you know if, in our opinion, an attorney might help.

10. Try to get the support of other family members, emotionally and physically. They may help you fill in some of the gaps and provide a shoulder to lean on. They must also be notified that their information may also be in jeopardy.

11. * Regarding contacting the police: If the imposter is a stranger, don't hesitate to contact the police. However, we do understand that calling the police is a sensitive topic if the imposter is someone you know. Please read through our information in Guide #115. If you wish to discuss how this will impact you, the imposter, and your family, please do not hesitate to contact ITRC. We will answer all your questions so that you can make the decision that is appropriate for you.

Child Victims: Parents will have to act on their behalf.

1. Follow the procedures on Victim Guide 17A, which includes contacting the three credit reporting agencies, reporting the crime to the police and contacting the credit issuers to clear your child's records. When you contact the credit reporting agencies, if there is no report, you will be told that no report if available. That is good news. That means that there is a possibility that nothing has happened. However, some companies do not report applications or accounts, only collection actions - so even a "no report" may change six months later.

2. If you don't have a copy handy, get a copy of that child's birth certificate. You will need to send a copy of it out with most investigation or fraud statements.

3. Only speak with fraud investigators when contacting credit issuers or collection agencies. 4. Keep a detailed log. This log should the name, phone number, and title of each person with whom you speak and summary of the

conversation. You may want to use ITRC's "Organizing Your Case" victim guide to help you. 5. For accounts that have gone to collection, use the ITRC guide designed to help you in that situation. 6. Point out that the child is a minor and that by law is not permitted to enter into a contract. 7. Ask to have all accounts, application inquiries and collection notices removed immediately from your child's credit report. You can do

this via the credit issuer or through a dispute process with the credit reporting agencies. ITRC recommends that you make the request of both groups. In the end, the credit issuer is the final decision maker as to whether to accept the claim of fraud or not.

8. Request copies of all application and transaction records still available. Make copies and provide those to the police investigating the case. The may help you discover how this crime occurred.

9. In the area of criminal identity theft, please use the ITRC victim guide specifically written for that purpose. Again, pointing out that the person they are investigating is a minor will be strong ammunition, especially if the child is very young. You may have to provide an alibi for the child i.e., school attendance records, doctor's appointments.

Page 13: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

10. Do you need an attorney? That depends on the offender or person who is using the information. If the offender is a parent or relative or if this is a case that could be tied into a custody or divorce issue, it may be necessary to involve a family law attorney. This is especially true in joint custody cases. If you have joint custody of the child, timing is critical. If you fear that the offending parent might run off with the child, seek the advice of your attorney as to timing, legal actions that might assist you in protecting the safety of the child or the need to involve child protective services.

11. If the offender is a relative, you might find that law enforcement is reluctant to get involved. You will have to convince them that you will stand up for your child's rights. It is essential that a case of child identity theft is not passed to the family law courts, but is recognized as the criminal crime it is: identity theft and financial fraud.

12. * Regarding contacting the police: If the imposter is a stranger, don't hesitate to contact the police. However, we do understand that calling the police is a sensitive topic if the imposter is someone you know. Please read through our information in Guide #115. If you wish to discuss how this will impact you, the imposter, your child and your family, please do not hesitate to contact ITRC. We will answer all your questions so that you can make the decision that is appropriate for you.

13. Each case of child id theft is different, so please feel free to contact us with any of your questions.

SHOULD I CHANGE MY SSN OR MY CHILD'S SSN? The Social Security Administration has very strict standards about granting new a SSN. We recommend that you read our guide "Should I Change My Social Security Number?" in which many of the specifics are detailed. You will note that in changing one's SSN, you literally separate yourself from any credit or college records attached to that number unless you know how to transfer them without breaching the new number's security. Please contact ITRC if you decide to proceed. In most circumstances, ITRC does not recommend that victims should apply for a new SSN. However, some child identity theft victims can benefit from such an action. Child Victim: This is an individual that has not yet established a credit history and will not lose college or financial records. A child who has not yet reached 18 has nothing to lose by changing his/her SSN provided the original offender does not have access to the new number. That may mean court orders prohibiting the offender from gaining access to that number. Talk with your attorney about this procedure. Adult/child Victim: A young adult that has just started out in life benefits most from a SSN change, if approved by SSA, because you are still in the process of getting college credits and starting a credit history. It is when you have a lengthy credit or work history that things become complicated. If you follow all the repair procedures and the problem continues, this may be the only answer, especially if criminal identity theft is also involved. EMOTIONAL IMPACT Adult/Child Victims: Please read ITRC's victim guides on "The Emotional Impact of Identity Theft" #108 and "What If I Know the Imposter" #115. These might give you a greater understanding of what you are experiencing.

1. If the offender is a parent or guardian: It is understandable for you to feel betrayed, violated, guilty and isolated. This is the person you should have been able to unconditionally trust. Hindsight is perfect and you probably saw signs of the problem long before you pieced together the puzzle.

a. YOU DID NOT CAUSE THIS TO HAPPEN. This person is ill or has significant problems. We understand that knowing this doesn't eliminate or help ease the pain you are feeling.

b. ITRC highly recommends that you seek counseling to help deal with the anger that may eventually boil up and with future trust issues. You have control over how this will ultimately affect your life, and therapy will help you in the healing process.

2. If the offender is a stranger: It is common for you to feel distrustful and wonder about how this happened. Unless you uncover evidence that helps to reveal the offender, trying to reason out how this happened is a waste of time.

3. Each person finds a different way to deal with this crime. Unfortunately, you will need to mature quickly. How this ultimately affects you depends on you, your support team and your ability to understand that one person does not represent the rest of the people you will ultimately meet in your life. To allow this one stranger to affect the rest of your life would be the tragedy- not the crime itself.

Child Victims: A few words of support to the courageous parents who will face the battle for their child's financial future.

Stranger Theft: This crime can affect the way that your child sees the world. It is up to you to help him or her understand that criminals exist in this world, but that they don't have to control the way we live our lives completely.

1. Don't feel the need to involve the child in the activities of clearing records. They don't need this type of education unless they are very mature and old enough.

Page 14: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

2. Familial ID Theft- Now is not the time or the way to get back at your ex. Your child will have a difficult enough time with this emotionally. Don't add to his or her burden. You may want to seek therapy, especially in cases of child ID theft done by the other parent or a relative. This can affect the child's ability to trust or develop lasting relationships. Even adults struggle with this issue.

3. The child needs to know that he or she did nothing to cause this. They need to understand that the parent made a mistake or is ill. If you consider how you talked with your children about a divorce or separation, and remember the reactions to that discussion, the right words will come.

4. Keep any discussion age specific. Clearly, an older child may want more information and be able to handle it. As with any adult discussion, let the child's questions guide your responses and keep it age appropriate. Do not embellish your answers. Keep them simple and to the point. The child will ask more if he or she wants to know more.

5. Your emotions should not enter the conversation. Children often tune into your body language and your tone of voice more than what you say. Be aware of that and how it might taint the discussion. Try to help them understand that stealing is a symptom of a bigger problem.

6. Finally, if the imposter is arrested and is also your child's other parent, clearly that issue will need to be discussed with older children. Let them guide you.

7. Expect rage, denial, embarrassment, fear and misplaced anger. Children act out their feelings more often than they express them. Keep telling them they are loved and that it is okay to express their feelings appropriately. Obviously, kicking walls is not acceptable.

Drawing is another way some children express emotions. Allow them an opportunity to share their drawing if they wish, but don't push it. Let them lead the way; you are there to be available if and when they want you.

Explain that identity thieves will not come and take them away, will not break into the house or hurt them physically. Reassure them that they are safe and that you will not let anyone hurt them. Other behaviors to watch for include nightmares and things they had outgrown such as bedwetting or the fear of sleeping with the lights off. These are indicators of emotional trauma. Keep reassuring them. AND------

Find resources to help you. Consider a good children's therapist who works with crime victims. See the list at the end of this guide for possible leads.

PEARLS OF WISDOM: (We invite you to submit a paragraph for possible addition to this worksheet. Please submit to Linda at [email protected] and include a release to print. Let us know if we may include your name or if you wish for us to change it.)

Advice from one parent to another:

From "Lisa"-- " I have yet to have a heart to heart with my children as the situation of their biological father amplifies. However, my new husband and I have slowly started to talk to them about similar situations and are starting to get a sense of how they would feel and react. We have talked with several child psychologists that recommend waiting until they can fully understand the ramifications of the occurrence as well as waiting until the laws take effect and actions against their father can be taken. My son is approaching high school this year and is interested in obtaining a checking account. So something will have to be done soon as his father has an account in his name. Explain that to a 13 year old. I myself have a wonderful support group of friends and family, who keep me grounded and supported throughout this mess."

PREVENTION RECOMMENDATIONS Be aware that consumers cannot prevent most cases of identity theft. However, there are some steps you can take that can limit the opportunities a thief may take advantage of. There are more tips elsewhere on the ITRC website, including Scam Alerts and Prevention Tips.

Parents: Parents are often asked to show a copy of a birth certificate and/or Social Security card in order for their children to participate in after school sports. Coaches often ask for photocopies of these papers. ITRC does not believe that this is a good security measure and that safer information handling practices should become policy. We recommend the following:

o Ask if the coach has had a criminal and financial background check done by an independent or hiring source. If not, will one be done? This should be an automatic practice due to the amount of child molestation and child information theft.

o Show the papers to the coach and then put them in a sealed envelope. Write your name across the sealed flap in colored ink so that you can tell if it has been opened.

o Initial the back of each page in colored ink that you place in the envelope. At the end of the season you will know if you got the original back.

Page 15: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

o Ask where the papers will be stored during the season. Parents need to make sure that the envelopes will be stored in a locked box and returned unopened after the season has ended, unless you have been notified that there is a need to show them to other people.

o Shred all papers that you throw out that contain account or SS numbers. o Do not carry your or your child's SSN in your wallet, including SS cards. If necessary (i.e. health insurance cards) make a

photocopy of the card, cut off the last 4 numbers of the SSN and carry that photocopy with you on a daily basis. Only carry original cards on days you know you will need them. Then if your wallet is lost or stolen, this information will not be stolen.

Students- when possible, ask your college not to use your SSN as your college ID number. If they insist on doing so, only carry your original card on the days you need it. Ask to not include the number on rosters that others may see and insist that it not be posted in public display areas. Lock your information away. Roommates may seem friendly and end up as good friends, but too many victims have found out that an unscrupulous roommate or friend has stolen their information. Watch your backpacks or any briefcases where you carry your wallets or important papers at all times (including in class, at lunch and in the library).

o Use a locked mailbox to send and receive all mail. Do not leave mail unattended for pickup in an "out" box. o Resist giving out your driver's license number or SSN (or child's SSN) unless they have a good reason for needing it. A doctor's office is a great place for a child profiler to collect information. Make sure that the physician is aware of that and that his or her staff is taking proper precautions with your child's information. Watch for people who may try to eavesdrop and overhear the information you give out orally. o Scams- Please read our scam alert. Parents- Teach children not to give out personal information over the phone and do not give out any of your or your child's information on the Internet unless you are absolutely sure that you are dealing with a legitimate company. When in doubt, don't. You can check out companies with the Better Business Bureau, the FBI or your State Attorney General if you have any concerns. Think first- don't give out information and then later regret it.

RESOURCES Victim assistance professionals have long recognized the value of support groups and counseling for victims of crime. Both you and your child (in the case of child victims) are victims of crime, whether your police department recognizes it as such or not. In some cases, you can seek restitution for the services of a professional therapist should your case go to court.

The following is a partial resource list for those who may not be financially able to afford a private therapist themselves or who may need the name of a good therapy program. We also recommend you look in the front of your local phonebook under Crisis Intervention; Psychologists; Marriage and Family Counseling; Clinical Social Workers; and Mental Health Professionals/Clinics.

o Local religious leader- your pastor, rabbi or minister o Family Service Association o Ask for a low-cost referral from your family physician o School counselors, psychologists or principals o YMCA Family Stress Counseling Services o Your county Mental Health Association o Many counties have Victim/Witness Assistance programs affiliated with your local district attorney or police departments. You might

also look up a Victim Assistance unit of your state attorney general's office. o Many professional counseling associations refer clients to free or reduced cost programs. o Local hospitals often maintain lists of both governmental and non-profit assistance programs. Some sponsor clinics and support

programs. Talk with the mental health department. o Many businesses have an Employee Assistance Program (EAP). You may want to talk with your HR representative to find out about its

availability. o 12-step programs have been of value for some victims. Ones to consider include Al-anon, Ala-teen and Ala-tot. o Older supportive family members or family friends

Page 16: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

IDENTITY THEFT: Firewalls & Computer Safety �������������� ��������������������������������������������

������� �!���"�#$$%�������� "���"�������

�������� �����"������������&'('�����#)*%%�������������!�+#,+)��*-*.)+%./+%-�� ��0�������������������� �1��0������������������� ��

������������ ������� ������� ����� ������ �������� �������� �� ���������������� ����������� ��� ������� ���������� �� ��������������������� ��� ������� ���� ���� �� �� ����� ���������� �������� �������������� ����������������������� ����������������� ������� ����� ������������� ���

DIRECT CONNECTIONS TO THE INTERNET: Protecting Yourself Against Intruders Today people use the Internet to see what movie is playing at a nearby cinema, shop, do homework, pay bills and even for banking. For many of us, email has not only taken the place of postal mail, but also telephone calls. There is an increasing group who has direct connections to the Web through cable modem or DSL, which means you may be hooked up 24 hours a day, 365 days a year. There is one major drawback to being hooked up to the Internet that many of us have either overlooked or are not aware of. Some Internet Service Providers (ISPs) are neglecting to tell you just how vulnerable you are to being hacked. The Internet is like the rest of the world. It is populated with the same kind of people society deals with on a daily basis, including criminals and those who wish to create havoc and chaos. It used to be people would get a kick out of hacking a company's homepage or Website in order to change some graphics. The object was to simply to prove you had the skill to "break into" another computer. Today, computer and database breaches have become more criminally focused. Leaving your computer hooked up to a direct connection without firewall protection software is like leaving your house unlocked all the time. Worse yet, you have a sign hanging out front saying, "Come on in!" When you are connected to the Internet, you literally have access to the world. What some people forget is that this is not a one-way mirror. If you can see out, that means anyone on the Internet, with the right program, can see into your computer as well. Not only that, but they can plant a program into your computer so that they can access it not only at that very moment, but in the future as well. Once a thief gains access to your computer, they can gather all the personal or sensitive information you have stored on the hard drive unless your information is securely encrypted. Social Security Numbers, credit card numbers, bank account information, your budget, and your electronic tax returns - any and all are up for grabs. Identity theft is on the rise, and these pieces of information are the keys that imposters seek. Leaving your computer openly connected to the web without firewall protection, be it via software or hardware, is just asking for trouble. DEFINITIONS: Virus: A virus is a program that reproduces itself by infecting other programs on the same computer. Viruses can do serious damage, including erasing files or an entire hard drive. Others may just do silly or annoying things such as popping up in a window that says, "Ha, ha, you are infected!" Viruses are transferred by electronic contact and usually are attached to a data file. You send it to a friend or coworker by sending a file or an email that contains the virus. Typically you need to open an infected file to activate the virus. Worm: Like a virus, a worm is also a program that reproduces itself. Unlike a virus, however, a worm can spread itself automatically over the network from one computer to the next without attaching itself to another file. Typically worms do not destroy a computer or files. They just take advantage of automatic file sending and receiving features found on many computers. However, a worm can send a virus through your computer to others using this auto-send feature. Trojan horse: Trojan horse attacks pose a serious threat to computer security. The name comes from the hollow, wooden horse the Greeks used to smuggled soldiers into the fortified city of Troy. In today's computer world, a Trojan horse is a malicious, security-breaking program that is disguised as something benign, such as a screen saver, game or joke. It might send itself to everybody on your email address book or IRC channel, erase or modify your files or download another Trojan horse program designed to steal your passwords. Many Trojan horses also allow hackers to take over your computer and "remote control" it. Trojan horses have become more sophisticated in recent years, as hackers use them to scan your system for vital information (credit card numbers, SSNs, bank account numbers), and use the retrieved information to open accounts, run up huge credit card debt, or drain the bank accounts of unsuspecting victims. Trojans can be spread in the guise of literally anything people find desirable, such as a free game, nude picture, MP3 song, etc. You might have downloaded the Trojan from a website or file transfer without even knowing it. That is why it is important to always know what you are downloading and who is sponsoring the program. Hacker/Cracker: When used properly, this term refers to an elite breed of "good guys" who are talented computer programmers. They enjoy solving challenging problems or exploring the capabilities of computers. Like a carpenter wielding an axe to make furniture, the hacker does good things with his skills. True hackers subscribe to a code of ethics and look down upon the illegal and immoral activity of crackers (defined above). When the press uses "hackers" to describe virus authors or computer criminals who commit theft or vandalism, it is not only incorrect, but also insulting to true hackers. The correct term for a hacker that uses this skill for criminal purposes is "cracker."

Page 17: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

Firewall: A firewall is a device, either software or hardware driven, that enforces an access control policy between two networks. A PC connected to an ISP, for instance, represents a bridging of two networks. A firewall can be thought of as a pair of guards: one blocks traffic and the other permits traffic. Some firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic. The most important thing to recognize about a firewall is that it implements an access control policy. That means you have control over what program or website is allowed to mingle with your computer. Even if you are unsure as to what kind of access you want programs or websites to have to your PC, it is vital as a cable modem or DSL user that you employ a firewall. Most firewalls manufactured today come with pre-set recognitions of those popular programs that most folks tend to have on their PCs, and therefore take much of the guesswork out of a user having to determine what programs should communicate via the Internet (and either send or receive information) or not. Even dial-up Internet users, should they be of the sort who remain online for hours on end, should have some sort of firewall protection, just in case. For such folks, there are a good number of free firewall programs available to suit their needs. Software-driven firewalls: A software firewall is okay for one computer connected to the web. Windows XP includes a limited firewall. You probably should consider adding an extra level with another program as well. There is an excellent free software firewall available from www.zonelabs.com/zonealarm. It is easily configured and can be tailored to meet your needs. There are many others but at this time (Aug 2003), Zonealarm still ranks as the best free program. Hardware-driven firewalls: If you have a small home network (two or more computers) you should look at a hardware-based firewall. A hardware firewall is vastly superior to software solutions because a computer running Firewall or other protection software is still visible on the Internet. There are several good ones available. D-Link makes a Cable/DSL Router which has a configurable firewall built right into it. The DI-701 looks like your computer on the Internet to hackers and it hides your real computer. Like a decoy, it stays visible so any attacks will be directed at it. The only thing the hackers see is the router, and they can try to hack that all they want. This should prevent damage to your expensive computer, as well as protect valuable personal information. Routers cost $400 to $500 dollars just a year ago. You can now pick one up like the D1-701 for less than $100. If you would like to read more about the D1-701 go here: http://www.dlink.com/products/broadband/di701/ HOW TO PROTECT YOURSELF:

o Install a firewall to protect your information. Remember that your ports are open doors that allow traffic in and out when your computer is connected to the Internet. Many people believe that if the company they shop with or bank with is protected, their own PC is protected. That couldn't be further from the truth. You still need to put a firewall around your PC to keep crackers and hackers out when you are online. This has nothing to do with the transactions you do with a bank or merchant. When your computer is online it can be tapped by anyone at any time, completely separate from the transaction you have just completed. Crackers can see any part of your hard drive: your tax records, the account numbers you placed in the computer for record-keeping, your bank information, even your letter to Aunt Mary.

o Install reputable anti-spam and anti-virus software. Most reputable anti-spam software programs today are also programmed to identify known viruses, which could contain Trojan horses as well.

o Keep your anti-virus, firewall and operating systems updated. Run an update at least every two weeks. You may need to do this more frequently if there is an alert about a particular virus. If you see a "time to update" notice sent by the supplier of your operating system, do so.

o Be certain of BOTH the source AND content of each file you download! Don't download an executable program just to "check it out." If it's a Trojan, the first time you run it, you're already infected! In other words, you need to be sure that you trust not only the person or file server that gave you the file, but also the contents of the file itself. Remember that a virus or Trojan horse might cause your friend's computer to automatically send you the questionable file. In general, there is no reason for even a friend or colleague to send you an executable file. When in doubt, ask them first. Be aware that "free" programs or spam might also contain a troublesome file. If you download commercial games or other software from unknown shareware sources or "spam," it's just a matter of time before you fall victim to a Trojan.

o Be cautious of dealing with pop-ups. This is a perfect place to plant a virus or Trojan program. You never know who wrote the program or that person's intent.

o Beware of hidden file extensions! Windows by default hides the last extension of a file, so that innocuous-looking picture "susie.jpg" might really be "susie.jpg.exe" - an executable Trojan! To avoid being tricked, unhide those pesky extensions .

o Don't be lulled into a false sense of security just because you run anti-virus programs. Many of anti-virus programs do not protect against all viruses and Trojans, even when fully up-to-date. You need both virus protection and firewalls programs to be fully protected against identity thieves.

o If you are an online multi-gamer type, do not publish your I.P. address on websites or newsgroups, unless you are very sure that you are fully protected. You would be much better off logging into others' game servers, than inviting others to log onto your game server at a precise I.P. address.

Page 18: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

o Backup your system! One of the best ways to protect yourself in the result of a virus attack is to have a clean set of backup disks/tapes/CDs that will fully restore your system (without the virus) and the applications you are using. Too often, home computer users fail to protect themselves in this manner. With CD burners and accompanying software being relatively inexpensive, a full system backup can quickly restore your computer in the event that your hard drive has to be reformatted.

o Turn off your computer when not in use. If you are not connected to the Internet, you cannot be infected, hacked or hijacked. o Use common sense. When in doubt, assume the unknown attachment is a virus. Pay attention to virus alerts. Don't even consider trying

to outsmart those who have created these malicious programs. Reconsider storing personal information in your computer. Transfer it to a CD and use the CD when you need the information. This is especially true of passwords, SSNs, tax and financial records.

In closing, jumping on the direct connection bandwagon can be safe and fun as long as you protect yourself adequately from unwanted intruders by using either a software or hardware firewall, practicing safe techniques and keeping virus protection updated. For further information on firewalls visit the following links:

• http://www.firewallguide.com/

• http://www.howstuffworks.com/firewall.htm

• http://www.greatcircle.com/gca/tutorial/bif.html

The information in this publication is the property of ITRC. It is not available for promotional purposes. Copyright 2003. All rights reserved. Any requests to reproduce this material should be directed to ITRC. E-mail: [email protected]. ITRC thanks Linda Foley, Jay Foley, Steve Allen, Ted Furlipa, Ronnie Wilson and our staff for their assistance in this project.

Page 19: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

IDENTITY THEFT: When You Personally Know the Identity Thief Co-Written by: Linda Foley, Identity Theft Resource Center Executive Director And: Mari Frank, Esq: Attorney, Author, and Identity Theft Expert Email: [email protected], Web: www.identitytheft.org Resource Material of: www.idtheftcenter.org Email: [email protected] Copyright: Linda Foley and Mari Frank, March 2002. Revised 2/03. Revised 10/04. All rights reserved. The text of this copyrighted document may not be altered without express authorization of the Identity Theft Resource Center. The information in this publication, including the Form Letters, are not to be considered legal or psychological advice. This information is a resource for you and has been helpful for other victims in similar situations. If you have any legal questions or concerns, you should consult with a consumer law attorney.

WHEN A FRIEND, FAMILY MEMBER, CO-WORKER OR EX-SPOUSE STEALS YOUR IDENTITY: WHAT ARE YOUR OPTIONS WHEN YOU KNOW THE IMPOSTER? Case 1: "My adult daughter used my information without my knowledge to open several credit cards and buy a car. She hasn't paid on any of these accounts and now the bank and credit card companies want me to pay. What do I do? I don't want to see her go to jail." Case 2. "My father has a gambling problem. He opened several checking accounts in both my name and my brother's name. Then he wrote bad checks for his debt. He's 68 years old and my family thinks we should just pay off the debt. I know that if we do, he'll just do it again. What do you advise?" Case 3. "My ex-husband is using my 8 year old son's SSN to open credit cards. He even got a driver's license using his information. How do I stop him?" Case 4. "My friend apparently went through my papers one day and found my SSN. She has several credit cards that she applied for in both of our names. I found out when I applied for a card and it was denied. She says she will pay off the cards but can only afford $20 a month. The credit card companies want all of it now. I can't afford to pay these off. It is more than $10,000. What do I do? She won't sign a letter saying these are really her cards because she is afraid they will arrest her." Identity theft is a complex crime at best. When the imposter is someone you know, the impact of the crime magnifies dramatically. How do I prosecute my own mother? What kind of father would I be if I allowed the police to arrest my son? Should I practice "tough love?" What will the other family members think of me? What will my friends say? If the imposter is an ex-spouse, the crime borders on abuse and harassment. You basically have three choices:

• Proceed as if this was a regular case of id theft- reporting the imposter to the police and following through in helping law enforcement eventually arrest and prosecute the imposter

• Working with the creditors to see if a resolution can be made without police involvement • Paying the debt and living with the consequences

THE REALITY OF THE SITUATION Let's look at this situation from various points of view. The law. If you do not report this case, there will be no police report, and no investigation. If you want the protection of the law as a victim of identity theft (and all the benefits you gain as a recognized id theft victim), you must make a report. You are not an accomplice or co-conspirator unless you knew about the fraud for a while and did nothing to stop it, or if you participated in the fraud yourself. If you refuse to make a report, you may appear suspect when you try to clear the fraud activity (civil or criminal). Credit card companies and financial institutions. The credit card companies and financial institutions want their money back. That is a reasonable expectation. They know a percentage of people will claim a crime was committed (stolen card or identity theft) in order to get out of paying a bill. One of the standards they have adopted to separate the "deadbeat" from a true case of identity theft is that a person will probably not file a police report if they are making a false claim. It is your task to convince them that another person has taken over your accounts and/or opened new accounts in your name - all without your permission or knowledge. You will have to prove that you have not benefited financially from these accounts. Unfortunately, without a police report, your job will be much tougher. Credit card companies do not take victims as seriously without a police report. The imposter. There are as many reasons to steal as there are imposters. The imposter may have an emotional problem or addiction that forces them to seek more money than they can afford. Examples are gambling, drugs, shoppaholic, or the need for attention. The imposter might be in severe financial straits and decide this is the best way to balance things out. Some imposters use identity theft to abuse the victim, as in the case of an ex-spouse, former boyfriend/girlfriend or an angry child.

Page 20: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

Some imposters do not believe that they have actually harmed the victim. They rationalize that the credit card company will absorb the loss and the victim will be forgiven the debt. The imposter does not realize the emotional and financial impact of this crime or the extensive hours and cost of clearing up compromised financial records. We know of a case of an adult child where the mother has used her identity, and she is now unable to even rent an apartment. She is forced to live at home, with the imposter who created the problem. The reality is you must realize that this was a choice made by the imposter. We all have choices and there is always a better solution than to steal. They have chosen to sacrifice you for their own needs. The victim. When you personally know the individual who has used your information, the emotional impact of identity theft dramatically increases -- the sense of violation and betrayal, embarrassment for yourself and the imposter, the abuse of trust, even your feeling of how you evaluate others. You may feel that this decision is not cut and dry. That feeling is one that many family id theft victims experience as they begin to explore their options. It has many ramifications, for you and for those who know both you and the imposter. And those who know both of you may put pressure on you to assume the responsibility for the crime to protect the criminal. As you explore this subject, you will find the indecision seems to lift and you are able to see the path you eventually will choose to take. One victim put it this way: "The person who stole my identity was a friend. When I first found out, I was angry at what she did to me, apparently without concern for my feelings or financial security. I reported the situation to the police and then spent the next few weeks worrying about her safety. Would she be arrested? Would she be angry with me? She did get arrested and pled guilty. The day they took her from the courtroom in shackles was a very difficult day for me. I had a lot of mixed feelings. I knew she would not be able to hurt me for a while, that she would pay for her crime. People told me I should be celebrating. But how do you celebrate when you get to walk in the sunlight and the person you thought was a friend is behind bars, on a cot, alone and unable to feel the breeze on her face? It took me a while to stop identifying with her. I also had to make peace with myself. I was not the cause of the crime. I was simply a way for her to get money. By going to the police, I had actually given her a gift. A chance to change her ways and get her life together. I finally realized this crime was not about me. It was about her and her problems. I was just an innocent bystander. She was not capable of understanding friendship." WHAT IF YOU SUSPECT THE IMPOSTER IS SOMEONE YOU KNOW? Normally these are the steps you would take: 1. The first step is order copies of your credit reports from Experian, TransUnion and Equifax (see Factsheet 17a at www.idtheftcenter.org). We recommend you place a fraud alert at the same time that your order these reports. These reports are free if you believe you aree a victim of financial crime or have been refused credit or a job. With this evidence (the info from your credit reports) call the police and file a police report. 2. Call all the companies or collection agencies that list an account that you have not personally opened or that show a pending application. Let them know this is a case of identity theft and find out what steps you must take to clear their records. Ask that they investigate the case, remove the information from your credit reports and finally ask these company(ies) for photocopies of the fraudulent applications and credit slips for purchases made. It is federal law that they must provide these to you (with a written request accompanied by a police report- Cantwell/Enzi amendment to FACTA- effective date June 2004) This is very important. With those, you can show that the signature is not yours. You might also recognize the writing, the address used, the purchases made, or the location of purchases. You may use the ITRC letter form (Under Letter Forms- #1) to make this request. 3. If the company refuses to give this documentation to you, contact the Federal Trade Commission (877-ID THEFT) and ask for their help in getting the information. 4. Remember, you are not liable for this debt, and the company is taking advantage of the fact that you are a family member if they insist that you pay. We hope you have not paid a penny of the fraudulent credit card accounts. If you have, your case is much harder to fight. Please do not be tempted into paying any of the debt. 5. Keep trying to get the company to remove the debt. If they won't give you the photocopies of the applications, and if they won't remove the debt from your credit reports, you may have to consider hiring an attorney. 6. New Federal Law- part of FACTA: If you have a police report listing all the fraud accounts, the credit bureaus must block the fraudulent accounts from your credit reports within 30 days. But that means you must file a police report first.

Page 21: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

YOUR OPTIONS There are many ways in which you can handle this situation. (1) You can deal with it by deciding not to shield the imposter and report him/her to the credit issuer(s) and to law enforcement. (2) You can seek mediation, when a third party is hired to help you arrive at a solution that both you and the imposter agree to. (3) You can also encourage the imposter to seek mental health counseling. (4) You can deal with the credit issuers yourself. (5) You can seek legal help. Or you might choose a combination of all these approaches. 1. Dealing with the situation: The following are several situations in which you, the victim decide to deal with the matter by not shielding the imposter. Situation One: Treat this like any other case of ID theft as listed above. The person who used your information showed a lack of concern for your safety and financial good health. The old saying, "I didn't think it would really hurt you; the credit card companies just write off the loss," cannot be allowed as an excuse. If you have approached that person and told them you have a problem they caused AND they don't respond with an offer to make it completely right immediately, they've told you their answer. Why would you continue to protect someone who is putting you at risk? It is difficult, but sometimes the best gift we give someone is to practice "tough love." By contacting the authorities and cooperating fully, you have not caused this person to be arrested. They caused this by their own actions. They have entered a life of crime and by stopping them you may actually prevent them from moving into a more dangerous situation, one that is life threatening. Identity thieves are often repeat offenders. They move from crime to crime, escalating as they continue their behavior. The imposter will not recognize this gift you have given them now. After therapy and dealing with the court system, they might. They also might never forgive you. In your heart, you must understand you did the right thing, sometimes the most difficult action you will ever take. Please be careful if you think this person may become violent. Do not confront him/her. Speak to law enforcement and make sure you protect yourself. Situation Two: The imposter admits guilt and will sign a form transferring responsibility from the victim to himself/herself. Contact the credit card company(ies) and let them know about the situation. See if the credit issuers will allow this procedure. Many will not. It is important for you to understand- THIS IS NOT AN AGREEMENT BETWEEN YOU AND THE IMPOSTER. IT IS AN AGREEMENT BETWEEN THE IMPOSTER AND THE CREDIT ISSUERS. Send Form Letter 2, below, with the affidavit the creditor sends you. We recommend that the imposter provide you with a check in their name for at least 15-25% of the debt to mail with the documents or whatever the credit issuer demands as a first payment. They may ask for all of the money or they won't agree. Be prepared for that answer. The check should be made payable to the credit issuer, not you. Situation Three: The imposter admits theft but will not sign forms. You can try mediation and hope the imposter repays the creditor. To protect yourself, gather documentation about the crime and send Form Letter 1, below, or use the standard fraud form provided by the Federal Trade Commission along with your police report (form available at www.idtheftcenter.org) to the credit issuer. Situation Four: The imposter will not admit guilt and you have conclusive proof of the crime. To protect yourself, gather documentation about the crime and send Form Letter 1, below, to the credit issuer or use the standard fraud affidavit provided by the Federal Trade Commission along with your police report. Situation Five: The imposter will not admit guilt, you have conclusive proof and the imposter is a repeat offender whom you have confronted prior to this new theft. See Situation One above. Situation Six: Your whole family tells you to forgive the imposter and they will help you pay off the bills slowly together. Seek mediation and family therapy. Have the family work out an agreement in writing, signed by all parties, to put the debt in the imposter's name to pay it off. See Form Letters 2 and 3 below. UNDERSTAND- any negative information on your credit report will remain on your report for seven (7) years if this process is used. You have basically assumed responsibility for the debt. Situation Seven: The creditor denies that an imposter has stolen your identity despite the proof you have provided or despite admission by the imposter. You believe that the creditor is going to continue to go after you since the imposter does not have any money and you do (the deep pocket theory). In this case we recommend you speak directly with the vice-president of customer service for the company. You might also ask for help from your state attorney general's office or Federal Trade Commission claiming unfair business practices. Situation Eight: The perpetrator is your ex-spouse or soon to be ex-spouse. If the person has opened up credit cards in your name, without your authorization, we recommend that you have your divorce attorney address this as part of the divorce proceedings or settlement. If the divorce is final, you may choose to deal with this as in Situation One above or go back to your divorce attorney for additional court assistance - such as a cease and desist order and an order that the perpetrator spouse pay off the debt. Unfortunately, many law enforcement agencies will see this as a continuation of domestic civil action and may not be willing to get involved. Your determination and professionalism in how you deal with the police may sway them to take action. Send a copy of the divorce decree with a cover letter to the creditors and let them go after your ex-spouse.

Page 22: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

2. Mediation. In this situation, you decide to inform your friend or family member that you don't want to be forced to take legal action and therefore are willing to go to a mediator to work out a structured solution and legally binding agreement as to the circumstances. (There are some low-cost community mediation services.) Work out an agreement in writing, signed by all parties, to put the debt in the imposter's name to pay it off. See Form Letters 2 and 3 below. If the party refuses to cooperate, take whatever action is necessary to protect yourself (for example, a police report). Remember, that if the debt is paid off under your name any negative information on your credit report will remain there for sever (7) years. 3. Therapy. Whatever option you choose, you may want to look into emotional counseling, for yourself, the imposter, and for your family if the imposter is a family member. This is a challenge and all involved must learn "boundaries." For the victim: It often benefits victims of familial identity theft to talk with a professional, either to help you make your decision or live with its consequences. For the imposter: This person has issues that need to be identified and dealt with. Possible therapies could include anti-theft counseling, anti-substance abuse counseling (for example, alcohol, drugs, gambling), responsible financial management, developing a conscience, accepting responsibility for one's actions, etc. For the family or between the victim/friend: The bottom line is that you will eventually all have to live with the consequences of the actions taken by the imposter. You need to talk out your anger (and you will experience anger), open new lines of communication, and see how interactions might have led to this action. You also need to establish boundaries to avoid new cases of abuse/identity theft. 4. Dealing directly with the credit card companies and/or collection agencies. In this situation, do not lie at any time to any of the companies. If you are not absolutely certain of your imposter's identity, you should not make an accusation. It is sufficient to provide all necessary documentation to show that the accounts are not yours. Situation One. If your imposter admits that he/she obtained the credit in your name, and will take over the account, and if the imposter has no means to pay and has poor credit, the creditor may pressure you, the victim, to keep the account in your name. You must refuse to do this. If the creditor will not transfer the account, it will have to absorb the losses. Situation Two. If the imposter refuses to accept responsibility, and the creditor knows it is a family member, they cannot force you to make a police report, but they may refuse to accept it as fraud. So you may be forced to file an informational report with the police, or the creditor or company(ies) involved can be the one(s) to file the report. You have the right to ask the creditor to file the report instead of you. However they may refuse to get involved. You must provide evidence of your innocence to law enforcement and the creditors. 5. Seeking legal assistance. If your impostor has committed crimes in your name, you should definitely contact a criminal defense attorney and have him/her help you to clear your name from the FBI and state criminal records databases. If your family member committed financial fraud, and the creditors will not remove the fraud after you have written letters, you may need to hire a consumer law attorney. For referral, contact the National Association of Consumer Advocates your local state bar association or other resources in The Identity Theft Survival Kit available at www.identitytheft.org. It provides additional attorney-written letters on diskette dealing with this situation.

Page 23: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

IDENTITY THEFT: Overcoming the Emotional Impact �������������� ����������������������������������������� ���� ����������������������� ��� ��������������������� ��

�� ��!"�����������"������������������������#� ������� �������$%%%#�&�����!"�����������#���������''(%'��$(%)��

������������������ ������������������ ������������������������������������������������������ ���������������������������������������������������������������������������������� ������������������

You've been spending hours writing credit card companies, calling merchants and spending time on hold with credit bureaus waiting to report the crime and request your credit report. Each time you answer the telephone or go to the mailbox, you wonder what new bill will appear. The idea of dealing with yet another collection agency or a newly discovered credit card leaves you filled with dread, rage and helplessness. It is NORMAL for this crime to have an emotional impact on you and your family. In fact, it would be unusual if it did not. Identity theft is a complex problem. Therefore, it is not surprising that some victims react as survivors of prolonged, repeated trauma, much like battered women or prisoners of war. In fact, victims may compare the crime to rape or torture. Some feel like they are experiencing a form of "post-traumatic stress disorder" for a short time. At one point or another, victims of identity theft may feel overwhelmed by the psychological pain of loss, helplessness, anger, isolation, betrayal, rage and even embarrassment. This crime triggers deep fears regarding financial security, the safety of family members, and the ability to ever trust again. It is not uncommon for identity theft victims to shut down emotionally and withdraw from family, friends and co-workers. You might suspect that someone you know committed this crime. Perhaps you might feel that no one seems to care or understand how devastated you are by the crime. Let's face it: many friends and family members get tired of hearing about the crime after the first or second time. Unfortunately, it may take months for this to be completely cleared up, and you may need to talk about it for more than a couple of days. Dealing with the mess left by an imposter is only part of your job. This crime, like other long-term crimes that involve repeated emotional abuse, can affect not only your emotional stability but that of your family. So, while you take care of the paperwork, don't forget to leave a little time to work on healing your and your family's emotional wounds.

THE MOMENT OF DISCOVERY: Be prepared for a roller coaster ride of emotions. As the implications sink in you may well find yourself cycling between denial ("This is not happening.") and rage ("How dare they!"), endless questioning ("How is this possible?" "Why me?"), and hopelessness and vulnerability ("Nothing can protect me"). This is normal and should be expected. Few people are emotionally protected from the impact of identity theft. There is a profound loss of innocence and trust associated with this crime. You may also have to deal with the fact that someone you know personally may be involved in the theft. That's a lot to absorb. Finally, you may feel stonewalled by the very people you turn to for help: the police and criminal justice system. Identity theft is a difficult crime to solve, and the wheels of justice are still very squeaky. Be patient with yourself and with those who want to help. STARTING THE HEALING PROCESS and REGAINING EMOTIONAL BALANCE: While it might take some time to straighten out the paper trail, it is important for you to regain your emotional balance as quickly as possible. The feelings you have are valid. You have been harmed. Recognizing and accepting your fears, apprehensions and frustrations is the first step. They might even sneak up on you, unexpected, sometimes long after the original crime, triggered by a situation most people would just shrug off. Don't berate yourself. Such emotional floods are a part of the healing process.

• Embarrassment is a waste of time and energy. Some people become embarrassed at becoming an identity theft victim. They feel ashamed and that they did something wrong or maybe deserved to have this happen to them. No one deserves to be a victim of identity theft. We'll say that again - No one deserves to be a victim of identity theft. We all do foolish things, moments we would give anything to get back and do just the opposite. That's in the past and beating up on you will not make this go away. It's wasted energy and you'll need all you have to clean up your records. The key to combating identity theft is not, nor has it ever been, up to the victim. We are not the first line of defense. It is up to the business community to protect us by practicing safer information handling procedures and safeguarding one of our most valuable possessions - our identifying information.

• You are not alone. In 2002, there were more than 700,000 new victims of identity theft. That averages to about one every 40 seconds. While support and assistance is not as complete as we'd like to see it, there are many resources for victims of identity theft today. You don't need to be alone through this crisis, if you choose not to be.

Page 24: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

• Appreciate the value of a support team. The emotional damage and isolation you feel can be compounded if you believe family members or friends don't understand what you are going through. The reality is that people who have not gone through identity theft may not recognize the on-going nature of this crime. They may expect that after the initial crime, you should just go on with your life or they may simply tire of hearing about your problem. Many victims find that after they explain how they feel and ask for on-going support, their support team is more open to being there through the long haul.

• Personality Changes. It's not surprising that something like identity theft may cause a certain amount of personality changes including the ways you relate to others. Identity theft attacks our belief in the trustworthiness of others. Some victims go through a period of time when they refuse to give anyone any information. We know of one victim whose employer stole her identity and refused to include her social security number and driver's license number on job applications. It took almost six months for her to find an employer who would interview this "uncooperative" applicant.

• Many victims never see the world with the same innocence again. Identity theft is life altering. However, if you feel the changes have gotten out of hand, or people on your support team raise some concerns, it can be very helpful to seek professional help from someone who understands identity theft response or victimization.

OVERCOMING FEELINGS OF POWERLESSNESS:

• Recognizing your emotions. An emotion is your reaction a situation. While it may not always seem like it, your reaction is under your control. When you say, "He made me angry," you are mentally giving another person your power over your reaction. He didn't make you angry - in that split second, without conscious thought, you chose to become angry. That awareness is a step in regaining control over the situation.

• Be consistent and organized. In terms of paperwork, consistence and organization are the key. Keep track of whom you talk with and what needs to be done next. Keep a journal with a calendar of "things to do." If you can control the process, you will start to feel more on top of the mess.

• Don't forget the rest of your life. Emotionally, at times, it is going to feel like everyone has control of your life but you. You might feel battered and bounced from one person or agency to another in your quest to clear your name. While identity theft seems all-consuming, it is important to acknowledge the other parts of your life that this crime has not touched. Focus on your accomplishments in life both in the past and currently.

• Accentuate the positives. Finally, some victims find a gift in identity theft. They learn how powerful they truly are. They find an assertiveness they never exercised before. They learn how to talk with high level people and get what they want, sometimes with a boldness they never knew they had. In addition, they find who their true friends are.

TAKE TIME FOR YOURSELF:

• Be kind to yourself. Cleaning up the problems left by identity theft can become a full time job. Take the time to pamper yourself and your support team. Now is the time to take advantage of those two-for-one dinner coupons, offers from others to baby-sit your kids or help do carpools or even the housekeeping. This might even be a good time to enjoy a weekend away from town, maybe with someone you care about. This is not a time to start a new diet. Listen to your body. It will tell you what it needs - rest, a massage, a day at an amusement park, comfort foods (in moderation), a night at a comedy club, or a long bath.

• Exercise. Exercise is a wonderful way to relieve stress and get away from the telephone. Take a long walk in the park, at the beach, or around your favorite lake. Play a round of golf or tennis or even go horseback riding. Swim some laps or go fly a kite. Learn a new sport or hobby.

• Set limits. Finally, don't be afraid to say "no" to requests for your time. Don't be afraid to speak out when you feel taken advantage of. Identity theft cannot become the only part of your life that you see.

A SPECIAL NOTE TO VICTIMS WHO ARE THE FINANCIAL HEAD OF HOUSEHOLD: Identity theft plays special havoc on those who are financially responsible for others or who are their only source of financial support. This crime threatens your credit rating, may affect your ability to get a loan or purchase a big-ticket item and even temporarily jeopardize your existence, as you know it. However, please know you have not let your family down. You did not cause this to happen. You are an innocent victim.

Page 25: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

We find that being honest with other members of the family takes the unbearable weight from your shoulders. You need to hear them say they don't blame you, and they don't. You have enough to deal with in the paperwork alone. Let your loved ones and friends help with the emotional burden and even some of the paperwork. Few of us can conquer this alone. FEELINGS ABOUT THE IMPOSTER(S): Whether you know the imposter or not, you may give a lot of thought to the person behind the act. If you know the imposter: You may feel more pronounced feelings of betrayal, especially if the person was a friend or family member. It may be very difficult to turn this person in to the authorities. The decision has many ramifications, for you and for those who know both you and the imposter. You might want to seek counseling, either to help you make your decision or live with its consequences. Please refer to our guide on Family Identity Theft (ITRC Fact Sheet #115). If you are a friend/relative of a victim, you need to be supportive. This victim is dealing with much more than a crime. They may feel in a no-win situation, especially if they are being pulled in two different directions- turn the person in and betray the imposter or don't act and betray the person insisting on action. If the imposter is still unknown: Victims often report a feeling of insecurity, wondering if the person standing next to them in the market or walking past them on the street may be the imposter. They may distrust everyone, feeling tremendously vulnerable. It's important to put the crime in some sense of proportion in order to function. This may mean focusing on the crime and not the criminal. To everyone: Making sure the person is arrested may not always bring you peace. Identity theft is epidemic and you are not immune to future crimes by other imposters. An arrest does not make the imposter accept guilt. Peace is yours to create, accept or deny. MOVING INTO ACTIVISM: Some crime victims find that by moving from their personal experience into a broader world, they begin the healing process. Here are some ways that you can help others while helping yourself:

• Join or begin a identity theft support group • Help other victims • Work to change laws • Increase public awareness • Increase corporate awareness • Help to increase understanding of this crime with law enforcement, district attorneys and victim assistance personnel • Get involved in community volunteer policing programs

The Identity Theft Resource Center can help you begin a support group, contact one in your area or become more active in creating public and legislative awareness. Contact us at [email protected] or by phone. SHOULD YOU CONSIDER PROFESSIONAL HELP? Without intervention, some victims can become so chronically dysfunctional that they are unable to cope any longer. They may be severely depressed - some symptoms are exhaustion, overeating, anxiousness, drinking, forgetful, or an unwillingness to leave home or their bed. Don't wait until you feel lost at the bottom of a pit. Even if you don't feel overwhelmed, talking to a trained professional who specializes in crime victims can be very beneficial. This could be a religious leader (i.e., minister, rabbi), a licensed counselor, psychologist or psychiatrist. Going to someone should never be considered a sign of weakness. You are going through a very stressful time and need to talk about your feelings. Victim assistance professionals have long recognized the value of support groups and counseling for victims of crime - and you are a victim of crime, whether your police department recognizes it as such or not. In some cases, you can seek restitution for the services of a professional therapist should your case go to court. The following is a partial resource list for those who may not be financially able to afford a private therapist themselves or who may need the name of a good therapy program. We also recommend you look in the front of your local phonebook under Crisis Intervention, Counseling and Mental Health.

• Local religious leader- your pastor, rabbi or minister • Family Service Association • Ask for a low cost referral from your family physician • YMCA Family Stress Counseling Services • Your county Mental Health Association • Senior Citizens: The Agency on Aging and Independence and AARP have referral programs.

Page 26: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

• Many counties have Victim/Witness Assistance programs affiliated with your local district attorney or police departments. You might also look up a victim assistance unit of your state attorney general's office. • Many professional counseling associations refer clients to free or reduced cost programs. • Local hospitals often maintain lists of both governmental and non-profit assistance programs. Some sponsor clinics and support programs. Talk with the mental health department. • Many businesses have an employee assistance program. You may want to talk with your HR representative to find out about availability. • NOVA- the National Organization of Victim Assistance has a web site (www.try-nova.org) and can be contacted for referrals of victim assistance professionals in your area.

CLINICAL SYMPTOMS OF CRIME VICTIMS: Many victims compare identity theft to rape, others to a cancer invading their lives. Many of the symptoms and reactions to identity theft victimization parallel those of violent crime. The following information is for understanding and, perhaps, to reassure victims that what they are experiencing is not abnormal. The reaction to identity theft can run the full spectrum from mild to severe. Clearly, the complexity of the crime itself will also define the severity of the impact, as will any other traumatic events that may occur around that same time frame. Impact: The moment of discovery.

• Can last from 2 hours to several days.

• Reactions include shock, disbelief, denial, inappropriate laughter, feeling defiled or dirty, shame or embarrassment. • Recoil:

• Can last for several weeks or months, especially as other instances of theft are uncovered.

• Physical and psychological symptoms may include: heart palpitations, chest discomfort, breathing difficulties(i.e., shortness of breath, hyperventilation), dizziness, clumsiness, sweating, hot and cold flashes, elevated blood pressure, feeling jumpy or jittery, shaking, diarrhea, easily fatigued, muscle aches, dry mouth, lump in throat, pallor, heightened sensory awareness, headaches, skin rashes, nausea, sexual dysfunction, sleep disturbance.

• It is not uncommon for victims to frequently search through events trying to pinpoint what they did to contribute to this crime.

• Anger, rage, tearfulness, overwhelming sadness, loss of sense of humor, an inability to concentrate, hyperprotectiveness, and a deep need to withdraw are all part of the psychological reactions to identity theft.

• You may misplace anger on others, especially loved ones causing family discord. Those who tend to lean on unhealthy habits such as under or overeating, smoking, alcohol or drugs may be drawn to those addictions for comfort.

• During Recoil, victims may experience a sensation of grief. They may grieve the loss of: financial security, sense of fairness, trust in the media, trust in people/humankind and society, trust in law enforcement and criminal justice systems, trust in employer (especially in workplace ID theft), trust in caregivers and loved ones, faith, family equilibrium, sense of invulnerability and sense of safety, hopes/dream and aspirations for the future.

• At one point or another, almost all victims will also grieve a loss of innocence, sense of control, sense of empowerment, sense of self and identity, and sense of self worth.

• Equilibrium/Balance/Recovery:

• In identity theft, this phase may come as early as several weeks after the crime and for others may take months or years. It usually depends on how quickly the actions of the imposter are resolved and cleared up.

• For all victims, achieving balance and entering recovery will take awareness and purposeful thought.

The information in this publication is the property of the IDENTITY THEFT RESOURCE CENTER and not available for promotional purposes. Copyright 2000. Revised 2/03. All rights reserved. Any requests to reproduce this material, other than by individuals for their own use or for a loved one, should be directed to the IDENTITY THEFT RESOURCE CENTER. E-mail: [email protected] Identity Theft Resource Center wishes to acknowledge the invaluable contribution and assistance of Dr. Charles E. Nelson, Ph.D. in the creation of this information sheet. He is the director of the Crime and Trauma Recovery Program in San Diego, CA. This program has worked with crime victims and those who love them since 1976. Victims who wish to contact him directly may reach him at (858) 546-9155. IDENTITY THEFT RESOURCE CENTER also thanks Mari Frank, Esq., Bronti Kelly, Elsie Strong (Victims of Identity Theft, Los Angeles), the US Department of Justice/Office for Victims of Crime and Beth Givens from Privacy Rights Clearinghouse for their insights, advice and information.

Page 27: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

IDENTITY THEFT: Travel Tips Written by: Linda Foley, Identity Theft Resource Center Co- Exec. Director with contributions from the ITRC staff Resource Material of: www.idtheftcenter.org, Email: [email protected] Copyright: Identity Theft Resource Center, Inc. and Linda Foley, June 2004. All rights reserved. The text of this copyrighted document may not be altered without express authorization of the Identity Theft Resource Center. This fact sheet should not be used in place of legal advice.

Whether you travel for business or pleasure, a traveler must be on the alert for opportunities that an identity thief may try to take advantage of. Unfortunately you cannot trust anyone you meet - housekeeping staff, bellmen, security guards, front desk clerks, etc. The following items have been contributed by our ITRC staff, many of whom travel for business or pleasure. Some have had their identities stolen while on a trip and it is in their honor that this sheet has been written.

1. Checks- Leave checkbooks and checks at home, in a locked safe. Checking account takeover is one of the hardest types of financial fraud to clear up. Too many people leave checkbooks in suitcases or use them for purchases in stores where they don't know the clerks. It is better to use cash, traveler's cheques or credit cards for purchases.

2. ATM/Debit cards/Credit Cards- Many people believe that an ATM card which is also a debit and credit card is perfectly safe because you need a PIN to use it. That is only true at an ATM machine. Unfortunately, ATM scams are very common and fake ATM machines have been placed in high tourist areas. They contain a camera that records you typing in your PIN number. The fake machine also has a computer storage device that reads the back of your ATM card.

The second problem with ATM/Debit/Credit cards is that the PIN is not necessary when used as a debit or credit card. It actually acts as a check and immediately withdraws money from your account. You don't find out about the problem until your get your bank statement. A lost ATM/Debit/Credit card can be quite costly and while the money should be replaced once the card is reported as lost (if within the contractual time period), it takes time for the money to be replaced in your account.

ITRC recommends that you change your card to ATM use only and get a separate credit card. Credit cards are protected by federal law as to the amount of money that you can be held responsible for if lost or stolen, with most companies now extending a zero liability policy to customers. You should be able to control this problem easily during the first billing cycle after the card is lost or should it be skimmed or copied. In fact, this is the easiest of all financial crimes to deal with.

1. Leave bills at home- Business travelers often take advantage of quiet evenings in hotels to catch up with bookkeeping and paying bills. Unfortunately many people have access to your room while you are at meetings and victims have reported that account information and check information has been stolen this way.

2. Hotel Safes- ITRC highly recommends that you lock up all valuables in room safes or hotel safes while you are out of your room. That includes laptops, palm pilots, jewelry, Social Security cards (if you are traveling with them), passports, and other documents that contain personal identifying information or that would be of interest to a thief. A suitcase is not a secure way to lock up information. You might return to your room to find the suitcase has been picked open or taken.

3. Pickpockets and fanny packs and travel pouches- Pickpockets can be found in most major cities and tend to focus on high traffic areas that attract business or vacation travelers. Some studies indicate that wallets stolen in tourist spots frequently lead to identity theft. These professionals aren't interested in cash. They want your SSN, checks and driver's license.

They depend on the fact that you are not paying attention to anything but what you are doing. In fact, they may cause distractions (as a team) - using animals, flower vendors, children, or even asking for directions. Vacation travelers should use fanny packs (preferably ones that open with a Velcro fastener and not a zipper) or travel pouches that are worn inside your shirt.

Business travelers should be aware that pickpockets are also looking for laptops and palm pilots that are temporarily out of your control- at airports, in lobbies and in dining areas. You'd be surprised at how many rushed business travelers leave the security area having forgotten these items. Remember, out of sight means out of control. A good pickpocket can remove a wallet from a tight pair of jeans without you being aware of the theft, especially the back pocket. They may travel in pairs and watch where you put it long before you know you are even a target.

1. Wallets- Don't take anything in your wallet that is not absolutely necessary. Leave all cards with SSN on them at home. If necessary, make a photocopy of a health card, cut off the last 4 numbers of the SSN from the photocopy and carry that with you. Make sure that you have an emergency phone number for ER personnel to use. That person would have the last 4 numbers of your SSN plus any pertinent medical history including prescriptions that you take. It goes without saying- never leave your wallet unattended even for a second.

Page 28: · 6. ATM cards. If your ATM or debit card has been stolen or compromised, report it immediately. Contact your bank branch and request a fraud affidavit. Get a new card, account number,

2. Shoulder surfers- Besides pickpockets, identity thieves take advantage of people via shoulder surfing. That term used to only apply to those who looked "over your shoulder" to see information. With the common use of cell phones, we forget that we are in a public venue and may talk about things that a thief can use. In other words- if you wouldn't want to see it on a billboard, don't talk about it on a cell phone in public. That includes personal information as well as company proprietary information.

3. Back-up material- carry photocopies of all travel documents including plane tickets, hotel reservations and passports. Keep these in a separate location from the originals.

4. Mail- Put your mail on "postal hold" stating that for a period of time you wish to have your mail held at the post office. We use that term rather than vacation hold so that postal clerks will not know that you will be gone. Arrange that mail may only be picked up by you and that you must show a driver's license or ID card with photo and with your current address to receive the mail.

5. Newspapers- Nothing says "we're out of town" more than a pile of newspapers. Don't forget to stop delivery until you return.

6. Neighbors, relatives and housesitters- While we would like to trust everyone, unfortunately statistics show that 9-14% of all identity theft victims who find out who the imposter is, discovers that it is someone they knew. If you have someone that is going to check the house and has a key to your house, then lock up any documents with account numbers or SSN. You wouldn't leave an expensive diamond ring or lots of cash out; follow those same guidelines when it comes to information an identity thief can use.

7. Public restrooms- Ladies, do not hang your purse from a hook on the door. It is too easy for someone to reach over the top of the door and take it before you have time to react. The best place to store your purse while in the restroom is beside you or hung around your body.

The bottom line- if you su����������������������� ���������������������� ������ �����������������