70
IDENTITY IDENTITY THEFT THEFT What is Identity Theft? What is Identity Theft?

IDENTITY THEFT

Embed Size (px)

DESCRIPTION

IDENTITY THEFT. What is Identity Theft?. A Legal Definition. “A fraud committed or attempted using the identifying information of another person without authority.”. Scope of Identity Theft. - PowerPoint PPT Presentation

Citation preview

IDENTITYIDENTITY THEFTTHEFT

What is Identity Theft?What is Identity Theft?

A Legal DefinitionA Legal Definition

““A fraud committed or A fraud committed or attempted using the attempted using the

identifying information of identifying information of another person without another person without

authority.”authority.”

Scope of Identity TheftScope of Identity Theft

In 2004, there were almost In 2004, there were almost 250,000 ID theft complaints and 250,000 ID theft complaints and victims spent nearly 250 million victims spent nearly 250 million hours trying to sort out bogus hours trying to sort out bogus accounts and set their credit accounts and set their credit records straightrecords straight Credit Card Fraud – 28%Credit Card Fraud – 28% Phone/utilities Fraud – 19%Phone/utilities Fraud – 19% Bank Fraud – 18%Bank Fraud – 18%

Scope of Identity TheftScope of Identity Theft

In 2004, merchandise and In 2004, merchandise and services obtained as a result of services obtained as a result of ID Theft exceeded $52 billion ID Theft exceeded $52 billion

In 2005, an estimated 10 million In 2005, an estimated 10 million Americans became victims of Americans became victims of Identity Theft. On average, a Identity Theft. On average, a victim spent $500.00 and 30 victim spent $500.00 and 30 hours resolving the problemhours resolving the problem

Scope of Identity TheftScope of Identity Theft

In 2004, plastic card In 2004, plastic card losses were $17 millionlosses were $17 million

In 2005, plastic card In 2005, plastic card losses are expected to losses are expected to be approximately $35 be approximately $35 millionmillion

Common Types of Identity Theft Common Types of Identity Theft or Financial Fraudor Financial Fraud

Unauthorized transactions on existing accounts Unauthorized transactions on existing accounts (e.g., unauthorized charges on a credit card or (e.g., unauthorized charges on a credit card or checks on a checking account) – often more easily checks on a checking account) – often more easily corrected than otherscorrected than others

Make purchases on your credit card and have the Make purchases on your credit card and have the statements sent to a different addressstatements sent to a different address

Takeover of existing accounts (e.g., prolonged use or Takeover of existing accounts (e.g., prolonged use or emptying of a financial account)emptying of a financial account)

Creation of new accounts Creation of new accounts Establish wireless serviceEstablish wireless service Open an account in your name and write bad checks Open an account in your name and write bad checks

on that accounton that account File for bankruptcy under your nameFile for bankruptcy under your name Get identification, such as Driver’s License made Get identification, such as Driver’s License made

with their picture and your namewith their picture and your name

Warning SignsWarning Signs A financial institution may call if a A financial institution may call if a

transaction seems out of the ordinarytransaction seems out of the ordinary You may see unauthorized charges on a You may see unauthorized charges on a

credit card or checking account statementcredit card or checking account statement Credit card statements don’t arriveCredit card statements don’t arrive Bills arrive for something you didn’t requestBills arrive for something you didn’t request You may see an account that you did not You may see an account that you did not

open on your credit reportopen on your credit report Suspicious inquiries on your credit reportSuspicious inquiries on your credit report Suddenly denied creditSuddenly denied credit You may get a call from a collection agency You may get a call from a collection agency

asking why you have not paid a billasking why you have not paid a bill

Identity Thieves Look For:Identity Thieves Look For: NameName AddressAddress Date of BirthDate of Birth Social Security Social Security

NumberNumber Driver’s license Driver’s license

numbernumber Mother’s maiden Mother’s maiden

namename Account numbersAccount numbers Card expiration Card expiration

datesdates

Internet passwordsInternet passwords Personal Personal

identification identification numbersnumbers

User Ids for online User Ids for online account accessaccount access

Security codes from Security codes from the back of credit the back of credit and debit cardsand debit cards

Other identifying Other identifying informationinformation

How Your Identity Can Be StolenHow Your Identity Can Be Stolen

Loss or theft of your wallet, purse, or Loss or theft of your wallet, purse, or credit cardcredit card

Mail theftMail theft Skimming information from the magnetic Skimming information from the magnetic

strip on credit or debit cardsstrip on credit or debit cards ““Dumpster diving” through the trashDumpster diving” through the trash ““Shoulder surfing,” looking over your Shoulder surfing,” looking over your

shoulder when you are entering a PIN or shoulder when you are entering a PIN or passwordpassword

Stealing records or information on the jobStealing records or information on the job Bribing an employee who has access to Bribing an employee who has access to

recordsrecords

How Your Identity Can Be StolenHow Your Identity Can Be Stolen

Hacking recordsHacking records Conning information out of employeesConning information out of employees Steal your credit reports by abusing Steal your credit reports by abusing

their employee’s authorized access to their employee’s authorized access to them, or by posing as someone who them, or by posing as someone who may have a legal right to access your may have a legal right to access your report (landlord, employer)report (landlord, employer)

Steal personal information found in Steal personal information found in your homeyour home

How Your Identity Can be StolenHow Your Identity Can be Stolen

EavesdroppingEavesdropping ImpersonationImpersonation Scam phone calls where a stranger asks Scam phone calls where a stranger asks

for personal or financial informationfor personal or financial information Pretexting – by posing as legitimate Pretexting – by posing as legitimate

companies and claiming you have a companies and claiming you have a problem with your accountproblem with your account

Computer hackingComputer hacking ““Phishing” e-mailsPhishing” e-mails SpywareSpyware

TELEMARKETING FRAUDTELEMARKETING FRAUD

How Can I Tell if it’s Fraud?How Can I Tell if it’s Fraud? High-pressure sales tacticsHigh-pressure sales tactics Insistence on an immediate decisionInsistence on an immediate decision The offer sounds too good to be trueThe offer sounds too good to be true A request for your credit card number for A request for your credit card number for

any purpose other than to make a any purpose other than to make a purchasepurchase

An offer to send someone to your home or An offer to send someone to your home or office to pick up the money, or some office to pick up the money, or some other method to get your funds more other method to get your funds more quicklyquickly

TELEMARKETING FRAUDTELEMARKETING FRAUD

A statement that something is A statement that something is “free,” followed by a requirement “free,” followed by a requirement that you pay for somethingthat you pay for something

An investment that is “without An investment that is “without risk”risk”

Unwillingness to provide written Unwillingness to provide written information or references that you information or references that you can contactcan contact

A suggestion that you should make A suggestion that you should make a purchase or investment on the a purchase or investment on the basis of “trust”basis of “trust”

TELEMARKETING FRAUDTELEMARKETING FRAUD

Ways to Avoid Becoming a Victim:Ways to Avoid Becoming a Victim: Don’t allow yourself to be pushed Don’t allow yourself to be pushed

into a hurried decisioninto a hurried decision Always request written information, Always request written information,

by mail, about the product, service, by mail, about the product, service, investment or charity and about the investment or charity and about the organization that’s offering itorganization that’s offering it

Don’t make any investment or Don’t make any investment or purchase you don’t fully understandpurchase you don’t fully understand

TELEMARKETING FRAUDTELEMARKETING FRAUD

Ask with what state or federal agencies Ask with what state or federal agencies the firm is registeredthe firm is registered

Check out the company or organizationCheck out the company or organization If an investment or major purchase is If an investment or major purchase is

involved, request that information also involved, request that information also be sent to your accountant, financial be sent to your accountant, financial adviser, banker, or attorney for adviser, banker, or attorney for evaluation and an opinionevaluation and an opinion

Ask what recourse you would have if you Ask what recourse you would have if you make a purchase and aren’t satisfiedmake a purchase and aren’t satisfied

TELEMARKETING FRAUDTELEMARKETING FRAUD

Beware of testimonials that you Beware of testimonials that you may have no way of verifyingmay have no way of verifying

Don’t provide personal financial Don’t provide personal financial information over the phone information over the phone unless you are absolutely certain unless you are absolutely certain the caller has a bona fide need to the caller has a bona fide need to knowknow

If necessary, hang up the phoneIf necessary, hang up the phone

DO NOT CALL LISTDO NOT CALL LIST

National Do Not Call RegistryNational Do Not Call Registry www.donotcall.govwww.donotcall.gov Effective for 5 YearsEffective for 5 Years FreeFree

Texas No Call RegistryTexas No Call Registry www.texasnocall.comwww.texasnocall.com Effective for 3 YearsEffective for 3 Years Free online registrationFree online registration Nominal fee for automated registration or Nominal fee for automated registration or

registration by mailregistration by mail

PhishingPhishing Seek to obtain the same kind of information Seek to obtain the same kind of information

that any ID thief wantsthat any ID thief wants May mimic:May mimic:

Financial InstitutionsFinancial Institutions Government agenciesGovernment agencies Computer software companiesComputer software companies E-Commerce sitesE-Commerce sites Other legitimate businessOther legitimate business

May ask you to go to a Web site to verify and May ask you to go to a Web site to verify and enter your personal informationenter your personal information

May contain a link that takes you to a Web site May contain a link that takes you to a Web site that looks just like your financial institution’sthat looks just like your financial institution’s

Phishing and SpywarePhishing and Spyware

PhishingPhishing (continued) (continued) At the fake Web site, crooks copy, or “spoof,” At the fake Web site, crooks copy, or “spoof,”

graphics from real Web sitesgraphics from real Web sites The message may include an excuse (e.g., the bank The message may include an excuse (e.g., the bank

is undergoing a computer upgrade), or sound urgent is undergoing a computer upgrade), or sound urgent or intimidating (e.g., you will lose access to your or intimidating (e.g., you will lose access to your account if you don’t provide the information account if you don’t provide the information promptly)promptly)

Spyware softwareSpyware software:: Monitors your online activity and diverts information Monitors your online activity and diverts information

while you are using legitimate Web siteswhile you are using legitimate Web sites May be installed on your computer when you visit May be installed on your computer when you visit

deceptive Web sites, download seemingly innocent deceptive Web sites, download seemingly innocent games or other software, or open e-mails that may games or other software, or open e-mails that may have spyware attachedhave spyware attached

Protect Yourself from Protect Yourself from PhishingPhishing

Update your browsers, spam Update your browsers, spam filters, anti-virus and anti-filters, anti-virus and anti-spyware software regularlyspyware software regularly

Use parental controlsUse parental controls Visit a Web site by typing the Visit a Web site by typing the

Web address – or URL – into your Web address – or URL – into your Web browser yourself, not by Web browser yourself, not by clicking a linkclicking a link

Phishing and SpywarePhishing and Spyware

Look for the “s” in “https” when Look for the “s” in “https” when engaging in financial transactions engaging in financial transactions because it indicates scrambling or because it indicates scrambling or encryption of the communication (don’t encryption of the communication (don’t just copy a link that appears to have an just copy a link that appears to have an “s” in “https”)“s” in “https”)

Look for the lock icon in the lower right Look for the lock icon in the lower right corner of the screen when engaging in corner of the screen when engaging in financial or other sensitive transactions financial or other sensitive transactions because the lock signifies an encrypted because the lock signifies an encrypted session (Spoofed phishing sites may session (Spoofed phishing sites may have fake locks, so beware)have fake locks, so beware)

Phishing and SpywarePhishing and Spyware

More information on Phishing is More information on Phishing is available at:available at: www.SecretService.govwww.SecretService.gov www.Antiphishing.orgwww.Antiphishing.org www.FTC.govwww.FTC.gov

SpywareSpyware

Use anti-spyware softwareUse anti-spyware software Set parental controlsSet parental controls Keep current with other software Keep current with other software

updates and patchesupdates and patches

On-Line SafetyOn-Line Safety

Protect your computer like you would Protect your computer like you would protect your personal informationprotect your personal information

Turn it off when you walk away from Turn it off when you walk away from the computer so that no one else can the computer so that no one else can gain access while you are not theregain access while you are not there

Use a firewallUse a firewall Make sure that your operating system Make sure that your operating system

and software are updated on a and software are updated on a frequent basis (keep patches current)frequent basis (keep patches current)

On-Line SafetyOn-Line Safety Make sure that you have anti-spam Make sure that you have anti-spam

software – many phishing attacks software – many phishing attacks come as a result of spamcome as a result of spam

Use strong passwordsUse strong passwords Words or numbers that are not easy to Words or numbers that are not easy to

guessguess Use a combination of numbers, letters, Use a combination of numbers, letters,

and other charactersand other characters Do not use the same password for Do not use the same password for

every account. Consider changing every account. Consider changing your passwords periodicallyyour passwords periodically

On-Line SafetyOn-Line Safety

Know the Web address – or Know the Web address – or “URL” – of the Web site that you “URL” – of the Web site that you are going to visitare going to visit

Read and learn how the Web site Read and learn how the Web site is going to protect and use your is going to protect and use your personal informationpersonal information

Clean your hard drive before you Clean your hard drive before you dispose of an old computerdispose of an old computer

FRAUDULENT CHECK FRAUDULENT CHECK TRANSACATIONSTRANSACATIONS

If your personal checks are stolen:If your personal checks are stolen: Close the accountClose the account Ask your financial institution to notify Ask your financial institution to notify

ChexSystems, Inc.ChexSystems, Inc. To prevent retailers from accepting the To prevent retailers from accepting the

stolen checks, call:stolen checks, call: TeleCheck at 1-800-710-9898 or 1-800-927-TeleCheck at 1-800-710-9898 or 1-800-927-

01880188 Certegy, Inc. at 1-800-437-5120Certegy, Inc. at 1-800-437-5120

To find out if an identity thief has been To find out if an identity thief has been passing bad checks in your name, call:passing bad checks in your name, call: SCAN: 1-800-262-7771SCAN: 1-800-262-7771

FRAUDULENT NEW ACCOUNTSFRAUDULENT NEW ACCOUNTS

Problems opening a new account? Problems opening a new account? Contact ChexSystems, Inc. at: Contact ChexSystems, Inc. at: ChexSystems, Inc.ChexSystems, Inc. Attn: Consumer RelationsAttn: Consumer Relations 7805 Hudson Road, Suite 1007805 Hudson Road, Suite 100 Woodbury, MN 55125Woodbury, MN 55125 1-800-428-96231-800-428-9623 Fax: 602-659-2197Fax: 602-659-2197 www.chexhelp.comwww.chexhelp.com

What is FTWCCU doing to Fight Back?What is FTWCCU doing to Fight Back?

Developing and implementing new Developing and implementing new technologies to improve online and technologies to improve online and physical security of information and physical security of information and communicationcommunication

Complying with new regulatory Complying with new regulatory requirements and enhancing requirements and enhancing procedures to prevent, find and fight procedures to prevent, find and fight Identity TheftIdentity Theft

Educating consumers about how to Educating consumers about how to protect themselvesprotect themselves See FTWCCU Home Page at See FTWCCU Home Page at

www.ftwccu.orgwww.ftwccu.org

What is FTWCCU doing to Fight Back?What is FTWCCU doing to Fight Back?

Providing assistance to victims of Identity Providing assistance to victims of Identity TheftTheft

Cooperating with local, state and federal Cooperating with local, state and federal law enforcement to investigate the crime law enforcement to investigate the crime and prosecute the thievesand prosecute the thieves

Partner with Fair Isaac’s Falcon Fraud Partner with Fair Isaac’s Falcon Fraud Manager to protect member’s credit and Manager to protect member’s credit and debit card transactions worldwidedebit card transactions worldwide Falcon Analyzes 65% of all credit card Falcon Analyzes 65% of all credit card

transactions and 85% of all US credit card transactions and 85% of all US credit card transactions for possible fraudulent activitytransactions for possible fraudulent activity

Falcon services ensure lower fraud rates without Falcon services ensure lower fraud rates without compromising member satisfactioncompromising member satisfaction

Monitors and protects members against account Monitors and protects members against account takeover, counterfeit, lost/stolen cards, and moretakeover, counterfeit, lost/stolen cards, and more

Protect Your InformationProtect Your Information

Do not leave a lot of financial records Do not leave a lot of financial records lying around your house for prying eyes lying around your house for prying eyes to seeto see

Do not keep information that you don’t Do not keep information that you don’t need in your purse or walletneed in your purse or wallet

Do not leave credit or debit card receipts Do not leave credit or debit card receipts at the ATM, gas pump, or anywhere elseat the ATM, gas pump, or anywhere else

Do not keep personal identification Do not keep personal identification numbers attached to credit, debit, or numbers attached to credit, debit, or ATM cardsATM cards

Protect Your InformationProtect Your Information Shred personal records or get rid of them as Shred personal records or get rid of them as

effectively as possibleeffectively as possible Beware of giving information to anyone Beware of giving information to anyone

over the phone or Internet unless you over the phone or Internet unless you initiate the contactinitiate the contact

Remember that your bank or credit card Remember that your bank or credit card issuers already have your account numbers, issuers already have your account numbers, PINs, access codes, passwords, Social PINs, access codes, passwords, Social Security numbers and other information Security numbers and other information they need. They won’t phone or e-mail you they need. They won’t phone or e-mail you to ask for itto ask for it

Protect your mail – send and receive it Protect your mail – send and receive it safelysafely

Protect Your Social Security Protect Your Social Security NumberNumber

Do not carry around your Social Security Do not carry around your Social Security numbernumber

Do not give the number to others just Do not give the number to others just because a merchant or someone else because a merchant or someone else says he or she needs itsays he or she needs it

Ask questions before deciding whether Ask questions before deciding whether to give it out – Why is it needed? How to give it out – Why is it needed? How will it be protected?will it be protected?

Remember, financial institutions will Remember, financial institutions will need your Social Security number – for need your Social Security number – for tax reporting and other identifying tax reporting and other identifying purposespurposes

Income Tax-Related Identity Income Tax-Related Identity TheftTheft

Your Social Security number can be Your Social Security number can be used by identity thieves to file a false used by identity thieves to file a false tax return and get a refund using tax return and get a refund using your nameyour name

Your Social Security number could be Your Social Security number could be used by someone to get a job and used by someone to get a job and report income that you didn’t know report income that you didn’t know aboutabout

If you do not prepare your own If you do not prepare your own income tax return, be very careful in income tax return, be very careful in choosing a tax preparerchoosing a tax preparer

Income Tax-Related Identity Income Tax-Related Identity TheftTheft

If you receive a notice from the IRS that If you receive a notice from the IRS that leads you to believe someone may have leads you to believe someone may have used your Social Security number used your Social Security number fraudulently, respond immediately either fraudulently, respond immediately either by phone or in writing as directed in that by phone or in writing as directed in that noticenotice

IRS tax examiners will work with you and IRS tax examiners will work with you and other agencies such as the Social other agencies such as the Social Security Administration to help resolve Security Administration to help resolve these problemsthese problems

www.irs.govwww.irs.gov 1-877-777-47781-877-777-4778

Avoid Mail TheftAvoid Mail Theft Mailboxes are vulnerable because they have no locks Mailboxes are vulnerable because they have no locks

and are located at the end of a drive or walkway, or and are located at the end of a drive or walkway, or at the curbsideat the curbside

Identity thieves know that unsecured mail boxes Identity thieves know that unsecured mail boxes may contain easy and valuable pickings for them may contain easy and valuable pickings for them because the mail may include:because the mail may include: Credit cardsCredit cards Credit card statementsCredit card statements Bank statementsBank statements Bank checksBank checks Credit card convenience checksCredit card convenience checks Insurance policiesInsurance policies Mortgage documentsMortgage documents Driver’s licensesDriver’s licenses Other material with important informationOther material with important information

Secure Your MailSecure Your Mail Take your incoming mail out of the mailbox as soon Take your incoming mail out of the mailbox as soon

as possibleas possible Consider getting a mail box with a lock or using a Consider getting a mail box with a lock or using a

Post Office boxPost Office box Put your outgoing mail in a blue, United States Put your outgoing mail in a blue, United States

Postal Service collection box on a street corner; orPostal Service collection box on a street corner; or Hand it to your letter carrier directly; orHand it to your letter carrier directly; or Bring it to the Post OfficeBring it to the Post Office If you put it in your mailbox, remember that putting If you put it in your mailbox, remember that putting

the red flag up alerts the thieves as well as the mail the red flag up alerts the thieves as well as the mail carrier that there is outgoing mailcarrier that there is outgoing mail

If you think you are an identity theft victim and the If you think you are an identity theft victim and the mail is involved, contact mail is involved, contact www.usps.com/postalinspectorswww.usps.com/postalinspectors

Steps to Catch Identity Steps to Catch Identity ThievesThieves

Monitor your online financial accounts Monitor your online financial accounts frequentlyfrequently

Promptly review your other financial Promptly review your other financial statements, credit card statements, statements, credit card statements, and other billsand other bills

Quickly call the financial institution or Quickly call the financial institution or company if you see anything company if you see anything suspicious and follow up in writingsuspicious and follow up in writing

Sign your new credit and debit cards Sign your new credit and debit cards promptlypromptly

What To Do If You Are, or Think What To Do If You Are, or Think You May Be A VictimYou May Be A Victim““Must Do” List – Act QuicklyMust Do” List – Act Quickly

Use the “Chart Your Course of Action” formUse the “Chart Your Course of Action” form (page 11 in “Take Charge: Fighting Back (page 11 in “Take Charge: Fighting Back Against Identity Theft” material - Against Identity Theft” material - http://www.ftc.gov/bcp/edu/pubs/consumer/ihttp://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt04.pdf)dtheft/idt04.pdf)

Contact the financial institutions or the Contact the financial institutions or the companies where the information about you companies where the information about you has been misused and let them know that has been misused and let them know that you’re a victim of Identity Theftyou’re a victim of Identity Theft

Close accounts that you know, or believe, Close accounts that you know, or believe, have been tampered with or opened have been tampered with or opened fraudulentlyfraudulently

What To Do If You Are, or Think What To Do If You Are, or Think You May Be A VictimYou May Be A Victim

Fraudulent Electronic Fraudulent Electronic WithdrawalsWithdrawals The Electronic Fund Transfer Act The Electronic Fund Transfer Act

protects consumers for fraudulent protects consumers for fraudulent ATM, debit or credit card ATM, debit or credit card withdrawals; or any other electronic withdrawals; or any other electronic debit or credit transactiondebit or credit transaction

You have 60 days from the time the You have 60 days from the time the statement was sent to you to report statement was sent to you to report discrepancies in writingdiscrepancies in writing

What To Do If You Are, or Think What To Do If You Are, or Think You May Be A VictimYou May Be A Victim

Lost or stolen ATM cardLost or stolen ATM card Loss is limited to $50 if reported Loss is limited to $50 if reported

within 2 business days of discovery within 2 business days of discovery of lossof loss

If after 2 business days, but within If after 2 business days, but within 60 days after discrepancy appears 60 days after discrepancy appears on your statement, loss could be up on your statement, loss could be up to $500 of what thief withdrawsto $500 of what thief withdraws

If more than 60 days after loss, you If more than 60 days after loss, you are responsible for loss of all are responsible for loss of all unauthorized fundsunauthorized funds

What To Do If You Are, or Think What To Do If You Are, or Think You May Be A VictimYou May Be A Victim

Credit Card Fraudulent ChargesCredit Card Fraudulent Charges Write to the creditor at the address given Write to the creditor at the address given

for “billing inquiries,” NOT the address for for “billing inquiries,” NOT the address for sending your payments (See sample letter sending your payments (See sample letter on page 20 – “Take Charge” documenton page 20 – “Take Charge” document

Send your letter within 60 days after the Send your letter within 60 days after the first billing containing the error was mailed first billing containing the error was mailed to you.to you.

If the billing address was changed by the identity If the billing address was changed by the identity thief and you didn’t receive the bill, your dispute thief and you didn’t receive the bill, your dispute letter still must reach the creditor within 60 days letter still must reach the creditor within 60 days of when the creditor would have mailed the billof when the creditor would have mailed the bill

What To Do If You Are, or Think What To Do If You Are, or Think You May Be A VictimYou May Be A Victim

Send your letter by certified mail and Send your letter by certified mail and request a return receipt. request a return receipt.

Include copies of the police reportInclude copies of the police report Keep original police report and copies of Keep original police report and copies of

letter and supporting documentationletter and supporting documentation The creditor must acknowledge your The creditor must acknowledge your

complaint in writing within 30 days complaint in writing within 30 days after receiving itafter receiving it

The creditor must resolve the dispute The creditor must resolve the dispute within two billing cycles (but no more within two billing cycles (but no more than 90 days) after receiving your than 90 days) after receiving your letterletter

Contact a Financial InstitutionContact a Financial Institution

They will investigate the They will investigate the circumstancescircumstances

They should take the suspect charges They should take the suspect charges off the account, pending investigationoff the account, pending investigation

They will reissue cards, PINs, access They will reissue cards, PINs, access codes and passwords, and close codes and passwords, and close accounts, as necessaryaccounts, as necessary

They need a written report of what They need a written report of what you are claimingyou are claiming

Where to Find HelpWhere to Find Help

If not satisfied with the way the If not satisfied with the way the financial institution is handling financial institution is handling your complaint you may contact your complaint you may contact the agency that oversees themthe agency that oversees them

If not sure which agency If not sure which agency oversees your financial oversees your financial institution, refer to pages 15-17 institution, refer to pages 15-17 in “Take Charge” manual for in “Take Charge” manual for specific agency web addresses specific agency web addresses and phone numbers.and phone numbers.

Contact the Credit BureausContact the Credit Bureaus Contact the credit bureaus immediately Contact the credit bureaus immediately

when you find out you are a victim of when you find out you are a victim of Identity Theft to place a fraud alert in your Identity Theft to place a fraud alert in your credit reportcredit report

You also may want to contact the credit You also may want to contact the credit bureaus to place a fraud alert if you feel bureaus to place a fraud alert if you feel like you may become a victim of Identity like you may become a victim of Identity Theft (e.g., your wallet containing Theft (e.g., your wallet containing identifying information has been stolen)identifying information has been stolen)

The fraud alert on your credit file signals to The fraud alert on your credit file signals to would-be creditors to do extra verification would-be creditors to do extra verification before they grant credit in your namebefore they grant credit in your name

Contact the Credit BureausContact the Credit Bureaus

You only need to notify one of the You only need to notify one of the three nationwide credit bureaus; it will three nationwide credit bureaus; it will notify the other two to place a fraud notify the other two to place a fraud alertalert

Carefully review your credit reports to Carefully review your credit reports to make sure that there are no fraudulent make sure that there are no fraudulent accounts opened in your name or other accounts opened in your name or other errorserrors

After the fraud alert is in place, the After the fraud alert is in place, the credit bureaus will also make available credit bureaus will also make available to you a free copy of your credit reportto you a free copy of your credit report

How To Get Credit ReportsHow To Get Credit Reports

You Are Entitled to ONE Free Annual Credit You Are Entitled to ONE Free Annual Credit Report every 12 Months at:Report every 12 Months at:

www.AnnualCreditReport.comwww.AnnualCreditReport.com

1-877-FACT ACT or 1-877-322-82281-877-FACT ACT or 1-877-322-8228

Annual Credit Report Request ServiceAnnual Credit Report Request ServiceP.O. Box 105281P.O. Box 105281

Atlanta, GA 30348-5281Atlanta, GA 30348-5281 See Web site, FTC Brochure, or Resource Library for the necessary See Web site, FTC Brochure, or Resource Library for the necessary

form for a postal requestform for a postal request

What You Can Do To Protect YourselfWhat You Can Do To Protect Yourself

Obtain Your Credit Report - Obtain Your Credit Report - EquifaxEquifax

Free Reports, due toFree Reports, due to

Adverse actionAdverse actionUnemploymentUnemploymentReceiving public Receiving public benefitsbenefitsErrors due to fraudErrors due to fraudState law provisionState law provision

One-Call One-Call Fraud Alerts, Fraud Alerts, Active Duty Active Duty Military Military Alerts, and Alerts, and Access to Free Access to Free Credit ReportCredit Report

Purchase Purchase Your Credit Your Credit ReportReport

www.equifax.comwww.equifax.com

1-800-685-11111-800-685-1111

Equifax Information Equifax Information Services LLCServices LLC

P.O. Box 740241P.O. Box 740241

Atlanta, GA 30374Atlanta, GA 30374

www.equifax.comwww.equifax.com

1-888-766-00081-888-766-0008

Equifax Credit Equifax Credit Information ServicesInformation Services

Consumer Fraud Consumer Fraud DivisionDivision

P.O. Box 740256P.O. Box 740256

Atlanta, GA 30374Atlanta, GA 30374

www.equifax.comwww.equifax.com

1-800-685-11111-800-685-1111

Equifax Equifax Information Information Services LLCServices LLC

P.O. Box 740241P.O. Box 740241

Atlanta, GA Atlanta, GA 3037430374

Obtain Your Credit Report - Obtain Your Credit Report - ExperianExperian

Free Reports, due to:Free Reports, due to:Adverse actionAdverse actionUnemploymentUnemploymentReceiving public Receiving public benefitsbenefitsErrors due to fraudErrors due to fraudState law provisionState law provision

One-Call Fraud One-Call Fraud Alerts, Active Alerts, Active Duty Military Duty Military Alerts, and Alerts, and Access to Free Access to Free Credit ReportCredit Report

Purchase Purchase Your Credit Your Credit ReportReport

www.experian.comwww.experian.com

1-866-200-60201-866-200-6020

ExperianExperian

P.O. Box 2104P.O. Box 2104

Allen, TX 75013Allen, TX 75013

www.experian.comwww.experian.com

1-888-397-37421-888-397-3742

Experian’s National Experian’s National Consumer AssistanceConsumer Assistance

P.O. Box 2002P.O. Box 2002

Allen, TX 75013Allen, TX 75013

www.experian.comwww.experian.com

1-888-397-37421-888-397-3742

ExperianExperian

P.O. Box 2104P.O. Box 2104

Allen, TX 75013Allen, TX 75013

Obtain Your Credit Report - Obtain Your Credit Report - TransUnionTransUnion

Free Reports, due to:Free Reports, due to:Adverse actionAdverse actionUnemploymentUnemploymentReceiving public Receiving public benefitsbenefitsErrors due to fraudErrors due to fraudState law provisionState law provision

One-Call Fraud One-Call Fraud Alerts, Active Alerts, Active Duty Military Duty Military Alerts, and Alerts, and Access to Free Access to Free Credit ReportCredit Report

Purchase Purchase Your Credit Your Credit ReportReport

www.transunion.comwww.transunion.com

1-800-888-42131-800-888-4213

P.O. Box 1000P.O. Box 1000

Chester, PA 19022Chester, PA 19022

www.transunion.comwww.transunion.com

1-800-680-72891-800-680-7289

Fraud Victim Fraud Victim Assistance Assistance DepartmentDepartment

P.O. Box 6790P.O. Box 6790

Fullerton, CA 92834Fullerton, CA 92834

www.transunion.comwww.transunion.com

1-800-888-42131-800-888-4213

P.O. Box 1000P.O. Box 1000

Chester, PA 19022Chester, PA 19022

How To Get Credit ReportsHow To Get Credit Reports

Other conditions under which you can Other conditions under which you can request a free report from any credit request a free report from any credit bureau:bureau: If you are unemployed and seeking If you are unemployed and seeking

employmentemployment If you receive public welfare assistance, If you receive public welfare assistance,

oror If you believe information in your credit If you believe information in your credit

file is incorrect due to fraudfile is incorrect due to fraud Request a free report for these Request a free report for these

reasons from any consumer reporting reasons from any consumer reporting agency by contacting them directlyagency by contacting them directly

Adverse Action NoticesAdverse Action Notices If your application for credit or If your application for credit or

insurance is denied, the company that insurance is denied, the company that denied the application based in whole denied the application based in whole or in part on information contained in or in part on information contained in a credit report must provide an a credit report must provide an adverse action noticeadverse action notice

The notice will tell you how you can The notice will tell you how you can request a free credit report from the request a free credit report from the appropriate credit bureauappropriate credit bureau

You can buy your credit report at any You can buy your credit report at any timetime

You can subscribe to credit monitoring You can subscribe to credit monitoring servicesservices

Fraud AlertsFraud Alerts

Initial AlertInitial Alert Extended Alert – refer to page 6 Extended Alert – refer to page 6

in “Take Charge” materialin “Take Charge” material

Fraud Alert Contact InformationFraud Alert Contact Information

www.equifax.comwww.equifax.com – 1-888-766-0008 – 1-888-766-0008

www.experian.comwww.experian.com – 1-888-397-3742 – 1-888-397-3742

www.transunion.comwww.transunion.com – 1-800-680-7289 – 1-800-680-7289

Contact Law EnforcementContact Law Enforcement

File a police report with the local police File a police report with the local police or sheriff to document your situationor sheriff to document your situation

Be persistent. Consider contacting State Be persistent. Consider contacting State or Federal law enforcement, if necessaryor Federal law enforcement, if necessary

Provide any evidence you may have when Provide any evidence you may have when you contact the policeyou contact the police

Get a copy of your police report to Get a copy of your police report to establish that you are a victim of a crime establish that you are a victim of a crime and to help you repair your credit recordand to help you repair your credit record

Contact Law EnforcementContact Law Enforcement

Proving You’re a Victim – refer to Proving You’re a Victim – refer to page 8 “Take Charge” materialpage 8 “Take Charge” material

Criminal Violations – refer to Criminal Violations – refer to pages 20 – 21 “Take Charge” pages 20 – 21 “Take Charge” materialmaterial

Contact the FTCContact the FTC

The Federal Trade Commission has a The Federal Trade Commission has a wealth of information for consumers wealth of information for consumers who find themselves victimized by who find themselves victimized by Identify Theft – Identify Theft – www.consumer.gov/idtheftwww.consumer.gov/idtheft Consumer Response Center, Federal Trade Consumer Response Center, Federal Trade

Commission, 600 Pennsylvania Ave., NW, Commission, 600 Pennsylvania Ave., NW, Washington, DC 20580Washington, DC 20580

The FTC shares collected data with 1400 The FTC shares collected data with 1400 law enforcement agencies around the law enforcement agencies around the country. To report the crime by phone, country. To report the crime by phone, call 1-877-IDTHEFTcall 1-877-IDTHEFT

OTHER CONTACTSOTHER CONTACTS Federal Trade CommissionFederal Trade Commission

www.onguardonline.govwww.onguardonline.gov www.ftc.govwww.ftc.gov www.ftc.gov/idtheftwww.ftc.gov/idtheft 1-877-IDTHEFT (438-4338)1-877-IDTHEFT (438-4338)

Internal Revenue ServiceInternal Revenue Service www.irs.govwww.irs.gov www.irs.gov/individuals/index.htmlwww.irs.gov/individuals/index.html www.irs.gov/individuals/article/www.irs.gov/individuals/article/

0,,id=136324,00.html0,,id=136324,00.html U.S. Department of JusticeU.S. Department of Justice

www.usdoj.govwww.usdoj.gov www.usdoj.gov/criminal/fraud/text/idtheft.htmlwww.usdoj.gov/criminal/fraud/text/idtheft.html

OTHER CONTACTSOTHER CONTACTS U.S. Postal Inspection ServiceU.S. Postal Inspection Service

www.usps.com/postalinspectorswww.usps.com/postalinspectors www.lookstoogoodtobetrue.com/www.lookstoogoodtobetrue.com/ Offer FREE Fraud-Prevention DVDsOffer FREE Fraud-Prevention DVDs

U.S. Secret ServiceU.S. Secret Service www.secretservice.govwww.secretservice.gov www.secretservice.gov/faq.shtmlwww.secretservice.gov/faq.shtml www.secretservice.gov/www.secretservice.gov/

faq.shtml#identityfaq.shtml#identity U.S. Social Security AdministrationU.S. Social Security Administration

www.ssa.govwww.ssa.gov www.socialsecurity.gov/pubs/10064.htmlwww.socialsecurity.gov/pubs/10064.html

OTHER CONTACTSOTHER CONTACTS

U.S. Treasury DepartmentU.S. Treasury Department www.treas.gov/offices/domestic-finance/www.treas.gov/offices/domestic-finance/

financial-institution/cip/financial-institution/cip/ www.treas.gov/offices/domestic-finance/www.treas.gov/offices/domestic-finance/

financial-institution/cip/identity-financial-institution/cip/identity-theft.shtmltheft.shtml

Refer to pages 22 – 25 in the “Take Refer to pages 22 – 25 in the “Take Charge: Fight Back Against Identity Charge: Fight Back Against Identity Theft” materials for contact agencies Theft” materials for contact agencies for other types of Identity Theft Fraud.for other types of Identity Theft Fraud.

Bankruptcy FraudBankruptcy Fraud

If someone has filed bankruptcy If someone has filed bankruptcy in your name, you must write to in your name, you must write to the U.S. Trustee in the region the U.S. Trustee in the region where the bankruptcy was filed. where the bankruptcy was filed. (Refer to page 17, “Take (Refer to page 17, “Take Charge” materials)Charge” materials)

Debt CollectionDebt Collection

Sometimes people find out that Sometimes people find out that they are a victim of Identity Theft they are a victim of Identity Theft when they are contacted by a when they are contacted by a debt collectordebt collector

Ascertain the details about the Ascertain the details about the debt and the collector (i.e., who is debt and the collector (i.e., who is calling and the nature of the debt)calling and the nature of the debt)

Determine the company that Determine the company that referred the debt to the debt referred the debt to the debt collectorcollector

Debt CollectionDebt Collection

Contact both the debt collector and Contact both the debt collector and the company on whose behalf they the company on whose behalf they are collecting and dispute the are collecting and dispute the accountaccount

You will probably have to send them a You will probably have to send them a copy of the police reportcopy of the police report

Document that they have resolved Document that they have resolved the debt and that you are no longer the debt and that you are no longer being held liable for the account on being held liable for the account on which they are trying to collectwhich they are trying to collect

Stop Debt Collector ContactStop Debt Collector Contact

Write letter to collection agencyWrite letter to collection agency Send collection agency letter of Send collection agency letter of

explanation. Include copy of explanation. Include copy of police report and supporting police report and supporting documentsdocuments Refer to pages 21-22 of “Take Refer to pages 21-22 of “Take

Charge” material for more Charge” material for more informationinformation

Tips for Identity Theft VictimsTips for Identity Theft Victims Keep good records (e.g., the names and Keep good records (e.g., the names and

telephone numbers of the people you talk to, telephone numbers of the people you talk to, summaries of conversations, documentary summaries of conversations, documentary evidence of the crime)evidence of the crime)

Consider using the FTC’s standard affidavit and Consider using the FTC’s standard affidavit and sample form letters for contacting credit sample form letters for contacting credit reporting agencies, available at: reporting agencies, available at: www.consumer.gov/idtheftwww.consumer.gov/idtheft

Filing the police report also allows you to block Filing the police report also allows you to block the identity theft accounts in your credit the identity theft accounts in your credit report, and makes it easier to get documents report, and makes it easier to get documents used to open the fraudulent identity theft used to open the fraudulent identity theft accountsaccounts

The police report will support your request for The police report will support your request for the 7-year fraud alert available to proven the 7-year fraud alert available to proven victimsvictims

Identity Theft MoviesIdentity Theft Movies