Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Presenter:Alicia DelgadoFraud Prevention Specialist
Protecting Your Identity
What is Identity Theft?
What is Synthetic ID Theft?
How does Identity Theft occur?
How do you protect yourself?
What do you do if you are a victim?
Identity Theft
Definition:• The fraudulent acquisition and use of a
person’s private identifying information, usually for financial gain
• Interchangeable with the term Identity Fraud
Identity Theft
Definition:• Synthetic ID Theft • The fraudulent acquisition and use of a
person’s private identifying information and fabricated information to create a new identity, usually for financial gain
Synthetic ID Theft
Quick Statistics
Quick Statistics
Identity Theft
Identity Theft
ATM & Gas Pump Skimming
Card Not Received
Fraud
Data Breaches
Phishing /Pharming
Mail Fraud
How does Identity Theft Occur?
Have you been a victim of ID Theft?
Poll Question
What type of Identity Theft did you have?
Credit/Debit card fraud
SSN Stolen
Tax Refund fraud
Account Takeover
Other form
Poll Question
Data Breaches: Hackers get into companies databases without authorization
Phishing/Pharming:Fraudsters pose as entity or “friend” in order to gain access to sensitive information
How does Identity Theft Occur?
ATM/Gas Pump Skimming: A skimming device is placed over or in the card reader to capture your card information
Mail Fraud/Card not Received:Mail is stolen from your mailbox or new accounts opened are not received by you
How does Identity Theft Occur?
Account Takeover: Fraudsters attempt to gain access to personal accounts. Many times requesting cards, checks, and moving funds out of the account to themselves.
New Account Fraud:Having a persons personal information fraudsters will attempt to open new accounts for their access.
How does Identity Theft Occur?
How does Identity Theft Occur?
• Empty your bank accounts
• Open new accounts (i.e. loans, cars, phone service)
• Get government documents
• Create false criminal records…all in your name!
What do Fraudsters do With Your Personal Information?
• Social Security
• Computers/Cell Phones
• Emails
• Websites
• Debit/Credit Cards
How do We Protect Ourselves?
Don’t post…• Birth date/place• Address, phone, email• Embarrassing photos• Answers to personal information questions
(crooks harvest your data)• Details about upcoming trips
Control access—use privacy settings
Social Media
How do We Protect Ourselves?
We have all seen these seemingly harmless online posts…
How do We Protect Ourselves?
What to do if you’re a victim
• Monitor your credit going forward
• Get one free report per year from each agency:- annualcreditreport.com
• Check for accuracy; file disputes
• Beware “free” credit report offers
What to do if you’re a victim
30%
19%15%
12%
11%
7% 6%
# OF REPORTS
Credit Card Fraud
Employment or Tax-RelatedFraudOther Identity Theft
Phone or Utilities Fraud
Bank Fraud
Loan or Lease Fraud
Government Documents orBenefits Fraud
Credit Monitoring
475 Anton Blvd. Costa Mesa, CA
926261.888.397.3742
www.experian.com
Equifax Credit Information Services, Inc.PO Box 740241Atlanta, GA 740241 1.800.685.1111www.equifax.com
PO Box 6790 Fullerton, CA 926341.800.680.7289www.transunion.com
877-322-8228Annual Credit Report Request Service,
P.O. Box 105281, Atlanta, GA 30348-5281
Credit Report Agency Contact Information
www.FTC.GOV
Other Reporting AgencyInformation
www.IC3.GOV
www.SSA.GOV
800.762.9988 alecu.org
ALEC, your credit union, can help you with all your financial challenges.
Questions?