180 likes | 253 Views
Identity Theft Solutions. Introduction.
E N D
Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the top of the list since that time according to the Federal Trade Commission. As a result, many employers have taken action to limit the information they provide to others, both internal and external, regarding records they maintain on employees. The federal government and state governments are also legislating privacy laws and regulations on the use and display of important personal data, i.e., Social Security numbers, employee health information and the destruction of some forms of employee records in the face of escalating identity theft problems. This presentation provides an overview of the importance of maintaining the confidentiality of personal information. This is a sample presentation that must be customized to include and match the employer’s own policies and practices.
Objective • To educate everyone to become “aware” as consumers • Help everyone understand the importance of maintaining “confidentiality” of their personal information • Identify resources available to assist in the event of ID theft
Common Perils Data thieves are smart and resourceful • Dumpster diving • Accessing credit reports • Phishing/Skimming • Spying – PIN entry • Stealing/redirecting mail Scams leading to ID theft can be done anywhere, any time
Typical Outcomes - $$$$$$$$$$$$$ • Charging to YOUR current accounts and opening new ones • Writing stolen or fake or altering checks • Siphoning checking/savings accounts • Borrowing for large ticket items
Protecting Personal Information • Keep personal information safe • Use complex passwords (alpha-numeric) • Protect mail • Use extreme caution in sharing any personal information online and on phones • Promptly take action on reporting discrepancies • Never carry your Social Security Card unless absolutely necessary
Protect Credit/Debit Card Information • Review statements received and shred statements at appropriate intervals and all unsolicited offers • Opt out of offers • Close unused accounts • Carry only cards to be used
Checking Accounts • Keep check book/checks in secure locations • Check/balance statements • Don’t provide checking account info - online - over the phone
Protect Computer • Update virus protection • Don’t open files from unknown sources • Look for lock icon and “https” before entering information • Use complex passwords • Use a firewall • Erase computer hard drive before disposing of computers and destroy peripheral storage devices before disposal
Consumer Protection Laws • Fair Credit Reporting Act - provides limited access to credit reports - requires credit bureaus to accuracy • FACT Act - provides for free credit reports - ensures improved safeguards from ID theft and disclosure
Credit Protection Services • Fee-based services or insurance can be valuable but be wary of scams • ID theft insurance services • Weigh cost v. benefit
ID Theft Recovery Practices • Review statements • Promptly contact financial institution(s) to note errors/discrepancies • Close or cancel accounts • Stop payments on outstanding checks • Establish new account numbers and passwords
ID Theft Recovery Practices (continued) • Report crime to local police • Get a copy of the police report • Notify postal service if mail was involved • Notify Social Security Administration if SSN was used • Notify DMV if driver’s license number was used
ID Theft Recovery Practices (continued) • Obtain credit bureau reports • Place fraud alerts on reports • Check reports at least quarterly for a period of one year and later, annually • Promptly dispute any discrepancies
ID Theft Recovery-Recordkeeping • Keep records/notes/copies of all contact information - names - dates - follow up notes • Maintain copies of all documentation
Online Resources • Federal Trade Commission ID Theft Page http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/index.html • National Conference of State Legislatures (links to state laws) http://www.ncsl.org/IssuesResearch/BankingInsuranceFinancialServices/IdentityTheftStateStatutes/tabid/12538/Default.aspx • Privacy Rights Clearinghouse FAQ’s http://www.privacyrights.org/fs/fs17d-FAQ-IdTheft-070510.htm
Course Evaluation Please be sure to complete and leave the evaluation sheet you received with your handouts. Thank you for your attention and interest!