Synthetic Identity Fraud. Kathy Druckenmiller, CFCI, CCCI, CIRM, ACT Specialist May 2017

Size: px
Start display at page:

Download "Synthetic Identity Fraud. Kathy Druckenmiller, CFCI, CCCI, CIRM, ACT Specialist May 2017"

Transcription

1 Synthetic Identity Fraud Kathy Druckenmiller, CFCI, CCCI, CIRM, ACT Specialist May 2017

2 Synthetic Identity/Ghosting

3 Identity Theft vs Identity Fraud Identity Theft Legitimate Identity is stolen Identity Fraud Fictitious Identity is created

4 Identity Theft Controls

5 Synthetic Identity/Identity Theft Synthetic identity theft now accounts for nearly 85% of the more than 16 million ID thefts in the U.S. each year finds the Federal Trade Commission Federal Trade Commission, "The Changing Face of Identity Theft"

6 Definition syn thet ic b : devised, arranged, or fabricated for special situations to imitate or replace usual realities 6

7 Credit Fraud Synthetic Identities Uses Establish valid residency (Immigrants) Health Insurance Fraud Credit Repair Organized Crime (Terrorism?) 7

8 How does it happen? Create a synthetic identity using combination of real and fabricated information Purchase a Credit Privacy Number (CPN) and assign it to a fictitious identity Create a credit file and link a synthetic identity to a legitimate account holders account as an authorized user. 8

9 Lifecycle of Synthetic ID for Fraud Obtain CPN or SSN Payment Default Establish Identity Obtain Credit Pollination

10 CPN Advertised by Credit Repair sites as: Credit Privacy Number Credit Profile Number Nine digit identification number that can be used instead of a Social Security Number in SOME INSTANCES. 10

11 CPN Advertisements CPN Number this ad? Trusted top quality CPN provider No risk! Money back guarantee. Secondary Credit Number this ad? Secondary Credit Number, SCN, SCN number, New credit file $25000 CPN Loan Funding this ad? Loan Ready CPN Numbers FBI approved You Can Use CPN in Lieu of Your SSN 11

12 Websites

13 Websites

14 Legal?

15 SECTION 7 Privacy Act of 1974 (a) (1) It shall be unlawful for any Federal, state, or local government agency to deny to any individual any right, benefit, or privilege provided by law because of such individual's refusal to disclose his social security account number. (b) Any Federal, State, or local government agency which requests an individual to disclose his social security account number shall inform that individual whether that disclosure is mandatory or voluntary, by what statutory or other authority such number is solicited, and what uses will be made of it.

16 Websites

17 CPNs? What is sold as a CPN in usually a valid Social Security Number. 17

18 CPNs Where do they really come from? Elderly Homeless Incarcerated 18

19 Synthetic Identity Minors with no established credit 19

20 Social Security Numbers How do they get the Social Security Numbers?

21 Data Breaches 106 Million records 21

22 Creating the Synthetic Identity Synthetic Identity Creation Create an identity to pair with the CPN and submit application to Credit Bureau 22

23 Creating the Synthetic Identity Synthetic Identity Creation Header information; Report for: John Q. Public, Since 08/01/2014, Social Security Number: , DOB 02/15/1952 John is 63 years old and only established a credit bureau in

24 Websites

25 Tradelines Also referred to as a Pollinator Account

26 Tradelines 26

27 Tradelines Combo Packages 27

28 Timeline for Credit Reporting 28

29 Pollination Creating the pollination of the identity/credit file Header information; Report for: John Q. Public, Since 08/01/2014, Social Security Number: , DOB 02/15/1952 John is 63 years old and only established a credit bureau in

30 Pollination Synthetic Identity Creation Oldest trade line; 30

31 Websites

32 Completed Creation Synthetic Identity Creation Oldest trade line; Check recent trade lines; 32

33 Challenges for Banks Why add Authorized users? 33

34 Challenges for Banks The Equal Credit Opportunity Act Compliance with Regulation B The Federal Reserve s Regulation B, which implements the 1974 Equal Credit Opportunity Act, requires that information on spousal authorized user accounts be reported to the credit bureaus and considered when lenders evaluate credit history. 34

35 Challenges for Law Enforcement Who are the victims? No person with this combination of identifiers exists 35

36 Who are the Victims? Most often Children 36

37 Victims 37

38 Who are the Victims? 38

39 Law Enforcement 39

40 Mitigation Synthetic Identity Training and Awareness Employees Law Enforcement Freeze all Minor s credit files until 18 years old Review policy of authorized users on credit accounts 40

41 Questions

Basil Doyle, Sr. Manager Corporate Investigations Department. Synthetic Credit Identities

Basil Doyle, Sr. Manager Corporate Investigations Department. Synthetic Credit Identities Basil Doyle, Sr. Manager Corporate Investigations Department Synthetic Credit Identities May 26, 2016 Are Your UBO s Synthetic? The Problem 4 2015 TransUnion LLC All Rights Reserved The Federal Trade Commission

More information

Synthetic Identities. Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved.

Synthetic Identities. Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved. Synthetic Identities Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved. Synthetic Identities A combination of fictitious and potentially stolen personally identifiable

More information

National DMV Fraud Trends. - Fighting the Fraud that s Fighting the DMV s

National DMV Fraud Trends. - Fighting the Fraud that s Fighting the DMV s National DMV Fraud Trends - Fighting the Fraud that s Fighting the DMV s Use of stolen blank title stock Identity & Vehicle fraud trends Synthetic identity fraud Title fraud and use of and disposal of

More information

The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age Scoping Out Synthetic ID Fraud In the 18 years since synthetic identity fraud emerged as a significant

More information

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),

More information

What is Credit Monitoring?

What is Credit Monitoring? 5LINX SafeScore Overview Fraud Facts What is Credit Monitoring How is Credit Monitoring different from Identity Monitoring Why choose Credit Monitoring Credit Monitoring package details Compensation How

More information

When Your Child s Identity Is Stolen

When Your Child s Identity Is Stolen When Your Child s Identity Is Stolen What is child identity theft? CONSUMER INFORMATION SHEET 3B 2/16/08 Adults are not the only targets of identity theft. In fact, children under the age of 18 can also

More information

Working Together to Prevent Identity Theft

Working Together to Prevent Identity Theft Consumer Measures Committee Comité des mesures en matière de consommation Working Together to Prevent Identity Theft Consultation Workbook Request for Comments The Consumer Measures Committee (CMC) is

More information

Russell P. Butler

Russell P. Butler Russell P. Butler rbutler@mdcrimevictims.org 301-952-0063 Russell P. Butler National Identity Theft Victim Assistance Network/ Maryland Crime Victims Resource Center, Inc. rbutler@mdcrimevictims.org; 301-952-0063

More information

Identity Theft: Shifting Focus from Criminals and Consumers to Businesses

Identity Theft: Shifting Focus from Criminals and Consumers to Businesses Identity Theft: Shifting Focus from Criminals and Consumers to Businesses Chris Jay Hoofnagle Director, Information Privacy Programs For The John Jay College of Criminal Justice October 20, 2009 1 Thesis:

More information

IRS Criminal Investigation

IRS Criminal Investigation IRS Criminal Investigation Kurt Bertram Special Agent Public Information Officer November 5, 2015 IRS Criminal Investigation Mission Criminal Investigation serves the American public by investigating potential

More information

FINANCIAL CRIMES INVESTIGATIONS

FINANCIAL CRIMES INVESTIGATIONS FINANCIAL CRIMES INVESTIGATIONS today s presenters... Brian Sallee Cuyahoga County Sheriff s Department Major Crimes Task Force Larry Henderhan FDA Special Agent Major Crimes Task Force Counterfeit Investigations

More information

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records; 3359-11-10.8 Identity theft detection, prevention and mitigation policy. (A) Introduction. (1) The university of Akron is committed to the detection, prevention and mitigation of identity theft associated

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

Clarion University Identity Theft Prevention Program

Clarion University Identity Theft Prevention Program Clarion University Identity Theft Prevention Program A) Purpose The purpose of the Identity Theft Prevention Program (Program) is to detect, prevent and mitigate identity theft in connection with any covered

More information

CoreLogic Credco First American Way Poway, CA (800)

CoreLogic Credco First American Way Poway, CA (800) Red Flag Regulation WHAT IT IS The Red Flag Regulation implements Sections 114 and 315 of the FACT Act. It finalizes three distinct requirements two of which are relevant to automotive, RV and marine dealers,

More information

LexisNexis Developing an Effective Red Flags Rule Program

LexisNexis Developing an Effective Red Flags Rule Program LexisNexis Developing an Effective Red Flags Rule Program Program Checklist R O I : R E T U R N O N I N F O R M AT I O N S O LU T I O N S Customer Development Authentication & Screening Fraud Prevention

More information

Edward J. Finn 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax:

Edward J. Finn 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax: Edward J. Finn 1275 Drummers Lane, Suite 302 Office: 267-930-4776 Wayne, PA 19087 Fax: 267-930-4771 Email: efinn@mullen.law VIA U.S. MAIL AND EMAIL Office of the Attorney General 1125 Washington Street

More information

Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009

Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009 Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009 Rebekah A. Z. Monson Pepper Hamilton LLP 215.981.4031 monsonr@pepperlaw.com

More information

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET 1-877-511-7906 LifeLock.com/Business FACT SHEET LifeLock Benefit Elite LifeLock

More information

THE CHILDREN'S MERCY HOSPITAL ADMINISTRATIVE POLICY

THE CHILDREN'S MERCY HOSPITAL ADMINISTRATIVE POLICY THE CHILDREN'S MERCY HOSPITAL ADMINISTRATIVE POLICY TITLE: Identity Theft Prevention Program EFFECTIVE: 11/08 REVISION DATE: REVIEWED WITH NO CHANGES: 12/13 RETIRED: PURPOSE: The Identity Theft Prevention

More information

ORGANIZATIONAL MANUAL

ORGANIZATIONAL MANUAL I. PURPOSE ORGANIZATIONAL MANUAL IDENTITY THEFT PROTECTION A. To establish an Identity Theft Prevention Program designed to detect, prevent and mitigate Identity Theft in connection with the opening of

More information

What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP

What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP LIFELOCK MEMBER EXPECTATIONS GUIDE 800-607-91744 LifeLock.com What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP THE LIFELOCK MEMBER COMMUNICATION EXPERIENCE Signing up

More information

The Smartest Employee Benefit Is Identity Theft Management

The Smartest Employee Benefit Is Identity Theft Management The Smartest Employee Benefit Is Identity Theft Management HELP PROTECT YOUR EMPLOYEES. Proposal For: Date: Presented By: Provide peace of mind. Raise your benefits to a new level. Every employee has a

More information

USA+ is committed to the promotion of Equal Access to Health Care for all Americans.

USA+ is committed to the promotion of Equal Access to Health Care for all Americans. MyDoc 24/7 USA+ is committed to the promotion of Equal Access to Health Care for all Americans. Real Benefits, Real Value, PLUS We Really Care! About USA+ MyDoc 24/7 (USA+) is a non-profit membership association

More information

Medical Identity Theft Prevention Policy

Medical Identity Theft Prevention Policy SUBJECT: NUMBER: EFFECTIVE DATE: SUPERSEDES SPP: APPROVED BY: DISTRIBUTION: Medical Identity Theft Prevention Policy (signature) DATED: I. STATEMENT OF PURPOSE: To define medical identity theft and outline

More information

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 Introduction: Under the Fair and Accurate Credit Transactions Act (FACT Act), financial institutions (and creditors) that offer or maintain covered accounts

More information

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

97 % of consumers surveyed expect their FI to help protect their financial assets from fraud. 2

97 % of consumers surveyed expect their FI to help protect their financial assets from fraud. 2 Deluxe Provent: Protecting against expanded threats. Providing for expanded opportunities. Introduction Identity thieves are smarter and more organized than ever before, claiming over 12.6 million victims

More information

TABLE OF CONTENTS LEGAL CPN 2010 TELL ALL CREDIT SECRETS INTRODUCTION... 2

TABLE OF CONTENTS LEGAL CPN 2010 TELL ALL CREDIT SECRETS INTRODUCTION... 2 TABLE OF CONTENTS LEGAL CPN 2010 TELL ALL CREDIT SECRETS INTRODUCTION... 2 CHAPTER 1 Understanding Your Credit... 7 The five types of information found on your credit report How your credit report is calculated

More information

Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC. Before the. Subcommittee on Crime, Terrorism and Homeland Security

Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC. Before the. Subcommittee on Crime, Terrorism and Homeland Security Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC Before the Subcommittee on Crime, Terrorism and Homeland Security Of the Judiciary Committee HR 1731: The Identity Theft

More information

First Name: KATHRYN Date of Birth (DOB): Middle Name: ALICE Social Security Number (SSN): ***-**-2664 Last Name: BRANNAN

First Name: KATHRYN Date of Birth (DOB): Middle Name: ALICE Social Security Number (SSN): ***-**-2664 Last Name: BRANNAN Company Name: INDIANA UNIVERSITY - PURDUE UNIVERSITY INDIANAPOLIS - UNDERGRADUATE NURSING Order Date: 11/30/2016 Company ID: IU34 Order ID: 9016-1130-2353-3200 ARU67D 12-05-2016 First Name: KATHRYN Date

More information

GAO SOCIAL SECURITY. Use of the Social Security Number Is Widespread. Testimony

GAO SOCIAL SECURITY. Use of the Social Security Number Is Widespread. Testimony GAO United States General Accounting Office Testimony Before the Subcommittee on Social Security, Committee on Ways and Means, House of Representatives For Release on Delivery Expected at 10:00 a.m. Tuesday,

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Identity Theft Prevention Program In December 2008 the VSC Board of Trustees recognized that some activities of the VSC are subject to the provisions of the Fair and Accurate Credit Transactions Act (FACT

More information

Customer Identification Programs for Banks, Savings Associations and Credit Unions

Customer Identification Programs for Banks, Savings Associations and Credit Unions Customer Identification Programs for Banks, Savings Associations and Credit Unions The National Consumer Law Center1 ("NCLC") submits the following comments on behalf of its low income clients regarding

More information

Medical Identity Theft

Medical Identity Theft South Dakota State University From the SelectedWorks of Axton Betz-Hamilton 2012 Medical Identity Theft Whitney Walters, Eastern Illinois University Axton Betz, Eastern Illinois University Available at:

More information

ROCHESTER INSTITUTE OF TECHNOLOGY

ROCHESTER INSTITUTE OF TECHNOLOGY ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3

More information

News Release IR IRS Releases the "Dirty Dozen" Tax Scams for 2014; Identity Theft, Phone Scams Lead List

News Release IR IRS Releases the Dirty Dozen Tax Scams for 2014; Identity Theft, Phone Scams Lead List Page 1 TEXT: News Release IR 2014-16 IRS Releases the "Dirty Dozen" Tax Scams for 2014; Identity Theft, Phone Scams Lead List IR 2014-16; 2014 IRB LEXIS 130 February 19, 2014 WASHINGTON - The Internal

More information

Description of Benefits for Family-IDprotect. Complete Management of Your Identity Recovery Case

Description of Benefits for Family-IDprotect. Complete Management of Your Identity Recovery Case IMPORTANT: This complimentary membership in Family-IDprotect is provided to you by one of our participating Merchants, Lenders and Associations. Coverage is provided at no cost to you in consideration

More information

Internal Revenue Service Criminal Investigation

Internal Revenue Service Criminal Investigation Tax Refund Fraud and Identity Theft IRS - Criminal Investigation John Collins Acting Special Agent In Charge Boston Field Office Internal Revenue Service Criminal Investigation Criminal Investigation serves

More information

Money Mule Awareness

Money Mule Awareness U.S. Department of Justice Federal Bureau of Investigation Money laundering, Forfeiture and Bank Fraud Unit Money Mule Awareness To report fraudulent activity, contact your nearest FBI field office. What

More information

Hacking Healthcare: Attacks on the Highest Value Asset

Hacking Healthcare: Attacks on the Highest Value Asset Hacking Healthcare: Attacks on the Highest Value Asset Paul Dant Chief Strategy Officer Independent Security Evaluators The Key Takeaway Who am I? Paul Dant Chief Strategist @ ISE 9: First digital product

More information

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Princeton University employees are responsible for detecting Red Flags consistent with

More information

ACA Reporting Checklist for Self-Insured Employer Plan Sponsors

ACA Reporting Checklist for Self-Insured Employer Plan Sponsors ACA Reporting Checklist for Self-Insured Employer Plan Sponsors IRC Section 6055 EMPLOYER TASK CHECKLIST WHAT NEEDS TO BE DONE Define employer s status as a controlled group or member of a controlled group

More information

11/14/ FNBT FACT ACT

11/14/ FNBT FACT ACT 1 FNBT FACT ACT This class addresses the Fair Credit Reporting Act which governs the collection and use of information considered in connection with granting credit, providing insurance or offering employment.

More information

Credit Matters Credit Concept Workshop Presentation Script (Part II of II)

Credit Matters Credit Concept Workshop Presentation Script (Part II of II) Credit Matters Credit Concept Workshop Presentation Script (Part II of II) (HAND OUT QUIZ PRIOR TO PRESENTATION) Opening Slide: WELCOME BACK TO THE SECOND PRESENTATION OF THE CREDIT CONCEPTS WORKSHOP SERIES.

More information

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 1 STUDENT SERVICES 2 3 AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 References: Fair

More information

NEUROLOGICAL INSTITUTE OF MICHIGAN PATIENT INFORMATION FORM

NEUROLOGICAL INSTITUTE OF MICHIGAN PATIENT INFORMATION FORM NEUROLOGICAL INSTITUTE OF MICHIGAN PATIENT INFORMATION FORM PATIENT NAME: HOME ADDRESS: BIRTH : SSN#: CELL: HOME TELEPHONE: EMPLOYER: WORK: EMERGENCY CONTACT: REFERRING DOCTOR: PRIMARY CARE MD: PHONE:

More information

IDENTITY THEFT RED FLAGS AND RESPONSES

IDENTITY THEFT RED FLAGS AND RESPONSES IDENTITY THEFT RED FLAGS AND RESPONSES Based on Supplement A to Appendix J Sources of Red Flags Financial institutions and creditors should incorporate relevant red flags from sources such as: Incidents

More information

The Cost of Identity Theft to Business What Business Owners Must Know Now

The Cost of Identity Theft to Business What Business Owners Must Know Now The Cost of Identity Theft to Business What Business Owners Must Know Now An Introduction to the Fair and Accurate Credit Reporting Act (FACTA): What Business Owners Must Know Now It often seems that there

More information

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009 Identity Theft Prevention Program Approved by the Board of Trustees on February 20, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules

More information

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.

16 CFR Duties regarding the detection, prevention, and mitigation of identity theft. 16 CFR 681.2 681.2 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and creditors that are subject to administrative

More information

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You. Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing

More information

POLICY: Identity Theft Red Flag Prevention

POLICY: Identity Theft Red Flag Prevention POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information

More information

ASSEMBLY FINANCIAL INSTITUTIONS AND INSURANCE COMMITTEE STATEMENT TO. ASSEMBLY, No with committee amendments STATE OF NEW JERSEY

ASSEMBLY FINANCIAL INSTITUTIONS AND INSURANCE COMMITTEE STATEMENT TO. ASSEMBLY, No with committee amendments STATE OF NEW JERSEY ASSEMBLY FINANCIAL INSTITUTIONS AND INSURANCE COMMITTEE STATEMENT TO ASSEMBLY, No. 944 with committee amendments STATE OF NEW JERSEY DATED: JUNE 18, 2012 The Assembly Financial Institutions and Insurance

More information

Identity Protection Services

Identity Protection Services Identity Protection Services Overview Why are identity protection services being provided? We believe your personal information should stay that way personal. That s why we re taking industry- leading

More information

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM TITLE II ADMINISTRATIVE REGULATIONS CHAPTER 30 IDENTITY THEFT PREVENTION PROGRAM 30.01 Program The Town of Flower Mound, Texas, as a utility provider ( Utility ), has developed an Identity Theft Prevention

More information

Protecting New Yorkers from Identity Theft. Senator David Carlucci

Protecting New Yorkers from Identity Theft. Senator David Carlucci Protecting New Yorkers from Identity Theft Senator David Carlucci Identity Theft According to USA Today, identity theft incidence rates rose 16% between 2015 and 2016, alone. 15.4 million Americans were

More information

Drexel and FMFCU. Presented By

Drexel and FMFCU.   Presented By Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission

More information

Identity Theft Protection Plans

Identity Theft Protection Plans Identity Theft Protection Plans V E R I F Y P R O T E C T R E C O V E R IN 2017, DATA BREACHES REACHED ECONOMIC PROPORTIONS A victim may need to spend time at work trying to recover their good name and

More information

Middlebury Institute of International Studies Identity Theft Prevention Program

Middlebury Institute of International Studies Identity Theft Prevention Program Middlebury Institute of International Studies Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury Institute of International Studies, hereafter referred to as the Institute, has developed

More information

Financial Literacy Course. East High School Module 9

Financial Literacy Course. East High School Module 9 Financial Literacy Course East High School Module 9 What will you learn about? Identity Theft and Consumer Fraud Protecting Against and Identity Theft and Consumer Fraud Fair Debt Collection Practices

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions How do you protect my identity? We use our proprietary software to proactively monitor various sources. Through PrivacyArmor, you will also have the power to create thresholds

More information

Secure Opening Plus Requirements for the Identity Theft Red Flag Program

Secure Opening Plus Requirements for the Identity Theft Red Flag Program Secure Opening Plus Requirements for the Identity Theft Red Flag Program Secure Opening Plus is a solution that assists financial institutions in obtaining identifying information and opening accounts

More information

ACH Tax Refunds: Exceptions, Posting, & Liabilities. Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist

ACH Tax Refunds: Exceptions, Posting, & Liabilities. Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist ACH Tax Refunds: Exceptions, Posting, & Liabilities Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist Audio Handouts Questions Dealing with ACH Tax Refunds: Exceptions, Posting & Liabilities

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program

WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54 Rule on Identity Theft Detection and Prevention Program Section 1. General 1.1 Purpose: The purpose of this policy is to establish an Identity Theft

More information

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Identity theft and identity fraud are terms used to refer to all types

More information

Identity Theft: World s Fastest Growing Crime!!

Identity Theft: World s Fastest Growing Crime!! Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all

More information

Fighting back against synthetic identity fraud

Fighting back against synthetic identity fraud Fighting back against synthetic identity fraud Digging deep into the data trails people leave behind can help banks detect whether their customers are real or not and stem losses from this fast-growing

More information

WHITE PAPER Fraud methods for identifying synthetic identities in credit applications and portfolios

WHITE PAPER Fraud methods for identifying synthetic identities in credit applications and portfolios WHITE PAPER Fraud methods for identifying synthetic identities in credit applications and portfolios Identifying trends and solutions to confirm proof of life based on alternative data. AUGUST 2017 Table

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions How do you monitor my identity? We use our exclusive software to proactively monitor various sources for suspicious activity. With PrivacyArmor : You will be able to set thresholds

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT

ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS The purpose of this Identity Theft Prevention Program (ITPP) is to control

More information

Servicing Agent Oversight and Surveillance Program Best Practices

Servicing Agent Oversight and Surveillance Program Best Practices Servicing Agent Oversight and Surveillance Program Best Practices Freddie Mac Single-Family Seller/Servicer Guide ( Guide ) Section 8102.1 requires Servicers to establish an oversight and surveillance

More information

Red Flags Rule Identity Theft Training Program

Red Flags Rule Identity Theft Training Program Red Flags Rule Identity Theft Training Program October 2017 Purpose of Training The purpose of the UA Little Rock Identity Theft Prevention Program is to reduce the exposure of financial and personal loss

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010

THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010 I. Introduction THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART RED FLAGS IDENTITY THEFT PREVENTION PROGRAM A. Purpose February 24, 2010 The Cooper Union for the Advancement of Science and Art

More information

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 8 Chapter 13,

More information

Middlebury College Identity Theft Prevention Program

Middlebury College Identity Theft Prevention Program Middlebury College Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury College has developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's Red

More information

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704 RE: Identity Theft Claim You recently notified Fay Servicing, LLC that you are the victim of identity theft with respect to the above referenced loan (also referred to in this notice as the debt or account

More information

LOAN OFFICER NAME: OFFICE PHONE: CELL PHONE: FAX: ADDRESS: AFFILIATE NAME: COMPANY NAME: BROKER NAME: BROKER PHONE: BROKER

LOAN OFFICER NAME: OFFICE PHONE: CELL PHONE: FAX:  ADDRESS: AFFILIATE NAME: COMPANY NAME: BROKER NAME: BROKER PHONE: BROKER Loan Application Complete the entire application. Failure to complete can cause delays in funding 701 E. Front Ave., Floor, Coeur d'alene, ID 83814 LOAN OFFICER NAME: OFFICE PHONE: CELL PHONE: FAX: EMAIL

More information

IRS Criminal Investigation SPECIAL AGENT FELICIA MCCAIN PUBLIC INFORMATION OFFICER (619)

IRS Criminal Investigation SPECIAL AGENT FELICIA MCCAIN PUBLIC INFORMATION OFFICER (619) IRS Criminal Investigation SPECIAL AGENT FELICIA MCCAIN PUBLIC INFORMATION OFFICER (619) 770-9317 FELICIA.MCCAIN@CI.IRS.GOV Areas of Emphasis for CI Abusive Return Preparers International Fraud Refund

More information

Identity Theft Information for Tax Professionals. August 2017

Identity Theft Information for Tax Professionals. August 2017 Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!

More information

Testimony. Submitted for the Record. American Bankers Association. Financial Institutions and Consumer Credit Subcommittee

Testimony. Submitted for the Record. American Bankers Association. Financial Institutions and Consumer Credit Subcommittee Testimony Submitted for the Record from the American Bankers Association for the Financial Institutions and Consumer Credit Subcommittee of the Committee on Financial Services United States House of Representatives

More information

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS I. Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention Program (ITPP) is to control reasonably

More information

Sian M. Schafle 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax:

Sian M. Schafle 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax: Sian M. Schafle 1275 Drummers Lane, Suite 302 Office: 267-930-4799 Wayne, PA 19087 Fax: 267-930-4771 Email: sschafle@mullen.law INTENDED FOR ADDRESSEE(S) ONLY VIA E-MAIL Office of the Attorney General

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM

WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM PURPOSE AND SCOPE The Identity Theft Prevention Program was developed pursuant to the Federal Trade Commission s

More information

if applicable if applicable if applicable

if applicable if applicable if applicable For official use only: Customer Name Customer No. Department of the Treasury Bureau of the Fiscal Service (Revised March 2014) CLAIM FOR LOST, STOLEN, OR DESTROYED UNITED STATES SAVINGS BONDS OMB No. 1535-0013

More information

OCTOBER 2017 EQUIFAX CYBERSECURITY INCIDENT

OCTOBER 2017 EQUIFAX CYBERSECURITY INCIDENT OCTOBER 2017 Equifax has reported a cybersecurity incident potentially impacting 143 million consumers a number equal to more than 50 percent of the U.S. adult population. Consumer information accessed

More information

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag Page 1 Austin Peay State University Identity Theft Prevention POLICIES Issued: March 25, 2017 Responsible Official: Vice President for Finance and Administration Responsible Office: Information Technology

More information

ALABAMA BILL OF RIGHTS

ALABAMA BILL OF RIGHTS ALABAMA BILL OF RIGHTS Alabama Consumers Have the Right to Obtain a Security Freeze. You have a right to place a security freeze on your credit report, which will prohibit a consumer reporting agency from

More information

Guidelines to RULE MB-001 Mortgage Brokers Licensing and Ongoing Obligations

Guidelines to RULE MB-001 Mortgage Brokers Licensing and Ongoing Obligations Guidelines to RULE MB-001 Mortgage Brokers Licensing and Ongoing Obligations Table of Contents PART 1: Preliminary Matters... 3 Lender... 3 Requirement to be licensed... 3 Exemptions... 4 Simple referrals...

More information

EXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud

EXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud EXECUTIVE SUMMARY A systematic approach for combating enrollment fraud OCTOBER 2017 Enrollment fraud is a serious and growing problem The proliferation of identity fraud and new ways of enrolling in health

More information

Illinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College

Illinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College Illinois Eastern Community Colleges Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College Identity Theft Prevention Program Approved by the Cabinet: February 4, 2015

More information

LOAN OFFICER NAME: OFFICE PHONE: CELL PHONE: FAX: ADDRESS: AFFILIATE NAME: COMPANY NAME: BROKER NAME: BROKER PHONE: BROKER

LOAN OFFICER NAME: OFFICE PHONE: CELL PHONE: FAX:  ADDRESS: AFFILIATE NAME: COMPANY NAME: BROKER NAME: BROKER PHONE: BROKER Loan Application Complete the entire application. Failure to complete can cause delays in funding 701 E. Front Ave., Floor, Coeur d'alene, ID 83814 LOAN OFFICER NAME: OFFICE PHONE: CELL PHONE: FAX: EMAIL

More information

CONSUMER REACTIONS TO DATA BREACHES

CONSUMER REACTIONS TO DATA BREACHES 1 CONSUMER REACTIONS TO DATA BREACHES Claire Greene Eric Johnson Slava Mikhed NACHA Payments 2017 April 24, 2017 2 DID THE TARGET BREACH CHANGE CONSUMER ASSESSMENTS OF PAYMENT CARD SECURITY? Claire Greene

More information

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing

More information

ADAM H. PUTNAM COMMISSIONER

ADAM H. PUTNAM COMMISSIONER FLORIDA DEPARTMENT OF AGRICULTURE AND CONSUMER SERVICES ADAM H. PUTNAM COMMISSIONER SOLICITATION OF CONTRIBUTIONS REGISTRATION APPLICATION Chapter 496, Florida Statutes 5J7.004 Florida Department of Agriculture

More information