Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Size: px
Start display at page:

Download "Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?"

Transcription

1 Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is Identity Theft? How is your identity stolen & are you at risk? The Effects of Identity Theft Slide 3 What is Identity Theft? Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company

2 Slide 4 Identity Theft is Wrongful use of someone s personal or financial information to commit fraud or other crimes I want your good name & identity Slide ID Theft Statistics 14% Credit Card Fraud New 18% Phone or Utility 13% Bank Fraud 14% Employment 9% Credit Card Fraud Existing 7% Loans 25% All Other Slide 6 Identity Theft Crime in America ID Theft is the #1 FTC complaint 32% of 2008 complaints About 4% of American adults are affected each year 10% spent at least 55 hours resolving their issues 10% reported out of pocket expenses > $1,200

3 Slide 7 A Question for You What percentage of identity fraud can be detected by the data that appears on a credit report? a) 16% b) 80% c) 50% d) 100% Slide 8 A Question for You What percentage of identity fraud can be detected by the data that appears on a credit report? a) 16% b) 80% c) 50% d) 100% Slide 9

4 Slide 10 Who Steals Our Identity? Slide 11 How Victims Information is Misused January 1 December 31, 2008 Total Number of Identity Theft Victims = 313,982 Attempted Fraud 6% Loan Fraud 4% Gov. Document/Benefits Fraud 15% Employment Related Fraud 15% Other Identity Fraud 24% Bank Fraud 11% Utilities Fraud 13% Credit Card Fraud 20% Slide 12 Identity Theft Victims by State Per 100,000 Population More Than Less Than 60

5 Slide 13 A Question for You What state has the highest ID Theft incident rate? New York Illinois Arizona California Slide 14 Number of Months Between ID Theft & Discovery 3 Years or More (12%) 2 3 Years (8%) Months (6%) Months (2%) 7-12 Months (14%) 4 6 Months (10%) 0 3 Months (47%) 0% 10% 20% 30% 40% 50% Slide 15 Identity Thieves Identity Steal Your Theft Information QuizMany Ways Copyright 2009, Copyright The 2010, Hartford The Hartford Steam Boiler Inspection and Insurance and Insurance Company Company

6 Slide 16 Take A Look At Just How They Do It. Stolen Purses & Wallets Stolen Mail Change Victim s Address Dumpster Diving Fraudulently Obtain Credit Reports Bogus s asking for personal information Steal at Workplaces Intercept Cell / Mobile Telemarketing Scams Slide 17 Growing Criminal Sophistication Global criminal element Virus and worms Spamming Phishing schemes Spyware, adware, malware Keystroke loggers File Sharing Slide 18 Phishing We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.

7 Slide 19 Trojans and RATS Remote Access Trojans (RATs) Malicious software programs that criminals use to control victims computers Monitor ALL online activity (purchases, chat, mail) Open Web Browser to specified location Record passwords Record Keystrokes (on and off-line) Delete ANY files Put ANY file on a computer Slide 20 Wireless Security Concerns Vulnerable Wireless Access Points (WAPS) Free WAP detection and logging tools available: Kismet, AirMagnet, Netstumbler Tools detect WAPs and can reveal their security or lack thereof War Driving - thief drives (or walks) around to find unprotected and accessible WAPs Some consumers & even system administrators fail to configure their Wireless systems adequately Slide 21 What age group is most vulnerable?

8 Slide 22 Risk Factors by Age Copyright 2010, 2009, The Hartford Steam Boiler Inspection and Insurance Company Slide 23 Are You at Risk for Identity Theft? Copyright 2010, Copyright The 2010, Hartford The Hartford Steam Boiler Inspection and Insurance and Insurance Company Company Slide 24 How At Risk Are You? points = High Risk points = Average Risk 0-50 points = Low Risk

9 Slide 25 Ideas For Minimizing Your Risk Be Assertive Be Aware Be an Advocate Slide 26 Monitor Your Credit Reports Copyright 2010, Copyright The 2010, Hartford The Hartford Steam Boiler Inspection and Insurance and Insurance Company Company Slide 27 Free Credit Reports since 2004

10 Slide 28 Guard Your Social Security Number Slide 29 Protect Your Mail Red Flagging & Midnight Mailing 888-5optout Slide 30 Destroy Documents

11 Slide 31 Shop online with caution Slide 32 Pick your PINs Carefully Slide 33 Record your Credit and Bank account information

12 Slide 34 Don t take that call Slide 35 Be Aware Of Sharks When Surfing The Net Copyright 2010, Copyright The 2010, Hartford The Hartford Steam Boiler Inspection and Insurance and Insurance Company Company Slide 36 Stop Companies from Selling Your Information

13 Slide 37 Let s go over it again How can you protect yourself? Clean out your wallet or purse Credit/debit cards Lock your mailbox Empty your glove box Monitor your trash Monitor yourself Slide 38 The Effects of Identity Theft Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 39 Three Most Common Ways a Victim Discovers Identity Theft

14 Slide 40 Now That Your Data Has Been Stolen, How Will It Be Used? I didn t open up that account! That isn t my car! How could my bank balance be zero? I ve never had knee replacement surgery! You don t want to hire me because of a criminal record!? Slide 41 Typical Victim Experiences Time Consuming Confusion & Frustration Emotional Toll It may prove difficult to dispute or remove inaccuracies from credit records Victim Made to Feel Like They Did Something Wrong Slide 42 Institutions Pay Only Part of the Cost Typically pay for direct fraud loss Don t pay for restoration costs, lost time or lost wages

15 Slide 43 The Financial Burden Falls To The Victim Lost Wages Credit Reports Loan Fees Certain Legal Fees Postage & Phone Charges Slide 44 Your Turn Questions Comments Slide 45 Marketplace Approaches to the Exposures Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company

16 Slide 46 Identity Theft Insurance Distribution: Master Policies Through Banks or Credit Card Issuers Employee Benefit Programs Commercial Lines Policies Homeowners Policies Slide 47 Identity Theft Insurance Master Policies: Banks, Credit Card Issuers and Employee Benefit Programs Mostly expense-only Non-admitted policy Certificate of insurance to insureds Slide 48 Identity Theft Insurance Individual Policies: Homeowners, Farmowners, Auto, Commercial Lines Mix of expense-only and programs with added services Policy endorsement Optional or automatic

17 Slide 49 Identity Theft Forms Slide 50 What to Call the Coverage? Identity Fraud Expense Coverage Identity Theft Insurance Identity Recovery Coverage Slide 51 Identity Theft Insurance Homeowners & Farmowners Insured = resident family members and minors Commercial Lines Policies Business Owners Sometimes Employees Special Programs Employees, students or members Alternate Distribution Banks, Online Programs

18 Slide 52 Identity Theft Insurance Forms for Use with Homeowners Policies: ISO HO AAIS ML Independent Various Slide 53 Covered Expenses Out-of-Pocket Expenses Slide 54 Legal Expenses Certain Legal Fees

19 Slide 55 Other Coverages Lost Wages Child or Elder Care Slide 56 Limit & Deductible May be Occurrence or Annual Aggregates Limits Vary From $5,000 - $25,000 Deductibles Vary from $0 - $500 Slide 57 Coverage Trigger Discovery Occurrence

20 Slide 58 Identity Theft Definition ISO Form requires that the fraud be a felony or federal offense AAIS and others use different definitions Slide 59 Identity Recovery Services Some Programs Include: Toll Free Help Line Personal Case Manager Other Specialized Services Slide 60 Data Compromise

21 Slide 61 Data Compromise The #1 concern of corporate managers in a recent poll. In the past two years, U.S. data breaches have affected 100 million people. Slide 62 What is Data Compromise? Types of Data Breach Electronic Hacking Physical Theft Inadvertent Release Fraud Slide 63 Data Compromise on the Front Page

22 Slide 64 Who can be affected? Employees Directors Customers Clients Third Parties Slide 65 Laptop Theft Statistics 10% of laptops stolen in the first 12 months 90% of stolen laptops are never recovered 49% of companies had laptops stolen in the last 12 months 57% of corporate crimes are linked to stolen laptops Roughly 88 Million Americans exposed since Feb % of all reported breaches involved missing laptops Slide 66 Breach Notification Laws 45 States: Data Breach Notification Laws 47 States: Adopted Credit Freeze Laws Pending Federal Bills for Breach Notification

23 Slide 67 Slide 68 State Laws Differ Definition of Personal Information Duty to Warn Timely Notice Mode of Notification Slide 69 Wave of Consumer Sentiment Consumers want companies held responsible for: Safeguarding data Prompt notification to affected persons of a breach Communication of scope of damage Providing assistance

24 Slide 70 Reputational Risks Risk of not notifying is a greater threat to a company s brand and reputation Negative media coverage Adverse impact to public image & reputation Slide 71 Financial Risks Cost of lost business Customer switches suppliers Lower or interrupted sales volume Loss of consumer trust due to data compromise Cost of responding to the breach Cost of notifications to those affected Legal reviews Forensic IT service Providing ID theft recovery services Copyright 2010, Copyright The 2010, Hartford The Hartford Steam Boiler Inspection and Insurance and Insurance Company Company Slide 72 Legal Risks Risk of legal action/lawsuits Affected persons seek payments for damages incurred from identity theft fraud & other misuse of personal data

25 Slide 73 Benefits of Notification Early notification may lower rates of misuse Evidence that public notification reduced misuse Breach notification can deter identity thieves Slide 74 Data Compromise Coverage? Typically no Property Damage or Bodily Injury Largest cost is typically services to third parties May find some third party coverage under cyber-risk forms Slide 75 Data Compromise Insurance Coverage forms just now appearing in the market Monoline and packaged First party only or first and third party

26 Slide 76 Issues for Insurers and Agents Slide 77 Issues for Insurers and Agents Sensitive Information on Claims: What is Needed? Who Should Have Access to It? How Should It Be Protected? Slide 78 Issues for Insurers and Agents Special Needs of Claimants: Emotional Issues Lack of Information Trust Confidentiality

27 Slide 79 Issues for Insurers and Agents We Can Get Fooled Fraudulent insured identity Fraudulent claims We Can Get Breached We keep lots of personal data We need to be part of the solution, not part of the problem Slide 80 Let s Share A Few Other Tips privacyrights.org consumer.gov/idtheft annualcreditreport.com (Equifax, Experian, Trans Union) snopes.com Slide 81 Final Word The pain of being an identity theft victim is driving public reaction to data breach incidents. The insurance industry can help by: Offering high quality services to identity theft victims Developing new coverages for data breach exposures Taking good care of data in our own control

28 Slide 82 Your Turn Questions? Comments?

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

Identity Protection 101: Protect your good name from identity theft.

Identity Protection 101: Protect your good name from identity theft. Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social

More information

UNIT 3-4 Preventing Identity Theft

UNIT 3-4 Preventing Identity Theft UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You. Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

Drexel and FMFCU. Presented By

Drexel and FMFCU.   Presented By Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission

More information

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing

More information

Learn about identity theft. Investor education

Learn about identity theft. Investor education Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions Barry Altland Director, Partner Engagement Who/What is FPP? A Thank You to

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft. PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity

More information

How to Freeze Your Credit Files

How to Freeze Your Credit Files Avoid Identity Theft! How to Freeze Your Credit Files County of Bucks Department of Consumer Protection/ Weights and Measures 1260 Almshouse Rd., 4th Floor Doylestown, Pa. 18901 215-348-6060 1-800-942-2669

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

Three D s of safeguarding your personal data

Three D s of safeguarding your personal data Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D

More information

GREENPATH FINANCIAL WELLNESS SERIES

GREENPATH FINANCIAL WELLNESS SERIES GREENPATH FINANCIAL WELLNESS SERIES IDENTITY THEFT Empowering people to lead financially healthy lives. TABLE OF CONTENTS What is Identity Theft?...2 How Identity Theft Occurs...3 How Identity Thieves

More information

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution

More information

Identity Theft: Help Your Students Avoid This Epidemic

Identity Theft: Help Your Students Avoid This Epidemic Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity

More information

Identity Theft.

Identity Theft. Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.

More information

It s not going away. (c) 2014 huberis.net. Identity Theft

It s not going away. (c) 2014 huberis.net. Identity Theft It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity

More information

Everyone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud. Capital of Texas Enrolled Agents CPE November 3, 2009

Everyone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud. Capital of Texas Enrolled Agents CPE November 3, 2009 Everyone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud Capital of Texas Enrolled Agents CPE November 3, 2009 When was the first significant instance of identity theft in

More information

Financial Literacy Course. East High School Module 9

Financial Literacy Course. East High School Module 9 Financial Literacy Course East High School Module 9 What will you learn about? Identity Theft and Consumer Fraud Protecting Against and Identity Theft and Consumer Fraud Fair Debt Collection Practices

More information

EQUIFAX AFTERMATH ONE YEAR LATER. id theftcente r.o r g

EQUIFAX AFTERMATH ONE YEAR LATER. id theftcente r.o r g EQUIFAX ONE YEAR LATER AFTERMATH R E P O RT Ξ 2018 id theftcente r.o r g 1-8 8 8-40 0-5 5 3 0 A little over one year ago, Equifax announced one of the largest data breaches in history in which approximately

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

GreenPath Financial Wellness Series

GreenPath Financial Wellness Series GreenPath Financial Wellness Series IDENTITY THEFT Through financial knowledge and expertise, we provide high-quality products and services that enable people to enjoy a better quality of life. Smart financial

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA

More information

A Definitions: Europ Assistance USA, Inc East-West Highway, Suite 1000, Bethesda, Maryland 20814

A Definitions: Europ Assistance USA, Inc East-West Highway, Suite 1000, Bethesda, Maryland 20814 This website is owned and/or operated by Europ Assistance USA, Inc. and is subject to the terms of use, privacy policy, and other legal notices posted on their website, which you should read before proceeding.

More information

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal

More information

Consumer Federation of America Best Practices for Identity Theft Services. March 10, 2011

Consumer Federation of America Best Practices for Identity Theft Services. March 10, 2011 Consumer Federation of America Best Practices for Identity Theft Services March 10, 2011 Consumer Federation of America Best Practices for Identity Theft Services Table of Contents Introduction 3 About

More information

IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY

IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY Slide 1 Identity Theft Coverage on Insurance Policies November 8, 2013 Slide 2 What s the big deal? Slide 3 PII Personally Identifiable Information

More information

ID Theft Security. Michael G. Solomon. CISSP PMP CISM

ID Theft Security. Michael G. Solomon. CISSP PMP CISM ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible

More information

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an

More information

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS

More information

Virus Protection and Personal Internet & Identity Theft Coverage Terms and Conditions

Virus Protection and Personal Internet & Identity Theft Coverage Terms and Conditions Virus Protection and Personal Internet & Identity Theft Coverage Terms and Conditions Total Internet Protection Plan Summary: Identity Theft Coverage and Virus Protection Coverage is aggregately valued

More information

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations 2017 BY: KAREN REDDICK NATIONAL CREDIT MANAGEMENT 888-692-3964 kreddick@ncmstl.com 1 WHAT DO THESE STARS HAVE

More information

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan Identity Theft & Identity Fraud By Kevin Sullivan Page 1 Table of Contents What is Identity Theft?... 3 What is Identity Fraud?... 4 How is Personal Information Stolen?... 5 How Your Personal Information

More information

Log on to: using Access Code MI to register and access the benefits provided by IDProtect.

Log on to:   using Access Code MI to register and access the benefits provided by IDProtect. Identity theft takes a serious financial and emotional toll on its victims. 8.1 million Americans were victims of identity fraud in 2010. Better education and increased monitoring of accounts is helping

More information

Protecting against and recovering from fraud and identity theft WHAT TO DO

Protecting against and recovering from fraud and identity theft WHAT TO DO Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls

More information

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major

More information

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Insuring your online world, even when you re offline. Masterpiece Cyber Protection Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied

More information

Visa s Approach to Card Fraud and Identity Theft

Visa s Approach to Card Fraud and Identity Theft Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting

More information

A GUIDE TO CYBER RISKS COVER

A GUIDE TO CYBER RISKS COVER A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance

More information

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

ROCHESTER INSTITUTE OF TECHNOLOGY

ROCHESTER INSTITUTE OF TECHNOLOGY ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3

More information

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director pierson Technological advances of the

More information

Identity Theft. Protect Yourself from

Identity Theft. Protect Yourself from Protect Yourself from Identity Theft Helping you to better understand some of the common sources of identity theft, how to protect your information, how to detect it when there s a problem, and how to

More information

SENIOR SAFETY PRESENTATION

SENIOR SAFETY PRESENTATION SENIOR SAFETY PRESENTATION Presentation Overview Elder Abuse Problem How the Calgary Police Service responds to this issue Most Prevalent Frauds/Scams Case Studies Contributing Societal Trends Elder Abuse

More information

Services & Features for Employee Benefit Members

Services & Features for Employee Benefit Members Services & Features for Employee Benefit Members IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific

More information

Protecting Yourself Against Frauds & Scams

Protecting Yourself Against Frauds & Scams Protecting Yourself Against Frauds & Scams Trust & Respect Integrity Accountability Excellence Teamwork Justice Progress Through Participation What you need to know Why do con artists target seniors? How

More information

Ohio Conference of Payroll Professionals

Ohio Conference of Payroll Professionals Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number

More information

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity

More information

2) The proper use and control of credit is the best way to build a good credit history. Answer: TRUE Diff: 1 Question Status: Previous edition

2) The proper use and control of credit is the best way to build a good credit history. Answer: TRUE Diff: 1 Question Status: Previous edition Personal Finance, 6e (Madura) Chapter 7 Assessing and Securing Your Credit 7.1 Background on Credit 1) If you refrain from using any credit, it will assure you the lowest possible interest rate when you

More information

Introduction to Fraud Detective Kirby Shoemake

Introduction to Fraud Detective Kirby Shoemake Introduction to Fraud Detective Kirby Shoemake Fraud In criminal law, fraud is an intentional deception or coercion made for personal gain and to damage another individual in some way shape or form. Types

More information

Insuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a

More information

Data Breach Financial Protection Program Terms and Conditions

Data Breach Financial Protection Program Terms and Conditions Data Breach Financial Protection Program Terms and Conditions The Data Breach Financial Protection Program (the Program ) is a comprehensive expense reimbursement program, provided with some Netsurion

More information

Tax-Related Identity Theft

Tax-Related Identity Theft Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman

More information

Jason B. Freeman, J.D., CPA

Jason B. Freeman, J.D., CPA Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman

More information

IDENTITY THEFT PROTECT YOUR MONEY

IDENTITY THEFT PROTECT YOUR MONEY IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that

More information

DATA COMPROMISE COVERAGE FORM

DATA COMPROMISE COVERAGE FORM DATA COMPROMISE DATA COMPROMISE COVERAGE FORM Various provisions in this policy restrict coverage. Read the entire policy carefully to determine rights, duties and what is and is not covered. Throughout

More information

Identity Theft What to do if your identity is stolen

Identity Theft What to do if your identity is stolen Identity Theft What to do if your identity is stolen Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 14 years1. It can impose damage that

More information

B. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.

B. The College is considered a creditor under the Red Flags Rule because it defers payment for services rendered. COLLEGE of CENTRAL FLORIDA ADMINISTRATIVE PROCEDURE Title: Identity Theft Prevention Program Procedure Page 1 of 5 Implementing Procedure For Policy # # 2.04 Date Approved: 07/07/11 Division: Administration

More information

PAI Secure Program Guide

PAI Secure Program Guide PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS

More information

Identity theft can occur even if you have been careful about protecting your personal information.

Identity theft can occur even if you have been careful about protecting your personal information. Dear Customer, Identity theft can occur even if you have been careful about protecting your personal information. If you suspect you have been a victim of identity theft, a fraud, or a scam, we have prepared

More information

Personal Information Protection Act Breach Reporting Guide

Personal Information Protection Act Breach Reporting Guide Personal Information Protection Act Breach Reporting Guide If an organization determines that a real risk of significant harm exists to an individual as a result of a breach of personal information, section

More information

Services and Features

Services and Features Services and Features IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific services and features.

More information

What is Identity Theft?

What is Identity Theft? IDENTITY THEFT What is Identity Theft? Identity theft is a growing problem in today s information age. Criminals are becoming more sophisticated in their ability to use your personal information for their

More information

Loaded Everyday card terms and conditions

Loaded Everyday card terms and conditions Loaded Everyday card terms and conditions Posted Online: 1 October 2013 Effective: 15 October 2013 The Loaded TM range of cards is issued by Kiwibank Limited and distributed by various organisations, including

More information

Identity Theft Information for Tax Professionals. August 2017

Identity Theft Information for Tax Professionals. August 2017 Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!

More information

Cyber Risks & Insurance

Cyber Risks & Insurance Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of

More information

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET 1-877-511-7906 LifeLock.com/Business FACT SHEET LifeLock Benefit Elite LifeLock

More information

MONEY CONNECTION. 4How s your security? Your financial future: A financial advisor can help. How CU Wealth Management* can help

MONEY CONNECTION. 4How s your security? Your financial future: A financial advisor can help. How CU Wealth Management* can help MONEY CONNECTION creditunion.coca-cola.com Your financial future: A financial advisor can help 6 ways to get out of debt 2 7 tips for protecting your credit 3 and debit cards from fraud 4How s your security?

More information

Call for assistance with registration and activation. You will be asked for your Access Code if registering by phone.

Call for assistance with registration and activation. You will be asked for your Access Code if registering by phone. Your Community West Credit Union checking account is about to work for you. Now it s time to start taking advantage of the benefits and features your account offers: IDPROTECT identity theft monitoring

More information

Chart 1 How Fraudulently Used Consumer Information is Obtained M A Y

Chart 1 How Fraudulently Used Consumer Information is Obtained M A Y M A Y 2 0 0 6 Payments Fraud: Consumer Considerations by Terri Bradford, Payments System Research Specialist, Federal Reserve Bank of Kansas City, and Bruce Cundiff, Research Analyst, Javelin Strategy

More information

The fastest growing white-collar crime in the US. Identity theft REPAIR KIT. brought to you by: Colorado Attorney General John Suthers

The fastest growing white-collar crime in the US. Identity theft REPAIR KIT. brought to you by: Colorado Attorney General John Suthers The fastest growing white-collar crime in the US. Identity theft REPAIR KIT brought to you by: Colorado Attorney General John Suthers Message from Attorney General John Suthers Dear Coloradoans: Identity

More information

IT Security Roundtable on recognizing scams and dealing with identity theft Important to file a report with the police (aka Identity Theft Report)

IT Security Roundtable on recognizing scams and dealing with identity theft Important to file a report with the police (aka Identity Theft Report) IT Security Roundtable on recognizing scams and dealing with identity theft Kansas State University March 7, 2008 Harvard Townsend. IT Security Officer Speaker Notes 1. Email scams sent last week to K-Staters

More information

Financial Crime: Awareness & Prevention. Jon Jarosinski

Financial Crime: Awareness & Prevention. Jon Jarosinski Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit

More information

What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP

What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP LIFELOCK MEMBER EXPECTATIONS GUIDE 800-607-91744 LifeLock.com What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP THE LIFELOCK MEMBER COMMUNICATION EXPERIENCE Signing up

More information

Get the most out of your membership

Get the most out of your membership PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing

More information

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance see} white paper see} white paper Red Flag! Now What? If you are a large bank, credit union or credit card issuer, you are well aware of

More information

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Identity theft and identity fraud are terms used to refer to all types

More information

Identity Theft: World s Fastest Growing Crime!!

Identity Theft: World s Fastest Growing Crime!! Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all

More information

REPAIR KIT. Identity theft. SUBJECT: Identity Theft. BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING:

REPAIR KIT. Identity theft. SUBJECT: Identity Theft. BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING: SUBJECT: Identity Theft Identity theft REPAIR KIT BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING: fastest growing white-collar crime in the US IDENTITY THEFT Message from your Attorney

More information

Cyber Risk Management

Cyber Risk Management Cyber Risk Management Privacy & Data Protection Agenda 2 Introductions Risk Management 101 Defining & Quantifying a Breach Prevention, Mitigation & Transfer Strategies Finance Strategy- Cyber Insurance

More information

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet:

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet: Before you start Telephone calls and other forms of direct communication: Use the worksheet included in this packet to keep a record of all conversations. When reporting fraud or communicating with law

More information

Identity Theft Solutions

Identity Theft Solutions Identity Theft Solutions Identity Theft Solutions August 12, 2015 2 A Complete IDENTITY THEFT SOLUTION Identity theft is the fastest growing financial crime in America, striking thousands of victims each

More information

Identity Theft Protection Plans

Identity Theft Protection Plans Identity Theft Protection Plans V E R I F Y P R O T E C T R E C O V E R IN 2017, DATA BREACHES REACHED ECONOMIC PROPORTIONS A victim may need to spend time at work trying to recover their good name and

More information

Chapter 27. Your Credit and the Law pp

Chapter 27. Your Credit and the Law pp Your Credit and the Law pp. 434-447 Learning Objectives After completing this chapter, you ll be able to: 1. Explain how government protects credit rights. 2. Name federal laws that protect consumers.

More information

MANITOBA OMBUDSMAN PRACTICE NOTE

MANITOBA OMBUDSMAN PRACTICE NOTE MANITOBA OMBUDSMAN PRACTICE NOTE Practice notes are prepared by Manitoba Ombudsman to assist persons using the legislation. They are intended as advice only and are not a substitute for the legislation.

More information

Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities.

Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. deluxe growth services introduction Identity thieves are extending beyond credit relationships and are more

More information

Kasasa Protect. FAQ and Product Overview

Kasasa Protect. FAQ and Product Overview Kasasa Protect FAQ and Product Overview Kasasa Protect... 3 Key Contact Info... 3 Included Benefits... 3 Credit Reporting... 4 Monthly Credit Score & Plotter... 4 24/7 Credit Monitoring... 5 Full-Service

More information

To alert you to the causes of Identity Theft To provide resources where you can learn about the subject To outline steps you can take to lesson your

To alert you to the causes of Identity Theft To provide resources where you can learn about the subject To outline steps you can take to lesson your Improving your odds To alert you to the causes of Identity Theft To provide resources where you can learn about the subject To outline steps you can take to lesson your risks It all started with an article

More information

Identity Protection Services

Identity Protection Services Identity Protection Services Overview Why are identity protection services being provided? We believe your personal information should stay that way personal. That s why we re taking industry- leading

More information

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW The Denver District Attorney's Office has been working closely with the Colorado Bureau of Investigations to provide you the most up-to-date information on the

More information