UI ID Theft in Texas UI Director s Conference. Paul Carmona Director, Regulatory Integrity Division

Size: px
Start display at page:

Download "UI ID Theft in Texas UI Director s Conference. Paul Carmona Director, Regulatory Integrity Division"

Transcription

1 UI ID Theft in Texas 2014 UI Director s Conference Paul Carmona Director, Regulatory Integrity Division

2 Overview Desired End State What We Know What We re Experiencing What We re Doing About It Near-Term Mid-Term Long-Term

3 Desired End State Accurately Pay Valid UI Claims to the Authentic Claimant

4 What We Know Court Ventures 200 Million people affected 130 Million people affected 76 Million people affected 152 Million people affected Target Corp. 110 Million people affected 56 Million people affected 76 Million people affected 145 Million people affected

5 What We Know - Data Breaches in the U.S.

6 What We Know - Data Breaches by Cause

7 What We Know

8 What We Know "In 2012, the total monetary loss due to identity theft was $24.7 billion nationally. The total monetary loss due to all other types of property theft combined that year was $14 billion Susan Combs, Texas Comptroller Javelin Strategy & Research has produced yearly studies, titled Identity Fraud Report, showing that the number of identity fraud victims increased from 10.2 million Americans in 2010 to 13.1 million in 2013.

9 Launched October 7, 2014 What We Know

10 What We Know - ID Theft Identity Theft: number one complaint category in the Consumer Sentinel Network for CY2013 with 14% of the overall complaints Debt Collection: 10% Banks and Lenders: 7% Impostor Scams: 6% Telephone and Mobile Services: 6% Prizes, Sweepstakes and Lotteries: 4% Auto-Related Complaints: 4% Shop-at-Home and Catalog Sales: 3% Television and Electronic Media: 3% Advance Payments for Credit Services: 2%

11

12 What We Know - Consumer Sentinel Network Identity Theft Complaints How Victims Information is Misused Government documents\benefits fraud (34%) was the most common form of reported identity theft, followed by credit card fraud (17%), phone or utilities fraud (14%), and bank fraud (8%). Other significant categories of identity theft reported by victims were employment-related fraud (6%) and loan fraud (4%).

13 What We Know Based on preliminary analysis, the Internal Revenue Service (IRS) estimates it paid $5.2 billion in fraudulent identity theft (IDT) refunds in filing season 2013, while preventing $24.2 billion (based on what it could detect). The full extent is unknown because of the challenges inherent in detecting IDT refund fraud. GAO Report IDENTITY THEFT Additional Actions Could Help IRS Combat the Large, Evolving Threat of Refund Fraud, August 2014

14 What We Know City Ranking for ID Theft Complaints Florida is the state with the highest per capita rate of reported identity theft complaints, followed by Georgia and California.

15 2. Prepaid Cards figures include a significant number of complaints from data contributor Green Dot, and Wire Transfer figures include a significant number of complaints from data contributors MoneyGram International and Western Union Money Transfer. This may affect the distribution of the reported methods of payment.

16 What We Know TWC Experience with UI Fraud Schemes Using Stolen Identities : 27 Claims, Saved $ : 200 Claims, Saved $693, : 260 Claims, Saved $533, : 26 Claims, Saved $65, : 274 Claims, Saved $966, :??? Claims, Saved $???

17 What We Are Experiencing Organized ID Theft Attack on the Texas UI System Using Stolen Identities ID Theft List is Extensive To Date, TWC has stopped > 7,200 claims Fraudsters continue filing claims daily TWC prevented paying millions on bad claims Some bogus claims are more sophisticated than previous schemes The claims exhibit recognizable patterns / attributes

18 What We Are Experiencing 2014 ID Theft - Florida On or about the end of January 2014, Office of Investigations (OI) received an ID Theft allegation The week of April 13, 2014, claimants and/or employers called and said they or their employee was not filing a UI claim UI alerted OI Special Investigations identified UI claims exhibiting known fraud patterns

19 What We re Doing About It - Near-Term Due to the volume of calls and ties to a previous scheme, Special Investigations (SI) requested all web data for UI claims filed since 1 Nov 13 IT determined ~86,000 claims filed through the internet portal Enterprise Architect (IT) analyzed UBS UI claim data patterns and identified 6,600 claims with similar characteristics: SI identified trends and developed a rating process with Operations Insight Analysts

20 What We Are Doing About It - Near-Term Tele-Center Ops fielded calls and provided UI Support with Known ID Theft Claims to stop The Tele-centers or UI Support Services staff read the following script to the caller who did not file the claim or their employer. This occurs only for claimants that call and say they did not file the claim or the employer response states the person is still working and they did not file the claim. Thank you for reporting this issue and taking the time to answer my questions. I ve documented the information about the fraudulent claim and am sending it to TWC s Office of Investigations. TWC works with state and federal agencies and law enforcement officials to investigate fraudulent claims. You don t need to contact us unless you have new information. If you think of additional information you d like to give us, call our fraud hotline at If you are (your employee is) concerned about identity theft, go to the Federal Trade Commission s website, at select the link for Report Identity Theft, and follow the instructions. Or, call the FTC at for help. The next step: Tele-centers notify UI Central of the detected Identity Theft case.

21 What We Are Doing About It - Near-Term UI Support Locks a Known ID Theft Claim (where the claimant and/or employer confirms true identity owner was not filing): After receiving the from the Tele-Centers or if we become aware of the ID theft case, UI Support Locks the claim: Moves balance to disqualification Keys High Importance Notepad Keys decision on open case and NAs all other cases Responds to the Tele-Center that this has been reported Sends 1 list at the end of the day to Special Investigations and UI Support UI sends a list to Tele-Center Operations to put into Case Management System OI returns TWC Hotline Calls and Bat Phone Calls (Script) UI began calling Employers on claims using Yopmail in the User ID or e- mail address to proactively determine if the suspicious claim was bogus

22 What We Are Doing About It - Near-Term Current Data Collection and Scoring Process IT and UI uploads daily run of all internet filed claims UI aggregates the daily claims weekly and uploads into the Crossfunctional Data Exchange folder Operations Insight (Data Analytics Unit) combines and de-conflicts the data and scores it against predefined attributes Special Investigations (SI) reviews the scored claims and identifies claims indicating ID Theft. SI sends highly suspicious claims to the UI Tele-Center to verify if claim is bogus UI Tele-Center sends verified or highly suspicious claims to UI Operations to Lock the claim and adds claim to Locked list

23 What We Are Doing About It - Near-Term Rating Process (Identify and Score Patterns) Implemented a weighting and scoring process to quickly identify bogus claims ID thieves adapt to countermeasures quickly, requiring frequent changes to attributes, weighting and analytical techniques Currently on 5 th generation weighting and scoring process that checks against 13 predefined attributes Maximum score is presently = 54 Plan to add two new attributes soon

24 What We Are Doing About It - Short-Term UI Filter for Suspicious Claims Short-Term: UI detected suspicious claims as they are filed and required the claimant to contact a TWC Call Center to file Rqmt ID Business Topic 1 Web - New Claim Fraud Filter 1a 1b Description (This system will ) For a new internet claim, the system evaluates claimant information based on the following criteria: Does user name or user contain "yopmail"? Is the claimant address provided in the state of Florida? 1c Does the username contain the numeric "agent" pattern identified in the analysis? 2 Upon the user clicking submit, the system evaluates the conditions above. If 1 or more of the criteria are met, the system will: 2b Not submit the claim 2c Store the rejection code of "NNN" in the "YYY" table along with the claimant SSN 2c Present a page advising the user to contact the Call Center to submit the claim. This enables TWC to more thoroughly ID a suspicious claimant

25 What We Are Doing About It - ID Questions Confirm customer s identity. May I please have your social security number? Thank you. May I please have your name and current mailing address? Next, to further confirm your identity, please provide me your TX driver license # or your TX ID # and your date of birth. Enter Texas Driver s License or Texas ID #. Review the name, address and DOB. If DL # and DOB are confirmed in TDI, go to next identifier. IF DISCREPANCIES: Ask about any discrepancies, but do not reveal identifying information from this screen. If the discrepancy cannot be explained, continue with: Mr./Ms. I appreciate you providing me that information. In order to continue with your claim for unemployment benefits TWC will need verification of your Driver s License (or ID), Social Security Number (SSN) and proof of residency at the address you provided. We apologize for any inconvenience this may cause. You can present the documentation to a Workforce Solutions Office and ask staff at the center to contact us at the number they have for us to verify the information has been presented. If you can t go to a Workforce Solutions Office you may fax a copy of this information to us at [give your Tele- Center s fax number]. When we receive the information we will contact you to complete the claim. Please include the best telephone number to reach you on the fax you send. 75% or more of the total base period wages NOT AT LEAST 75% OF 2013 BASE PERIOD WAGES, ask caller to follow the additional verification procedure as outlined above. Referring to Workforce Solutions office or fax.

26 Filter and Enhanced Claimant ID Process Lesson Learned: Fraudsters adapted very quickly, rendering filter ineffective because the filter permitted multiple attempts per claim This educated the fraudster on how to circumvent the filter Long-Term: need capability on the front of UI claims system (Web and IVR) to identify suspicious claims requiring further action to authenticate the claimant s identity and validate eligibility

27 What We Are Doing About It - Mid-Term August 4, AWARE UI Benefits Fraud Detection System became fully operational Continue current detection/prevention efforts, including prosecuting thieves Applied for and received DOL Supplemental Budget Request (SBR) funds to create an ID Theft Task Force 3 BPC Investigators 1 Operational Insight Analyst (BPC expert) Submit proposal and process to stop direct deposits to pre-paid debit cards ID Theft Task Force Define requirements, procure, test and implement an enhanced detection/prevention capability (ID Theft FraudX) for existing AWARE system Define requirements for a layered Identity-Proofing system for real-time detection and predictive analysis to prevent high risk claims from entering the UI Benefits system

28 What We Are Doing About It - Long-Term Procure a layered Identity-Proofing system for real-time detection and predictive analysis to prevent high risk claims from entering the UI Benefits system

29 Summary Desired End State What We Know What We re Experiencing What We re Doing About It Near-Term Mid-Term Long-Term

Tax-Related Identity Theft

Tax-Related Identity Theft Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman

More information

Jason B. Freeman, J.D., CPA

Jason B. Freeman, J.D., CPA Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information

Identity Theft Information for Tax Professionals. August 2017

Identity Theft Information for Tax Professionals. August 2017 Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!

More information

Visa s Approach to Card Fraud and Identity Theft

Visa s Approach to Card Fraud and Identity Theft Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting

More information

Data Thefts and Protecting Client Tax Information

Data Thefts and Protecting Client Tax Information Data Thefts and Protecting Client Tax Information October 20, 2015 The information contained in this presentation is current as of the date it was presented. It should not be considered official guidance.

More information

Combating ID Theft with the Help of Payroll Professionals

Combating ID Theft with the Help of Payroll Professionals PENNSYLVANIA STATEWIDE PAYROLL CONFERENCE Indiana University Of Pennsylvania Philip G. Yamalis Senior Stakeholder Liaison October 7, 2016 Future State Resources for Payroll Professionals Combating ID Theft

More information

SPECIAL REPORT. What to Do If Your Client Is a Victim of Tax-Related Identity Theft

SPECIAL REPORT. What to Do If Your Client Is a Victim of Tax-Related Identity Theft SPECIAL REPORT What to Do If Your Client Is a Victim of Tax-Related Identity Theft What to Do If Your Client Is a Victim of Tax-Related Identity Theft Tax-related identity theft revolves around the fraudulent

More information

IRS UPDATES & Taxes. Security. Together.

IRS UPDATES & Taxes. Security. Together. IRS UPDATES & Taxes. Security. Together. Dennis Bell Senior Stakeholder Liaison CATA February 3, 2016 Issue 5: Online Tools for Tax Professionals 1 Keeping Current Preparer Guidelines 2 Other Tax Pro Links

More information

DALLAS CPA SOCIETY CONTINUING EDUCATION CORPORATION MEMBER APPRECIATION CPE SERIES. October 26, 2016

DALLAS CPA SOCIETY CONTINUING EDUCATION CORPORATION MEMBER APPRECIATION CPE SERIES. October 26, 2016 DALLAS CPA SOCIETY CONTINUING EDUCATION CORPORATION MEMBER APPRECIATION CPE SERIES October 26, 2016 TIGTA & You: Protecting Clients and Taxpayers Tom Traxinger Assistant Special Agent in Charge, Treasury

More information

Helping Victims of Identity Theft and Consumer Fraud Crimes., 2017 at 3 pm ET Thursday, July 13, 2017 at 3:00pm ET

Helping Victims of Identity Theft and Consumer Fraud Crimes., 2017 at 3 pm ET Thursday, July 13, 2017 at 3:00pm ET Helping Victims of Identity Theft and Consumer Fraud Crimes, 2017 at 3 pm ET Thursday, July 13, 2017 at 3:00pm ET What is the need? What FTC resources are available to assist victims of ID Theft and fraud?

More information

Today s Speakers. Lisa Weintraub Schifferle. Eva Velasquez. Attorney Federal Trade Commission (FTC) CEO & President Identity Theft Resource Center

Today s Speakers. Lisa Weintraub Schifferle. Eva Velasquez. Attorney Federal Trade Commission (FTC) CEO & President Identity Theft Resource Center Today s Speakers Lisa Weintraub Schifferle Attorney Federal Trade Commission (FTC) Eva Velasquez CEO & President Identity Theft Resource Center Overview What is identity theft? What is tax identity theft?

More information

Combating Refund Fraud: Recent Trends and Successful Prevention Techniques

Combating Refund Fraud: Recent Trends and Successful Prevention Techniques Combating Refund Fraud: Recent Trends and Successful Prevention Techniques Revenue Solutions, Inc. 2017 WSATA Annual Conference Missoula, MT October 3, 2017 2017 Revenue Solutions, Inc. Introduction Davis

More information

Introduction to Fraud Detective Kirby Shoemake

Introduction to Fraud Detective Kirby Shoemake Introduction to Fraud Detective Kirby Shoemake Fraud In criminal law, fraud is an intentional deception or coercion made for personal gain and to damage another individual in some way shape or form. Types

More information

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting

More information

Risk Management on Prepaid Cards

Risk Management on Prepaid Cards Responsibilities CenterState Bank of Florida, NA (CSBF) is the issuing financial institution of all prepaid cards and owner of the associated network BINs. CSBF is responsible for all program monitoring

More information

What is Credit Monitoring?

What is Credit Monitoring? 5LINX SafeScore Overview Fraud Facts What is Credit Monitoring How is Credit Monitoring different from Identity Monitoring Why choose Credit Monitoring Credit Monitoring package details Compensation How

More information

Identity theft can occur even if you have been careful about protecting your personal information.

Identity theft can occur even if you have been careful about protecting your personal information. Dear Customer, Identity theft can occur even if you have been careful about protecting your personal information. If you suspect you have been a victim of identity theft, a fraud, or a scam, we have prepared

More information

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet:

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet: Before you start Telephone calls and other forms of direct communication: Use the worksheet included in this packet to keep a record of all conversations. When reporting fraud or communicating with law

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

Better Business Bureau

Better Business Bureau Better Business Bureau 1 Who We Are & Our Vision BBB is an unbiased non-profit organization that sets and upholds high standards for fair and honest business behavior. For more than 100 years, Better Business

More information

It s not going away. (c) 2014 huberis.net. Identity Theft

It s not going away. (c) 2014 huberis.net. Identity Theft It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity

More information

Enterprise Fraud, Waste and Abuse Prevention and Detection:

Enterprise Fraud, Waste and Abuse Prevention and Detection: Enterprise Fraud, Waste and Abuse Prevention and Detection: Annual Report to the Legislature OFFICE OF THE NEW YORK STATE COMPTROLLER Thomas P. DiNapoli, State Comptroller SEPTEMBER 1, 2017 Introduction

More information

The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age Scoping Out Synthetic ID Fraud In the 18 years since synthetic identity fraud emerged as a significant

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal

More information

Templeton Municipal Light and Water Plant

Templeton Municipal Light and Water Plant Templeton Municipal Light and Water Plant RED FLAG POLICY 1. POLICY It is the policy of the Templeton Municipal Light and Water Plant (TMLWP) that information compiled on all customers and employees is

More information

The Smartest Employee Benefit Is Identity Theft Management

The Smartest Employee Benefit Is Identity Theft Management The Smartest Employee Benefit Is Identity Theft Management HELP PROTECT YOUR EMPLOYEES. Proposal For: Date: Presented By: Provide peace of mind. Raise your benefits to a new level. Every employee has a

More information

IDENTITY THEFT PROTECT YOUR MONEY

IDENTITY THEFT PROTECT YOUR MONEY IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that

More information

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft. PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity

More information

ROCHESTER INSTITUTE OF TECHNOLOGY

ROCHESTER INSTITUTE OF TECHNOLOGY ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3

More information

POLICY: Identity Theft Red Flag Prevention

POLICY: Identity Theft Red Flag Prevention POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity Theft Prevention Program Lake Forest College Revision 1.0 Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:

More information

Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities.

Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. deluxe growth services introduction Identity thieves are extending beyond credit relationships and are more

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

Kasasa Protect. FAQ and Product Overview

Kasasa Protect. FAQ and Product Overview Kasasa Protect FAQ and Product Overview Kasasa Protect... 3 Key Contact Info... 3 Included Benefits... 3 Credit Reporting... 4 Monthly Credit Score & Plotter... 4 24/7 Credit Monitoring... 5 Full-Service

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

Services and Features

Services and Features Services and Features IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific services and features.

More information

Preventing Senior Scams. Welcome. MoneyWi$e is a joint financial education project of Consumer Action and Capital One

Preventing Senior Scams. Welcome. MoneyWi$e is a joint financial education project of Consumer Action and Capital One Preventing Senior Scams Welcome MoneyWi$e is a joint financial education project of Consumer Action and Capital One Overview of topics Recognizing scams Protecting yourself from fraud Steps to take if

More information

Services & Features for Employee Benefit Members

Services & Features for Employee Benefit Members Services & Features for Employee Benefit Members IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific

More information

State of Card Fraud: 2018

State of Card Fraud: 2018 State of Card Fraud: 2018 A deep dive into the evolution of card fraud + industry benchmark data for financial institutions. Stopping Fraud at the Speed of Data Continuing the trend of prior years, the

More information

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper

Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance see} white paper see} white paper Red Flag! Now What? If you are a large bank, credit union or credit card issuer, you are well aware of

More information

Year-end 2016 fraud update: Payment cards, remote banking and cheque

Year-end 2016 fraud update: Payment cards, remote banking and cheque Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments

More information

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704 RE: Identity Theft Claim You recently notified Fay Servicing, LLC that you are the victim of identity theft with respect to the above referenced loan (also referred to in this notice as the debt or account

More information

MICHIGAN STATE UNIVERSITY

MICHIGAN STATE UNIVERSITY MICHIGAN STATE UNIVERSITY Mr. Bob Ferguson Attorney General Office of the Attorney General 1125 Washington Street SE PO Box 40100 Olympia, WA 98504-0100 Dear Attorney General: November 18, 2016 R E ru,

More information

NAU Police Department s Identity Theft Victim s Packet

NAU Police Department s Identity Theft Victim s Packet NAU Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted the NAU Police Department and obtained a police report number

More information

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 8 Chapter 13,

More information

What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP

What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP LIFELOCK MEMBER EXPECTATIONS GUIDE 800-607-91744 LifeLock.com What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP THE LIFELOCK MEMBER COMMUNICATION EXPERIENCE Signing up

More information

Bank Secrecy Act OFAC FinCEN

Bank Secrecy Act OFAC FinCEN Bank Secrecy Act OFAC FinCEN SOUTHEAST DIRECTORS AND SUPERVISORY COMMITTEE CONFERENCE SEPTEMBER 18, 2017 Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer

More information

2017 annual fraud update:

2017 annual fraud update: 2017 annual update: Payment cards, remote banking, cheque and authorised push payment scams March 2018 The threat from is always changing, but the finance industry is continuously enhancing its response,

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Reno Police Department, complete a crime report and obtained a police report case number

More information

Scam Type #1: Wire Fraud Scams

Scam Type #1: Wire Fraud Scams 2015 Scam Type #1: Wire Fraud Scams The Goal of Wire Fraud Scams is to have the victim wire or otherwise send money to the Scammer through non-refundable, non-traceable methods such as Wire Transfer; Money

More information

Legal Basics: Protecting Older Adults Against Scams

Legal Basics: Protecting Older Adults Against Scams Legal Basics: Protecting Older Adults Against Scams Odette Williamson Attorney, National Consumer Law Center Lisa Weintraub Schifferle Attorney, Federal Trade Commission April 10, 2018 Housekeeping All

More information

Mortgage Asset Research Institute Quarterly Fraud Report

Mortgage Asset Research Institute Quarterly Fraud Report Mortgage Asset Research Institute Quarterly Fraud Report August 25, 2008 Fight Mortgage Fraud with Solutions that Help You Know your Customer, Employee and Vendor www.marisolutions.com 2008 ChoicePoint

More information

Tax Deductions lost in Tax Law Highlights (for 2018 changes see page 4)

Tax Deductions lost in Tax Law Highlights (for 2018 changes see page 4) Income Tax Preparation Services 19401 E 40 Hwy, Suite 170 Independence MO 64055 Phone: 816-795-9882 Fax: 816-795-9883 Email: DLPENCE@GMAIL.COM Website: www.taxesbydebbie.com 2017 Tax Law Highlights (for

More information

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Slide 1 Identity Theft Prevention Program Welcome to the Identity Theft Prevention Program annual training course. Your personal identification information can be used by individuals seeking to use your

More information

IDShield National Plan Benefit Overview

IDShield National Plan Benefit Overview IDShield National Plan Benefit Overview IDShield is an industry leader in identity theft protection, monitoring and restoration services. Through IDShield, participants receive a comprehensive set of identity

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

news Submit Your Nominations for the 2013 AIS/NER Award NER and NICB Release 2011 Heavy Equipment Theft Report IN THE

news Submit Your Nominations for the 2013 AIS/NER Award NER and NICB Release 2011 Heavy Equipment Theft Report IN THE EQUIPMENT SECURITY NEWS THIRD QUARTER 2012 IN THE news NER and NICB Release 2011 Heavy Equipment Theft Report The National Equipment Register (NER), a division of Verisk Crime Analytics, and the National

More information

Synthetic Identities. Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved.

Synthetic Identities. Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved. Synthetic Identities Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved. Synthetic Identities A combination of fictitious and potentially stolen personally identifiable

More information

Revenue Solutions, Inc. Refund Fraud Deterrence

Revenue Solutions, Inc. Refund Fraud Deterrence Revenue Solutions, Inc. Refund Fraud Deterrence Presentation for: Federation of Tax Administrators Solution Track Series August 2008 Introduction John Bace Senior Consulting Manager Data Warehouse / Business

More information

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM TITLE II ADMINISTRATIVE REGULATIONS CHAPTER 30 IDENTITY THEFT PREVENTION PROGRAM 30.01 Program The Town of Flower Mound, Texas, as a utility provider ( Utility ), has developed an Identity Theft Prevention

More information

McDonald Hop kins. January 23, Office of Washington Attorney General Consumer Protection Division 800 5th Ave, Suite 2000 Seattle, WA

McDonald Hop kins. January 23, Office of Washington Attorney General Consumer Protection Division 800 5th Ave, Suite 2000 Seattle, WA McDonald Hop kins A business advisory and advocacy law firm", James J. Giszczak Direct Dial: 248.220.1354 jgiszczak@mcdonaldhopkins.com McDonald Hopkins PLC 39533 Woodward Avenue Suite 318 Bloomfield Hills,

More information

Chapter 9: Identity Theft and Refund Fraud. 1 09: Identity Theft and Refund Fraud

Chapter 9: Identity Theft and Refund Fraud. 1 09: Identity Theft and Refund Fraud Page 135-146 Chapter 9: Identity Theft and Refund Fraud 1 Learning Objectives Page 135-146 Upon completion of this seminar, participants should be able to Recognize the threats that apply to practitioners.

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Revised April 2010 Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso County Sheriff s Office and obtained a police report number

More information

Identity Theft Prevention. Red Flags. Training Program

Identity Theft Prevention. Red Flags. Training Program Identity Theft Prevention Red Flags Training Program 1 Red Flags Training Program Adoption Amendment passed in 2003 to the Fair Credit Reporting Act called The Fair and Accurate Credit Transactions Act

More information

Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009

Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009 Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009 Rebekah A. Z. Monson Pepper Hamilton LLP 215.981.4031 monsonr@pepperlaw.com

More information

IDENTITY THEFT DETECTION POLICY

IDENTITY THEFT DETECTION POLICY IDENTITY THEFT DETECTION POLICY PC 6.9 Date of Last Update: May 05, 2009 Approved By: President's Cabinet Responsible Office: Business and Finance POLICY STATEMENT Grand Valley State University (GVSU)

More information

ACH Tax Refunds: Exceptions, Posting, & Liabilities. Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist

ACH Tax Refunds: Exceptions, Posting, & Liabilities. Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist ACH Tax Refunds: Exceptions, Posting, & Liabilities Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist Audio Handouts Questions Dealing with ACH Tax Refunds: Exceptions, Posting & Liabilities

More information

Tips for Preventing Credit Card Fraud and Avoiding Chargebacks

Tips for Preventing Credit Card Fraud and Avoiding Chargebacks Tips for Preventing Credit Card Fraud and Avoiding Chargebacks Accepting credit cards is more than just a courtesy that your small business extends to its valued customers. In today s marketplace, it has

More information

The Cost of Identity Theft to Business What Business Owners Must Know Now

The Cost of Identity Theft to Business What Business Owners Must Know Now The Cost of Identity Theft to Business What Business Owners Must Know Now An Introduction to the Fair and Accurate Credit Reporting Act (FACTA): What Business Owners Must Know Now It often seems that there

More information

Drexel and FMFCU. Presented By

Drexel and FMFCU.   Presented By Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission

More information

Get back your good name. Refuse to be a target of identity crime again.

Get back your good name. Refuse to be a target of identity crime again. Clear Your Good Name After Identity Crime You suspect that someone is using your name and personal identification information for unlawful purposes. This kit can help you resolve your identity crime case

More information

Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait!

Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait! Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait! By Tom Bassett, J.D., CPA Trending Upward Again in 2018 Taxpayer Identity Theft As head of Commerce Trust

More information

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Program Adoption Purpose Definitions Fitchburg State College (College) developed this Identity Theft Prevention Program to detect,

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

Kris Kleiner Via to: March 2, 2018

Kris Kleiner Via  to: March 2, 2018 Kris Kleiner +1 720 566 4048 kkleiner@cooley.com Via Email to: SecurityBreach@atg.wa.gov March 2, 2018 Office of the Attorney General 1125 Washington Street SE PO Box 40100 Olympia, WA 98504-0100 Re: Legal

More information

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET 1-877-511-7906 LifeLock.com/Business FACT SHEET LifeLock Benefit Elite LifeLock

More information

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations 2017 BY: KAREN REDDICK NATIONAL CREDIT MANAGEMENT 888-692-3964 kreddick@ncmstl.com 1 WHAT DO THESE STARS HAVE

More information

B. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.

B. The College is considered a creditor under the Red Flags Rule because it defers payment for services rendered. COLLEGE of CENTRAL FLORIDA ADMINISTRATIVE PROCEDURE Title: Identity Theft Prevention Program Procedure Page 1 of 5 Implementing Procedure For Policy # # 2.04 Date Approved: 07/07/11 Division: Administration

More information

Hacking Healthcare: Attacks on the Highest Value Asset

Hacking Healthcare: Attacks on the Highest Value Asset Hacking Healthcare: Attacks on the Highest Value Asset Paul Dant Chief Strategy Officer Independent Security Evaluators The Key Takeaway Who am I? Paul Dant Chief Strategist @ ISE 9: First digital product

More information

Ohio Conference of Payroll Professionals

Ohio Conference of Payroll Professionals Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number

More information

Typology of Fraudulent and Deceptive Commercial Practices Cases in E-commerce - Economic Crisis Focus

Typology of Fraudulent and Deceptive Commercial Practices Cases in E-commerce - Economic Crisis Focus Typology of Fraudulent and Deceptive Commercial Practices Cases in E-commerce - Economic Crisis Focus OECD ICPEN Joint Meeting 1 April 2009 Stacy Feuer Assistant Director for International Consumer Protection

More information

Financial Crime: Awareness & Prevention. Jon Jarosinski

Financial Crime: Awareness & Prevention. Jon Jarosinski Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit

More information

Identity Theft. Protect Yourself from

Identity Theft. Protect Yourself from Protect Yourself from Identity Theft Helping you to better understand some of the common sources of identity theft, how to protect your information, how to detect it when there s a problem, and how to

More information

2017 Cyber Security and Data Privacy Study

2017 Cyber Security and Data Privacy Study RESEARCH REPORT DECEMBER 2017 2017 Cyber Security and Data Privacy Study How does your company compare? TABLE OF CONTENTS 05 How does your company compare? 06 Key findings 08 Cyber security and data privacy

More information

Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC. Before the. Subcommittee on Crime, Terrorism and Homeland Security

Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC. Before the. Subcommittee on Crime, Terrorism and Homeland Security Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC Before the Subcommittee on Crime, Terrorism and Homeland Security Of the Judiciary Committee HR 1731: The Identity Theft

More information

945 East Paces Ferry Rd., Suite 1475, Atlanta, GA aptos.com

945 East Paces Ferry Rd., Suite 1475, Atlanta, GA aptos.com 945 East Paces Ferry Rd., Suite 1475, Atlanta, GA 30326 +1-866-493-7037 aptos.com March 10, 2017 BY U.S. MAIL Office of the Attorney General 1125 Washington Street SE P.O. Box 40100 Olympia, WA 98504-0100

More information

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions

More information

Busting Fraud Rings with. Social Link Analysis

Busting Fraud Rings with. Social Link Analysis Busting Fraud Rings with Social Link Analysis Table of Contents INTRODUCTION... 1 WHAT IS BUST-OUT FRAUD AND WHY IS IT SO HARD TO DETECT?... 2 SOCIAL LINK ANALYSIS (SLA): A POWERFUL NEW WEAPON... 3 HOW

More information

Bank Secrecy Act OFAC FinCEN

Bank Secrecy Act OFAC FinCEN Bank Secrecy Act OFAC FinCEN 2017 CREDIT UNION EMPLOYEE TRAINING Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer Identification Program Customer Due Diligence

More information

When Your Child s Identity Is Stolen

When Your Child s Identity Is Stolen When Your Child s Identity Is Stolen What is child identity theft? CONSUMER INFORMATION SHEET 3B 2/16/08 Adults are not the only targets of identity theft. In fact, children under the age of 18 can also

More information

React fast to mitigate impact on your finances and reputation

React fast to mitigate impact on your finances and reputation React fast to mitigate impact on your finances and reputation 90% of large organisations suffered a form of security breach in 2015 1, with malicious attacks accounting for a third of data breaches 2.

More information

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity

More information

Fraudulent Check, Credit Card Fraud and ID Theft Guide

Fraudulent Check, Credit Card Fraud and ID Theft Guide Fraudulent Check, Credit Card Fraud and ID Theft Guide COLLECTING BAD CHECKS The police involvement in bad check cases is for the sole purpose of investigating the incident to determine whether or not

More information

Dig Deep into the Root Causes of Fraud to Prevent Future Attacks

Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Presented by: Ann Davidson, VP of Risk Consulting at Allied Solutions & Tammy Behnke, Credit Union Program Director at ProSight Specialty

More information