UI ID Theft in Texas UI Director s Conference. Paul Carmona Director, Regulatory Integrity Division
|
|
- Daniel Green
- 6 years ago
- Views:
Transcription
1 UI ID Theft in Texas 2014 UI Director s Conference Paul Carmona Director, Regulatory Integrity Division
2 Overview Desired End State What We Know What We re Experiencing What We re Doing About It Near-Term Mid-Term Long-Term
3 Desired End State Accurately Pay Valid UI Claims to the Authentic Claimant
4 What We Know Court Ventures 200 Million people affected 130 Million people affected 76 Million people affected 152 Million people affected Target Corp. 110 Million people affected 56 Million people affected 76 Million people affected 145 Million people affected
5 What We Know - Data Breaches in the U.S.
6 What We Know - Data Breaches by Cause
7 What We Know
8 What We Know "In 2012, the total monetary loss due to identity theft was $24.7 billion nationally. The total monetary loss due to all other types of property theft combined that year was $14 billion Susan Combs, Texas Comptroller Javelin Strategy & Research has produced yearly studies, titled Identity Fraud Report, showing that the number of identity fraud victims increased from 10.2 million Americans in 2010 to 13.1 million in 2013.
9 Launched October 7, 2014 What We Know
10 What We Know - ID Theft Identity Theft: number one complaint category in the Consumer Sentinel Network for CY2013 with 14% of the overall complaints Debt Collection: 10% Banks and Lenders: 7% Impostor Scams: 6% Telephone and Mobile Services: 6% Prizes, Sweepstakes and Lotteries: 4% Auto-Related Complaints: 4% Shop-at-Home and Catalog Sales: 3% Television and Electronic Media: 3% Advance Payments for Credit Services: 2%
11
12 What We Know - Consumer Sentinel Network Identity Theft Complaints How Victims Information is Misused Government documents\benefits fraud (34%) was the most common form of reported identity theft, followed by credit card fraud (17%), phone or utilities fraud (14%), and bank fraud (8%). Other significant categories of identity theft reported by victims were employment-related fraud (6%) and loan fraud (4%).
13 What We Know Based on preliminary analysis, the Internal Revenue Service (IRS) estimates it paid $5.2 billion in fraudulent identity theft (IDT) refunds in filing season 2013, while preventing $24.2 billion (based on what it could detect). The full extent is unknown because of the challenges inherent in detecting IDT refund fraud. GAO Report IDENTITY THEFT Additional Actions Could Help IRS Combat the Large, Evolving Threat of Refund Fraud, August 2014
14 What We Know City Ranking for ID Theft Complaints Florida is the state with the highest per capita rate of reported identity theft complaints, followed by Georgia and California.
15 2. Prepaid Cards figures include a significant number of complaints from data contributor Green Dot, and Wire Transfer figures include a significant number of complaints from data contributors MoneyGram International and Western Union Money Transfer. This may affect the distribution of the reported methods of payment.
16 What We Know TWC Experience with UI Fraud Schemes Using Stolen Identities : 27 Claims, Saved $ : 200 Claims, Saved $693, : 260 Claims, Saved $533, : 26 Claims, Saved $65, : 274 Claims, Saved $966, :??? Claims, Saved $???
17 What We Are Experiencing Organized ID Theft Attack on the Texas UI System Using Stolen Identities ID Theft List is Extensive To Date, TWC has stopped > 7,200 claims Fraudsters continue filing claims daily TWC prevented paying millions on bad claims Some bogus claims are more sophisticated than previous schemes The claims exhibit recognizable patterns / attributes
18 What We Are Experiencing 2014 ID Theft - Florida On or about the end of January 2014, Office of Investigations (OI) received an ID Theft allegation The week of April 13, 2014, claimants and/or employers called and said they or their employee was not filing a UI claim UI alerted OI Special Investigations identified UI claims exhibiting known fraud patterns
19 What We re Doing About It - Near-Term Due to the volume of calls and ties to a previous scheme, Special Investigations (SI) requested all web data for UI claims filed since 1 Nov 13 IT determined ~86,000 claims filed through the internet portal Enterprise Architect (IT) analyzed UBS UI claim data patterns and identified 6,600 claims with similar characteristics: SI identified trends and developed a rating process with Operations Insight Analysts
20 What We Are Doing About It - Near-Term Tele-Center Ops fielded calls and provided UI Support with Known ID Theft Claims to stop The Tele-centers or UI Support Services staff read the following script to the caller who did not file the claim or their employer. This occurs only for claimants that call and say they did not file the claim or the employer response states the person is still working and they did not file the claim. Thank you for reporting this issue and taking the time to answer my questions. I ve documented the information about the fraudulent claim and am sending it to TWC s Office of Investigations. TWC works with state and federal agencies and law enforcement officials to investigate fraudulent claims. You don t need to contact us unless you have new information. If you think of additional information you d like to give us, call our fraud hotline at If you are (your employee is) concerned about identity theft, go to the Federal Trade Commission s website, at select the link for Report Identity Theft, and follow the instructions. Or, call the FTC at for help. The next step: Tele-centers notify UI Central of the detected Identity Theft case.
21 What We Are Doing About It - Near-Term UI Support Locks a Known ID Theft Claim (where the claimant and/or employer confirms true identity owner was not filing): After receiving the from the Tele-Centers or if we become aware of the ID theft case, UI Support Locks the claim: Moves balance to disqualification Keys High Importance Notepad Keys decision on open case and NAs all other cases Responds to the Tele-Center that this has been reported Sends 1 list at the end of the day to Special Investigations and UI Support UI sends a list to Tele-Center Operations to put into Case Management System OI returns TWC Hotline Calls and Bat Phone Calls (Script) UI began calling Employers on claims using Yopmail in the User ID or e- mail address to proactively determine if the suspicious claim was bogus
22 What We Are Doing About It - Near-Term Current Data Collection and Scoring Process IT and UI uploads daily run of all internet filed claims UI aggregates the daily claims weekly and uploads into the Crossfunctional Data Exchange folder Operations Insight (Data Analytics Unit) combines and de-conflicts the data and scores it against predefined attributes Special Investigations (SI) reviews the scored claims and identifies claims indicating ID Theft. SI sends highly suspicious claims to the UI Tele-Center to verify if claim is bogus UI Tele-Center sends verified or highly suspicious claims to UI Operations to Lock the claim and adds claim to Locked list
23 What We Are Doing About It - Near-Term Rating Process (Identify and Score Patterns) Implemented a weighting and scoring process to quickly identify bogus claims ID thieves adapt to countermeasures quickly, requiring frequent changes to attributes, weighting and analytical techniques Currently on 5 th generation weighting and scoring process that checks against 13 predefined attributes Maximum score is presently = 54 Plan to add two new attributes soon
24 What We Are Doing About It - Short-Term UI Filter for Suspicious Claims Short-Term: UI detected suspicious claims as they are filed and required the claimant to contact a TWC Call Center to file Rqmt ID Business Topic 1 Web - New Claim Fraud Filter 1a 1b Description (This system will ) For a new internet claim, the system evaluates claimant information based on the following criteria: Does user name or user contain "yopmail"? Is the claimant address provided in the state of Florida? 1c Does the username contain the numeric "agent" pattern identified in the analysis? 2 Upon the user clicking submit, the system evaluates the conditions above. If 1 or more of the criteria are met, the system will: 2b Not submit the claim 2c Store the rejection code of "NNN" in the "YYY" table along with the claimant SSN 2c Present a page advising the user to contact the Call Center to submit the claim. This enables TWC to more thoroughly ID a suspicious claimant
25 What We Are Doing About It - ID Questions Confirm customer s identity. May I please have your social security number? Thank you. May I please have your name and current mailing address? Next, to further confirm your identity, please provide me your TX driver license # or your TX ID # and your date of birth. Enter Texas Driver s License or Texas ID #. Review the name, address and DOB. If DL # and DOB are confirmed in TDI, go to next identifier. IF DISCREPANCIES: Ask about any discrepancies, but do not reveal identifying information from this screen. If the discrepancy cannot be explained, continue with: Mr./Ms. I appreciate you providing me that information. In order to continue with your claim for unemployment benefits TWC will need verification of your Driver s License (or ID), Social Security Number (SSN) and proof of residency at the address you provided. We apologize for any inconvenience this may cause. You can present the documentation to a Workforce Solutions Office and ask staff at the center to contact us at the number they have for us to verify the information has been presented. If you can t go to a Workforce Solutions Office you may fax a copy of this information to us at [give your Tele- Center s fax number]. When we receive the information we will contact you to complete the claim. Please include the best telephone number to reach you on the fax you send. 75% or more of the total base period wages NOT AT LEAST 75% OF 2013 BASE PERIOD WAGES, ask caller to follow the additional verification procedure as outlined above. Referring to Workforce Solutions office or fax.
26 Filter and Enhanced Claimant ID Process Lesson Learned: Fraudsters adapted very quickly, rendering filter ineffective because the filter permitted multiple attempts per claim This educated the fraudster on how to circumvent the filter Long-Term: need capability on the front of UI claims system (Web and IVR) to identify suspicious claims requiring further action to authenticate the claimant s identity and validate eligibility
27 What We Are Doing About It - Mid-Term August 4, AWARE UI Benefits Fraud Detection System became fully operational Continue current detection/prevention efforts, including prosecuting thieves Applied for and received DOL Supplemental Budget Request (SBR) funds to create an ID Theft Task Force 3 BPC Investigators 1 Operational Insight Analyst (BPC expert) Submit proposal and process to stop direct deposits to pre-paid debit cards ID Theft Task Force Define requirements, procure, test and implement an enhanced detection/prevention capability (ID Theft FraudX) for existing AWARE system Define requirements for a layered Identity-Proofing system for real-time detection and predictive analysis to prevent high risk claims from entering the UI Benefits system
28 What We Are Doing About It - Long-Term Procure a layered Identity-Proofing system for real-time detection and predictive analysis to prevent high risk claims from entering the UI Benefits system
29 Summary Desired End State What We Know What We re Experiencing What We re Doing About It Near-Term Mid-Term Long-Term
Tax-Related Identity Theft
Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman
More informationJason B. Freeman, J.D., CPA
Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman
More informationWHEN BAD THINGS HAPPEN TO YOUR GOOD NAME
WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card
More informationIdentity Theft Information for Tax Professionals. August 2017
Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!
More informationVisa s Approach to Card Fraud and Identity Theft
Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting
More informationData Thefts and Protecting Client Tax Information
Data Thefts and Protecting Client Tax Information October 20, 2015 The information contained in this presentation is current as of the date it was presented. It should not be considered official guidance.
More informationCombating ID Theft with the Help of Payroll Professionals
PENNSYLVANIA STATEWIDE PAYROLL CONFERENCE Indiana University Of Pennsylvania Philip G. Yamalis Senior Stakeholder Liaison October 7, 2016 Future State Resources for Payroll Professionals Combating ID Theft
More informationSPECIAL REPORT. What to Do If Your Client Is a Victim of Tax-Related Identity Theft
SPECIAL REPORT What to Do If Your Client Is a Victim of Tax-Related Identity Theft What to Do If Your Client Is a Victim of Tax-Related Identity Theft Tax-related identity theft revolves around the fraudulent
More informationIRS UPDATES & Taxes. Security. Together.
IRS UPDATES & Taxes. Security. Together. Dennis Bell Senior Stakeholder Liaison CATA February 3, 2016 Issue 5: Online Tools for Tax Professionals 1 Keeping Current Preparer Guidelines 2 Other Tax Pro Links
More informationDALLAS CPA SOCIETY CONTINUING EDUCATION CORPORATION MEMBER APPRECIATION CPE SERIES. October 26, 2016
DALLAS CPA SOCIETY CONTINUING EDUCATION CORPORATION MEMBER APPRECIATION CPE SERIES October 26, 2016 TIGTA & You: Protecting Clients and Taxpayers Tom Traxinger Assistant Special Agent in Charge, Treasury
More informationHelping Victims of Identity Theft and Consumer Fraud Crimes., 2017 at 3 pm ET Thursday, July 13, 2017 at 3:00pm ET
Helping Victims of Identity Theft and Consumer Fraud Crimes, 2017 at 3 pm ET Thursday, July 13, 2017 at 3:00pm ET What is the need? What FTC resources are available to assist victims of ID Theft and fraud?
More informationToday s Speakers. Lisa Weintraub Schifferle. Eva Velasquez. Attorney Federal Trade Commission (FTC) CEO & President Identity Theft Resource Center
Today s Speakers Lisa Weintraub Schifferle Attorney Federal Trade Commission (FTC) Eva Velasquez CEO & President Identity Theft Resource Center Overview What is identity theft? What is tax identity theft?
More informationCombating Refund Fraud: Recent Trends and Successful Prevention Techniques
Combating Refund Fraud: Recent Trends and Successful Prevention Techniques Revenue Solutions, Inc. 2017 WSATA Annual Conference Missoula, MT October 3, 2017 2017 Revenue Solutions, Inc. Introduction Davis
More informationIntroduction to Fraud Detective Kirby Shoemake
Introduction to Fraud Detective Kirby Shoemake Fraud In criminal law, fraud is an intentional deception or coercion made for personal gain and to damage another individual in some way shape or form. Types
More informationFRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools
FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting
More informationRisk Management on Prepaid Cards
Responsibilities CenterState Bank of Florida, NA (CSBF) is the issuing financial institution of all prepaid cards and owner of the associated network BINs. CSBF is responsible for all program monitoring
More informationWhat is Credit Monitoring?
5LINX SafeScore Overview Fraud Facts What is Credit Monitoring How is Credit Monitoring different from Identity Monitoring Why choose Credit Monitoring Credit Monitoring package details Compensation How
More informationIdentity theft can occur even if you have been careful about protecting your personal information.
Dear Customer, Identity theft can occur even if you have been careful about protecting your personal information. If you suspect you have been a victim of identity theft, a fraud, or a scam, we have prepared
More informationEquifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet:
Before you start Telephone calls and other forms of direct communication: Use the worksheet included in this packet to keep a record of all conversations. When reporting fraud or communicating with law
More informationIdentity thieves use a variety of ways to gain access to your personal information:
How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into
More informationIdentity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office
Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission
More informationBetter Business Bureau
Better Business Bureau 1 Who We Are & Our Vision BBB is an unbiased non-profit organization that sets and upholds high standards for fair and honest business behavior. For more than 100 years, Better Business
More informationIt s not going away. (c) 2014 huberis.net. Identity Theft
It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity
More informationEnterprise Fraud, Waste and Abuse Prevention and Detection:
Enterprise Fraud, Waste and Abuse Prevention and Detection: Annual Report to the Legislature OFFICE OF THE NEW YORK STATE COMPTROLLER Thomas P. DiNapoli, State Comptroller SEPTEMBER 1, 2017 Introduction
More informationThe Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age
The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age Scoping Out Synthetic ID Fraud In the 18 years since synthetic identity fraud emerged as a significant
More informationIdentity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.
Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should
More informationHere is some more information on the Equifax Breach and how you may protect yourself in the aftermath...
UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal
More informationTempleton Municipal Light and Water Plant
Templeton Municipal Light and Water Plant RED FLAG POLICY 1. POLICY It is the policy of the Templeton Municipal Light and Water Plant (TMLWP) that information compiled on all customers and employees is
More informationThe Smartest Employee Benefit Is Identity Theft Management
The Smartest Employee Benefit Is Identity Theft Management HELP PROTECT YOUR EMPLOYEES. Proposal For: Date: Presented By: Provide peace of mind. Raise your benefits to a new level. Every employee has a
More informationIDENTITY THEFT PROTECT YOUR MONEY
IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that
More informationPRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.
PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity
More informationROCHESTER INSTITUTE OF TECHNOLOGY
ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3
More informationPOLICY: Identity Theft Red Flag Prevention
POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information
More informationID Theft Toolkit and Affidavit
ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information
More informationIdentity Theft Prevention Program Lake Forest College Revision 1.0
Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:
More informationDeluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities.
Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. deluxe growth services introduction Identity thieves are extending beyond credit relationships and are more
More informationIDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018
IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,
More informationKasasa Protect. FAQ and Product Overview
Kasasa Protect FAQ and Product Overview Kasasa Protect... 3 Key Contact Info... 3 Included Benefits... 3 Credit Reporting... 4 Monthly Credit Score & Plotter... 4 24/7 Credit Monitoring... 5 Full-Service
More informationProtect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently
Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity
More informationServices and Features
Services and Features IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific services and features.
More informationPreventing Senior Scams. Welcome. MoneyWi$e is a joint financial education project of Consumer Action and Capital One
Preventing Senior Scams Welcome MoneyWi$e is a joint financial education project of Consumer Action and Capital One Overview of topics Recognizing scams Protecting yourself from fraud Steps to take if
More informationServices & Features for Employee Benefit Members
Services & Features for Employee Benefit Members IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific
More informationState of Card Fraud: 2018
State of Card Fraud: 2018 A deep dive into the evolution of card fraud + industry benchmark data for financial institutions. Stopping Fraud at the Speed of Data Continuing the trend of prior years, the
More informationRed Flag! Now What? An SME s Guide for FACTA Red Flag Compliance. see} white paper
Red Flag! Now What? An SME s Guide for FACTA Red Flag Compliance see} white paper see} white paper Red Flag! Now What? If you are a large bank, credit union or credit card issuer, you are well aware of
More informationYear-end 2016 fraud update: Payment cards, remote banking and cheque
Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments
More informationFay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704
RE: Identity Theft Claim You recently notified Fay Servicing, LLC that you are the victim of identity theft with respect to the above referenced loan (also referred to in this notice as the debt or account
More informationMICHIGAN STATE UNIVERSITY
MICHIGAN STATE UNIVERSITY Mr. Bob Ferguson Attorney General Office of the Attorney General 1125 Washington Street SE PO Box 40100 Olympia, WA 98504-0100 Dear Attorney General: November 18, 2016 R E ru,
More informationNAU Police Department s Identity Theft Victim s Packet
NAU Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted the NAU Police Department and obtained a police report number
More informationNEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 8 Chapter 13,
More informationWhat to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP
LIFELOCK MEMBER EXPECTATIONS GUIDE 800-607-91744 LifeLock.com What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP THE LIFELOCK MEMBER COMMUNICATION EXPERIENCE Signing up
More informationBank Secrecy Act OFAC FinCEN
Bank Secrecy Act OFAC FinCEN SOUTHEAST DIRECTORS AND SUPERVISORY COMMITTEE CONFERENCE SEPTEMBER 18, 2017 Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer
More information2017 annual fraud update:
2017 annual update: Payment cards, remote banking, cheque and authorised push payment scams March 2018 The threat from is always changing, but the finance industry is continuously enhancing its response,
More informationIdentity Theft Victim s Packet
Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Reno Police Department, complete a crime report and obtained a police report case number
More informationScam Type #1: Wire Fraud Scams
2015 Scam Type #1: Wire Fraud Scams The Goal of Wire Fraud Scams is to have the victim wire or otherwise send money to the Scammer through non-refundable, non-traceable methods such as Wire Transfer; Money
More informationLegal Basics: Protecting Older Adults Against Scams
Legal Basics: Protecting Older Adults Against Scams Odette Williamson Attorney, National Consumer Law Center Lisa Weintraub Schifferle Attorney, Federal Trade Commission April 10, 2018 Housekeeping All
More informationMortgage Asset Research Institute Quarterly Fraud Report
Mortgage Asset Research Institute Quarterly Fraud Report August 25, 2008 Fight Mortgage Fraud with Solutions that Help You Know your Customer, Employee and Vendor www.marisolutions.com 2008 ChoicePoint
More informationTax Deductions lost in Tax Law Highlights (for 2018 changes see page 4)
Income Tax Preparation Services 19401 E 40 Hwy, Suite 170 Independence MO 64055 Phone: 816-795-9882 Fax: 816-795-9883 Email: DLPENCE@GMAIL.COM Website: www.taxesbydebbie.com 2017 Tax Law Highlights (for
More informationSubject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New
Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),
More informationIdentity Theft Prevention Program
Slide 1 Identity Theft Prevention Program Welcome to the Identity Theft Prevention Program annual training course. Your personal identification information can be used by individuals seeking to use your
More informationIDShield National Plan Benefit Overview
IDShield National Plan Benefit Overview IDShield is an industry leader in identity theft protection, monitoring and restoration services. Through IDShield, participants receive a comprehensive set of identity
More informationIdentity Theft: Protecting, Monitoring and Resolving
Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA
More informationProtecting Yourself from Fraud including Identity Theft Advanced Level
Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial
More informationnews Submit Your Nominations for the 2013 AIS/NER Award NER and NICB Release 2011 Heavy Equipment Theft Report IN THE
EQUIPMENT SECURITY NEWS THIRD QUARTER 2012 IN THE news NER and NICB Release 2011 Heavy Equipment Theft Report The National Equipment Register (NER), a division of Verisk Crime Analytics, and the National
More informationSynthetic Identities. Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved.
Synthetic Identities Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved. Synthetic Identities A combination of fictitious and potentially stolen personally identifiable
More informationRevenue Solutions, Inc. Refund Fraud Deterrence
Revenue Solutions, Inc. Refund Fraud Deterrence Presentation for: Federation of Tax Administrators Solution Track Series August 2008 Introduction John Bace Senior Consulting Manager Data Warehouse / Business
More informationTITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM
TITLE II ADMINISTRATIVE REGULATIONS CHAPTER 30 IDENTITY THEFT PREVENTION PROGRAM 30.01 Program The Town of Flower Mound, Texas, as a utility provider ( Utility ), has developed an Identity Theft Prevention
More informationMcDonald Hop kins. January 23, Office of Washington Attorney General Consumer Protection Division 800 5th Ave, Suite 2000 Seattle, WA
McDonald Hop kins A business advisory and advocacy law firm", James J. Giszczak Direct Dial: 248.220.1354 jgiszczak@mcdonaldhopkins.com McDonald Hopkins PLC 39533 Woodward Avenue Suite 318 Bloomfield Hills,
More informationChapter 9: Identity Theft and Refund Fraud. 1 09: Identity Theft and Refund Fraud
Page 135-146 Chapter 9: Identity Theft and Refund Fraud 1 Learning Objectives Page 135-146 Upon completion of this seminar, participants should be able to Recognize the threats that apply to practitioners.
More informationIdentity Theft Victim s Packet
Revised April 2010 Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso County Sheriff s Office and obtained a police report number
More informationIdentity Theft Prevention. Red Flags. Training Program
Identity Theft Prevention Red Flags Training Program 1 Red Flags Training Program Adoption Amendment passed in 2003 to the Fair Credit Reporting Act called The Fair and Accurate Credit Transactions Act
More informationIdentity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009
Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009 Rebekah A. Z. Monson Pepper Hamilton LLP 215.981.4031 monsonr@pepperlaw.com
More informationIDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY PC 6.9 Date of Last Update: May 05, 2009 Approved By: President's Cabinet Responsible Office: Business and Finance POLICY STATEMENT Grand Valley State University (GVSU)
More informationACH Tax Refunds: Exceptions, Posting, & Liabilities. Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist
ACH Tax Refunds: Exceptions, Posting, & Liabilities Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist Audio Handouts Questions Dealing with ACH Tax Refunds: Exceptions, Posting & Liabilities
More informationTips for Preventing Credit Card Fraud and Avoiding Chargebacks
Tips for Preventing Credit Card Fraud and Avoiding Chargebacks Accepting credit cards is more than just a courtesy that your small business extends to its valued customers. In today s marketplace, it has
More informationThe Cost of Identity Theft to Business What Business Owners Must Know Now
The Cost of Identity Theft to Business What Business Owners Must Know Now An Introduction to the Fair and Accurate Credit Reporting Act (FACTA): What Business Owners Must Know Now It often seems that there
More informationDrexel and FMFCU. Presented By
Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission
More informationGet back your good name. Refuse to be a target of identity crime again.
Clear Your Good Name After Identity Crime You suspect that someone is using your name and personal identification information for unlawful purposes. This kit can help you resolve your identity crime case
More informationReceive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait!
Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait! By Tom Bassett, J.D., CPA Trending Upward Again in 2018 Taxpayer Identity Theft As head of Commerce Trust
More informationFitchburg State College Identity Theft Prevention Program updated 11/17/09
Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Program Adoption Purpose Definitions Fitchburg State College (College) developed this Identity Theft Prevention Program to detect,
More informationSlide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?
Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is
More informationKris Kleiner Via to: March 2, 2018
Kris Kleiner +1 720 566 4048 kkleiner@cooley.com Via Email to: SecurityBreach@atg.wa.gov March 2, 2018 Office of the Attorney General 1125 Washington Street SE PO Box 40100 Olympia, WA 98504-0100 Re: Legal
More informationLifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET
LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET 1-877-511-7906 LifeLock.com/Business FACT SHEET LifeLock Benefit Elite LifeLock
More informationHow To Protect Students Against Identity Theft and Complying with Safeguarding Regulations
How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations 2017 BY: KAREN REDDICK NATIONAL CREDIT MANAGEMENT 888-692-3964 kreddick@ncmstl.com 1 WHAT DO THESE STARS HAVE
More informationB. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.
COLLEGE of CENTRAL FLORIDA ADMINISTRATIVE PROCEDURE Title: Identity Theft Prevention Program Procedure Page 1 of 5 Implementing Procedure For Policy # # 2.04 Date Approved: 07/07/11 Division: Administration
More informationHacking Healthcare: Attacks on the Highest Value Asset
Hacking Healthcare: Attacks on the Highest Value Asset Paul Dant Chief Strategy Officer Independent Security Evaluators The Key Takeaway Who am I? Paul Dant Chief Strategist @ ISE 9: First digital product
More informationOhio Conference of Payroll Professionals
Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number
More informationTypology of Fraudulent and Deceptive Commercial Practices Cases in E-commerce - Economic Crisis Focus
Typology of Fraudulent and Deceptive Commercial Practices Cases in E-commerce - Economic Crisis Focus OECD ICPEN Joint Meeting 1 April 2009 Stacy Feuer Assistant Director for International Consumer Protection
More informationFinancial Crime: Awareness & Prevention. Jon Jarosinski
Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit
More informationIdentity Theft. Protect Yourself from
Protect Yourself from Identity Theft Helping you to better understand some of the common sources of identity theft, how to protect your information, how to detect it when there s a problem, and how to
More information2017 Cyber Security and Data Privacy Study
RESEARCH REPORT DECEMBER 2017 2017 Cyber Security and Data Privacy Study How does your company compare? TABLE OF CONTENTS 05 How does your company compare? 06 Key findings 08 Cyber security and data privacy
More informationStatement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC. Before the. Subcommittee on Crime, Terrorism and Homeland Security
Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC Before the Subcommittee on Crime, Terrorism and Homeland Security Of the Judiciary Committee HR 1731: The Identity Theft
More information945 East Paces Ferry Rd., Suite 1475, Atlanta, GA aptos.com
945 East Paces Ferry Rd., Suite 1475, Atlanta, GA 30326 +1-866-493-7037 aptos.com March 10, 2017 BY U.S. MAIL Office of the Attorney General 1125 Washington Street SE P.O. Box 40100 Olympia, WA 98504-0100
More informationAutomotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy
CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions
More informationBusting Fraud Rings with. Social Link Analysis
Busting Fraud Rings with Social Link Analysis Table of Contents INTRODUCTION... 1 WHAT IS BUST-OUT FRAUD AND WHY IS IT SO HARD TO DETECT?... 2 SOCIAL LINK ANALYSIS (SLA): A POWERFUL NEW WEAPON... 3 HOW
More informationBank Secrecy Act OFAC FinCEN
Bank Secrecy Act OFAC FinCEN 2017 CREDIT UNION EMPLOYEE TRAINING Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer Identification Program Customer Due Diligence
More informationWhen Your Child s Identity Is Stolen
When Your Child s Identity Is Stolen What is child identity theft? CONSUMER INFORMATION SHEET 3B 2/16/08 Adults are not the only targets of identity theft. In fact, children under the age of 18 can also
More informationReact fast to mitigate impact on your finances and reputation
React fast to mitigate impact on your finances and reputation 90% of large organisations suffered a form of security breach in 2015 1, with malicious attacks accounting for a third of data breaches 2.
More informationTAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT
TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity
More informationFraudulent Check, Credit Card Fraud and ID Theft Guide
Fraudulent Check, Credit Card Fraud and ID Theft Guide COLLECTING BAD CHECKS The police involvement in bad check cases is for the sole purpose of investigating the incident to determine whether or not
More informationDig Deep into the Root Causes of Fraud to Prevent Future Attacks
Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Presented by: Ann Davidson, VP of Risk Consulting at Allied Solutions & Tammy Behnke, Credit Union Program Director at ProSight Specialty
More information