Tax-Related Identity Theft

Size: px
Start display at page:

Download "Tax-Related Identity Theft"

Transcription

1 Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas (214) Copyright Freeman Law, PLLC. All rights reserved. 1

2 Jason B. Freeman, J.D., CPA Phone (214) Toll-free (855) Mr. Freeman is the managing member of Freeman Law, PLLC, a tax, white-collar, and litigation boutique law firm based in the Dallas-Fort Worth Metroplex with clients throughout the world. He is a tax attorney and adjunct professor at SMU s School of Law, as well as a licensed CPA. Mr. Freeman handles federal and state tax controversies and white-collar civil and criminal matters, as well as advises clients in tax planning and compliance matters. Mr. Freeman has been recognized multiple times by D Magazine as one of the Best Lawyers in Dallas for tax law, and by Super Lawyers and Texas Monthly magazine. He is the President of the North Texas chapter of the American Academy of Attorney-CPAs, serves on the Executive Board for the Texas Society of CPA's, and sits on the Board of Directors for the Dallas Society of CPAs. 2

3 What is Tax-Related ID Theft? 3

4 The Scale of the Problem An new ID theft occurs every two seconds! The financial burden of identity theft costs more than all other property crimes combined ID theft is the No. 1 complaint filed with the FTC More than 1 billion personal records were stolen in 2014 Large-scale data breaches netted more than 100 million SSNs in

5 Recent SIRF Schemes Harassing Calls from IRS CI agents Fraudsters Posing as Company Executives Puerto Rico/Territorial Schemes Others 5

6 Loan Company Employee Steals Identities Used to File False Tax Returns July 21, 2016 DOJ Press Release. Defendant was sentenced to 48 months in prison for her role in a stolen identity refund fraud scheme. Defendant admitted that between January 2013 and August 2015, she worked at two loan companies in Montgomery, Alabama, and had access to the personal identifying information of customers. She agreed to steal information from her employers and provide it to her coconspirator who used that information to file over 335 returns claiming more than $400,000 in fraudulent refunds and directed the requested tax refunds to prepaid debit cards and U.S. Treasury checks, which were mailed to addresses in Montgomery, including her residence. 6

7 Former Healthcare Employee SIRF Conspiracy Using Patient Information July 20, 2016 DOJ Press Release. Defendant worked at a healthcare company where she had access to patient information protected from disclosure under the Health Insurance Portability and Accountability Act of She admitted that she stole the names, dates of birth and social security numbers of patients from her employer s database and provided these identities to a co-conspirator who then provided the stolen personal identification information to another co-conspirator who, along with others, used it to file fraudulent federal tax returns with the Internal Revenue Service (IRS) requesting tax refunds. Defendant and her co-conspirator were prosecuted and sentenced to 74 months and 60 months in prison, respectively. 7

8 How Does it Happen? A Common Scenario 8

9 How do ID Thieves Obtain Identifying Information? 9

10 How Identity Theft Occurs Identity theft often occurs from the following sources: Dumpster diving Skimming Phishing Address changes Theft of records Pre-texting Trojan Horses Spyware Data breaches 10

11 Data Breaches 11

12 The IRS Get Transcript Application Breach In 2015, IRS announced a breach of its Get Transcript System IRS CRISC identified irregularities Approximately 724,000 account affected Required breaching a multi-step authentication 12

13 The IP PIN Data Breach March 2016 IRS announced suspension of IP PIN Services on IRS.gov Another breach of authentication process 13

14 What are the Current Trends? 14

15 What are the Current Trends? 15

16 The IRS Response: A Four- Pronged Approach The IRS Strategic Approach is centered around the following objectives: Prevention Detection Victim Assistance Enforcement 16

17 How Does the IRS Detect ID Theft? 17

18 Prevention and Initiatives: Combatting IDT on the Front End The Security Summit IDT Filters Authentication Checks Information Return Matching Taxpayer Protection Program Identity Protection PIN Program 18

19 The Security Summit Initiative A collaborative effort to address tax-related identity theft a partnership between the IRS, state tax administrators, and the tax industry, including tax return preparation firms, tax software vendors, and payroll and tax financial product processors. This public-private partnership was launched in March 2015 to establish new safeguards to protect taxpayer information and the integrity of federal and state tax systems. 19

20 The IP PIN Program IP PIN Program began in the 2014 tax year The IP PIN is used as a supplement to the taxpayer s SSN to identify the taxpayer as the valid owner of the SSN and related tax account. Must be included on electronically filed income tax returns New number issued before each filing season via CP01A notice Currently, no opt-out provision How to get an IP PIN: Residents of Florida, Georgia, and the District of Columbia can participate in the IRS IP PIN pilot program; Determination by IRS that taxpayer is a fraud victim; Taxpayer reports tax-related identity theft on Form

21 IP PIN - IRS Notices CP01 Notifies the taxpayer that the IRS has resolved IDT issues and that an identity theft indicator has been placed on their account. CP01A An annual notice that contains the latest IP PIN. CP01F A one-time notice for 2015 giving certain taxpayers option of obtaining an IP PIN through 21

22 IDT Filters Improved ID theft models and filters In 2012, the IRS had 12 filters; returns currently pass through more than 200 Return Review Program ( RRP ) Dependent Database (DDB) Electronic Fraud Detection System (EFDS) 22

23 The Return Review Program In February 2009, the IRS began development of the Return Review Program (RRP) to replace its existing fraud detection system. The IRS conducted a pilot test of the RRP to assess its effectiveness in identifying potential identity theft tax returns during Processing Year 2014, and based on the positive pilot results, expanded the use of the RRP s identity theft detection for Processing Year The RRP uses predictive analytics, models, i.e., filters, clustering, a scoring system, business rules, and selection groups to identify suspected identity theft and fraudulent tax returns. 23

24 The Taxpayer Protection Program Filters and modeling identify suspicious returns Suspicious returns pulled for Taxpayer Protection Program verification and treatment stream Correspondence sent to address on the return asking for identity verification 24

25 The Taxpayer Protection Program 25

26 Victim Assistance 26

27 Enforcement: CID and ID-Theft Prosecution Efforts Fighting ID-theft related tax fraud is CI s TOP priority Over the past three years, IRS CID has helped convict approximately 2,000 identity thieves During fiscal year 2015, the average prison term was 38 months the longest sentence was over 27 years. The Law Enforcement Assistance Program ( LEAP ) ID Theft Clearing House ( ITC ) Multi-region task forces Questionable Refund Program Return Preparer Program 27

28 Questionable Refund Program Investigation Example IRS Press Release Bulgarian Citizen Sentenced for Role in $6 Million Tax Refund Scheme On June 2, 2016, in Newark, New Jersey, Vanyo Minkov, a citizen of the Republic of Bulgaria, was sentenced to 46 months in prison, two years of supervised release and ordered to pay restitution of $2,702,555. In late 2012, Minkov and his conspirators hacked into the networks of at least four accounting firms and stole the 2011 tax filings for over 1,000 of the firms clients. Minkov and others then used the stolen information to file fraudulent tax returns in the clients names for the 2012 tax year or sold the information to others for the same purpose. To date, the IRS has identified over $6 million in fraudulent claims made in connection with the scheme 28

29 Common Charges in SIRF Cases 18U.S.C. 286/287(False Claims) 18 U.S.C. 641 (Theft of gov t funds) 18 U.S.C (Access device fraud) 18 U.S.C (Wire fraud) 18 U.S.C (ID theft) 18 U.S.C. 1028A (Aggravated ID theft) 18 U.S.C. 371 (Conspiracy) 29

30 Legislation The Consolidated Appropriations Act of 2016 The PATH Act What s On the Horizon? 30

31 The Warning Signs More than one tax return was prepared for taxpayer Receipt of notice from IRS Rejected E-File Notice regarding an unknown employer 31

32 What to Do if A Client is Victimized File a police report File a complaint with the FTC Contact the IRS to report the theft and file IRS Form 14039, Identify Theft Affidavit. Contact credit bureau to place fraud alert, request a credit report Close any financial accounts opened without authorization Contact State tax agency Contact Debt Collectors Other Steps 32

33 The IRS Process The taxpayer attempts to file a return or experiences a loss of PII. IRS Form 14039, Identity Theft Affidavit, is filed. IRS codes taxpayer s account to show identity theft documentation was submitted. IRS reconciles taxpayer s account to reflect valid return information. Identity protection indicator is placed on the taxpayer s account. IRS issues a CP01 notice to let the taxpayer know an identity theft marker has been placed on his/her account. Before the next filing season, the IRS generally assigns the taxpayer a unique Identity Protection PIN to verify his/her return. If the taxpayer is identified as being deceased, the IRS locks the account to prevent future filing. 33

34 Best Practices Implement a security plan Educate clients Urge them to protect IP PINs, E-File PINs, etc. Use security software with firewall and anti-virus protections. Use strong passwords. Learn to recognize and avoid phishing s, threatening calls and texts from thieves posing as legitimate organizations such as your bank, credit card companies and even the IRS. Don t respond to suspicious IRS s, texts, or faxes Do not click on links or download attachments from unknown or suspicious s. Encrypt sensitive Other 34

35 Concluding Remarks and Questions 35

36 Disclaimer The information included in these slides is for discussion purposes only and should not be relied on without seeking individual legal advice. 36

Jason B. Freeman, J.D., CPA

Jason B. Freeman, J.D., CPA Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman

More information

Identity Theft Information for Tax Professionals. August 2017

Identity Theft Information for Tax Professionals. August 2017 Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!

More information

IRS Criminal Investigation

IRS Criminal Investigation IRS Criminal Investigation Kurt Bertram Special Agent Public Information Officer November 5, 2015 IRS Criminal Investigation Mission Criminal Investigation serves the American public by investigating potential

More information

IRS UPDATES & Taxes. Security. Together.

IRS UPDATES & Taxes. Security. Together. IRS UPDATES & Taxes. Security. Together. Dennis Bell Senior Stakeholder Liaison CATA February 3, 2016 Issue 5: Online Tools for Tax Professionals 1 Keeping Current Preparer Guidelines 2 Other Tax Pro Links

More information

Tax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Shannon Vernieuw

Tax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Shannon Vernieuw Tax Refund Fraud and Identity Theft IRS Criminal Investigation Special Agent Shannon Vernieuw Internal Revenue Service Criminal Investigation Criminal Investigation serves the American public by investigating

More information

Data Thefts and Protecting Client Tax Information

Data Thefts and Protecting Client Tax Information Data Thefts and Protecting Client Tax Information October 20, 2015 The information contained in this presentation is current as of the date it was presented. It should not be considered official guidance.

More information

Internal Revenue Service Criminal Investigation

Internal Revenue Service Criminal Investigation Tax Refund Fraud and Identity Theft IRS - Criminal Investigation John Collins Acting Special Agent In Charge Boston Field Office Internal Revenue Service Criminal Investigation Criminal Investigation serves

More information

Combating ID Theft with the Help of Payroll Professionals

Combating ID Theft with the Help of Payroll Professionals PENNSYLVANIA STATEWIDE PAYROLL CONFERENCE Indiana University Of Pennsylvania Philip G. Yamalis Senior Stakeholder Liaison October 7, 2016 Future State Resources for Payroll Professionals Combating ID Theft

More information

Ohio Conference of Payroll Professionals

Ohio Conference of Payroll Professionals Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number

More information

White Collar Crime: An IRS-CI Perspective. Focused on ID Theft

White Collar Crime: An IRS-CI Perspective. Focused on ID Theft White Collar Crime: An IRS-CI Perspective Focused on ID Theft Special Agents Bill Beckham Brooke Tetzlaff What is IRS-CI? OBJECTIVES Divisions, Mission, Workforce Types of Investigations Tax Evasion, Money

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

International Tax and Asset- Reporting for the Everyday Client

International Tax and Asset- Reporting for the Everyday Client International Tax and Asset- Reporting for the Everyday Client Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 www.freemanlaw-pllc.com Copyright Freeman Law,

More information

Chapter 9: Identity Theft and Refund Fraud. 1 09: Identity Theft and Refund Fraud

Chapter 9: Identity Theft and Refund Fraud. 1 09: Identity Theft and Refund Fraud Page 135-146 Chapter 9: Identity Theft and Refund Fraud 1 Learning Objectives Page 135-146 Upon completion of this seminar, participants should be able to Recognize the threats that apply to practitioners.

More information

SPECIAL REPORT. What to Do If Your Client Is a Victim of Tax-Related Identity Theft

SPECIAL REPORT. What to Do If Your Client Is a Victim of Tax-Related Identity Theft SPECIAL REPORT What to Do If Your Client Is a Victim of Tax-Related Identity Theft What to Do If Your Client Is a Victim of Tax-Related Identity Theft Tax-related identity theft revolves around the fraudulent

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA

More information

The Bank Secrecy Act & Beyond: Currency and Monetary Reporting Requirements

The Bank Secrecy Act & Beyond: Currency and Monetary Reporting Requirements The Bank Secrecy Act & Beyond: Currency and Monetary Reporting Requirements Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

UI ID Theft in Texas UI Director s Conference. Paul Carmona Director, Regulatory Integrity Division

UI ID Theft in Texas UI Director s Conference. Paul Carmona Director, Regulatory Integrity Division UI ID Theft in Texas 2014 UI Director s Conference Paul Carmona Director, Regulatory Integrity Division Overview Desired End State What We Know What We re Experiencing What We re Doing About It Near-Term

More information

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting

More information

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

Polson/ Ronan Ambulance Service Identity Theft Prevention Program

Polson/ Ronan Ambulance Service Identity Theft Prevention Program Purpose Polson/ Ronan Ambulance is committed to providing all aspects of our service and conducting our business operations in compliance with all applicable laws and regulations. This policy sets forth

More information

Visa s Approach to Card Fraud and Identity Theft

Visa s Approach to Card Fraud and Identity Theft Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting

More information

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

Hacking Healthcare: Attacks on the Highest Value Asset

Hacking Healthcare: Attacks on the Highest Value Asset Hacking Healthcare: Attacks on the Highest Value Asset Paul Dant Chief Strategy Officer Independent Security Evaluators The Key Takeaway Who am I? Paul Dant Chief Strategist @ ISE 9: First digital product

More information

Information on Identity Theft for Business, Partnerships and Estate and Trusts

Information on Identity Theft for Business, Partnerships and Estate and Trusts Page 1 of 5 HELP MENU Home News Fact Sheets Information on Identity Theft for Business Partnerships and Estate and Trusts Information on Identity Theft for Business, Partnerships and Estate and Trusts

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information

Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait!

Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait! Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait! By Tom Bassett, J.D., CPA Trending Upward Again in 2018 Taxpayer Identity Theft As head of Commerce Trust

More information

Identity Theft: Help Your Students Avoid This Epidemic

Identity Theft: Help Your Students Avoid This Epidemic Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Detection Has Improved; However, Identity Theft Continues to Result in Billions of Dollars in Potentially Fraudulent Tax Refunds September 20, 2013 Reference

More information

Everyone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud. Capital of Texas Enrolled Agents CPE November 3, 2009

Everyone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud. Capital of Texas Enrolled Agents CPE November 3, 2009 Everyone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud Capital of Texas Enrolled Agents CPE November 3, 2009 When was the first significant instance of identity theft in

More information

What s New for Stage 1 in 2014

What s New for Stage 1 in 2014 The problem Your Accounting for a New Economy What s New for Stage 1 in 2014 Medical identity is now the fastest-growing type of identity theft in the world and Texas has become the fourth highest identity

More information

Identity Protection 101: Protect your good name from identity theft.

Identity Protection 101: Protect your good name from identity theft. Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social

More information

DALLAS CPA SOCIETY CONTINUING EDUCATION CORPORATION MEMBER APPRECIATION CPE SERIES. October 26, 2016

DALLAS CPA SOCIETY CONTINUING EDUCATION CORPORATION MEMBER APPRECIATION CPE SERIES. October 26, 2016 DALLAS CPA SOCIETY CONTINUING EDUCATION CORPORATION MEMBER APPRECIATION CPE SERIES October 26, 2016 TIGTA & You: Protecting Clients and Taxpayers Tom Traxinger Assistant Special Agent in Charge, Treasury

More information

FINAL COPYRIGHT 2016 LGUTEF IRS ISSUES

FINAL COPYRIGHT 2016 LGUTEF IRS ISSUES IRS ISSUES 8 Issue 1: Form 2848, Power of Attorney and Declaration of Representative........ 246 Issue 2: Levels of Representation before the IRS........... 249 Issue 3: IRS Transcripts....... 251 Issue

More information

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No. DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box 777 - Lexington, Nebraska - 68850 Tel. No.- 308/324/2386 Fax No.-308/324/2907 CUSTOMER POLICY IDENTITY THEFT PREVENTION I. OBJECTIVE Page

More information

Drexel and FMFCU. Presented By

Drexel and FMFCU.   Presented By Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Today s Speakers. Lisa Weintraub Schifferle. Eva Velasquez. Attorney Federal Trade Commission (FTC) CEO & President Identity Theft Resource Center

Today s Speakers. Lisa Weintraub Schifferle. Eva Velasquez. Attorney Federal Trade Commission (FTC) CEO & President Identity Theft Resource Center Today s Speakers Lisa Weintraub Schifferle Attorney Federal Trade Commission (FTC) Eva Velasquez CEO & President Identity Theft Resource Center Overview What is identity theft? What is tax identity theft?

More information

Tax Identity Care Terms and Conditions

Tax Identity Care Terms and Conditions Tax Identity Care Terms and Conditions Thank you for purchasing Tax Identity Care. We appreciate the opportunity to serve you! This Tax Identity Care Terms and Conditions agreement ( Care Agreement ) is

More information

IDENTITY THEFT PROTECT YOUR MONEY

IDENTITY THEFT PROTECT YOUR MONEY IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that

More information

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

IRS Criminal Investigation SPECIAL AGENT FELICIA MCCAIN PUBLIC INFORMATION OFFICER (619)

IRS Criminal Investigation SPECIAL AGENT FELICIA MCCAIN PUBLIC INFORMATION OFFICER (619) IRS Criminal Investigation SPECIAL AGENT FELICIA MCCAIN PUBLIC INFORMATION OFFICER (619) 770-9317 FELICIA.MCCAIN@CI.IRS.GOV Areas of Emphasis for CI Abusive Return Preparers International Fraud Refund

More information

2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER

2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER 07/13/2017 Version 2 2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER 2018-2B SECTION ONE: 2018 Product Suite Our portfolio of financial services and our commitment to customer service will

More information

2018 ERO Compliance Training RETURNING CLIENTS FEE COLLECT

2018 ERO Compliance Training RETURNING CLIENTS FEE COLLECT 07/13/2017 Version 2 2018 ERO Compliance Training RETURNING CLIENTS FEE COLLECT 2018-2B SECTION ONE: 2018 Fee Collect Program In partnership with your software provider and Santa Barbara Tax Products Group

More information

Identity theft can occur even if you have been careful about protecting your personal information.

Identity theft can occur even if you have been careful about protecting your personal information. Dear Customer, Identity theft can occur even if you have been careful about protecting your personal information. If you suspect you have been a victim of identity theft, a fraud, or a scam, we have prepared

More information

Credit Matters Credit Concept Workshop Presentation Script (Part II of II)

Credit Matters Credit Concept Workshop Presentation Script (Part II of II) Credit Matters Credit Concept Workshop Presentation Script (Part II of II) (HAND OUT QUIZ PRIOR TO PRESENTATION) Opening Slide: WELCOME BACK TO THE SECOND PRESENTATION OF THE CREDIT CONCEPTS WORKSHOP SERIES.

More information

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Identity theft and identity fraud are terms used to refer to all types

More information

Identity Theft: World s Fastest Growing Crime!!

Identity Theft: World s Fastest Growing Crime!! Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all

More information

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You. Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing

More information

Financial Literacy Course. East High School Module 9

Financial Literacy Course. East High School Module 9 Financial Literacy Course East High School Module 9 What will you learn about? Identity Theft and Consumer Fraud Protecting Against and Identity Theft and Consumer Fraud Fair Debt Collection Practices

More information

Do a Paycheck Checkup

Do a Paycheck Checkup Do a Paycheck Checkup Alan Gregerson October 25, 2018 Why a Paycheck Checkup? Some law changes in the Tax Cuts and Jobs Act may affect your withholding. Protect against having too little tax withheld and

More information

Protecting against and recovering from fraud and identity theft WHAT TO DO

Protecting against and recovering from fraud and identity theft WHAT TO DO Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls

More information

Red Flags Rule Identity Theft Training Program

Red Flags Rule Identity Theft Training Program Red Flags Rule Identity Theft Training Program October 2017 Purpose of Training The purpose of the UA Little Rock Identity Theft Prevention Program is to reduce the exposure of financial and personal loss

More information

GREENPATH FINANCIAL WELLNESS SERIES

GREENPATH FINANCIAL WELLNESS SERIES GREENPATH FINANCIAL WELLNESS SERIES IDENTITY THEFT Empowering people to lead financially healthy lives. TABLE OF CONTENTS What is Identity Theft?...2 How Identity Theft Occurs...3 How Identity Thieves

More information

IRS Updates. Due Date. Richard Furlong, Jr. Senior Stakeholder Liaison 1/2/2018

IRS Updates. Due Date. Richard Furlong, Jr. Senior Stakeholder Liaison 1/2/2018 IRS Updates Richard Furlong, Jr. Senior Stakeholder Liaison January 4, 2018 North Jersey Working Together Conference Seton Hall University Due Date Returns and payments otherwise due April 15, 2018, are

More information

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Program Adoption Purpose Definitions Fitchburg State College (College) developed this Identity Theft Prevention Program to detect,

More information

Tax Identity Shield What to Expect. Tax Identity Shield Terms & Conditions

Tax Identity Shield What to Expect. Tax Identity Shield Terms & Conditions Tax Identity Shield What to Expect Congratulations! Enrolling in Tax Identity Shield (by signing below) is an important first step in helping to better protect your taxpayer identity. What happens next?

More information

Fraudulent Check, Credit Card Fraud and ID Theft Guide

Fraudulent Check, Credit Card Fraud and ID Theft Guide Fraudulent Check, Credit Card Fraud and ID Theft Guide COLLECTING BAD CHECKS The police involvement in bad check cases is for the sole purpose of investigating the incident to determine whether or not

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Slide 1 Identity Theft Prevention Program Welcome to the Identity Theft Prevention Program annual training course. Your personal identification information can be used by individuals seeking to use your

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Results of the 2015 Filing Season August 31, 2015 Reference Number: 2015-40-080 This report has cleared the Treasury Inspector General for Tax Administration

More information

Combating Refund Fraud: Recent Trends and Successful Prevention Techniques

Combating Refund Fraud: Recent Trends and Successful Prevention Techniques Combating Refund Fraud: Recent Trends and Successful Prevention Techniques Revenue Solutions, Inc. 2017 WSATA Annual Conference Missoula, MT October 3, 2017 2017 Revenue Solutions, Inc. Introduction Davis

More information

Offer in Compromise. Ley Mills COSS SL-Field. December 21, 2016

Offer in Compromise. Ley Mills COSS SL-Field. December 21, 2016 Offer in Compromise Ley Mills COSS SL-Field December 21, 2016 Offer in Compromise Pre-Qualifier Tool Good candidate? Reasonable offer amount? Use as guide for Doubt as to Collectibility offer 2 Offer in

More information

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity

More information

How to Freeze Your Credit Files

How to Freeze Your Credit Files Avoid Identity Theft! How to Freeze Your Credit Files County of Bucks Department of Consumer Protection/ Weights and Measures 1260 Almshouse Rd., 4th Floor Doylestown, Pa. 18901 215-348-6060 1-800-942-2669

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

Crime Coverage Section Application (Large Public Company > $1B revenues)

Crime Coverage Section Application (Large Public Company > $1B revenues) Crime Coverage Section Application (Large Public Company > $1B revenues) BY COMPLETING THIS CRIME APPLICATION THE APPLICANT IS APPLYING FOR COVERAGE WITH CHUBB INSURANCE COMPANY OF CANADA (THE COMPANY

More information

GreenPath Financial Wellness Series

GreenPath Financial Wellness Series GreenPath Financial Wellness Series IDENTITY THEFT Through financial knowledge and expertise, we provide high-quality products and services that enable people to enjoy a better quality of life. Smart financial

More information

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS

More information

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet:

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet: Before you start Telephone calls and other forms of direct communication: Use the worksheet included in this packet to keep a record of all conversations. When reporting fraud or communicating with law

More information

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan Identity Theft & Identity Fraud By Kevin Sullivan Page 1 Table of Contents What is Identity Theft?... 3 What is Identity Fraud?... 4 How is Personal Information Stolen?... 5 How Your Personal Information

More information

Identity Theft.

Identity Theft. Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.

More information

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009 Identity Theft Prevention Program Approved by the Board of Trustees on February 20, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules

More information

Bryan Coffey Stakeholder Liaison Internal Revenue Service Small Business/Self-Employed Communications, Outreach, Systems, and Solutions

Bryan Coffey Stakeholder Liaison Internal Revenue Service Small Business/Self-Employed Communications, Outreach, Systems, and Solutions Bryan Coffey Stakeholder Liaison Internal Revenue Service Small Business/Self-Employed Communications, Outreach, Systems, and Solutions 732-777-7242 Bryan currently works as a Stakeholder Liaison out of

More information

ACH Tax Refunds: Exceptions, Posting, & Liabilities. Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist

ACH Tax Refunds: Exceptions, Posting, & Liabilities. Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist ACH Tax Refunds: Exceptions, Posting, & Liabilities Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist Audio Handouts Questions Dealing with ACH Tax Refunds: Exceptions, Posting & Liabilities

More information

What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP

What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP LIFELOCK MEMBER EXPECTATIONS GUIDE 800-607-91744 LifeLock.com What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP THE LIFELOCK MEMBER COMMUNICATION EXPERIENCE Signing up

More information

Insuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a

More information

ID Theft Security. Michael G. Solomon. CISSP PMP CISM

ID Theft Security. Michael G. Solomon. CISSP PMP CISM ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible

More information

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No BEAZLEY BREACH RESPONSE APPLICATION NOTICE: THIS POLICY S LIABILITY INSURING AGREEMENTS PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY TO CLAIMS FIRST MADE AGAINST THE INSURED DURING

More information

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan

California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan California State University Bakersfield Identity Theft Prevention ( Red Flag ) Implementation Plan May 28, 2010 1.0 INTRODUCTION... 3 2.0 PURPOSE... 3 3.0 DEFINITIONS... 4 4.0 THE PROGRAM... 4 4.1. Program

More information

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity Theft Prevention Program Lake Forest College Revision 1.0 Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:

More information

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704 RE: Identity Theft Claim You recently notified Fay Servicing, LLC that you are the victim of identity theft with respect to the above referenced loan (also referred to in this notice as the debt or account

More information

Medical Identity Theft Prevention Policy

Medical Identity Theft Prevention Policy SUBJECT: NUMBER: EFFECTIVE DATE: SUPERSEDES SPP: APPROVED BY: DISTRIBUTION: Medical Identity Theft Prevention Policy (signature) DATED: I. STATEMENT OF PURPOSE: To define medical identity theft and outline

More information

NAU Police Department s Identity Theft Victim s Packet

NAU Police Department s Identity Theft Victim s Packet NAU Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted the NAU Police Department and obtained a police report number

More information

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director pierson Technological advances of the

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Reno Police Department, complete a crime report and obtained a police report case number

More information

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft. PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity

More information

The National Association of Community Health Centers, Inc. Issue Brief on. Complying with the FTC s Red Flag Rules. February, 2009

The National Association of Community Health Centers, Inc. Issue Brief on. Complying with the FTC s Red Flag Rules. February, 2009 1/28/2009 The National Association of Community Health Centers, Inc. Issue Brief on Complying with the FTC s Red Flag Rules February, 2009 Prepared for NACHC by: Michael Glomb Feldesman Tucker Leifer Fidell,

More information

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET 1-877-511-7906 LifeLock.com/Business FACT SHEET LifeLock Benefit Elite LifeLock

More information

ID Theft Protection Kit

ID Theft Protection Kit ID Theft Protection Kit Congratulations. You ve taken a big step in protecting the power of your credit and your identity. Identity theft is a serious crime. Victims can spend a significant amount of time

More information

Identity Theft What to do if your identity is stolen

Identity Theft What to do if your identity is stolen Identity Theft What to do if your identity is stolen Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 14 years1. It can impose damage that

More information

FINANCIAL CRIMES INVESTIGATIONS

FINANCIAL CRIMES INVESTIGATIONS FINANCIAL CRIMES INVESTIGATIONS today s presenters... Brian Sallee Cuyahoga County Sheriff s Department Major Crimes Task Force Larry Henderhan FDA Special Agent Major Crimes Task Force Counterfeit Investigations

More information

UNIT 3-4 Preventing Identity Theft

UNIT 3-4 Preventing Identity Theft UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information

More information

Financial Institutions Bond Application Form 24 for Commercial Banks, Savings Banks and Savings and Loan Associations New Business Application

Financial Institutions Bond Application Form 24 for Commercial Banks, Savings Banks and Savings and Loan Associations New Business Application General Information 1. Name of Applicant: 2. Address of Applicant: Please attach a list of all subsidiaries including operations, percent of ownership and the date acquired or created. (te: The application

More information

U.S. DEPARTMENT OF JUSTICE ANTITRUST DIVISION. National Tax Liens Association

U.S. DEPARTMENT OF JUSTICE ANTITRUST DIVISION. National Tax Liens Association Presentation By The U.S. DEPARTMENT OF JUSTICE ANTITRUST DIVISION To National Tax Liens Association February 26, 2015 DISCLAIMER: The views expressed in this presentation are not purported to reflect those

More information