Best Practices for Educating & Protecting Your Members in Light of the Equifax Breach

Size: px
Start display at page:

Download "Best Practices for Educating & Protecting Your Members in Light of the Equifax Breach"

Transcription

1 Best Practices for Educating & Protecting Your Members in Light of the Equifax Breach October 10, 2017 Presented by: Ann Davidson, VP of Risk Consulting at Allied Solutions & Sally King, Co-founder of NXG Strategies

2 Agenda Latest updates on the Equifax data breach Update on potential fraud exposure What you and your members need to know Key takeaways Q & A

3 Equifax Data Breach Representative Greg Walden was perhaps the harshest in his criticism: I don t think we can pass a law that fixes stupid, he said. Walden further compared the breach to a robbery at Fort Knox, saying Equifax had forgot to lock the doors and failed to notice the thieves were emptying the vaults. Equifax warned of vulnerability but failed to fix it Waited 40 days to tell the public about the data breach! 145 million consumers are at risk! That s what we know today.

4 Polling Question Have you posted or sent out information to your members on the Equifax data breach? Yes No Not Sure

5 Polling Question Do you have a written data breach plan in place? Yes No Not Sure

6 Why is Equifax Different from Other Card Breaches? It is the largest breach to date, with million individuals at risk Neither you nor your members can replace the data that was exposed: Members' name Members' date of birth Members' social security number Members' drivers license number Card numbers (for some of the breached records) In a card breach, you can block and reissue a new card number

7 Equifax Data Breach Vulnerabilities Credit union and member alerts! Be aware of increased phishing attempts using: Phone Text Don t respond, click links or open attachments! How are you authenticating your members today?

8 Fraud Risk Exposures Authentication Risk Identity theft (subsequent identity fraud) New account and account takeover Account takeover leads to money in the bad guys pockets Transaction Risk Payment card fraud debit and credit (card/card number) ACH ODFI & RDFI debit and credit items Wire incoming/outgoing/recurring Paper check deposits Loan fraud Digital fraud A2A, P2P, home banking, bill payment, remote deposit

9 Best Practices for Equifax Data Breach Monitor and follow up on the data breach Uncover and report the fraud type Review your fraud monitoring reports on all fraud Work closely with your vendors to respond immediately Watch closely for subsequent fraud attacks Equifax data breach is high risk Utilize solutions to help respond to your member risk of identity theft Continue to educate both internal staff and external accountholders what to watch. Education is key!

10 Risk Mitigation for Members Monitor all credit accounts and loans Immediately report suspicions Set password/passcode on accounts Set lower daily dollar limits on accounts Watch activity daily Sign up for alert notifications Sign up for the credit bureaus fraud alerting services Sign up for free credit monitoring services Place a freeze on all three credit bureau accounts Sign up for identify theft Stay informed about what happened and what to do

11 New Account Fraud Management Validate all new account information Watch for any type of immediate wire, ACH or new loan requests. Watch for full service deposits at an ATM with immediate withdrawals Verify how cards are being activated Limit the dollar amount on outgoing wires, ACH, and debit card transactions Educate new account holders to be cautious when entering their accounts online and to require personal info not compromised in the breach for account access Recommend that new members create a required password/passcode for access to their accounts

12 New Account Fraud Management Limit the dollar amount on loans Implement multiple layers of authentication; consider using biometrics, security tokens or device authentication Perform extensive authentication prior to approving loans Institute a waiting period on loan, debit card or product applications Require strong passwords for account access Review each new applicant's credit reports in detail Use other authentication measures to confirm the ID is real Train employees about red flags of new account fraud and loan fraud on and ongoing basis Network with peers in the industry if you think a new loan applicant or new account applicant seems suspicious

13 Key Takeaways Better understanding of: Equifax breach Types of potential fraud exposure Action steps to stay aware of what could happen next Solutions to respond to and recover from the Equifax data breach Education, understanding, sharing and networking is key to help all of us work together in order to stay ahead of the fraudsters!

14 Identity Protection in the Post-Equifax Breach World

15 Data Breach Totals Since ,073,490,127 FOUR TIMES the number of adults in the U.S. Yahoo! 3 billion, December 2016 MySpace 360 million May 2016 Equifax million, September 2017 EBay 145 million, May 2014 Target 110 million, November 2013 LinkedIn 100 million, May 2016 AOL 92 million, October 2007 JP Morgan Chase 83 million, October 2013 Anthem 76 million, February 2015 Sony PlayStation Network 77 million, April 2011 Home Depot 53 million, September 2014 TJ Maxx 45.7 million 2007 Ashley Madison, 32 million, August 2015 OPM 21.5 million, July 2015 Experian (T-mobile) 15 million, October 2015 Scottrade 4.6 million, October 2015 UCLA Health 4.5 million, July 2015

16 Additional Recent Breach Incidents September 21 the Securities and Exchange Commission (SEC) disclosed that hackers breached its Electronic Data Gathering, Analysis and Retrieval (EDGAR) system through a software vulnerability and the stolen data was possibly used for illegal stock trading. September 25 Deloitte hit by a cyber-attack, revealing clients non-public information. Hackers possibly accessed usernames, passwords and personal details of the firm s blue-chip clients. Per media reports, the account access authentication simply required a single password and did not have a two-step verification.

17 Cyber Crime is Soaring Compounded annual growth of detected security incidents around the world has increased 66% year-over-year since 2009 Worldwide there are millions of cyber-attacks detected each day Carried out by sophisticated criminal enterprises Source: The Global State of Information Security Survey 2015, a worldwide survey by CIO, CSO and PwC

18 Over 10 billion attacks per day Source: 30 Sept Live cyberattack map showing the top.1% of reported attacks (avg. over 10 million per day) that s a total of over 10 BILLION attacks per day worldwide

19 Monetizing Stolen Data Date of Birth $11 Set of online service credentials $19 Health insurance credentials $20 Credit card with mag stripe or chip data (with freshness date) $20 Name, address, SSN and DOB $15-65 Set of business account credentials $ Loan application/portfolio $250 Sources: 2015 Trend Micro the Global Black Market Prices for US Data SecureWorks Underground Hacker Markets Annual Report, April 2016.

20 Monetizing Stolen Logins itunes Account User Name/Password $11 Fedex.com, Continental.com and United.com accounts $6 Groupon credentials $5 GoDaddy.com, ATT.com, Sprint.com, Verizonwireless.com, Tmobile.com and other wireless provider accounts $4 Facebook and Twitter logins $2.50 Dell.com, overstock.com, Walmart.com, tesco.com, bestbuy.com and target.com $1.50 Sources: 2015 Trend Micro the Global Black Market Prices for US Data SecureWorks Underground Hacker Markets Annual Report, April 2016.

21 Where Criminal Activity Lives 1 % 99% Image licensed for use by NXG Strategies, LLC Surface Web Deep Web Dark Web Google, Facebook, Amazon, Twitter, Instagram, All Search Engines Database-Driven Information (Academic Information, Medical Records, Govt Docs, Intranets) Stolen Data Trafficking through Online Criminal Storefronts, Drug Trafficking, Terrorist Group Communications, etc.

22 Online Criminal Data Merchants Online stores sell stolen card numbers, and print and sell with plastic Includes fake chip (i.e. fallback) Sold by quantity ( dumps ) Grouped by state Grouped by BIN Includes freshness date Check-out with Bitcoins, Western Union, Money Gram Advertised sales Money-Back guarantees Operated from countries with no extradition treaty with U.S.

23 Examples: Criminal Storefronts From:

24 Source: Federal Trade Commission Criminals will post samples of stolen data on websites in order to make the data public as an advertisement. How fast will identity thieves use the stolen info? Answer: 9 minutes

25 FTC Research Study May fake consumers in a database were loaded to a website used by hackers to make stolen credentials public Names, addresses, addresses, phone numbers and payment information (bitcoin wallet, credit card or online payment service) There were 1,200 attempts to use the stolen data, beginning only 9 minutes after posting Thieves tried to buy clothing, games, online dating memberships and even pizza Two-factor authentication prevented the thieves from being successful

26 Dark Web Scan Offers 26

27 Dark Web Monitoring Monitors malicious command and control networks, black market forums, known compromised machines and servers, phishing networks and exploited websites SSN, Name, Address, DOB address, user name, passwords Other credentials Credit card numbers Bank account numbers Passport number Insurance contract numbers Professional license numbers Gaming credentials Other identifying information

28 EXAMPLE: Compromised Corporate /Passwords Actual dark web search of one bank s (Includes number of user names/passwords found using financial domain and to which hack it was attributed)

29 Not All Dark Web Monitoring is Alike Some services use non-malicious Botnets (internet robots) scour the surface web looking for exposed data. Others use both botnets and human operatives who infiltrate criminal networks to gather stolen data, compare transactions and determine common points of compromise to alert an organization of a breach. Dark web monitoring uses the rich cache of data collected by botnets AND operatives to alert registered consumers. YAHOO BREACH: Dark Web Monitoring notified hundreds of thousands of Yahoo users with Dark Web Monitoring about the breach 6 months before the official announcement from Yahoo.

30 30

31 High Risk Transactions Monitoring Monitors for Knowledge-Based Authentication process during a high risk transaction in a network of participating organizations Provides an alert if the credentials used match a registered subscriber Consumer can respond with me or not me Not me response goes back to the organization conducting the transaction Online authorization Account management activity Password reset Online transfer Online purchase Loan application Medical billing request Address change Fraud inquiry New accounts Change of account ownership

32 Credit Freeze Restricts access to your credit report Must request to lift the freeze if applying for a job, renting an apartment, buying insurance, etc. Contact EACH agency (Equifax, Experian, TransUnion) Supply your name, address, date of birth, SSN and other personal information. Fees vary based on where you live, but commonly $5 - $10 Receive PIN (personal identification number) or password from EACH agency or password. Keep this in a safe place. You will need it if you choose to lift the freeze. To lift you must contact all three bureaus unless you know which bureau(s) a potential employer, creditor or insurance company will contact for your report.

33 Credit Monitoring Monitors for changes in your credit file and alerts of the change typically via and SMS text message One bureau or three bureau monitoring available Does NOT provide an alert of account takeover Does NOT provide an alert of noncredit identity theft, which more than half of all identity theft

34 Federal Trade Commission Report Financial Fraud Total: 50% Non-Financial Fraud Total: 71% Based on 399,225 consumer complaints. NOTE: 25% of identity theft complaints have more than one type of identity theft Source: Federal Trade Commission Consumer Sentinel Report, February 2017

35 Professional Identity Recovery CASE ASSIGNMENT Dedicated Identity Recovery Advocate assigned upon case submission Victim provided direct /phone No time limit for recovery INITIAL CONTACT & RESEARCH Assist with fraud alert placement Assist with police report filing Credit reports reviewed DOCUMENTATION Assist with Fraud Affidavit Educational materials Offers Limited Power of Attorney (LPOA) Free Credit Monitoring During Recovery REMEDIATION Advocate will contact creditors, government agencies, and others for the consumer RECOVERY Petition to expunge any fraudulent records created by the crime Obtain credit reports to validate FOLLOW-UP Advocate will follow-up with the consumer for 12 months Free Credit Monitoring after case is closed for 12 months

36 Financial Institution Assets at Risk

37 Time for Questions! If you have remaining questions that were not addressed today, please reach out: To receive ongoing education on industry-related topics: Sign-up for our fraud education newsletter: Sign-up for our corporate newsletter: Follow us on social media

Equifax Data Breach: Your Vital Next Steps

Equifax Data Breach: Your Vital Next Steps Equifax Data Breach: Your Vital Next Steps David A. Reed Partner, Ann Davidson Vice President Risk Consulting/ Bond Division Allied Solutions, LLC Do You Remember When this Was the Biggest Threat to Data

More information

Dig Deep into the Root Causes of Fraud to Prevent Future Attacks

Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Presented by: Ann Davidson, VP of Risk Consulting at Allied Solutions & Tammy Behnke, Credit Union Program Director at ProSight Specialty

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

Identity Theft Protection Plans

Identity Theft Protection Plans Identity Theft Protection Plans V E R I F Y P R O T E C T R E C O V E R IN 2017, DATA BREACHES REACHED ECONOMIC PROPORTIONS A victim may need to spend time at work trying to recover their good name and

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

Kasasa Protect. FAQ and Product Overview

Kasasa Protect. FAQ and Product Overview Kasasa Protect FAQ and Product Overview Kasasa Protect... 3 Key Contact Info... 3 Included Benefits... 3 Credit Reporting... 4 Monthly Credit Score & Plotter... 4 24/7 Credit Monitoring... 5 Full-Service

More information

Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities.

Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. deluxe growth services introduction Identity thieves are extending beyond credit relationships and are more

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

IDShield National Plan Benefit Overview

IDShield National Plan Benefit Overview IDShield National Plan Benefit Overview IDShield is an industry leader in identity theft protection, monitoring and restoration services. Through IDShield, participants receive a comprehensive set of identity

More information

Up for Grabs: Taking Charge of Your Digital Identity

Up for Grabs: Taking Charge of Your Digital Identity Up for Grabs: Taking Charge of Your Digital Identity AARP Wisconsin Survey of Internet Users Age 18+ Report prepared by Karla Pak, Doug Shadel, and Alicia Williams August 2018 https://doi.org/10.26419/res.00228.022

More information

Protecting against and recovering from fraud and identity theft WHAT TO DO

Protecting against and recovering from fraud and identity theft WHAT TO DO Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls

More information

Three D s of safeguarding your personal data

Three D s of safeguarding your personal data Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D

More information

Up for Grabs: Taking Charge of Your Digital Identity

Up for Grabs: Taking Charge of Your Digital Identity Up for Grabs: Taking Charge of Your Digital Identity AARP Nebraska Survey of Internet Users Age 18+ Report prepared by Karla Pak, Doug Shadel, and Alicia Williams August 2018 https://doi.org/10.26419/res.00228.014

More information

Up for Grabs: Taking Charge of Your Digital Identity

Up for Grabs: Taking Charge of Your Digital Identity Up for Grabs: Taking Charge of Your Digital Identity AARP Kentucky Survey of Internet Users Age 18+ Report prepared by Karla Pak, Doug Shadel, and Alicia Williams August 2018 https://doi.org/10.26419/res.00228.007

More information

It s not going away. (c) 2014 huberis.net. Identity Theft

It s not going away. (c) 2014 huberis.net. Identity Theft It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions How do you monitor my identity? We use our exclusive software to proactively monitor various sources for suspicious activity. With PrivacyArmor : You will be able to set thresholds

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Up for Grabs: Taking Charge of Your Digital Identity

Up for Grabs: Taking Charge of Your Digital Identity Up for Grabs: Taking Charge of Your Digital Identity AARP Louisiana Survey of Internet Users Age 18+ Report prepared by Karla Pak, Doug Shadel, and Alicia Williams August 2018 https://doi.org/10.26419/res.00228.008

More information

UNIT 3-4 Preventing Identity Theft

UNIT 3-4 Preventing Identity Theft UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information

More information

Employee Identity Theft Plans for Issues Management dba Five Star Call Center. Prepared by LegalShield June 26, 2018 Proposal valid for 180 days.

Employee Identity Theft Plans for Issues Management dba Five Star Call Center. Prepared by LegalShield June 26, 2018 Proposal valid for 180 days. Employee Identity Theft Plans for Issues Management dba Five Star Call Center Prepared by LegalShield June 26, 2018 Proposal valid for 180 days. Sean Rooney National Sales Director LegalShield Business

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions How do you protect my identity? We use our proprietary software to proactively monitor various sources. Through PrivacyArmor, you will also have the power to create thresholds

More information

A Definitions: Europ Assistance USA, Inc East-West Highway, Suite 1000, Bethesda, Maryland 20814

A Definitions: Europ Assistance USA, Inc East-West Highway, Suite 1000, Bethesda, Maryland 20814 This website is owned and/or operated by Europ Assistance USA, Inc. and is subject to the terms of use, privacy policy, and other legal notices posted on their website, which you should read before proceeding.

More information

Up for Grabs: Taking Charge of Your Digital Identity

Up for Grabs: Taking Charge of Your Digital Identity Up for Grabs: Taking Charge of Your Digital Identity AARP Massachusetts Survey of Internet Users Age 18+ Report prepared by Karla Pak, Doug Shadel, and Alicia Williams August 2018 https://doi.org/10.26419/res.00228.009

More information

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing

More information

Drexel and FMFCU. Presented By

Drexel and FMFCU.   Presented By Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission

More information

Services and Features

Services and Features Services and Features IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific services and features.

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

97 % of consumers surveyed expect their FI to help protect their financial assets from fraud. 2

97 % of consumers surveyed expect their FI to help protect their financial assets from fraud. 2 Deluxe Provent: Protecting against expanded threats. Providing for expanded opportunities. Introduction Identity thieves are smarter and more organized than ever before, claiming over 12.6 million victims

More information

Get back your good name. Refuse to be a target of identity crime again.

Get back your good name. Refuse to be a target of identity crime again. Clear Your Good Name After Identity Crime You suspect that someone is using your name and personal identification information for unlawful purposes. This kit can help you resolve your identity crime case

More information

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal

More information

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet:

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet: Before you start Telephone calls and other forms of direct communication: Use the worksheet included in this packet to keep a record of all conversations. When reporting fraud or communicating with law

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA

More information

ROCHESTER INSTITUTE OF TECHNOLOGY

ROCHESTER INSTITUTE OF TECHNOLOGY ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3

More information

Services & Features for Employee Benefit Members

Services & Features for Employee Benefit Members Services & Features for Employee Benefit Members IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific

More information

Visa s Approach to Card Fraud and Identity Theft

Visa s Approach to Card Fraud and Identity Theft Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting

More information

Ohio Conference of Payroll Professionals

Ohio Conference of Payroll Professionals Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number

More information

Year-end 2016 fraud update: Payment cards, remote banking and cheque

Year-end 2016 fraud update: Payment cards, remote banking and cheque Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information

Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer Survey presented by RateWatch

Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer Survey presented by RateWatch Accurate Financial Data Since 1989 Security Breaches and Identity Theft Consumer Actions and Opinions Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

Get the most out of your membership

Get the most out of your membership PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account

More information

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 Introduction: Under the Fair and Accurate Credit Transactions Act (FACT Act), financial institutions (and creditors) that offer or maintain covered accounts

More information

Eastpointe Community Credit Union Identity Theft and Deterrence Policy

Eastpointe Community Credit Union Identity Theft and Deterrence Policy Eastpointe Community Credit Union Identity Theft and Deterrence Policy Areas of Responsibility: Management/Operations Board Approval December 14, 2016 Board Review: December 14, 2016 Last Revision: December

More information

Privacy and Security Issues Facing Qualified Retirement Plans

Privacy and Security Issues Facing Qualified Retirement Plans SECURIAN FINANCIAL 1 Privacy and Security Issues Facing Qualified Retirement Plans Theodore Schmelzle, JD, CIPP/US Senior Director, Retirement Solutions November 2018 SECURIAN FINANCIAL 2 Agenda Why advisors,

More information

Identity theft can occur even if you have been careful about protecting your personal information.

Identity theft can occur even if you have been careful about protecting your personal information. Dear Customer, Identity theft can occur even if you have been careful about protecting your personal information. If you suspect you have been a victim of identity theft, a fraud, or a scam, we have prepared

More information

Hacking Healthcare: Attacks on the Highest Value Asset

Hacking Healthcare: Attacks on the Highest Value Asset Hacking Healthcare: Attacks on the Highest Value Asset Paul Dant Chief Strategy Officer Independent Security Evaluators The Key Takeaway Who am I? Paul Dant Chief Strategist @ ISE 9: First digital product

More information

O P C S. OPCS Overview 9/28/2017 (OPCS) The implementation of the Ohio Pooled Collateral System creates a unique partnership between:

O P C S. OPCS Overview 9/28/2017 (OPCS) The implementation of the Ohio Pooled Collateral System creates a unique partnership between: O P C S (OPCS) opcs.ohio.gov 1 OPCS Overview The implementation of the Ohio Pooled Collateral System creates a unique partnership between: Treasurer s Office Financial Institutions Local Governments opcs.ohio.gov

More information

Office of Privacy Protection Safeguarding Information for Your Future

Office of Privacy Protection Safeguarding Information for Your Future W I S C O N S I N Office of Privacy Protection Safeguarding Information for Your Future Credit report security freeze Wisconsin consumers have the right to place a security freeze on their credit reports.

More information

Financial Crime: Awareness & Prevention. Jon Jarosinski

Financial Crime: Awareness & Prevention. Jon Jarosinski Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit

More information

What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP

What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP LIFELOCK MEMBER EXPECTATIONS GUIDE 800-607-91744 LifeLock.com What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP THE LIFELOCK MEMBER COMMUNICATION EXPERIENCE Signing up

More information

2017 annual fraud update:

2017 annual fraud update: 2017 annual update: Payment cards, remote banking, cheque and authorised push payment scams March 2018 The threat from is always changing, but the finance industry is continuously enhancing its response,

More information

January to June 2016 fraud update: Payment cards, remote banking and cheque

January to June 2016 fraud update: Payment cards, remote banking and cheque January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.

More information

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM Cards

Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM Cards Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM s Terms and Conditions effective 04/24/2017. Introduction page 1 Using Your page 2 Using Your Through a Mobile Device page 4 One-Time

More information

True Identity Protection. Identity Theft & Fraud Protection Proposal ID WATCHDOG. Presented To: Presented By:

True Identity Protection. Identity Theft & Fraud Protection Proposal ID WATCHDOG. Presented To: Presented By: Identity Theft & Fraud Protection Proposal ID WATCHDOG Presented To: Presented By: Identity Theft Protection as an Employee Benefit ID Watchdog is a leading provider of comprehensive identity monitoring

More information

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 1 STUDENT SERVICES 2 3 AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 References: Fair

More information

Identity Protection Services

Identity Protection Services Identity Protection Services Overview Why are identity protection services being provided? We believe your personal information should stay that way personal. That s why we re taking industry- leading

More information

Bank Secrecy Act OFAC FinCEN

Bank Secrecy Act OFAC FinCEN Bank Secrecy Act OFAC FinCEN 2017 CREDIT UNION EMPLOYEE TRAINING Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer Identification Program Customer Due Diligence

More information

Bank Secrecy Act OFAC FinCEN

Bank Secrecy Act OFAC FinCEN Bank Secrecy Act OFAC FinCEN SOUTHEAST DIRECTORS AND SUPERVISORY COMMITTEE CONFERENCE SEPTEMBER 18, 2017 Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer

More information

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET 1-877-511-7906 LifeLock.com/Business FACT SHEET LifeLock Benefit Elite LifeLock

More information

Edward J. Finn 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax:

Edward J. Finn 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax: Edward J. Finn 1275 Drummers Lane, Suite 302 Office: 267-930-4776 Wayne, PA 19087 Fax: 267-930-4771 Email: efinn@mullen.law VIA U.S. MAIL AND EMAIL Office of the Attorney General 1125 Washington Street

More information

Identity Theft.

Identity Theft. Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.

More information

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Princeton University employees are responsible for detecting Red Flags consistent with

More information

Notification of Rights for Texas Consumers

Notification of Rights for Texas Consumers Notification of Rights for Texas Consumers The Texas Business and Commerce Code requires that Texas consumers be given notice of their rights with written disclosure. You have the right to obtain a copy

More information

Identity Protection 101: Protect your good name from identity theft.

Identity Protection 101: Protect your good name from identity theft. Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social

More information

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No. DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box 777 - Lexington, Nebraska - 68850 Tel. No.- 308/324/2386 Fax No.-308/324/2907 CUSTOMER POLICY IDENTITY THEFT PREVENTION I. OBJECTIVE Page

More information

ID Theft Security. Michael G. Solomon. CISSP PMP CISM

ID Theft Security. Michael G. Solomon. CISSP PMP CISM ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible

More information

B. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.

B. The College is considered a creditor under the Red Flags Rule because it defers payment for services rendered. COLLEGE of CENTRAL FLORIDA ADMINISTRATIVE PROCEDURE Title: Identity Theft Prevention Program Procedure Page 1 of 5 Implementing Procedure For Policy # # 2.04 Date Approved: 07/07/11 Division: Administration

More information

State of Card Fraud: 2018

State of Card Fraud: 2018 State of Card Fraud: 2018 A deep dive into the evolution of card fraud + industry benchmark data for financial institutions. Stopping Fraud at the Speed of Data Continuing the trend of prior years, the

More information

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),

More information

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director pierson Technological advances of the

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW The Denver District Attorney's Office has been working closely with the Colorado Bureau of Investigations to provide you the most up-to-date information on the

More information

2012 Payments Fraud Survey

2012 Payments Fraud Survey 2012 Payments Fraud Survey Consolidated Results Payments Information & Outreach Office Federal Reserve Bank of Minneapolis September 25, 2012 Topics Survey Methodology & Respondent Profile Fraud Attempts

More information

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft. PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity

More information

Selected Terms & Conditions for Wells Fargo Business Debit, ATM and Deposit Cards

Selected Terms & Conditions for Wells Fargo Business Debit, ATM and Deposit Cards Selected Terms & Conditions for Wells Fargo Debit, ATM and Deposit Cards Terms and Conditions effective 04/24/2017. Introduction page 1 Using Your Card page 2 Using Your Card Through a Mobile Device page

More information

IT Security Roundtable on recognizing scams and dealing with identity theft Important to file a report with the police (aka Identity Theft Report)

IT Security Roundtable on recognizing scams and dealing with identity theft Important to file a report with the police (aka Identity Theft Report) IT Security Roundtable on recognizing scams and dealing with identity theft Kansas State University March 7, 2008 Harvard Townsend. IT Security Officer Speaker Notes 1. Email scams sent last week to K-Staters

More information

Fraudulent Check, Credit Card Fraud and ID Theft Guide

Fraudulent Check, Credit Card Fraud and ID Theft Guide Fraudulent Check, Credit Card Fraud and ID Theft Guide COLLECTING BAD CHECKS The police involvement in bad check cases is for the sole purpose of investigating the incident to determine whether or not

More information

Compliance With the Red Flags Rules

Compliance With the Red Flags Rules For Audio Participation, Please Call 1.866.281.4322, *1382742* Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321

More information

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity

More information

POLICY: Identity Theft Red Flag Prevention

POLICY: Identity Theft Red Flag Prevention POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information

More information

Benefits Handbook Date November 1, Identity Theft Plan MMC

Benefits Handbook Date November 1, Identity Theft Plan MMC Date November 1, 2010 MMC MMC offers identity theft solutions, supplied by ID TheftSmart, to all eligible employees (spouses or approved domestic partners are also eligible for coverage). The services

More information

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Identity theft and identity fraud are terms used to refer to all types

More information

Identity Theft: World s Fastest Growing Crime!!

Identity Theft: World s Fastest Growing Crime!! Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all

More information

Frequently Asked Questions Guide

Frequently Asked Questions Guide Global Card Access Frequently Asked Questions Guide Table of Contents Section I: General Overview... 2 Section II: Registration... 2 Section III: Alerts... 3 Section IV: Online PIN Check... 5 Section V:

More information

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Program Adoption Purpose Definitions Fitchburg State College (College) developed this Identity Theft Prevention Program to detect,

More information

Benefits Handbook Date March 1, Identity Theft Plan MMC

Benefits Handbook Date March 1, Identity Theft Plan MMC Date March 1, 2010 MMC MMC offers identity theft solutions, supplied by ID TheftSmart, to all eligible employees (spouses or approved domestic partners are also eligible for coverage). The services include

More information

Red Flags Rule Identity Theft Training Program

Red Flags Rule Identity Theft Training Program Red Flags Rule Identity Theft Training Program October 2017 Purpose of Training The purpose of the UA Little Rock Identity Theft Prevention Program is to reduce the exposure of financial and personal loss

More information

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution

More information

Templeton Municipal Light and Water Plant

Templeton Municipal Light and Water Plant Templeton Municipal Light and Water Plant RED FLAG POLICY 1. POLICY It is the policy of the Templeton Municipal Light and Water Plant (TMLWP) that information compiled on all customers and employees is

More information

McDonald Hop kins. January 23, Office of Washington Attorney General Consumer Protection Division 800 5th Ave, Suite 2000 Seattle, WA

McDonald Hop kins. January 23, Office of Washington Attorney General Consumer Protection Division 800 5th Ave, Suite 2000 Seattle, WA McDonald Hop kins A business advisory and advocacy law firm", James J. Giszczak Direct Dial: 248.220.1354 jgiszczak@mcdonaldhopkins.com McDonald Hopkins PLC 39533 Woodward Avenue Suite 318 Bloomfield Hills,

More information

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You. Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing

More information

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Last Reviewed May 24, 2016 AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Reference: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA))

More information

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity Theft Prevention Program Lake Forest College Revision 1.0 Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Reno Police Department, complete a crime report and obtained a police report case number

More information

Learn about identity theft. Investor education

Learn about identity theft. Investor education Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information