Best Practices for Educating & Protecting Your Members in Light of the Equifax Breach
|
|
- Angel Evans
- 5 years ago
- Views:
Transcription
1 Best Practices for Educating & Protecting Your Members in Light of the Equifax Breach October 10, 2017 Presented by: Ann Davidson, VP of Risk Consulting at Allied Solutions & Sally King, Co-founder of NXG Strategies
2 Agenda Latest updates on the Equifax data breach Update on potential fraud exposure What you and your members need to know Key takeaways Q & A
3 Equifax Data Breach Representative Greg Walden was perhaps the harshest in his criticism: I don t think we can pass a law that fixes stupid, he said. Walden further compared the breach to a robbery at Fort Knox, saying Equifax had forgot to lock the doors and failed to notice the thieves were emptying the vaults. Equifax warned of vulnerability but failed to fix it Waited 40 days to tell the public about the data breach! 145 million consumers are at risk! That s what we know today.
4 Polling Question Have you posted or sent out information to your members on the Equifax data breach? Yes No Not Sure
5 Polling Question Do you have a written data breach plan in place? Yes No Not Sure
6 Why is Equifax Different from Other Card Breaches? It is the largest breach to date, with million individuals at risk Neither you nor your members can replace the data that was exposed: Members' name Members' date of birth Members' social security number Members' drivers license number Card numbers (for some of the breached records) In a card breach, you can block and reissue a new card number
7 Equifax Data Breach Vulnerabilities Credit union and member alerts! Be aware of increased phishing attempts using: Phone Text Don t respond, click links or open attachments! How are you authenticating your members today?
8 Fraud Risk Exposures Authentication Risk Identity theft (subsequent identity fraud) New account and account takeover Account takeover leads to money in the bad guys pockets Transaction Risk Payment card fraud debit and credit (card/card number) ACH ODFI & RDFI debit and credit items Wire incoming/outgoing/recurring Paper check deposits Loan fraud Digital fraud A2A, P2P, home banking, bill payment, remote deposit
9 Best Practices for Equifax Data Breach Monitor and follow up on the data breach Uncover and report the fraud type Review your fraud monitoring reports on all fraud Work closely with your vendors to respond immediately Watch closely for subsequent fraud attacks Equifax data breach is high risk Utilize solutions to help respond to your member risk of identity theft Continue to educate both internal staff and external accountholders what to watch. Education is key!
10 Risk Mitigation for Members Monitor all credit accounts and loans Immediately report suspicions Set password/passcode on accounts Set lower daily dollar limits on accounts Watch activity daily Sign up for alert notifications Sign up for the credit bureaus fraud alerting services Sign up for free credit monitoring services Place a freeze on all three credit bureau accounts Sign up for identify theft Stay informed about what happened and what to do
11 New Account Fraud Management Validate all new account information Watch for any type of immediate wire, ACH or new loan requests. Watch for full service deposits at an ATM with immediate withdrawals Verify how cards are being activated Limit the dollar amount on outgoing wires, ACH, and debit card transactions Educate new account holders to be cautious when entering their accounts online and to require personal info not compromised in the breach for account access Recommend that new members create a required password/passcode for access to their accounts
12 New Account Fraud Management Limit the dollar amount on loans Implement multiple layers of authentication; consider using biometrics, security tokens or device authentication Perform extensive authentication prior to approving loans Institute a waiting period on loan, debit card or product applications Require strong passwords for account access Review each new applicant's credit reports in detail Use other authentication measures to confirm the ID is real Train employees about red flags of new account fraud and loan fraud on and ongoing basis Network with peers in the industry if you think a new loan applicant or new account applicant seems suspicious
13 Key Takeaways Better understanding of: Equifax breach Types of potential fraud exposure Action steps to stay aware of what could happen next Solutions to respond to and recover from the Equifax data breach Education, understanding, sharing and networking is key to help all of us work together in order to stay ahead of the fraudsters!
14 Identity Protection in the Post-Equifax Breach World
15 Data Breach Totals Since ,073,490,127 FOUR TIMES the number of adults in the U.S. Yahoo! 3 billion, December 2016 MySpace 360 million May 2016 Equifax million, September 2017 EBay 145 million, May 2014 Target 110 million, November 2013 LinkedIn 100 million, May 2016 AOL 92 million, October 2007 JP Morgan Chase 83 million, October 2013 Anthem 76 million, February 2015 Sony PlayStation Network 77 million, April 2011 Home Depot 53 million, September 2014 TJ Maxx 45.7 million 2007 Ashley Madison, 32 million, August 2015 OPM 21.5 million, July 2015 Experian (T-mobile) 15 million, October 2015 Scottrade 4.6 million, October 2015 UCLA Health 4.5 million, July 2015
16 Additional Recent Breach Incidents September 21 the Securities and Exchange Commission (SEC) disclosed that hackers breached its Electronic Data Gathering, Analysis and Retrieval (EDGAR) system through a software vulnerability and the stolen data was possibly used for illegal stock trading. September 25 Deloitte hit by a cyber-attack, revealing clients non-public information. Hackers possibly accessed usernames, passwords and personal details of the firm s blue-chip clients. Per media reports, the account access authentication simply required a single password and did not have a two-step verification.
17 Cyber Crime is Soaring Compounded annual growth of detected security incidents around the world has increased 66% year-over-year since 2009 Worldwide there are millions of cyber-attacks detected each day Carried out by sophisticated criminal enterprises Source: The Global State of Information Security Survey 2015, a worldwide survey by CIO, CSO and PwC
18 Over 10 billion attacks per day Source: 30 Sept Live cyberattack map showing the top.1% of reported attacks (avg. over 10 million per day) that s a total of over 10 BILLION attacks per day worldwide
19 Monetizing Stolen Data Date of Birth $11 Set of online service credentials $19 Health insurance credentials $20 Credit card with mag stripe or chip data (with freshness date) $20 Name, address, SSN and DOB $15-65 Set of business account credentials $ Loan application/portfolio $250 Sources: 2015 Trend Micro the Global Black Market Prices for US Data SecureWorks Underground Hacker Markets Annual Report, April 2016.
20 Monetizing Stolen Logins itunes Account User Name/Password $11 Fedex.com, Continental.com and United.com accounts $6 Groupon credentials $5 GoDaddy.com, ATT.com, Sprint.com, Verizonwireless.com, Tmobile.com and other wireless provider accounts $4 Facebook and Twitter logins $2.50 Dell.com, overstock.com, Walmart.com, tesco.com, bestbuy.com and target.com $1.50 Sources: 2015 Trend Micro the Global Black Market Prices for US Data SecureWorks Underground Hacker Markets Annual Report, April 2016.
21 Where Criminal Activity Lives 1 % 99% Image licensed for use by NXG Strategies, LLC Surface Web Deep Web Dark Web Google, Facebook, Amazon, Twitter, Instagram, All Search Engines Database-Driven Information (Academic Information, Medical Records, Govt Docs, Intranets) Stolen Data Trafficking through Online Criminal Storefronts, Drug Trafficking, Terrorist Group Communications, etc.
22 Online Criminal Data Merchants Online stores sell stolen card numbers, and print and sell with plastic Includes fake chip (i.e. fallback) Sold by quantity ( dumps ) Grouped by state Grouped by BIN Includes freshness date Check-out with Bitcoins, Western Union, Money Gram Advertised sales Money-Back guarantees Operated from countries with no extradition treaty with U.S.
23 Examples: Criminal Storefronts From:
24 Source: Federal Trade Commission Criminals will post samples of stolen data on websites in order to make the data public as an advertisement. How fast will identity thieves use the stolen info? Answer: 9 minutes
25 FTC Research Study May fake consumers in a database were loaded to a website used by hackers to make stolen credentials public Names, addresses, addresses, phone numbers and payment information (bitcoin wallet, credit card or online payment service) There were 1,200 attempts to use the stolen data, beginning only 9 minutes after posting Thieves tried to buy clothing, games, online dating memberships and even pizza Two-factor authentication prevented the thieves from being successful
26 Dark Web Scan Offers 26
27 Dark Web Monitoring Monitors malicious command and control networks, black market forums, known compromised machines and servers, phishing networks and exploited websites SSN, Name, Address, DOB address, user name, passwords Other credentials Credit card numbers Bank account numbers Passport number Insurance contract numbers Professional license numbers Gaming credentials Other identifying information
28 EXAMPLE: Compromised Corporate /Passwords Actual dark web search of one bank s (Includes number of user names/passwords found using financial domain and to which hack it was attributed)
29 Not All Dark Web Monitoring is Alike Some services use non-malicious Botnets (internet robots) scour the surface web looking for exposed data. Others use both botnets and human operatives who infiltrate criminal networks to gather stolen data, compare transactions and determine common points of compromise to alert an organization of a breach. Dark web monitoring uses the rich cache of data collected by botnets AND operatives to alert registered consumers. YAHOO BREACH: Dark Web Monitoring notified hundreds of thousands of Yahoo users with Dark Web Monitoring about the breach 6 months before the official announcement from Yahoo.
30 30
31 High Risk Transactions Monitoring Monitors for Knowledge-Based Authentication process during a high risk transaction in a network of participating organizations Provides an alert if the credentials used match a registered subscriber Consumer can respond with me or not me Not me response goes back to the organization conducting the transaction Online authorization Account management activity Password reset Online transfer Online purchase Loan application Medical billing request Address change Fraud inquiry New accounts Change of account ownership
32 Credit Freeze Restricts access to your credit report Must request to lift the freeze if applying for a job, renting an apartment, buying insurance, etc. Contact EACH agency (Equifax, Experian, TransUnion) Supply your name, address, date of birth, SSN and other personal information. Fees vary based on where you live, but commonly $5 - $10 Receive PIN (personal identification number) or password from EACH agency or password. Keep this in a safe place. You will need it if you choose to lift the freeze. To lift you must contact all three bureaus unless you know which bureau(s) a potential employer, creditor or insurance company will contact for your report.
33 Credit Monitoring Monitors for changes in your credit file and alerts of the change typically via and SMS text message One bureau or three bureau monitoring available Does NOT provide an alert of account takeover Does NOT provide an alert of noncredit identity theft, which more than half of all identity theft
34 Federal Trade Commission Report Financial Fraud Total: 50% Non-Financial Fraud Total: 71% Based on 399,225 consumer complaints. NOTE: 25% of identity theft complaints have more than one type of identity theft Source: Federal Trade Commission Consumer Sentinel Report, February 2017
35 Professional Identity Recovery CASE ASSIGNMENT Dedicated Identity Recovery Advocate assigned upon case submission Victim provided direct /phone No time limit for recovery INITIAL CONTACT & RESEARCH Assist with fraud alert placement Assist with police report filing Credit reports reviewed DOCUMENTATION Assist with Fraud Affidavit Educational materials Offers Limited Power of Attorney (LPOA) Free Credit Monitoring During Recovery REMEDIATION Advocate will contact creditors, government agencies, and others for the consumer RECOVERY Petition to expunge any fraudulent records created by the crime Obtain credit reports to validate FOLLOW-UP Advocate will follow-up with the consumer for 12 months Free Credit Monitoring after case is closed for 12 months
36 Financial Institution Assets at Risk
37 Time for Questions! If you have remaining questions that were not addressed today, please reach out: To receive ongoing education on industry-related topics: Sign-up for our fraud education newsletter: Sign-up for our corporate newsletter: Follow us on social media
Equifax Data Breach: Your Vital Next Steps
Equifax Data Breach: Your Vital Next Steps David A. Reed Partner, Ann Davidson Vice President Risk Consulting/ Bond Division Allied Solutions, LLC Do You Remember When this Was the Biggest Threat to Data
More informationDig Deep into the Root Causes of Fraud to Prevent Future Attacks
Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Presented by: Ann Davidson, VP of Risk Consulting at Allied Solutions & Tammy Behnke, Credit Union Program Director at ProSight Specialty
More informationSAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
More informationIdentity Theft Protection Plans
Identity Theft Protection Plans V E R I F Y P R O T E C T R E C O V E R IN 2017, DATA BREACHES REACHED ECONOMIC PROPORTIONS A victim may need to spend time at work trying to recover their good name and
More informationIDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018
IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,
More informationKasasa Protect. FAQ and Product Overview
Kasasa Protect FAQ and Product Overview Kasasa Protect... 3 Key Contact Info... 3 Included Benefits... 3 Credit Reporting... 4 Monthly Credit Score & Plotter... 4 24/7 Credit Monitoring... 5 Full-Service
More informationDeluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities.
Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. deluxe growth services introduction Identity thieves are extending beyond credit relationships and are more
More informationc» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:
Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security
More informationIDShield National Plan Benefit Overview
IDShield National Plan Benefit Overview IDShield is an industry leader in identity theft protection, monitoring and restoration services. Through IDShield, participants receive a comprehensive set of identity
More informationUp for Grabs: Taking Charge of Your Digital Identity
Up for Grabs: Taking Charge of Your Digital Identity AARP Wisconsin Survey of Internet Users Age 18+ Report prepared by Karla Pak, Doug Shadel, and Alicia Williams August 2018 https://doi.org/10.26419/res.00228.022
More informationProtecting against and recovering from fraud and identity theft WHAT TO DO
Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls
More informationThree D s of safeguarding your personal data
Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D
More informationUp for Grabs: Taking Charge of Your Digital Identity
Up for Grabs: Taking Charge of Your Digital Identity AARP Nebraska Survey of Internet Users Age 18+ Report prepared by Karla Pak, Doug Shadel, and Alicia Williams August 2018 https://doi.org/10.26419/res.00228.014
More informationUp for Grabs: Taking Charge of Your Digital Identity
Up for Grabs: Taking Charge of Your Digital Identity AARP Kentucky Survey of Internet Users Age 18+ Report prepared by Karla Pak, Doug Shadel, and Alicia Williams August 2018 https://doi.org/10.26419/res.00228.007
More informationIt s not going away. (c) 2014 huberis.net. Identity Theft
It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity
More informationIdentity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office
Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission
More informationIdentity thieves use a variety of ways to gain access to your personal information:
How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into
More informationFrequently Asked Questions
Frequently Asked Questions How do you monitor my identity? We use our exclusive software to proactively monitor various sources for suspicious activity. With PrivacyArmor : You will be able to set thresholds
More informationID Theft Toolkit and Affidavit
ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information
More informationUp for Grabs: Taking Charge of Your Digital Identity
Up for Grabs: Taking Charge of Your Digital Identity AARP Louisiana Survey of Internet Users Age 18+ Report prepared by Karla Pak, Doug Shadel, and Alicia Williams August 2018 https://doi.org/10.26419/res.00228.008
More informationUNIT 3-4 Preventing Identity Theft
UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information
More informationEmployee Identity Theft Plans for Issues Management dba Five Star Call Center. Prepared by LegalShield June 26, 2018 Proposal valid for 180 days.
Employee Identity Theft Plans for Issues Management dba Five Star Call Center Prepared by LegalShield June 26, 2018 Proposal valid for 180 days. Sean Rooney National Sales Director LegalShield Business
More informationIdentity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.
Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should
More informationFrequently Asked Questions
Frequently Asked Questions How do you protect my identity? We use our proprietary software to proactively monitor various sources. Through PrivacyArmor, you will also have the power to create thresholds
More informationA Definitions: Europ Assistance USA, Inc East-West Highway, Suite 1000, Bethesda, Maryland 20814
This website is owned and/or operated by Europ Assistance USA, Inc. and is subject to the terms of use, privacy policy, and other legal notices posted on their website, which you should read before proceeding.
More informationUp for Grabs: Taking Charge of Your Digital Identity
Up for Grabs: Taking Charge of Your Digital Identity AARP Massachusetts Survey of Internet Users Age 18+ Report prepared by Karla Pak, Doug Shadel, and Alicia Williams August 2018 https://doi.org/10.26419/res.00228.009
More information10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office
Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing
More informationDrexel and FMFCU. Presented By
Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission
More informationServices and Features
Services and Features IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific services and features.
More informationProtecting Yourself from Fraud including Identity Theft Advanced Level
Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial
More information97 % of consumers surveyed expect their FI to help protect their financial assets from fraud. 2
Deluxe Provent: Protecting against expanded threats. Providing for expanded opportunities. Introduction Identity thieves are smarter and more organized than ever before, claiming over 12.6 million victims
More informationGet back your good name. Refuse to be a target of identity crime again.
Clear Your Good Name After Identity Crime You suspect that someone is using your name and personal identification information for unlawful purposes. This kit can help you resolve your identity crime case
More informationHere is some more information on the Equifax Breach and how you may protect yourself in the aftermath...
UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal
More informationEquifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet:
Before you start Telephone calls and other forms of direct communication: Use the worksheet included in this packet to keep a record of all conversations. When reporting fraud or communicating with law
More informationIdentity Theft: Protecting, Monitoring and Resolving
Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA
More informationROCHESTER INSTITUTE OF TECHNOLOGY
ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3
More informationServices & Features for Employee Benefit Members
Services & Features for Employee Benefit Members IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific
More informationVisa s Approach to Card Fraud and Identity Theft
Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting
More informationOhio Conference of Payroll Professionals
Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number
More informationYear-end 2016 fraud update: Payment cards, remote banking and cheque
Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments
More informationWHEN BAD THINGS HAPPEN TO YOUR GOOD NAME
WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card
More informationProvided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer Survey presented by RateWatch
Accurate Financial Data Since 1989 Security Breaches and Identity Theft Consumer Actions and Opinions Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer
More informationProtect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently
Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity
More informationGet the most out of your membership
PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account
More informationIDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008
IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 Introduction: Under the Fair and Accurate Credit Transactions Act (FACT Act), financial institutions (and creditors) that offer or maintain covered accounts
More informationEastpointe Community Credit Union Identity Theft and Deterrence Policy
Eastpointe Community Credit Union Identity Theft and Deterrence Policy Areas of Responsibility: Management/Operations Board Approval December 14, 2016 Board Review: December 14, 2016 Last Revision: December
More informationPrivacy and Security Issues Facing Qualified Retirement Plans
SECURIAN FINANCIAL 1 Privacy and Security Issues Facing Qualified Retirement Plans Theodore Schmelzle, JD, CIPP/US Senior Director, Retirement Solutions November 2018 SECURIAN FINANCIAL 2 Agenda Why advisors,
More informationIdentity theft can occur even if you have been careful about protecting your personal information.
Dear Customer, Identity theft can occur even if you have been careful about protecting your personal information. If you suspect you have been a victim of identity theft, a fraud, or a scam, we have prepared
More informationHacking Healthcare: Attacks on the Highest Value Asset
Hacking Healthcare: Attacks on the Highest Value Asset Paul Dant Chief Strategy Officer Independent Security Evaluators The Key Takeaway Who am I? Paul Dant Chief Strategist @ ISE 9: First digital product
More informationO P C S. OPCS Overview 9/28/2017 (OPCS) The implementation of the Ohio Pooled Collateral System creates a unique partnership between:
O P C S (OPCS) opcs.ohio.gov 1 OPCS Overview The implementation of the Ohio Pooled Collateral System creates a unique partnership between: Treasurer s Office Financial Institutions Local Governments opcs.ohio.gov
More informationOffice of Privacy Protection Safeguarding Information for Your Future
W I S C O N S I N Office of Privacy Protection Safeguarding Information for Your Future Credit report security freeze Wisconsin consumers have the right to place a security freeze on their credit reports.
More informationFinancial Crime: Awareness & Prevention. Jon Jarosinski
Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit
More informationWhat to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP
LIFELOCK MEMBER EXPECTATIONS GUIDE 800-607-91744 LifeLock.com What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP THE LIFELOCK MEMBER COMMUNICATION EXPERIENCE Signing up
More information2017 annual fraud update:
2017 annual update: Payment cards, remote banking, cheque and authorised push payment scams March 2018 The threat from is always changing, but the finance industry is continuously enhancing its response,
More informationJanuary to June 2016 fraud update: Payment cards, remote banking and cheque
January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.
More informationIdentity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation
Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an
More informationSlide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?
Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is
More informationSelected Terms & Conditions for Wells Fargo Consumer Debit and ATM Cards
Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM s Terms and Conditions effective 04/24/2017. Introduction page 1 Using Your page 2 Using Your Through a Mobile Device page 4 One-Time
More informationTrue Identity Protection. Identity Theft & Fraud Protection Proposal ID WATCHDOG. Presented To: Presented By:
Identity Theft & Fraud Protection Proposal ID WATCHDOG Presented To: Presented By: Identity Theft Protection as an Employee Benefit ID Watchdog is a leading provider of comprehensive identity monitoring
More informationPalomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS
1 STUDENT SERVICES 2 3 AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 References: Fair
More informationIdentity Protection Services
Identity Protection Services Overview Why are identity protection services being provided? We believe your personal information should stay that way personal. That s why we re taking industry- leading
More informationBank Secrecy Act OFAC FinCEN
Bank Secrecy Act OFAC FinCEN 2017 CREDIT UNION EMPLOYEE TRAINING Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer Identification Program Customer Due Diligence
More informationBank Secrecy Act OFAC FinCEN
Bank Secrecy Act OFAC FinCEN SOUTHEAST DIRECTORS AND SUPERVISORY COMMITTEE CONFERENCE SEPTEMBER 18, 2017 Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer
More informationLifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET
LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET 1-877-511-7906 LifeLock.com/Business FACT SHEET LifeLock Benefit Elite LifeLock
More informationEdward J. Finn 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax:
Edward J. Finn 1275 Drummers Lane, Suite 302 Office: 267-930-4776 Wayne, PA 19087 Fax: 267-930-4771 Email: efinn@mullen.law VIA U.S. MAIL AND EMAIL Office of the Attorney General 1125 Washington Street
More informationIdentity Theft.
Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.
More informationRed Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010
Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Princeton University employees are responsible for detecting Red Flags consistent with
More informationNotification of Rights for Texas Consumers
Notification of Rights for Texas Consumers The Texas Business and Commerce Code requires that Texas consumers be given notice of their rights with written disclosure. You have the right to obtain a copy
More informationIdentity Protection 101: Protect your good name from identity theft.
Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social
More informationDAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.
DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box 777 - Lexington, Nebraska - 68850 Tel. No.- 308/324/2386 Fax No.-308/324/2907 CUSTOMER POLICY IDENTITY THEFT PREVENTION I. OBJECTIVE Page
More informationID Theft Security. Michael G. Solomon. CISSP PMP CISM
ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible
More informationB. The College is considered a "creditor" under the Red Flags Rule because it defers payment for services rendered.
COLLEGE of CENTRAL FLORIDA ADMINISTRATIVE PROCEDURE Title: Identity Theft Prevention Program Procedure Page 1 of 5 Implementing Procedure For Policy # # 2.04 Date Approved: 07/07/11 Division: Administration
More informationState of Card Fraud: 2018
State of Card Fraud: 2018 A deep dive into the evolution of card fraud + industry benchmark data for financial institutions. Stopping Fraud at the Speed of Data Continuing the trend of prior years, the
More informationSubject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New
Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),
More informationv ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service
www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director pierson Technological advances of the
More informationRecognizing Credit Card Fraud
1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended
More informationEQUIFAX DATA BREACH WHAT YOU NEED TO KNOW
EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW The Denver District Attorney's Office has been working closely with the Colorado Bureau of Investigations to provide you the most up-to-date information on the
More information2012 Payments Fraud Survey
2012 Payments Fraud Survey Consolidated Results Payments Information & Outreach Office Federal Reserve Bank of Minneapolis September 25, 2012 Topics Survey Methodology & Respondent Profile Fraud Attempts
More informationPRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.
PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity
More informationSelected Terms & Conditions for Wells Fargo Business Debit, ATM and Deposit Cards
Selected Terms & Conditions for Wells Fargo Debit, ATM and Deposit Cards Terms and Conditions effective 04/24/2017. Introduction page 1 Using Your Card page 2 Using Your Card Through a Mobile Device page
More informationIT Security Roundtable on recognizing scams and dealing with identity theft Important to file a report with the police (aka Identity Theft Report)
IT Security Roundtable on recognizing scams and dealing with identity theft Kansas State University March 7, 2008 Harvard Townsend. IT Security Officer Speaker Notes 1. Email scams sent last week to K-Staters
More informationFraudulent Check, Credit Card Fraud and ID Theft Guide
Fraudulent Check, Credit Card Fraud and ID Theft Guide COLLECTING BAD CHECKS The police involvement in bad check cases is for the sole purpose of investigating the incident to determine whether or not
More informationCompliance With the Red Flags Rules
For Audio Participation, Please Call 1.866.281.4322, *1382742* Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321
More informationTAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT
TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity
More informationPOLICY: Identity Theft Red Flag Prevention
POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information
More informationBenefits Handbook Date November 1, Identity Theft Plan MMC
Date November 1, 2010 MMC MMC offers identity theft solutions, supplied by ID TheftSmart, to all eligible employees (spouses or approved domestic partners are also eligible for coverage). The services
More informationIdentity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit
Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Identity theft and identity fraud are terms used to refer to all types
More informationIdentity Theft: World s Fastest Growing Crime!!
Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all
More informationFrequently Asked Questions Guide
Global Card Access Frequently Asked Questions Guide Table of Contents Section I: General Overview... 2 Section II: Registration... 2 Section III: Alerts... 3 Section IV: Online PIN Check... 5 Section V:
More informationFitchburg State College Identity Theft Prevention Program updated 11/17/09
Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Program Adoption Purpose Definitions Fitchburg State College (College) developed this Identity Theft Prevention Program to detect,
More informationBenefits Handbook Date March 1, Identity Theft Plan MMC
Date March 1, 2010 MMC MMC offers identity theft solutions, supplied by ID TheftSmart, to all eligible employees (spouses or approved domestic partners are also eligible for coverage). The services include
More informationRed Flags Rule Identity Theft Training Program
Red Flags Rule Identity Theft Training Program October 2017 Purpose of Training The purpose of the UA Little Rock Identity Theft Prevention Program is to reduce the exposure of financial and personal loss
More informationIdentity Theft. Help Your Students Avoid This Epidemic Sun Ow
Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution
More informationTempleton Municipal Light and Water Plant
Templeton Municipal Light and Water Plant RED FLAG POLICY 1. POLICY It is the policy of the Templeton Municipal Light and Water Plant (TMLWP) that information compiled on all customers and employees is
More informationMcDonald Hop kins. January 23, Office of Washington Attorney General Consumer Protection Division 800 5th Ave, Suite 2000 Seattle, WA
McDonald Hop kins A business advisory and advocacy law firm", James J. Giszczak Direct Dial: 248.220.1354 jgiszczak@mcdonaldhopkins.com McDonald Hopkins PLC 39533 Woodward Avenue Suite 318 Bloomfield Hills,
More informationContents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.
Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing
More informationAP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS
Last Reviewed May 24, 2016 AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS Reference: 15 U.S. Code Section 1681m(e) (Fair and Accurate Credit Transactions Act (FACT ACT or FACTA))
More informationIdentity Theft Prevention Program Lake Forest College Revision 1.0
Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:
More informationIdentity Theft Victim s Packet
Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Reno Police Department, complete a crime report and obtained a police report case number
More informationLearn about identity theft. Investor education
Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the
More information