Understanding Identity Theft

Size: px
Start display at page:

Download "Understanding Identity Theft"

Transcription

1 Understanding Identity Theft Learn How to Protect Yourself and Your Business A FREE E-book by the Nations Authority on Collecting Money, Michelle Dunn

2 Understanding Identity Theft, learn how to protect yourself and your business Never Dunn Publishing, LLC Plymouth, New Hampshire By Michelle Dunn 2008 Michelle Dunn Published by: Never Dunn Publishing LLC PO Box 40 Plymouth, NH All rights reserved. No part of this book may be reproduced in any form or by any means, without written permission by the author and publisher. This book is designed to provide accurate and authoritive information in regard to the subject matter covered. It is distributed with the understanding that the author is not engaged in rendering legal advice or services. If legal advice is required, please see your attorney. 1

3 Printed in the United States of America. This book is designed to provide information to help you deal with identity theft. It is sold with the understanding that the publisher and author are not giving legal, accounting or other professional advice or services. The content of this book is based on my own personal research and experience. If legal or other assistance is required, please see your attorney or accountant. Every effort has been made to make this book as accurate as possible. However, there may be mistakes. This book is sold as a guide with what information is current as of the date of the original printing. January This book is sold to provide information and guidance. Never Dunn Publishing, LLC and Michelle Dunn shall have no liability or responsibility to any person or entity for any damage or alleged damage caused directly or indirectly by the information contained in this book. Copyright Michelle Dunn No parts of this book can be copies or reproduced without the written permission of the author. 2

4 Table of Contents Chapter One How the new Red Flag Rules impact your business and 11 things you need to do about it now Chapter Two Are you at Risk for Identity Theft? Learn How to Protect Yourself Chapter Three How can you tell if a money order is fraudulent? Chapter Four How do these people get my name? Chapter Five How can I prevent Identity Theft from happening to me? Chapter Six What can you do If you are a victim of Identity theft? Chapter Seven Resources 3

5 Chapter One How the new Red Flag Rules impact your business and 11 things you need to do about it now The Red Flag Rules are rules that apply to financial institutions and creditors who offer or maintain one or more covered accounts. The rules specifically mandate that these financial institutions and creditors create and implement identity theft prevention programs to identify, detect and respond to patterns, practices or specific activities that could indicate identity theft. The Red Flag Rule was developed in accordance with the Fair and Accurate Credit Transactions Act of Under the rule, financial institutions and creditors with covered accounts, accounts that involve making payments on account, must have identity theft prevention programs to identify anything that could lead to identity theft. If you extend credit to your customers or clients, you will have to follow these Red Flag Rules which will be enforced by the Fair Trade Commission and will be in effect on May 1, According to the FTC, any entity that regularly extends, renews or continues credit, or any creditor that is involved in the decision to extend credit must comply with this rule. Examples of creditors who may need to put the Red Flag Rules into place for their businesses are: Finance companies Automotive dealers Mortgage brokers Utility companies Oil companies Telecommunications companies Just what are the Red Flags? According to the FTC s final rule, the red flags can be but are not limited to: Alerts, notifications or warnings from a consumer credit reporting agency. Suspicious documents, such as those that may appear to be forged. Suspicious personal information, such as a social security number that is off, or doesn t exist, or is listed on the Social Security Administrations Death Master File. Receiving requests for new, additional or replacement credit cards, debit cards, cell phones or adding authorized users after receiving a change of address form. Address discrepancies Unusual credit activity, such as increased inquiries. Signatures that are inconsistent with information on file. Information on an ID not matching any address on a credit report. 4

6 Drastic changes in payment patterns. Mail being returned for an undeliverable address yet the account is being used. Customers reporting that they are not receiving bills or statements. The FTC estimates that as many as 9 million Americans have their identities stolen each year, leading to over $56.6 billion in costs. According to the Better Business Bureau, the average amount lost to fraud per case has increased from $5,249 in 2003 to $6,383 in If you are a business that extends credit to customers and do not comply with the Red Flag Rules a civil penalty ca be up to $2,500 per violation to be enforced by the FTC. The FTC will enforce the Red Flag Rules based on consumer complaints. What you can do to comply: 1. Keep customers sensitive personal information secure. 2. Take stock what personal information do you have in your files and computer. 3. Clean out and throw away any outdated or personal information on customers that you no longer need buy a shredder. 4. Write a plan that is easy to follow and that will help you to respond to any security incidents. 5. Require employees to log out in computer programs that have personal customer information, after they are done accessing that information. 6. Use only one computer to store personal customer information and limit access to it. 7. Keep up to date on alerts and vulnerabilities to your computer by visiting 8. Never give out any personal customer information over the phone or in s. 9. Change computer passwords frequently 10. Train employees, visit for a tutorial or If you outsource any business functions- investigate that company s data security policies and practices and compare them to yours, visit their facilities if possible. If you have signed credit applications, personal guarantees, or any paperwork with personal information for your customers, keep it under lock and key. This can include invoices, receipts or statements. Take stock of what personal information you have in your file cabinets, computers, laptops, flash drives, disks, s and anywhere else your company stores sensitive data, Once you have a clear picture of what you are dealing with, it will be much easier to create a plan. Decide who in your business will have access to this information and who will not. Make a firm decision and enforce it. Limit who has a key and limit the number of keys. 5

7 When you are taking stock, if you find you don t need some of the personal information you have on some customers, get rid of it. Shred it and toss it. This paperwork might look like a bunch of trash to you but it is a gold mine for an identity thief! When you are putting your plan into writing remember to list who to notify in the event of a security incident. This might include the customer, or consumer, law enforcement, your attorney, the credit bureaus or other business owners that might be affected by a breach. Your plan doesn t have to be long and complicated, it should be written according to your company s size and complexity. Your plan must: Designate one or more employees to coordinate the information security program, or be in charge of the program. Identify and assess any risks to customer information and evaluate the effectiveness of your current safeguards for controlling those risks. Write and implement a safeguards program, as well as monitor and test it regularly. For example, what will you do if someone s identity is stolen and what do you do now to prevent identity theft? Screen service providers that meet your security measures and make sure they maintain those safeguards, and oversee their handling of your customer s personal information. Evaluate and adjust the plan as things change within your business, with the law or as the result of security testing and monitoring. Your plan can be a single page, or multiple pages with many chapters. Make sure you identify any unique risks your company might have, depending on the nature of your business. If you have employees that work from home, research and write a specific plan for those computers, s and employees. 6

8 Chapter Two Are you at Risk for Identity Theft? Learn How to Protect Yourself Identity Theft is America s fastest growing type of robbery. There have been an estimated 9.9 million victims in America and over 40% of all consumer complaints in the U.S. involve identity theft. About half of the victims do not know how the thief obtained their personal information. The Boston Globe and Newsweek have both covered Identity theft telling us how important it is for us to educate ourselves on preventing and protecting ourselves from this type of robbery. Identity theft can happen anytime, anywhere and to anyone, individuals or businesses. Everyone must be educated and aware so it can be avoided. Michael Blanchard, US Postal Inspector says postal money orders and business or certified checks are one way you can be at risk. Most identity theft involves the U.S. Mail which is why the U.S. Postal Inspection Service is a lead agency in investigating Identity Theft. Identity Theft is a criminal offense. Some scams are internet related, you go into a chat room and chat with people there, someone approaches you as a friend, or about an auction. You become comfortable with these people you are chatting with and start a friendship. The person who has befriended you may tell you such things as, I am in the Peace Corp, and I have a money order that I can t cash where I am, which is Lagos or Nigeria. They may ask you if they send you the money order, if you will cash it and send them the money. This is a scam. The money order you receive can be fraudulent, once you cash and send the money you are out this money once the bank realizes the money order was no good. Another scenario might be if you sell items at online auctions. Someone may you about your item that is for sale. They will tell you that they want to purchase your item, and they are in Nigeria so they will send you extra money to pay for a shipper to send the item to them. They will send you a counterfeit money order or check and ask you to cash eh check and wire the extra money to them so they can pay the shippers to ship your item. They may even ask you to go to a bank to cash the money order rather than the post office. The reason for this is that the post office has a machine that can tell if the money order if fake and they have much more experience with money orders than banks do. Many of these types of scams originate in Nigeria, London and Toronto. If you are aware of this, you can prevent this from happening to you. Most thieves still obtain personal information through traditional rather than electronic channels. In the cases where the method was known, 68.2% of information was obtained off-line versus only 11.6% obtained online. If you receive a fraudulent money order and take it to a bank, rather than the post office, a bank can take a month or more before they notify you that the money order is fake. If this happens, you are then responsible for the funds. If you do get caught up in this 7

9 situation, take your money order to a post office rather than a bank, it is not guaranteeing you will not be taken but it lowers your chances. Chapter Three How can you tell if a money order is fraudulent? Fake money orders to not have a water mark. Hold up the money order to the window or light, can you see the portrait, on the left side? This portrait needs to be backlit by light to be seen and cannot be mimicked. Some producers of fake money orders try to use fake pictures as a water mark; you will be able to tell if you hold it up to the light. These money orders are generally printed in Nigeria, they use the same offset press we use to print real money orders, so check your money orders! You can also check for type size, color and fonts. Another step you can take is to call or go online to the Post Office and give them the serial number off of the money order; they can tell if it is real. If you receive a counterfeit money order, you will want to give it to the post office or police. Possession of a counterfeit item is a felony. Other scams include receiving an or letter stating you have won a lottery, or a prize notification. Some letters or announcements will arrive with a counterfeit check and you pay a processing fee to get the prize. These checks are counterfeit; never send money to anyone who is asking for money from you in order to give you money, whether it is disguised as a prize or lottery. Any prize that requires you to pay anything is no prize. Chapter Four How do these people get my name? If you have a credit card, your name is sold to third parties, if you do not want this to happen, you must contact your credit card companies to inform them that you do not want your information sold. Check the privacy notice that comes with your bill. If you enter contests, your information becomes public. Also, when you buy a new product, and fill out the warranty cards, those companies sell that information you provide to other companies. Since when does your toaster manufacturer need to know your households 8

10 annual income to extend a warranty on your toaster? Thieves use dumpster digging, phishing, and pharming to obtain your information. Things they steal from your trash include: Pre-approved credit card offers they complete them and have the card send to them at a different address. Loan applications they complete the application and have the money sent to a phony address. Bank statements they then have your bank account number and can print counterfeit checks. Becky Palmer, a Consumer Credit Counselor, knew of someone who had their wallet stolen, and they used the credit card to buy a $ gift card at Wal mart, this then becomes very hard to trace. People that are more at risk are senior citizens, people with disabilities and immigrants, but remember that everyone, including children are at risk. Senior citizens are home all day; they might get a phone call from a fake charity asking for money. Immigrants are desperate for credit, they may have just arrive din the US and know they need credit to do anything and are not aware of these scams. People with disabilities are home, and may become a victim of phone or online fraud. There have also been cases of home care providers taking advantage of their clients. Remember, it is not always a stranger that can steal someone s identity. Di you know children can be victims of identity theft? This could affect or ruin their credit before they even are able to build up credit for themselves. There have been cases of parents using a child s name for their electric bill or phone bill when they have bad credit or owe the utility company money. Thieves will obtain the social security number of these children then use that number to get credit cards and rack up purchases. Some of these scammers will call you and say they are form a factious charity. They will offer to have your contribution automatically deducted from your checking account and will ask for your routing number, bank name and account number. DO NOT GIVE OUT THIS INFORMATION! If you pick up a call from a telemarketer, ask them the following questions and if they are a fraud, they will hang up quickly: Who do you work for? They will try to give you the name of the fake charity here, so ask them, Who pays your salary? How much of my donation (percentage) goes to this charity and what is the rest of the money used for? If they are for real, they can easily give you this information. What is the charity s full name, address, phone number and website? Once you have the above information you can check with the state attorney generals office or secretary of state to see if the charity is registered. Also check the charity s rating thru the Better Business Bureau at 9

11 Chapter Five How can I prevent Identity Theft from happening to me? Never leave your receipt or slip in the ATM or gas pump. Pay attention to your habits, lock up or organize and file your bills and bank statements. Shred them using a cross shredder before throwing them away. Some steps you can take to avoid becoming a victim of Identity Theft are: Get a copy of your credit report from all three credit bureaus. Opt out of mailing lists by contacting the credit bureaus. Opt out by reading eh privacy notice that comes with your credit card and following the instructions. Call the National Do Not Call Registry at or visit and be sure to call from the number you want to register. Do not carry your Social Security Card in your wallet. Do not print your Social Security number on your checks. Do not get your Social Security number printed on your driver s license. Do not carry your medicade card with you, Medicade # s are your Social Security number. Delete any s from Nigeria, or lottery or prize notifications, do not open them. Stop credit card offers by calling OPT-OUT Remove your name from National mailing lists by visiting Install firewall and virus protection software on your computer. Password protect your computer and private personal files. Format your hard drive or physically destroy it when disposing of your old computer. When you order new checks, get your first initial printed on them instead of your first name. Use a cross shredder to shred your bills and bank statements or any junk mail. Bring your mail to the post office or a secure mail box rather than leaving it in a rural box. Use only one designated credit card for online purchases. Be sure all online purchases are made through a secure server notice the lock icon and how the URL address changes from http to https. The S means SECURE. Do not carry your PIN# in your wallet. Do not use your date of birth as a password or PIN. Do not give out personal or financial information over the phone. Grind up or shred back up CD s you are throwing away. 10

12 Check your online banking account at least 3 times a week and change your password often. Chapter Six What can you do if you are already a victim of ID theft? Contact the fraud departments of the three major credit bureaus, to place a fraud alert on your credit file. Close all accounts that have been affected and request copies of frau-dispute forms and complete and return them immediately. KEEP COPIES! File a police report in each jurisdiction the theft occurred. Send copies of the report tot your creditors or anyone that requires proof of the crime. File a complaint with the FTC at or call 800- IDTHEFT and the post office. Contact the Identity Theft Resource Center at or Request a new driver s license from the state of motor vehicles and have a fraud report attached to your driving record. Notify check-verification firms about any fraudulent checks: International check service Call CALL-FCC and file a complaint. Change your passwords and PIN immediately. Be aware that 40 million crooks obtained credit card numbers this past year, Be Suspicious ; also be aware that most identity theft is not reported, especially when it involves family members, so the statistics are off. These statistics show that consumers lost $5 billion last year when in actuality it is closer to $50 billion. There have been an estimated 9.9 million victims in America. 11

13 Chapter Seven RESOURCES For more information on the rules or to educate yourself or your staff contact Michael Barnett at Barnett Training, or visit the FTC website at U.S. Postal Inspection Service Federal Trade Commission IDTHEFT or TTY U.S. Secret Service Department of Justice Federal Deposit Insurance Corporation Equifax Experian Trans Union Training or 12

14 About Michelle Dunn Michelle Dunn helps companies that want to have customers that pay on time or early, she works with companies that are struggling with customers that pay late or don t pay. Michelle has over 21 years experience in credit & debt collection, is the author many books and possesses a depth of knowledge and a whole tool kit of products and services that can make a big difference for your company 13

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

UNIT 3-4 Preventing Identity Theft

UNIT 3-4 Preventing Identity Theft UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information

More information

WHAT DO MANY OF US HAVE IN COMMON WITH. Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise

WHAT DO MANY OF US HAVE IN COMMON WITH. Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise WHAT DO MANY OF US HAVE IN COMMON WITH Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise IDENTITY THEFT: protecting ourselves and our clients Presented by: Eric Albert, Rhonda Davis, Kevin

More information

IDENTITY THEFT PROTECT YOUR MONEY

IDENTITY THEFT PROTECT YOUR MONEY IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that

More information

Identity Theft.

Identity Theft. Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.

More information

Identity Protection 101: Protect your good name from identity theft.

Identity Protection 101: Protect your good name from identity theft. Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social

More information

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You. Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing

More information

GREENPATH FINANCIAL WELLNESS SERIES

GREENPATH FINANCIAL WELLNESS SERIES GREENPATH FINANCIAL WELLNESS SERIES IDENTITY THEFT Empowering people to lead financially healthy lives. TABLE OF CONTENTS What is Identity Theft?...2 How Identity Theft Occurs...3 How Identity Thieves

More information

ID Theft Security. Michael G. Solomon. CISSP PMP CISM

ID Theft Security. Michael G. Solomon. CISSP PMP CISM ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible

More information

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

Drexel and FMFCU. Presented By

Drexel and FMFCU.   Presented By Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission

More information

Identity theft can occur even if you have been careful about protecting your personal information.

Identity theft can occur even if you have been careful about protecting your personal information. Dear Customer, Identity theft can occur even if you have been careful about protecting your personal information. If you suspect you have been a victim of identity theft, a fraud, or a scam, we have prepared

More information

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet:

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet: Before you start Telephone calls and other forms of direct communication: Use the worksheet included in this packet to keep a record of all conversations. When reporting fraud or communicating with law

More information

Get the most out of your membership

Get the most out of your membership PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account

More information

IDENTITY THEFT ADDITIONAL INFORMATION FORM Submittal Instructions

IDENTITY THEFT ADDITIONAL INFORMATION FORM Submittal Instructions IDENTITY THEFT ADDITIONAL INFORMATION FORM Submittal Instructions You may disregard the following instructions if no further police investigation is needed because the filing of the online Identity Theft

More information

GreenPath Financial Wellness Series

GreenPath Financial Wellness Series GreenPath Financial Wellness Series IDENTITY THEFT Through financial knowledge and expertise, we provide high-quality products and services that enable people to enjoy a better quality of life. Smart financial

More information

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW The Denver District Attorney's Office has been working closely with the Colorado Bureau of Investigations to provide you the most up-to-date information on the

More information

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal

More information

ROCHESTER INSTITUTE OF TECHNOLOGY

ROCHESTER INSTITUTE OF TECHNOLOGY ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3

More information

Preventing Senior Scams. Welcome. MoneyWi$e is a joint financial education project of Consumer Action and Capital One

Preventing Senior Scams. Welcome. MoneyWi$e is a joint financial education project of Consumer Action and Capital One Preventing Senior Scams Welcome MoneyWi$e is a joint financial education project of Consumer Action and Capital One Overview of topics Recognizing scams Protecting yourself from fraud Steps to take if

More information

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations 2017 BY: KAREN REDDICK NATIONAL CREDIT MANAGEMENT 888-692-3964 kreddick@ncmstl.com 1 WHAT DO THESE STARS HAVE

More information

What is Identity Theft?

What is Identity Theft? IDENTITY THEFT What is Identity Theft? Identity theft is a growing problem in today s information age. Criminals are becoming more sophisticated in their ability to use your personal information for their

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts

More information

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft. PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity

More information

Learn about identity theft. Investor education

Learn about identity theft. Investor education Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

Three D s of safeguarding your personal data

Three D s of safeguarding your personal data Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D

More information

NAU Police Department s Identity Theft Victim s Packet

NAU Police Department s Identity Theft Victim s Packet NAU Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted the NAU Police Department and obtained a police report number

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Reno Police Department, complete a crime report and obtained a police report case number

More information

What s New for Stage 1 in 2014

What s New for Stage 1 in 2014 The problem Your Accounting for a New Economy What s New for Stage 1 in 2014 Medical identity is now the fastest-growing type of identity theft in the world and Texas has become the fourth highest identity

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Revised April 2010 Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso County Sheriff s Office and obtained a police report number

More information

Fraudulent Check, Credit Card Fraud and ID Theft Guide

Fraudulent Check, Credit Card Fraud and ID Theft Guide Fraudulent Check, Credit Card Fraud and ID Theft Guide COLLECTING BAD CHECKS The police involvement in bad check cases is for the sole purpose of investigating the incident to determine whether or not

More information

The fastest growing white-collar crime in the US. Identity theft REPAIR KIT. brought to you by: Colorado Attorney General John Suthers

The fastest growing white-collar crime in the US. Identity theft REPAIR KIT. brought to you by: Colorado Attorney General John Suthers The fastest growing white-collar crime in the US. Identity theft REPAIR KIT brought to you by: Colorado Attorney General John Suthers Message from Attorney General John Suthers Dear Coloradoans: Identity

More information

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity

More information

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

Truro Police Department IDENTITY THEFT. Policy Number: OPS-6.06A Effective Date: April 20, 2008 REFERENCE: I. GENERAL CONSIDERATIONS AND GUIDELINES

Truro Police Department IDENTITY THEFT. Policy Number: OPS-6.06A Effective Date: April 20, 2008 REFERENCE: I. GENERAL CONSIDERATIONS AND GUIDELINES Truro Police Department IDENTITY THEFT Policy Number: Effective Date: April 20, 2008 REFERENCE: Accreditation Standards: Other: I. GENERAL CONSIDERATIONS AND GUIDELINES Identity theft is the unlawful use

More information

FINANCIAL CRIMES INVESTIGATIONS

FINANCIAL CRIMES INVESTIGATIONS FINANCIAL CRIMES INVESTIGATIONS today s presenters... Brian Sallee Cuyahoga County Sheriff s Department Major Crimes Task Force Larry Henderhan FDA Special Agent Major Crimes Task Force Counterfeit Investigations

More information

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing

More information

Take Charge: Fighting Back Against Identity Theft 37

Take Charge: Fighting Back Against Identity Theft 37 Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts

More information

Financial Literacy Course. East High School Module 9

Financial Literacy Course. East High School Module 9 Financial Literacy Course East High School Module 9 What will you learn about? Identity Theft and Consumer Fraud Protecting Against and Identity Theft and Consumer Fraud Fair Debt Collection Practices

More information

Instructions for completing the ID Theft Affidavit

Instructions for completing the ID Theft Affidavit Instructions for completing the ID Theft Affidavit To make certain that you do not become responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts

More information

Unit 5 - Your Money: Keeping it Safe and Secure

Unit 5 - Your Money: Keeping it Safe and Secure Unit 5 - Your Money: Keeping it Safe and Secure Credit Unions and Banks Banks For-profit companies owned by shareholders Credit Unions Not-for for-profit institutions owned and controlled by its own customers,

More information

HOW TO USE CREDIT. Latino Community Credit Union & the Latino Community Development Center.

HOW TO USE CREDIT. Latino Community Credit Union & the Latino Community Development Center. HOW TO USE CREDIT Latino Community Credit Union & the Latino Community Development Center www.latinoccu.org Copyright 2016 Latino Community Credit Union Made possible by a generous contribution from the

More information

Resources for Victims of IDENTITY THEFT. HENNEPIN COUNTY CHIEFS OF POLICE and HENNEPIN COUNTY ATTORNEY S OFFICE

Resources for Victims of IDENTITY THEFT. HENNEPIN COUNTY CHIEFS OF POLICE and HENNEPIN COUNTY ATTORNEY S OFFICE Resources for Victims of IDENTITY THEFT HENNEPIN COUNTY CHIEFS OF POLICE and HENNEPIN COUNTY ATTORNEY S OFFICE Fraud and financial crimes are a form of theft that occur when a person or entity takes money

More information

Date Here. Welcome University of Michigan International Students

Date Here. Welcome University of Michigan International Students Date Here Welcome University of Michigan International Students U.S. Banking System Overview Banking is regulated by federal and state governments Privacy Disclosure Fraud protection Protection against

More information

ID Theft Protection Kit

ID Theft Protection Kit ID Theft Protection Kit Congratulations. You ve taken a big step in protecting the power of your credit and your identity. Identity theft is a serious crime. Victims can spend a significant amount of time

More information

The Cost of Identity Theft to Business What Business Owners Must Know Now

The Cost of Identity Theft to Business What Business Owners Must Know Now The Cost of Identity Theft to Business What Business Owners Must Know Now An Introduction to the Fair and Accurate Credit Reporting Act (FACTA): What Business Owners Must Know Now It often seems that there

More information

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director pierson Technological advances of the

More information

Introduction to Fraud Detective Kirby Shoemake

Introduction to Fraud Detective Kirby Shoemake Introduction to Fraud Detective Kirby Shoemake Fraud In criminal law, fraud is an intentional deception or coercion made for personal gain and to damage another individual in some way shape or form. Types

More information

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and to enhance existing efforts to educate Hoosiers about

More information

Identity Theft Prevention. Red Flags. Training Program

Identity Theft Prevention. Red Flags. Training Program Identity Theft Prevention Red Flags Training Program 1 Red Flags Training Program Adoption Amendment passed in 2003 to the Fair Credit Reporting Act called The Fair and Accurate Credit Transactions Act

More information

CoreLogic Credco First American Way Poway, CA (800)

CoreLogic Credco First American Way Poway, CA (800) Red Flag Regulation WHAT IT IS The Red Flag Regulation implements Sections 114 and 315 of the FACT Act. It finalizes three distinct requirements two of which are relevant to automotive, RV and marine dealers,

More information

Get back your good name. Refuse to be a target of identity crime again.

Get back your good name. Refuse to be a target of identity crime again. Clear Your Good Name After Identity Crime You suspect that someone is using your name and personal identification information for unlawful purposes. This kit can help you resolve your identity crime case

More information

Your Guide to Cars, Insurance and Identity Theft

Your Guide to Cars, Insurance and Identity Theft Ignition Your Guide to Cars, Insurance and Identity Theft Each step toward independence comes with questions about finances that may affect your future. We ve got you covered; this booklet can answer some

More information

Making cards work for you. A public education campaign brought to you by MasterCard

Making cards work for you. A public education campaign brought to you by MasterCard Making cards work for you A public education campaign brought to you by MasterCard At school or work paying bills, renting an apartment or shopping for a new car, you need to know how cards save you money

More information

Credit Cards. The Language of Credit. Student Loans. Installment Loans 12/14/2016

Credit Cards. The Language of Credit. Student Loans. Installment Loans 12/14/2016 Quick Response Explain how you think credit cards work. How much do you have to pay every month? What happens if you pay late? What kinds of fees are involved? Unit 4 - Good Debt, Bad Debt: Using Credit

More information

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution

More information

CITY OF ISSAQUAH. Identity Theft Prevention Program

CITY OF ISSAQUAH. Identity Theft Prevention Program Attachment A CITY OF ISSAQUAH Identity Theft Prevention Program Effective beginning May 1, 2009 Page 1 of 6 I. PROGRAM ADOPTION The City of Issaquah ( Utility ) developed this Identity Theft Prevention

More information

Chapter 27. Your Credit and the Law pp

Chapter 27. Your Credit and the Law pp Your Credit and the Law pp. 434-447 Learning Objectives After completing this chapter, you ll be able to: 1. Explain how government protects credit rights. 2. Name federal laws that protect consumers.

More information

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan Identity Theft & Identity Fraud By Kevin Sullivan Page 1 Table of Contents What is Identity Theft?... 3 What is Identity Fraud?... 4 How is Personal Information Stolen?... 5 How Your Personal Information

More information

Protecting Yourself Against Frauds & Scams

Protecting Yourself Against Frauds & Scams Protecting Yourself Against Frauds & Scams Trust & Respect Integrity Accountability Excellence Teamwork Justice Progress Through Participation What you need to know Why do con artists target seniors? How

More information

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008

IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 Introduction: Under the Fair and Accurate Credit Transactions Act (FACT Act), financial institutions (and creditors) that offer or maintain covered accounts

More information

POLICY: Identity Theft Red Flag Prevention

POLICY: Identity Theft Red Flag Prevention POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information

More information

MONROE COUNTY SHERIFF S OFFICE. General Order

MONROE COUNTY SHERIFF S OFFICE. General Order MONROE COUNTY SHERIFF S OFFICE General Order CHAPTER: 34 - D EFFECTIVE DATE: August 19, 2009 REFERENCE: CALEA 42.2.8 NO. PAGES: 8 TITLE: Identification Theft Investigation Procedures AMENDED: RESCINDS:

More information

Financial Crime: Awareness & Prevention. Jon Jarosinski

Financial Crime: Awareness & Prevention. Jon Jarosinski Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA

More information

LexisNexis Developing an Effective Red Flags Rule Program

LexisNexis Developing an Effective Red Flags Rule Program LexisNexis Developing an Effective Red Flags Rule Program Program Checklist R O I : R E T U R N O N I N F O R M AT I O N S O LU T I O N S Customer Development Authentication & Screening Fraud Prevention

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information

To alert you to the causes of Identity Theft To provide resources where you can learn about the subject To outline steps you can take to lesson your

To alert you to the causes of Identity Theft To provide resources where you can learn about the subject To outline steps you can take to lesson your Improving your odds To alert you to the causes of Identity Theft To provide resources where you can learn about the subject To outline steps you can take to lesson your risks It all started with an article

More information

REPAIR KIT. Identity theft. SUBJECT: Identity Theft. BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING:

REPAIR KIT. Identity theft. SUBJECT: Identity Theft. BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING: SUBJECT: Identity Theft Identity theft REPAIR KIT BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING: fastest growing white-collar crime in the US IDENTITY THEFT Message from your Attorney

More information

Scam Type #1: Wire Fraud Scams

Scam Type #1: Wire Fraud Scams 2015 Scam Type #1: Wire Fraud Scams The Goal of Wire Fraud Scams is to have the victim wire or otherwise send money to the Scammer through non-refundable, non-traceable methods such as Wire Transfer; Money

More information

Identity Theft: Help Your Students Avoid This Epidemic

Identity Theft: Help Your Students Avoid This Epidemic Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity

More information

c» BALANCE C:» Financially Empowering You The World of Credit Reports Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You The World of Credit Reports Podcast [Music plays] Nikki: The World of Credit Reports Podcast [Music plays] Nikki: You re listening to world of credit. Hi, I m Nikki, your host for today s podcast. Credit reports and credit scores influence our lives in many

More information

Volume 2 Your Credit Report and Your Rights

Volume 2 Your Credit Report and Your Rights Volume 2 Your Credit Report and Your Rights Your Credit Report and Your Rights Take the first step in changing your financial future. Call InCharge Debt Solutions today at 1.877.544.7772 or visit www.incharge.org

More information

Credit Matters Credit Concept Workshop Presentation Script (Part II of II)

Credit Matters Credit Concept Workshop Presentation Script (Part II of II) Credit Matters Credit Concept Workshop Presentation Script (Part II of II) (HAND OUT QUIZ PRIOR TO PRESENTATION) Opening Slide: WELCOME BACK TO THE SECOND PRESENTATION OF THE CREDIT CONCEPTS WORKSHOP SERIES.

More information

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS

More information

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM TITLE II ADMINISTRATIVE REGULATIONS CHAPTER 30 IDENTITY THEFT PREVENTION PROGRAM 30.01 Program The Town of Flower Mound, Texas, as a utility provider ( Utility ), has developed an Identity Theft Prevention

More information

How to Freeze Your Credit Files

How to Freeze Your Credit Files Avoid Identity Theft! How to Freeze Your Credit Files County of Bucks Department of Consumer Protection/ Weights and Measures 1260 Almshouse Rd., 4th Floor Doylestown, Pa. 18901 215-348-6060 1-800-942-2669

More information

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions Barry Altland Director, Partner Engagement Who/What is FPP? A Thank You to

More information

UNDERSTANDING CREDIT. WASFAA Conference Seattle, WA Speakers: Thalassa Naylor, Sallie Mae Anthony Lombardi, Sallie Mae Date: April 10, 2017

UNDERSTANDING CREDIT. WASFAA Conference Seattle, WA Speakers: Thalassa Naylor, Sallie Mae Anthony Lombardi, Sallie Mae Date: April 10, 2017 UNDERSTANDING CREDIT WASFAA Conference Seattle, WA Speakers: Thalassa Naylor, Sallie Mae Anthony Lombardi, Sallie Mae Date: April 10, 2017 Agenda 2 Credit Management Protect Yourself Understanding Your

More information

11/14/ FNBT FACT ACT

11/14/ FNBT FACT ACT 1 FNBT FACT ACT This class addresses the Fair Credit Reporting Act which governs the collection and use of information considered in connection with granting credit, providing insurance or offering employment.

More information

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

Identity Protection Services

Identity Protection Services Identity Protection Services Overview Why are identity protection services being provided? We believe your personal information should stay that way personal. That s why we re taking industry- leading

More information

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial DEVELOPING YOUR DEALERSHIP S WRITTEN PROGRAM TO DETECT, PREVENT, AND MITIGATE IDENTITY THEFT AS REQUIRED BY THE THE RED FLAG RULES AND TO RESPOND TO NOTICES OF ADDRESS DISCREPANCIES The Interagency Guidelines

More information

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity Theft Prevention Program Lake Forest College Revision 1.0 Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:

More information

Services & Features for Employee Benefit Members

Services & Features for Employee Benefit Members Services & Features for Employee Benefit Members IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific

More information

Banking YourMoneyCounts

Banking YourMoneyCounts Banking YourMoneyCounts As one of the world s leading financial services companies, HSBC is proud to support our communities. Our long history of providing financial education continues today, through

More information

Protecting your money

Protecting your money MODULE 9: Protecting your money If you have a 10 -minute session... If you have a 30 -minute session... If you have multiple sessions... Tool 1: Submitting a complaint to the CFPB Tool 2: Protecting your

More information

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),

More information

Templeton Municipal Light and Water Plant

Templeton Municipal Light and Water Plant Templeton Municipal Light and Water Plant RED FLAG POLICY 1. POLICY It is the policy of the Templeton Municipal Light and Water Plant (TMLWP) that information compiled on all customers and employees is

More information

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records; 3359-11-10.8 Identity theft detection, prevention and mitigation policy. (A) Introduction. (1) The university of Akron is committed to the detection, prevention and mitigation of identity theft associated

More information