Identity Theft. Help Your Students Avoid This Epidemic Sun Ow

Similar documents
Identity Theft: Help Your Students Avoid This Epidemic

Identity Protection 101: Protect your good name from identity theft.

Identity thieves use a variety of ways to gain access to your personal information:

Recognizing Credit Card Fraud

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.

ID Theft Security. Michael G. Solomon. CISSP PMP CISM

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Drexel and FMFCU. Presented By

Learn about identity theft. Investor education

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

GREENPATH FINANCIAL WELLNESS SERIES

WHAT DO MANY OF US HAVE IN COMMON WITH. Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions

GreenPath Financial Wellness Series

Identity Theft.

Three D s of safeguarding your personal data

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

Ohio Conference of Payroll Professionals

Protecting Yourself from Fraud including Identity Theft Advanced Level

What s New for Stage 1 in 2014

Identity Theft Prevention. Red Flags. Training Program

Tax-Related Identity Theft

Jason B. Freeman, J.D., CPA

It s not going away. (c) 2014 huberis.net. Identity Theft

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation

Instructions for completing the ID Theft Affidavit

UNIT 3-4 Preventing Identity Theft

Identity Theft What to do if your identity is stolen

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND

Identity Theft Information for Tax Professionals. August 2017

Note: Action items are italicized

Take Charge: Fighting Back Against Identity Theft 37

DAWSON PUBLIC POWER DISTRICT 300 South Washington Street P. O. Box Lexington, Nebraska Tel. No.- 308/324/2386 Fax No.

Get the most out of your membership

ID Theft Toolkit and Affidavit

Identity Theft. Protect Yourself from

Get back your good name. Refuse to be a target of identity crime again.

Identity Theft Prevention Program

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

2) The proper use and control of credit is the best way to build a good credit history. Answer: TRUE Diff: 1 Question Status: Previous edition

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

Date Here. Welcome University of Michigan International Students

Protecting against and recovering from fraud and identity theft WHAT TO DO

ID Theft Protection Kit

11/14/ FNBT FACT ACT

2018 ERO Compliance Training RETURNING CLIENTS FEE COLLECT

IDENTITY THEFT ADDITIONAL INFORMATION FORM Submittal Instructions

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan

IDENTITY THEFT DETECTION POLICY

Announcing Dollar Bank s 2017 Tuition Scholarship Contest

Instructions for Completing the ID Theft Affidavit

Identity Theft Prevention Program

Minnesota State Colleges and Universities Identity Theft Prevention Program

Templeton Municipal Light and Water Plant

Financial Literacy Course. East High School Module 9

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704

FWA HSBC Financial Backpack Program

To alert you to the causes of Identity Theft To provide resources where you can learn about the subject To outline steps you can take to lesson your

2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER

Identity Theft Prevention Program Procedure

IDENTITY THEFT PROTECT YOUR MONEY

Identity fraud explained. How to protect your identity

Identity theft can occur even if you have been careful about protecting your personal information.

Instructions for Completing the ID Theft Affidavit

REPAIR KIT. Identity theft. SUBJECT: Identity Theft. BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING:

TITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM

What to Know, What to Do Colleen Tressler FTC Division of Consumer & Business Education consumer.ftc.gov IdentityTheft.

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet:

Introduction to Fraud Detective Kirby Shoemake

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;

2017 annual fraud update:

ROCHESTER INSTITUTE OF TECHNOLOGY

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT

Christopher Newport University. Policy: Red Flag Identity Theft Identification and Prevention Program Policy Number: 3030

Illinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

AIMS COMMUNITY COLLEGE PROCEDURE IDENTITY THEFT PREVENTION - RED FLAG PROCEDURE

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service

The fastest growing white-collar crime in the US. Identity theft REPAIR KIT. brought to you by: Colorado Attorney General John Suthers

Polson/ Ronan Ambulance Service Identity Theft Prevention Program

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

Protecting Yourself Against Frauds & Scams

Consumer Federation of America Best Practices for Identity Theft Services. March 10, 2011

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

Identity Theft Victim s Packet

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools

NAU Police Department s Identity Theft Victim s Packet

Credit Choosing a credit card: Read the fine print How to tell if you have a credit emergency Protecting yourself against identity theft

Think You're Already a Victim? Follow These Seven Steps.

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit

Transcription:

Identity Theft Help Your Students Avoid This Epidemic Sun Ow

34% of identity theft victims are college students

Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution Every three seconds someone's identity is stolen The FTC estimates that as many as 9 million Americans have their identities stolen each year

Why College Students May Become a Target Moving to campus locations and living with roommates Placing orders over the internet in public places Discarding credit card offers without shredding them

Why College Students May Become a Target Being careless with student IDs, PINs, and credit card information Using cell phones in public and divulging sensitive information Leaving dorm rooms unlocked Walking away from laptops or tablets

Objectives 1 Recognize the types of identity theft 2 Discuss ways in which identity theft occurs 3 Review the potential impact 4 Identify ways to protect themselves

Objectives 5 Determine what to do if they suspect a problem 6 Pinpoint techniques to prevent being a victim 7 Share ways to educate your students

Test Your Identity IQ One out of four people are affected by identity theft Identity theft issues are resolved quickly once reported to the authorities True False

Test Your Identity IQ 7% of all adults have their identities stolen from gov t or corporate databases Identity theft is not a serious crime College students comprise the single largest demographic of all identity theft victims True False True

What Are the Types of Identity Theft?

First: What Is It? Identity theft occurs when an unauthorized person steals your personal information and uses it to commit identity fraud by Getting a loan Using an existing account

Second: What s the Harm? Identity theft can ruin your credit Recovering your credit and your good name can be time consuming and expensive Credit Time consuming Expensive

Types of Identity Theft 1 Financial identity theft 2 Criminal identity theft 3 Identity cloning 4 Business/commercial identity theft

Consumer Sentinel Network Identity Theft Complaints by Victims Ages 1 19 and Under 7% 20-29 30-39 22% 24% 40-49 19% 50-59 15% 60-69 8 % 70 And Over 5 % Source: Consumer Sentinel Network

How Does Identity Theft Occur?

Beware 1 False identification 4 Social engineering 2 Credit card fraud 5 Dumpster diving 3 Computer hacking 6 Mail theft

The Thief in the Machine Skimming Captures information on a data storage device Phishing Captures information through email or phone Pharming Captures information through a fake website

The Thief in the Machine Vishing A form of phishing that is short for voice-phishing Captures information using VolP (Voice over Internet Protocol) Accomplished through emails or cold calls

Social Media Statistics: By-the-Numbers of Americans have never checked their social networking privacy and security account settings of teen Facebook users share photos and videos of themselves an tag friends National Cyber Security Alliance (NCSA)-MacAfee Online Safety Study, 2011 PEW Research Center, 2013

Social Media Statistics: By-the-Numbers of teen profile creators say it would be "pretty easy" for someone to find out who they are from the information posted on their profile of teen Facebook users share their personal cell phone number Internetsafety101.org PEW Research Center, 2013

Did You Know 25% of Facebook users don t bother with privacy settings Facebook users share 2.5 billion pieces of content per day 40 million photos are posted in Instagram a day Flickr hosts more than 4 billion images Huffington Post Ivn.us Econsultancy.com

Did You Know 72% of teens have a social networking profile and nearly half (47%) have a public profile viewable by anyone Of the active adult users of Facebook, 66% reported they did not know privacy controls existed on Facebook and/or they did not know how to use them Internetsafety101.org Consumer Reports, June 2011

Did You Know 76% 26% 36% of teens are at least somewhat concerned that posting information publicly could negatively impact future of teens know someone something bad has happened to because of information or photos posted online of 18-29 year olds have and use Instagram regularly Internetsafety101.org

Friends May Not Be Friends Social networks can be a target of identity theft Use anti-phishing filters Use the official networking site Be suspicious of anyone who asks for money

Friends May Not Be Friends Verify circumstances independently, preferably by direct telephone contact Use different passwords for all web accounts Include more than one contact email address Review a site s security page for Current alerts Steps to take if you become a victim

Students Put Themselves at Risk Tweeting that they re enjoying some alone time Facebook status updated that they re away from home or out-of-town Including personal statistics such as birth date, address, cell phone number Accepting friend requests from people they do not know

Other Methods of Identity Theft Identity thieves steal information from: Personnel records from employers Mailboxes (or by redirecting mail with a change of address form) Personal belongings from someone s home Wallets or purses Databases

What is the Impact?

Students May be Unaware Young people are easy targets Identity theft among young people: Remains undetected, sometimes for years Is stolen at more than 50 times the rate of adults Shows no obvious warning signs Is easier to rectify than with an adult case Source: Reuters, July 11, 2011

It s Not Always Random Information can be stolen by: Relatives Doctor s offices Friends Schools Hospitals

Financial Aid Victims of Identity Theft A victim of IRS identity theft who is not able to obtain an IRS Tax Return Transcript or use the IRS Data Retrieval Tool (DRT) must contact the IRS at 1-800-908-4490 Upon authentication of the tax filer s identity, the IRS will provide, by U.S. Postal Service, a printout of the tax filer s IRS income tax return information which can be used to complete verification

How Can Students Protect Themselves?

The Three Ds of Identity Theft Deter identity thieves by safeguarding your information Detect suspicious activity by monitoring statements and accounts Defend against Identify theft as soon as you suspect a problem Federal Trade Commission

Don t Give Thieves the Red Flag Send important mail from the post office or a USPS mailbox not your home mailbox Use a locked mailbox Stop mail/newspapers when on vacation Request special delivery for check orders Opt out of pre-approved credit card offers optoutprescreen.com or 1-888-567-8688

Hang onto Purses and Wallets Keep your purses and/or wallets in a secure location Don t keep seldom used credit cards in your wallet Don t carry your checkbook if you don t plan to use it Keep your Social Security card and/or passport in a safe place

Remain Cautious Don t think that See I.D. will stop criminals from using a stolen card Use caution with financial aid forms, documents, and other materials with personal information Students should consider having a locked file cabinet or safe

Use Online Precautions Use strong passwords and change them often howsecureismypassword.net Don t give out sensitive information SSN Date of birth Bank account information, etc.

Use Online Precautions Use secure websites Don t open email from strangers Use a firewall Update virus software regularly

Use Online Precautions Use the highest level security setting Read privacy and security policies Use the least amount of personal information possible Idtheftcenter.org

Use Online Precautions Be wise about your online postings Connect only to those you know Watch emails and links Idtheftcenter.org

Be on the Lookout for Suspicious Activity Unexpected credit denials Unexpected charges on monthly financial statements Unexpected credit card approvals Calls or letters from debt collectors

Be on the Lookout for Suspicious Activity Protect personal data Shred documents Don t share too much information on social networks Monitor bank and credit accounts Pay attention to official notices

Monitor Your Credit Report Get a free credit report every year annualcreditreport.com (877) 322-8228 Review credit card offers, then shred

What Can Students Do if They Suspect a Problem?

If They Have Been Victimized They should: Close their accounts File a detailed police report Place a fraud alert on their credit reports (800) 525-6285 (888) 397-3742 (800) 680-7289

Identity Theft Complaints File a complaint with the Federal Trade Commission Online Phone Mail ftc.gov/idtheft or https://www.consumer.ftc.gov/features /feature-0014-identity-theft (877) ID-THEFT Identity Theft Clearinghouse Federal Trade Commissions 600 Pennsylvania Ave. NW Washington, DC 20580

Identity Theft Complaints Create an identity theft report Use an identity theft complaint form, which entitles students to certain protections, along with a police report Identity Theft Complaint form + Police Report = Identity Theft Report

Identity Theft Report Students can use an Identity Theft Report to: Permanently block fraudulent information from appearing on their credit report Ensure that debts do not reappear on their credit report Prevent a company from continuing to collect debts that result from identity theft Place a fraud alert protection on their credit report

Fraud Alert Protection Initial Alert Stays on a student s credit report for at least 90 days Entitles them to one free credit report from each credit reporting agency Lists only the last four digits of their SSN

Fraud Alert Protection Extended Alert Stays on a credit report for seven years Requires an identity theft report Entitles students to two free credit reports per year Removes their name from marketing lists for five years

Fraud Alert Protection Extended Alert Ensures that businesses contact them directly before issuing credit Requires proof of their identity to place and/or remove an alert from their credit report

Are There Ways to Be Proactive?

Proactive Measures Insurance Credit Freeze Credit Monitoring Self-Monitoring Fraud Alert

Identity Theft Insurance Coverage can be in many ways Separate policy Part of existing insurance policy Through credit card company Included in credit monitoring Think about the types of losses and coverage available after the deductible

Credit Monitoring Many companies from which to choose Multiple types of monitoring available Credit reports Public records Credit cards Social security Fees range from $5 - $17 per month nextadvisor.com

Credit Monitoring Provides updates to customers including information about credit checks and new accounts Receive immediate notification about any suspicious activity on their credit report Many offer different levels of service for varied fees

Fraud Alert Requires credit reporting agencies to use "reasonable policies and procedures" to verify your identity before opening an account Only need to set it with one credit agency and they will report it to the others

Credit Freeze Stops access to a student s credit report file Prevents fraudulent opening of new accounts in their name Credit freeze laws exists in most states Voluntary programs are available from the three major credit reporting agencies

Credit Freeze Consumer has more control of access to credit file PIN provided Does not affect existing accounts Does not stop misuse of existing accounts

Self-Monitoring Proactive safekeeping of personal information is the most effective and it s free

What Can You Do to Educate Your Students?

Ways You Can Help Your Students 1 Recommend they have a shredder 2 Reinforce the importance of providing information only on secure websites 3 Explain how to monitor their credit report 4 Caution them about what they share on social media

Ways You Can Help Your Students 5 Remind them to have spyware and an anti-virus program installed on their notebook or PC 6 Encourage students to avoid accepting requests to interlink their Facebook and other social media accounts with people they don't know 7 Provide them with resources

Helpful Resources Credit Reporting Agencies Experian.com Equifax.com Transunion.com Privacyrights.org (Privacy Rights Clearinghouse) Identitytheft.gov and Fraud.org (National Fraud Information Center)

Helpful Resources fcc.gov and ftc.gov idtheftcenter.org sec.gov ncvc.org ed.gov/misused epic.org

Thanks for Attending Contact Information: Sun Ow Senior Marketing Associate (866) 348-0710 sow@glhec.org Great Lakes Higher Education Corporation & Affiliates