Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out

Who Is That _

VIEWS: 4 PAGES: 24

									Who Is This?!

By Bailey Hoover
                Foreword
                 Deter, Detect, Defend Brochure


        Deter



                     Detect


                                  Defend
ID Theft: What It’s All About
                 Deter
• Safeguard Information-
  – Shred personal finance
    documents/paperwork
  – Protect your social security number
  – Don’t give out personal info over:
    • Phone
    • Mail
    • Internet
     Deter- (cont.)

– Never click on unsolicited email links
– Don’t use obvious passwords
– Keep personal info secure at home
              Detect
• Be alert to:
  –   Bills not arriving as expected
  –   Unexpected credit card/bank statements
  –   Denials of credit, unexpectedly
  –   Calls about unknown purchases
      Detect- (cont.)
• Inspect:
  – Your credit reports
    • Equifax, Experian, & TransUnion: give free
      reports
  – Financial statements
    • Review regularly
            Defend
• Place a ‘Fraud Alert’, if necessary
• Review reports carefully
  – Equifax- 1-800-525-6285
  – Experian- 1-888-397-3742
  – TransUnion- 1800-680-7289
        Defend- (cont.)
• Closing accounts
  – Call fraud departments
  – Use the ID Theft Affiant
    • Ftc.gov/idtheft
  – Ash verification of closure of account
  – Keep copies of documents/record
  – File police report
  – Report to Federal Trade Commission
  Worst of Both Worlds

• Identity Theft in the Real World



• Identity Theft in the Virtual World
    Details of Theft in Real
             World
•   What the Thief Wants
•   Where They Find It
•   How They Use Them
•   How to Stop It
Details of Theft in Virtual
          World
• What Thieves Want
• Where Thieves Find Identities
• How to Defend Yourself
    What the Thief Wants
•   Social Security cards
•   Driver’s licenses
•   Account numbers
•   PIN’s
•   Passwords
      Where They Find It
•   Wallets or purses
•   Mailboxes
•   Glove compartments
•   Trashcans
•   You, yourself
   How They Use Them
• Purchasing major items
• Open credit card accounts
• Change mailing addresses
• Buy cars, take out auto loans
• Establish telephone services
   How They Use Them
        (cont.)
• Open bank accounts, using bad
  checks
• File for bankruptcy
• Apply for jobs under your name
• Give names to cops for an arrest
       How to Stop It
• Purse/Wallets-
  – Don’t carry Social Security cards around
• Credit/Debit Cards-
  – Don’t carry more credit cards than
    necessary
  – Cancel cards not in use
  – Don’t write your PIN down
    • (Equifax, Experian and TransUnion)
 How to Stop It (cont.)
  – Write ‘check photo id’ in signature block
  – Check bills & bank statements carefully
• Your Mailbox-
  – Take outgoing mail to post offices
  – Pick up incoming mail ASAP
• Your Glove Compartment
  – Remove personal identifying documents
  How to Stop It (cont.)
• Your Trash-
  – Purchase a home paper shredder
  – Shred any documents containing
    personal information
• You, yourself
  – DON’T give out personal information
  – Secure important documents with info
  – Ordering new checks, send to the bank
   What Thieves Want
• They want to create new identities
• They use your information to do so
   Where Thieves Find
       Identities
• Bank account information
• Electronic tax returns
• PDA data
• Insurance information
• Spreadsheets/Word documents
How to Defend Yourself
• Use Unique passwords
• Use passwords whenever possible
• Change passwords regularly
• Never set to ‘Remember My Password’
• Don’t write passwords down
• Use anti-virus software
How to Defend Yourself
       (cont.)
• Keep your O.S. updated
• Install a firewall
• Be careful with Wi-Fi
• Beware of phishing
• Make sure website is secure
      End of the Line
• Now you realize identity theft
• Thieves stop at nothing to steal
• Use these tips to stay safe
        Works Cited
Consumer Response Center, Federal
 Trade Commission. ‘Deter, Detect,
 Defend, Avoid ID Theft.’ www.ftc.gov
Better Business Bureau, Inc. ‘Protecting
 Your Identity In the Virtual World.’
 September 2008.

								
To top