Docstoc

Advanced Automation

Document Sample
Advanced Automation Powered By Docstoc
					  A Presentation of this webinar
(including Power Point and Audio)
   will be sent to you on request            Identity Crimes:
after the webinar by using the email
  link at the bottom of the screen

                                             A New Dimension In Risk Management




                                       Have a Question? Enter your question in the Dashbord to the right of your screen

                                       For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                         Enter Pass code 981277#
                                       Webinar Objectives

                                       By the end of this webinar, you will be able to:


                                         • Communicate your agency’s opportunity to write new business and
                                           retain more clients as a result of the overwhelming impact of Identity
                                           crimes.


  A Presentation of this webinar         • Communicate the need for Identity Theft risk management with clients
(including Power Point and Audio)          and prospects.
   will be sent to you on request
after the webinar by using the email
  link at the bottom of the screen       • Implement training and goals equipping staff to become effective risk
                                           managers in the area of Identity Protection and Restoration.

                                         • Effectively incorporate Identity Protection and Restoration into the
                                           business model for your agency.



                                         Have a Question? Enter your question in the Dashbord to the right of your screen

                                         For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       Webinar Agenda
                                       • The four main types of Identity Theft

                                       • How Identity thieves steal information

                                       • Scope of the Identity Theft problem

                                       • Impact of Identity crimes on consumers
  A Presentation of this webinar
(including Power Point and Audio)
   will be sent to you on request      • Why consumers need risk management professionals
after the webinar by using the email
  link at the bottom of the screen
                                       • Steps agencies can take to help clients with Identity theft risk
                                         management

                                       • Examples of how agencies can leverage Identity Protection and
                                         Restoration to grow their agency




                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                       The Four Main Types of Identity Theft

                                       #1 - Financial

                                       Financial Identity Theft is the most common form of Identity crime.

                                       This type of theft often involves purchases made with stolen credit cards,
                                       unauthorized use of telephone and cell phones and other activities creating
  A Presentation of this webinar       a financial impact on the victim.
(including Power Point and Audio)
   will be sent to you on request
after the webinar by using the email   The victim’s identity can be used to create new debt, obtain new credit
  link at the bottom of the screen     cards, sign up for new telephone or other utility service, lease a car, take out
                                       an apartment lease and even secure a mortgage to purchase a new home.




                                         Have a Question? Enter your question in the Dashbord to the right of your screen

                                         For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       The Four Main Types of Identity Theft

                                       #2 - Criminal


                                       Identity thieves often use a stolen identity so that authorities will look for
                                       someone else to charge with the crime.


                                       One of the most common examples is traffic violations in which the thief gives
  A Presentation of this webinar
                                       police a false driver’s license.
(including Power Point and Audio)
   will be sent to you on request
after the webinar by using the email
  link at the bottom of the screen     Another example of criminal behavior is using a stolen license plate to steal
                                       fuel by “drive offs” from service stations. If the crime is caught on security
                                       cameras, all the authorities have is an Identity that belongs to someone else.


                                       The victim’s first alert that something is wrong is when they get a citation for
                                       not responding to the charge.


                                         Have a Question? Enter your question in the Dashbord to the right of your screen

                                         For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       The Four Main Types of Identity Theft

                                       #3 - Cloning


                                       Cloning means that criminals use a false identity to create a new life for
                                       themselves.


                                       The goal of Cloning is not financial, but using the victim’s hard work to make
  A Presentation of this webinar
                                       the criminal’s life more comfortable.
(including Power Point and Audio)
   will be sent to you on request
after the webinar by using the email
  link at the bottom of the screen     Identity thieves have been known to steal an identity so they can start a new
                                       life to avoid prosecution, creditors and even the IRS.


                                       By the time the false life is exposed, years may have gone by, creating an
                                       intricate web of deception that can take years to unravel.



                                         Have a Question? Enter your question in the Dashbord to the right of your screen

                                         For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       The Four Main Types of Identity Theft

                                       #4 - Commercial


                                       The stolen identity of an Individual that owns or manages a business can
                                       mean that the business is also open to Identity crimes.


                                       An Identity thief may gain access to the business or confidential data by
  A Presentation of this webinar
                                       falsely using an authorized person’s identity.
(including Power Point and Audio)
   will be sent to you on request
after the webinar by using the email
  link at the bottom of the screen     Criminals make unauthorized purchases that are shipped to an alternate
                                       address while the invoice is sent to the business.


                                       Employees come to work to discover that the “owner” has sold all of the
                                       furniture and office equipment.



                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                          How Thieves Steal Information

                                          Outside Vendors or Service Staff
                                          Thieves can pose as service repair/support provider such as a copier repair
                                          person, or a legitimate individual can gain access unauthorized access to
                                          personal client data and use for criminal purposes.

                                          Thieves look for opportunities such as:

     A Presentation of this webinar
                                              • Unattended files or papers containing client information
   (including Power Point and Audio)          • Unattended server backup tapes
      will be sent to you on request
   after the webinar by using the email       • Unattended mail containing client information
     link at the bottom of the screen
                                              • Overheard phone conversations between staff and clients or prospects
                                              • Lists with user names and passwords
“How Thieves Steal Your Identity”

                                          SOLUTIONS agencies: This document can be located in the
                                          Training and Learning Center


                                            Have a Question? Enter your question in the Dashbord to the right of your screen

                                            For Technical issues, please contact …TBD


                  For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       How Thieves Steal Information

                                       Break In
                                       Businesses are beginning to realize that their data is as vulnerable in the
                                       event of a break-in, just like money or valuables.

                                       Private homes are also vulnerable to thieves looking for valuables.


                                       Personal Technology
  A Presentation of this webinar
(including Power Point and Audio)      Passwords stored on computers, laptops, PDAs and cell phone are a high risk
   will be sent to you on request      for theft or unauthorized access.
after the webinar by using the email
  link at the bottom of the screen
                                       Old computers may hold information on their hard drives after deletion.

                                       Technology items should never be discarded without removing all data using
                                       the appropriate deletion software.




                                         Have a Question? Enter your question in the Dashbord to the right of your screen

                                         For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       How Thieves Steal Information

                                       Spyware
                                       Computer viruses can ‘spy’ while the user shops or banks online.

                                       Any website that asks for personal information can potentially be ‘spied on’.



                                       Unsecured Online Transactions
  A Presentation of this webinar
(including Power Point and Audio)      Online shopping on an un-secured website can potentially put Non-Public
   will be sent to you on request      Information at risk.
after the webinar by using the email
  link at the bottom of the screen
                                       Websites can collect and sell some personal information without the
                                       knowledge or consent of the victim.




                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                       How Thieves Steal Information

                                       Phishing’ or ‘Pretexting’
                                       ”Phishing” is a criminal activity in which sensitive information such as
                                       passwords, credit card details and other Non-Public Information is accessed
                                       by a website masquerading as a trustworthy entity.



                                       Lost or Stolen Wallet
  A Presentation of this webinar
(including Power Point and Audio)      A lost wallet creates one of the most common risks of becoming a victim of
   will be sent to you on request      identity theft.
after the webinar by using the email
  link at the bottom of the screen
                                       Important documents such as a Social Security Number, birth certificate,
                                       driver’s license and credit or debit cards can give a thief easy access to
                                       personal information.




                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                       How Thieves Steal Information

                                       Missing Mail
                                       Credit card bills, offers for credit cards and information that contains personal
                                       information or your SSN can be used by criminals to gain access to
                                       unauthorized credit or to commit Identity fraud.


                                       Garbage
  A Presentation of this webinar       Junk mail that is tossed in the trash is a very common way Identity thieves
(including Power Point and Audio)      gain access to personal information.
   will be sent to you on request
after the webinar by using the email
  link at the bottom of the screen     “Dumpster diving’ is a method used by both personal and commercial Identity
                                       thieves because it provides easy access to the exact information needed to
                                       commit an Identity crime.




                                         Have a Question? Enter your question in the Dashbord to the right of your screen

                                         For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       How Thieves Steal Information

                                       Skimming
                                       ‘Tools of the trade’ allow thieves to steal information from credit cards in use
                                       at ATM’s or during a card swipe for a purchase.

                                       These tools include electronic monitoring and data retrievable devices are
                                       able to access personal information without the victim’s knowledge..

  A Presentation of this webinar
(including Power Point and Audio)
   will be sent to you on request
                                       Change of Address
after the webinar by using the email   An Identity thief can go to the post office and submit a change address form
  link at the bottom of the screen
                                       for any individual or business.

                                       Mail with personal data is delivered to the criminal’s address rather than to the
                                       victim.




                                         Have a Question? Enter your question in the Dashbord to the right of your screen

                                         For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       How Thieves Steal Information

                                       How The Criminals Stole Identities in 2005


                                       Phishing                                 2.4%
                                       Dumpster Diving                          2.8%
                                       Spyware                                  6.4%
  A Presentation of this webinar
(including Power Point and Audio)      Mail Theft                               7.8%
   will be sent to you on request
after the webinar by using the email   Friends/Relatives                        9.6%
  link at the bottom of the screen
                                       Clerks/Sales People                      10.6%
                                       Skimming                                 11.9%
                                       Lost/Stolen Cards                           28%


                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                       Scope Of The Identity Theft Problem

                                       Identity Crimes Create A Significant Financial Issue.

                                        • Total thefts topped $47 billion in 2003.

                                        • The average monetary loss per victim is estimated at $4,800.

                                        • The loss to businesses and financial institutions was $10,200 per victim
  A Presentation of this webinar
                                          totaling $32.9 billion. Individual victims lost an average of $1,180 for a
(including Power Point and Audio)
   will be sent to you on request         total of $3.8 billion.
after the webinar by using the email
  link at the bottom of the screen
                                        • The average fraud amount per case has increased from $5,249 to
                                          $6,383, over 2 years. As a result, the total one-year cost of identity fraud
                                          in the United States has remained relatively flat between 2003 and 2006,
                                          increasing from $53.2 billion to $56.6 billion.




                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                       Scope Of The Identity Theft Problem

                                       Identity Crime Affects People From All Walks of Life

                                        • More than 52 million Americans have had their personal information
                                          compromised in data breaches since 2005

                                        • Near-perfect driver’s licenses are readily available on the Web from
  A Presentation of this webinar          offshore suppliers who know they are providing false documentation
(including Power Point and Audio)
   will be sent to you on request
                                        • Nearly 85% of all victims find out about their identity theft case in a
after the webinar by using the email
  link at the bottom of the screen        negative manner. Only 15% of victims find out due to a proactive action
                                           taken by a business.


                                        • In 2006, the 35-44 demographic age group has the highest average fraud
                                          amount ($9,435).



                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                       Impact Of Identity Crimes On Consumers

                                       Identity Theft Robs The Victim of Their Time, Their
                                       Security and Their Life

                                         • An average of 600 hours is required to recover from identity theft.

                                         • That’s a total of 297 million hours a year spent by victims to clear their
                                           good name.

  A Presentation of this webinar
(including Power Point and Audio)        • Legal tie ups and credit score reductions can compromise granting of
   will be sent to you on request          new credit for a year or more.
after the webinar by using the email
  link at the bottom of the screen
                                         • The emotional impact of identity theft has been found to parallel that of
                                            victims of violent crime.




                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                          Why Consumers Need Risk Management
                                          Professionals

                                          Most Consumers Are Unaware of How Identity Crimes
                                          Impact Their Lives, and How to Protect Themselves.


                                            • Lack of understanding of Identity crimes.

     A Presentation of this webinar
    (including Power Point and Audio)       • Lack of understanding how criminals steal an identity
      will be sent to you on request
   after the webinar by using the email
     link at the bottom of the screen
                                            • Failure to regularly check credit report.


Advanced Automation has partnered           • Assumption that they will not become a victim.
with The Benefits Group, specialists
in Identity Protection. Contact Mark
Seguin at mark@tbg-usa.net




                                           Have a Question? Enter your question in the Dashbord to the right of your screen

                                           For Technical issues, please contact …TBD


                  For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                       Why Consumers Need Risk Management
                                       Professionals

                                       Independent Insurance Agents Have An Opportunity
                                       and Responsibility To Provide Risk Management


                                        • Clients trust and expect financial planners to proactively inform and
                                          protect them and manage their risks.
  A Presentation of this webinar
(including Power Point and Audio)
   will be sent to you on request       • Many times the client is not in a position to gauge the legitimacy of
after the webinar by using the email
  link at the bottom of the screen
                                          information and offers they receive and need a professional sounding
                                          board.




                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                       Steps Agencies Can Take To Help Clients With
                                       Identity Theft Risk Management

                                       Understand the Responsibility of Identity Protection and
                                       Restoration

                                       According to current Privacy Laws, financial institutions such as independent
  A Presentation of this webinar
                                       insurance agencies have a LEGAL RESPONSIBILITY to protect their client’s
(including Power Point and Audio)      confidentional,Non-Public Information.
   will be sent to you on request
after the webinar by using the email
  link at the bottom of the screen     Due Dilligence that actively protects Non-Public Information can be the best
                                       protection possible in the event of a lawsuit.




                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                       Steps Agencies Can Take To Help Clients With
                                       Identity Theft Risk Management

                                       Understand The Impact of Identity Theft

                                       C. Miller was told by a nationally known retirement plan custodian that they
                                       could not open a 401(k) account with them even though the client worked for
                                       a Fortune 500 company.
  A Presentation of this webinar
(including Power Point and Audio)
   will be sent to you on request      The reason? Someone had previously opened an account with the custodian
after the webinar by using the email
                                       using the client’s Social Security number.
  link at the bottom of the screen




                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                       Steps Agencies Can Take To Help Clients With Identity
                                       Theft Risk Management


                                       Understand The Impact of Identity Theft

                                       An elderly client who believed he had won an international lottery.

                                       When they were told that these were thieves seeking to gain his personal
  A Presentation of this webinar       information, he responded rather innocently, “No—all they’re asking for is
(including Power Point and Audio)
   will be sent to you on request      my bank account number!”
after the webinar by using the email
  link at the bottom of the screen




                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                       Steps Agencies Can Take To Help Clients With Identity
                                       Theft Risk Management

                                       Make A Commitment to Understand Legislation That
                                       Influences Identity Protection and Recovery

                                       GLBA (Gramm-Leach-Bliley Privacy Act)

  A Presentation of this webinar
(including Power Point and Audio)      On November 12, 1999, the President signed the Gramm-Leach-Bliley Act
   will be sent to you on request      (Pub. L. 106-102) into law. Section 501 of the Act titled "Protection of
after the webinar by using the email
                                       Nonpublic Personal Information" requires the establishment of appropriate
  link at the bottom of the screen
                                       standards for the financial institutions relating to the administrative, technical
                                       and physical safeguards for customer records and information.




                                         Have a Question? Enter your question in the Dashbord to the right of your screen

                                         For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       Steps Agencies Can Take To Help Clients With Identity
                                       Theft Risk Management

                                       Make A Commitment to Understand Legislation That
                                       Influences Identity Protection and Recovery

                                       FACTA (Fair and Accurate Credit Transaction Act )

  A Presentation of this webinar
                                       The Fair and Accurate Credit Transaction Act of 2003 (FACTA) added new
(including Power Point and Audio)
   will be sent to you on request      sections to the federal Fair Credit Reporting Act (FCRA, 15 U.S.C. 1681 et
after the webinar by using the email   seq.), intended primarily to help consumers fight the growing crime of identity
  link at the bottom of the screen
                                       theft. Accuracy, privacy, limits on information sharing, and new consumer
                                       rights to disclosure are included in FACTA. (Pub. L. 108-159, 111 Stat. 1952)




                                         Have a Question? Enter your question in the Dashbord to the right of your screen

                                         For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                         Examples Of How Agencies Can Incorporate
                                         Identity Theft Risk Management Into Their
                                         Business Model

                                         Make A Commitment to Comply With Privacy Legislation
                                         a Matter of Public Record


     A Presentation of this webinar      Every agency needs a Privacy Policy that clearly holds the agency to a
   (including Power Point and Audio)
                                         standard recognized by clients, prospects and courts.
     will be sent to you on request
  after the webinar by using the email
    link at the bottom of the screen     Include “compliance” in your marketing, new policies, annual reviews and
                                         proposals.

“Sample Privacy Policy”
                                         Other agencies may be taking steps to offer this level of Risk Management,
                                         but few let their community know about it.



                                          Have a Question? Enter your question in the Dashbord to the right of your screen

                                          For Technical issues, please contact …TBD


                 For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                          Examples Of How Agencies Can Incorporate
                                          Identity Theft Risk Management Into Their
                                          Business Model

                                          Create An Identity Protection Toolkit

                                          Many agencies use an “Auto Accident Toolkit” with a camera, flashlight and
                                          note pad. This is a great idea that can be brought into the 21st century.
     A Presentation of this webinar
    (including Power Point and Audio)
      will be sent to you on request      An effective Toolkit contains resources that both protect the identities of
   after the webinar by using the email
                                          their clients as well as provide resources for restoration.
     link at the bottom of the screen




Identity Theft Protection
and Restoration Toolkit

                                          SOLUTIONS agencies: These documents can be located in the
                                          Training and Learning Center


                                            Have a Question? Enter your question in the Dashbord to the right of your screen

                                            For Technical issues, please contact …TBD


                  For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                          Examples Of How Agencies Can Incorporate
                                          Identity Theft Risk Management Into Their
                                          Business Model

                                          Offer ID Theft Protection

                                          Although many agencies are not yet aware of its impact, the rapid growth of
                                          Identity Crimes has created a mushrooming opportunity for agency growth.
     A Presentation of this webinar
    (including Power Point and Audio)
      will be sent to you on request      The direct revenue may not be large, but even a small increase of retention
   after the webinar by using the email
                                          such as 2% results in a 20% increase in bottom line profit.
     link at the bottom of the screen


Advanced Automation has partnered         It is important to partner with the right people so you can be confident that
with The Benefits Group, specialists      your valued clients will be well protected.
in Identity Protection. Contact Mark
Seguin at mark@tbg-usa.net




                                            Have a Question? Enter your question in the Dashbord to the right of your screen

                                            For Technical issues, please contact …TBD


                  For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       Examples Of How Agencies Can Incorporate
                                       Identity Theft Risk Management Into Their
                                       Business Model

                                       Host Seminars and Webinars On Identity Protection

                                       Take advantage of the amount of public information regarding Identity Theft,
                                       Protection and Restoration by hosting seminars at a local hotel.
  A Presentation of this webinar
(including Power Point and Audio)
   will be sent to you on request      Webinars are another option using tools such as www.gotowebinar.com. This
after the webinar by using the email
                                       is a very affordable resource and includes a free conference line for the audio
  link at the bottom of the screen
                                       portion of the webinar.

                                       Offer your FREE “Identity Protection and Restoration Toolkit” for attending.

                                       SOLUTIONS agencies: Classes on GoToMyPC are available in the
                                       Training and Learning Center.


                                         Have a Question? Enter your question in the Dashbord to the right of your screen

                                         For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       Examples Of How Agencies Can Incorporate
                                       Identity Theft Risk Management Into Their
                                       Business Model

                                       Offer Identity Theft Protection To Your Commercial
                                       Customers


  A Presentation of this webinar       An excellent way to increase retention is to provide clients with valuable
(including Power Point and Audio)      resources they would not want to lose if they were to go to another agency.
   will be sent to you on request
after the webinar by using the email
  link at the bottom of the screen     Consider picking up the expense for providing your larger Commercial
                                       accounts with Identity Theft Protection.




                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                       Examples Of How Agencies Can Incorporate
                                       Identity Theft Risk Management Into Their
                                       Business Model

                                       Offer Identity Theft Protection and Restoration To Your
                                       Commercial Customers As A “Pass-Through”


  A Presentation of this webinar       Suggest that your Commercial clients offer Identity Protection and Restoration
(including Power Point and Audio)      to their staff as an employee benefit.
   will be sent to you on request
after the webinar by using the email
  link at the bottom of the screen     Providing this type of product as a “pass-through”, your agency can
                                       dramatically increase retention by becoming part of the client’s continued
                                       success and way of doing business.



                                       .


                                           Have a Question? Enter your question in the Dashbord to the right of your screen

                                           For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                             Enter Pass code 981277#
                                       Examples Of How Agencies Can Incorporate
                                       Identity Theft Risk Management Into Their
                                       Business Model

                                       Include Identity Theft Risk Management in all Proposals
                                       and Annual Reviews


  A Presentation of this webinar       Get away from “Quotes” and provide prospects with a 360 degree approach to
(including Power Point and Audio)      protecting their lives, businesses and families.
   will be sent to you on request
after the webinar by using the email
  link at the bottom of the screen     Include Identity Protection and Restoration in EVERY annual review for both
                                       Personal Lines and Commercial Lines clients.

                                       Opportunities such as this may the exactly what your agency has been
                                       looking for as they look for ways to get clients to invest the time for an annual
                                       review.


                                         Have a Question? Enter your question in the Dashbord to the right of your screen

                                         For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       Examples Of How Agencies Can Incorporate
                                       Identity Theft Risk Management Into Their
                                       Business Model

                                       Include Articles About Identity Protection In Your
                                       Newsletters and Other Publications


  A Presentation of this webinar       Create printed material, broadcast commercials, postcards and other means
(including Power Point and Audio)      of communicating to customers the risk and the solution to the type of crime.
   will be sent to you on request
after the webinar by using the email
  link at the bottom of the screen     Newsletters are another excellent way for agencies to regularly “touch” their
                                       clients and communicate agency philosophy, resources and up-to-date
                                       information.




                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#
                                         Examples Of How Agencies Can Incorporate
                                         Identity Theft Risk Management Into Their
                                         Business Model

                                         Take advantage of “specialty” markets that have the
                                         potential to be a victim of Identity Crimes.


     A Presentation of this webinar      Teens are among the fastest growing demographic that is being impacted by
   (including Power Point and Audio)     Identity Crimes.
     will be sent to you on request
  after the webinar by using the email
    link at the bottom of the screen     Tools such as a “Parent-Teen Identity Protection Contract” can be an excellent
                                         opportunity to retain your current customers as well as connect with the next
                                         generation.
Parent-Teen ID Protection Contract


                                         SOLUTIONS agencies: This document can be located in the
                                         Training and Learning Center


                                           Have a Question? Enter your question in the Dashbord to the right of your screen

                                           For Technical issues, please contact …TBD


                 For Audio, Dial (712) 580-0380                           Enter Pass code 981277#
                                       How To Use Identity Protection To Generate
                                       Revenue In Any Type of Market

                                       Advanced Automation Has Partnered With
                                       “The Benefits Group”

                                       The Benefits Group has created several opportunities to create an ongoing
                                       revenue stream by providing level of Identity Protection and Restoration
  A Presentation of this webinar
                                       protection for your clients.
(including Power Point and Audio)
   will be sent to you on request
after the webinar by using the email   For information about The Benefits Group, please contact Tom Baker at
  link at the bottom of the screen
                                       tom@advancedautomationinc.com.

                                       Information is also available in the special August issue of The Source dealing
                                       with Identity Theft. Click Here for the August issue.




                                        Have a Question? Enter your question in the Dashbord to the right of your screen

                                        For Technical issues, please contact …TBD


               For Audio, Dial (712) 580-0380                          Enter Pass code 981277#

				
DOCUMENT INFO
Categories:
Tags:
Stats:
views:0
posted:5/31/2012
language:
pages:34