IdentityTheft ppt Gonzaga edu (PowerPoint) by chenmeixiu


									      Identity Theft

Cyber Security Awareness Month
         October 2006
               Identity Theft
• What are we going to talk about?
  –   Information
  –   Identity theft – the crime
  –   Minimizing Risk
  –   What is GU doing?
  –   Resources
           Identity Theft
• Identity theft occurs when someone
  uses your information without your
  permission to commit fraud or other
• You will never be able to fully control
  whether you will become a victim.
• Personally Identifiable Information
  – Any information which can potentially be
    used to uniquely identify, contact, or
    locate a single person.
               Information (PII) Types
               COMOMON                                 More PII
  Social Security Number (TIN)              Home phone
  Name                                      Work email address
  Street Address                            IP Address (Internet address)
  Date of birth                             Vehicle Registration Number
  Maiden name                               Drivers license number
  Personal Email address                    License plate

Face & Eyes           Country, State, City of    Workplace
Fingerprints          residence                  Junk mail
Handwriting           Age – Gender - Race        Job position
Credit card number    High school                Criminal record
Bank account          Cell phone                 ON-Star
Business cards        Medical / Dental           Birthmarks - Scars
• Where is it?
• Everywhere!
  –   Public record – mortgage & deeds
  –   Businesses – use Social to identify you
  –   Junk mail
  –   On-Line
                 PII con’t
• What is most important?
  –   Social Security Number
  –   Date of birth
  –   Email address
  –   Home address
  –   Drivers License Number
  –   Accounts – Credit, Bank, Mortgage
          PII Related Laws
• Health Insurance Portability and
  Accountability Act (HIPAA)
• Anti-Phishing Act of 2005
• Social Security Number Protection act
  of 2005
• Identity Theft Prevention Act
• Proposed:
  – Privacy Act
      Identity theft – the crime
• How does it happen?
  –   Stealing records while on the job
  –   Bribing employees
  –   Hacking
  –   Con
  –   Mail theft
  –   Dumpster diving
  –   Illegal credit checking
  –   Credit or debit card theft
  –   Stolen wallet or purse
  –   Information inside your home
  –   Phishing scams
      Identity theft – the crime
• How do criminals use the information?
  –   Change billing address on your credit card
  –   Open new credit or bank accounts
  –   Establish phone or wireless service
  –   Counterfeit checks
  –   File for bankruptcy
  –   Take out a loan
  –   Get a drivers license
  –   Get a job
  –   Give your name to police during an arrest
            Minimizing Risk
• Impossible to fully control your PII
• Order copies of your credit report annually.
  – Credit companies required by law to send you a
    free report every 12 months (upon request)
• Secure the personal information in your
  – Fireproof safe
      Minimizing Risk con’t
• Passwords Passwords Passwords
  – Place unique passwords and PIN
    numbers on your accounts
  – Bank accounts
  – Phone accounts
  – Email accounts
  – Ecommerce accounts
• Businesses may allow a pin instead of
  your SSN
       Minimizing Risk con’t
• Read the fine print
  – Information security procedures in the
    work place and for transactions
• Shred your trash
  – Confetti type shredder
      Minimizing Risk con’t
• Do not carry your Social Security
  Card or Tax ID Number
• Make sure that companies do not use
  your SSN as your identification
  – HealthCare card
  – Utilities
• Carry only the ID and credit cards
  that you need.
        Minimizing Risk con’t
• Be cautious when responding to
  – The car sitting in the hallway at the mall
  – Raffles
  – Online surveys
• Keep your purse or wallet in a safe place
  at work
• When ordering new checks, pick them up at
  the bank
      Minimizing Risk con’t
• Minimize the risk to others!
  – Think of what PII you handle
  – When you came to this session how did
    you leave your PII or that of others?
     Minimizing Risk con’t
• Online records
• Take a look…
    Phone Number Reverse Lookup
          If you are a victim
• File a police report
• Close all financial accounts
• Call the Social Security Office fraud
• Cancel your state ID
• Place fraud alert on your credit reports
• File a complaint with the Federal Trade
• Guilty until proven innocent – prove that
  you are a victim
         What is GU doing
• Creation of an information security
  program is underway
• User education & awareness
• Incident response team
• Launching major data classification
  and control initiative
• TAKE CHARGE: Fighting Back Against
  Identity Theft
• Free Credit Reports or 877-322-
• Credit reporting agencies
  – Equifax 800-525-6285
  – Experian 888-397-3742
  – TransUnion 800-680-7289
• Classic Cons
• Mail theft
• Social Security Number misuse
       Contact Information
• Help Desk –
  – Extension 5550
• Jim Jones – IT Asset Manager
  – Extension 5926
• Http://

To top