identity theft: real or virtual? by: alex metzler
TRANSCRIPT
Real Table of Contents
• What are the three pieces of information thieves look for?
• Where do they get personal information?• How is it used?• How can you protect yourself?
What are three pieces of
information thieves look for?• Account number
• Driver’s license• Social Security number
How is it used?• Credit Cards
– Go on a buying spree– Open new accounts– Change the credit card mailing address– Buy cars– Counterfeit debit cards
How is it used? (Cont.)
• Other personal documents– Establish telephone lines in your name– Counterfeit checks– Open bank account in your name– File bankruptcy under your name– Use your name when arrested
How can you protect yourself?
• Wallet or Purse– Don’t carry personal information unless needed
• Credit/Debit Cards– Cancel unused cards
• Cut up into tiny pieces• Throw away
How can you protect yourself? (Cont.)
– Don’t carry excess cards unless needed– Don’t write (PIN) on the card
• Have them use your photo ID• Make copy of cards; Keep them safe
– You can cancel cards if stolen– Keep credit reporting agencies from sending
offers
How can you protect yourself? (Cont.)
– http://www.equifax.com/home/en_us, http://www.experian.com/, http://www.transunion.com/ are three credit reporting agencies
• Mailbox– Take outgoing mail to Post Office
• Also Postal Box• Glove Compartment
– Remove any/all personal information
How can you protect yourself? (Cont.)
• Trash– Shred all personal papers
• You– Don’t give out personal information
• i.e. in person, telephone, mail, or internet– Secure personal papers
How can you protect yourself? (Cont.)
– i.e. safe, locked drawer, locked box• If personal information needed, ask questions:
– How is it going to be used?– How is it going to be protected?– What happens if not provided?
Virtual Table of Contents
• What does a thief want?• Where do they get it?• How do you protect yourself?
What does a thief want?
• Capture your personal information• Create a new identity
– Based on you– Use that identity for own purposes
Where do they get it?
• Anywhere from your personal computer• They can get your:
– Bank account information or e-tax returns– PDA data or spreadsheets– Anything with personal information they want
How do you protect yourself?
• Use unique passwords– Use one when you can– Change them regularly– Don’t set to “Remember My Password”– Don’t write them down
How do you protect yourself? (Cont.)
• Get Anti-Virus software– Always keep up to date
• Keep OS system up-to-date• Install firewall
– “Software barrier”• Take caution with Wi-Fi
How do you protect yourself? (Cont.)
• P2P– You get files, so can they
• From others or yourself• DON’T GIVE OUT PERSONAL INFORMATION• Beware of “Phishing”
– Use fake emails, trick you for information
How do you protect yourself? (Cont.)
• Pay attention to “caching”– Computer remembers where you have been
• Secure site will have an “s”– Always after http; i.e. https://
DETER• Shred all personal papers• Protect Social Security Number• Keep important information locked up• Never give out personal information unless
secure• Use hard Passwords
Detect• Signs of ID theft:
– Bills don’t arrive – New credit card accounts
• Check your credit score often• Review Financial statement
Defend• Place Fraud Alert on credit report• Close tampered with accounts
– Call company’s fraud department• File a police report• Report theft to FTC
Thanks For The Help• BBBOnline.
http://www.bbbonlince.org/IDTheft/virtual.asp. 2003
• BBBOnline. http://www.bbbonlince.org/IDTheft/protect.asp. 2003
• Federal Trade Commission. www.ftc.gov/idtheft.• Federal Trade Commission.
http://www.ftc.gov/bcp/edu/microsites/idtheft/images/identity-theft-symbols.gif