SlideShare una empresa de Scribd logo
1 de 21
Protecting Your Identity:
What to Know, What to Do
Mark Fullbright, Identity Theft Advocate

ICFE CITRMS® Certified
Overview
Identity protection
•Protection from what?
•Warning signs of identity theft
•How you can reduce your risk
What is identity theft?
Identity theft:
•Someone steals your personal information
•Uses it without permission
•Can damage your finances, credit history and reputation
Warning Signs
How do you know if your identity was stolen?
•mistakes on accounts or your Explanation of Medical benefits
•regular bills go missing
•calls from debt collectors for debts that aren’t yours
•notice from the IRS
•calls or mail about accounts in your minor child’s name
How does identity theft happen?
Identity thieves will:
•steal information from trash or from a business
•trick you into revealing information
•take your wallet or purse

•pretend to offer a job, loan, or apartment to get your
information
Reduce Your Risk
Identity protection means treating your personal information
with care.
Make it a habit.

•like buckling your seatbelt, or
•locking your doors at night
Reduce Your Risk
How does identity theft happen?
•Your right to a free credit report every 12 months
•To order:
annualcreditreport.com
1-877-322-8228
Reduce Your Risk
Read your bank, credit and account statements, and
Explanation of Medical benefits.
•Look for charges you didn’t make.

•Be alert for bills that don’t arrive when you expect them.
•Follow up if you get account statements you don’t expect.
Reduce Your Risk
Respond quickly to notices from the Internal Revenue
Service.
•If someone has used your Social Security number on a tax
return, contact IRS’s Specialized Identity Theft Protection
Unit
–1-800-908-4490
Reduce Your Risk
Secure your Social Security Number.
•If someone asks for it, ask:
–Why do you need it?
–How will it be used?
–How do you protect it?
Reduce Your Risk
Protect Your Personal Information.
•Keep your important papers secure.
•Be careful with your mail.
•Shred sensitive documents.

•Don’t overshare on social networking sites.
Reduce Your Risk
Be alert to online impersonators.
•Do you know who is getting your personal information?
•Don’t click on links in emails.
•Contact customer service.
Reduce Your Risk
Protect your computer.
•Use anti-virus software, anti-spyware software, and a
firewall.

•Create strong passwords.
•Keep your computer’s operating system, browser, and
security up to date.
Reduce Your Risk
Protect your computer.
•Encrypt your data.
•Be wise about wi-fi.
Reduce Your Risk
Protect your computer.
•Lock up your laptop.
•Read privacy policies.
What to do if someone has
stolen your identity?
•

•Act fast to limit the damage.
•Take these steps immediately.
If your identity is stolen…
STEP 1: Place an initial fraud alert on your credit report.
•Contact any one of the three nationwide credit reporting
companies.
•Equifax 1-800-525-6285
•Experian 1-888-397-3742
•TransUnion 1-800-680-7289
If your identity is stolen…
Step 2: Order your credit reports.
•Contact each of the three credit reporting companies.
•ID theft victims get a copy of their reports for free.
•Read your reports carefully and correct any errors.
If your identity is stolen…
Step 3: Create an Identity Theft Report.
•Gives you rights that help you to recover more quickly.
• File a complaint with the FTC.
– Ftc.gov/complaint or 1-877-438-4338.
– This will become your FTC Affidavit.

•File a police report.
Your FTC Affidavit and police report make an
Identity Theft Report.
Contact the FTC
•File an identity theft complaint with the FTC:
– ftc.gov/complaint
– 1-877-ID-THEFT
– 1-877-438-4338

•Learn more identity theft:
–ftc.gov/idtheft

•Order free materials:
–bulkorder.ftc.gov

Más contenido relacionado

La actualidad más candente

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
[Wroclaw #3] Trusted Computing
[Wroclaw #3] Trusted Computing[Wroclaw #3] Trusted Computing
[Wroclaw #3] Trusted ComputingOWASP
 
Tips On Trick Odoo Add-On.pptx
Tips On Trick Odoo Add-On.pptxTips On Trick Odoo Add-On.pptx
Tips On Trick Odoo Add-On.pptxAgusto Sipahutar
 
Society, law and ethics Privacy Laws
Society, law and ethics Privacy LawsSociety, law and ethics Privacy Laws
Society, law and ethics Privacy Lawsvikram mahendra
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)Ali Habeeb
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityarun alfie
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security BlueprintZefren Edior
 
Log management principle and usage
Log management principle and usageLog management principle and usage
Log management principle and usageBikrant Gautam
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 

La actualidad más candente (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
[Wroclaw #3] Trusted Computing
[Wroclaw #3] Trusted Computing[Wroclaw #3] Trusted Computing
[Wroclaw #3] Trusted Computing
 
Tips On Trick Odoo Add-On.pptx
Tips On Trick Odoo Add-On.pptxTips On Trick Odoo Add-On.pptx
Tips On Trick Odoo Add-On.pptx
 
Society, law and ethics Privacy Laws
Society, law and ethics Privacy LawsSociety, law and ethics Privacy Laws
Society, law and ethics Privacy Laws
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Application Security Logging with Splunk using Java
Application Security Logging with Splunk using JavaApplication Security Logging with Splunk using Java
Application Security Logging with Splunk using Java
 
Bank security
Bank securityBank security
Bank security
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
ISMS Awareness_Intan Rahayu
ISMS Awareness_Intan RahayuISMS Awareness_Intan Rahayu
ISMS Awareness_Intan Rahayu
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
Log management principle and usage
Log management principle and usageLog management principle and usage
Log management principle and usage
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 

Destacado

わかる中級英文法 Grammar in Use Unit 100 soとsuch
わかる中級英文法 Grammar in Use Unit 100 soとsuchわかる中級英文法 Grammar in Use Unit 100 soとsuch
わかる中級英文法 Grammar in Use Unit 100 soとsuchiacer
 
Diaposiitivas de-informatica
Diaposiitivas de-informaticaDiaposiitivas de-informatica
Diaposiitivas de-informaticawilmerquinatoa
 
CV-of-Saif-CCIE-Collaboration
CV-of-Saif-CCIE-CollaborationCV-of-Saif-CCIE-Collaboration
CV-of-Saif-CCIE-CollaborationSaiful Jehadi
 
coursecompletion (1)
coursecompletion (1)coursecompletion (1)
coursecompletion (1)Heather Keel
 
わかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ where
わかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ whereわかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ where
わかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ whereiacer
 
re:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さい
re:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さいre:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さい
re:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さい宗 大栗
 
第一回IoT関連技術勉強会 分散処理編
第一回IoT関連技術勉強会 分散処理編第一回IoT関連技術勉強会 分散処理編
第一回IoT関連技術勉強会 分散処理編tzm_freedom
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Martin Ruubel
 
PythonでテキストをJSONにした話(PyCon mini sapporo 2015)
PythonでテキストをJSONにした話(PyCon mini sapporo 2015)PythonでテキストをJSONにした話(PyCon mini sapporo 2015)
PythonでテキストをJSONにした話(PyCon mini sapporo 2015)Satoshi Yamada
 
わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1
わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1
わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1iacer
 
Agritech×IoT_lorawanで実現する環境モニタリング
Agritech×IoT_lorawanで実現する環境モニタリングAgritech×IoT_lorawanで実現する環境モニタリング
Agritech×IoT_lorawanで実現する環境モニタリングkazuhiro harada
 
わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1
わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1
わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1iacer
 
SDN / NFV opensource and standards in wireless networks 2015 for cnv
SDN  / NFV opensource and standards in wireless networks 2015 for cnvSDN  / NFV opensource and standards in wireless networks 2015 for cnv
SDN / NFV opensource and standards in wireless networks 2015 for cnvPatrick Lopez
 
Fwn wan link load balancer 2015-04-30
Fwn wan link load balancer 2015-04-30Fwn wan link load balancer 2015-04-30
Fwn wan link load balancer 2015-04-30Lan & Wan Solutions
 
わかる中級英文法 Grammar in Use Unit 47否定疑問文
わかる中級英文法 Grammar in Use Unit 47否定疑問文わかる中級英文法 Grammar in Use Unit 47否定疑問文
わかる中級英文法 Grammar in Use Unit 47否定疑問文iacer
 
Business credit for business owners - Credit Management Association
Business credit for business owners - Credit Management AssociationBusiness credit for business owners - Credit Management Association
Business credit for business owners - Credit Management AssociationCredit Management Association
 
わかる中級英文法 Grammar in Use Unit 79 'sとof
わかる中級英文法 Grammar in Use  Unit 79  'sとof わかる中級英文法 Grammar in Use  Unit 79  'sとof
わかる中級英文法 Grammar in Use Unit 79 'sとof iacer
 
本気でPythonで宛名書きした話
本気でPythonで宛名書きした話本気でPythonで宛名書きした話
本気でPythonで宛名書きした話Satoshi Yamada
 

Destacado (20)

Vmware
VmwareVmware
Vmware
 
わかる中級英文法 Grammar in Use Unit 100 soとsuch
わかる中級英文法 Grammar in Use Unit 100 soとsuchわかる中級英文法 Grammar in Use Unit 100 soとsuch
わかる中級英文法 Grammar in Use Unit 100 soとsuch
 
Diaposiitivas de-informatica
Diaposiitivas de-informaticaDiaposiitivas de-informatica
Diaposiitivas de-informatica
 
CV-of-Saif-CCIE-Collaboration
CV-of-Saif-CCIE-CollaborationCV-of-Saif-CCIE-Collaboration
CV-of-Saif-CCIE-Collaboration
 
coursecompletion (1)
coursecompletion (1)coursecompletion (1)
coursecompletion (1)
 
わかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ where
わかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ whereわかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ where
わかる中級英文法 Grammar in Use Unit 92 関係節3 whose/whom/ where
 
re:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さい
re:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さいre:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さい
re:Growth 2015 TOKYO keynote以外のアップデートのこと、時々でいいから...... 思い出して下さい
 
第一回IoT関連技術勉強会 分散処理編
第一回IoT関連技術勉強会 分散処理編第一回IoT関連技術勉強会 分散処理編
第一回IoT関連技術勉強会 分散処理編
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
 
PythonでテキストをJSONにした話(PyCon mini sapporo 2015)
PythonでテキストをJSONにした話(PyCon mini sapporo 2015)PythonでテキストをJSONにした話(PyCon mini sapporo 2015)
PythonでテキストをJSONにした話(PyCon mini sapporo 2015)
 
わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1
わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1
わかる中級英文法 Grammar in Use Unit 98 形容詞と副詞1
 
Agritech×IoT_lorawanで実現する環境モニタリング
Agritech×IoT_lorawanで実現する環境モニタリングAgritech×IoT_lorawanで実現する環境モニタリング
Agritech×IoT_lorawanで実現する環境モニタリング
 
わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1
わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1
わかる中級英文法 Grammar in Use Unit 67 可算名詞と不可算名詞1
 
SDN / NFV opensource and standards in wireless networks 2015 for cnv
SDN  / NFV opensource and standards in wireless networks 2015 for cnvSDN  / NFV opensource and standards in wireless networks 2015 for cnv
SDN / NFV opensource and standards in wireless networks 2015 for cnv
 
Fwn wan link load balancer 2015-04-30
Fwn wan link load balancer 2015-04-30Fwn wan link load balancer 2015-04-30
Fwn wan link load balancer 2015-04-30
 
わかる中級英文法 Grammar in Use Unit 47否定疑問文
わかる中級英文法 Grammar in Use Unit 47否定疑問文わかる中級英文法 Grammar in Use Unit 47否定疑問文
わかる中級英文法 Grammar in Use Unit 47否定疑問文
 
Business credit for business owners - Credit Management Association
Business credit for business owners - Credit Management AssociationBusiness credit for business owners - Credit Management Association
Business credit for business owners - Credit Management Association
 
わかる中級英文法 Grammar in Use Unit 79 'sとof
わかる中級英文法 Grammar in Use  Unit 79  'sとof わかる中級英文法 Grammar in Use  Unit 79  'sとof
わかる中級英文法 Grammar in Use Unit 79 'sとof
 
Venom
Venom Venom
Venom
 
本気でPythonで宛名書きした話
本気でPythonで宛名書きした話本気でPythonで宛名書きした話
本気でPythonで宛名書きした話
 

Similar a Protect Identity: Know Risks & Steps

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftCost U Less Direct
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 

Similar a Protect Identity: Know Risks & Steps (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Toolkit
Identity Theft ToolkitIdentity Theft Toolkit
Identity Theft Toolkit
 
Staying Secure Electronically
Staying Secure ElectronicallyStaying Secure Electronically
Staying Secure Electronically
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Idenity Theft
Idenity TheftIdenity Theft
Idenity Theft
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 

Más de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Más de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Último (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

Protect Identity: Know Risks & Steps

  • 1. Protecting Your Identity: What to Know, What to Do Mark Fullbright, Identity Theft Advocate ICFE CITRMS® Certified
  • 2. Overview Identity protection •Protection from what? •Warning signs of identity theft •How you can reduce your risk
  • 3. What is identity theft? Identity theft: •Someone steals your personal information •Uses it without permission •Can damage your finances, credit history and reputation
  • 4. Warning Signs How do you know if your identity was stolen? •mistakes on accounts or your Explanation of Medical benefits •regular bills go missing •calls from debt collectors for debts that aren’t yours •notice from the IRS •calls or mail about accounts in your minor child’s name
  • 5. How does identity theft happen? Identity thieves will: •steal information from trash or from a business •trick you into revealing information •take your wallet or purse •pretend to offer a job, loan, or apartment to get your information
  • 6. Reduce Your Risk Identity protection means treating your personal information with care. Make it a habit. •like buckling your seatbelt, or •locking your doors at night
  • 7. Reduce Your Risk How does identity theft happen? •Your right to a free credit report every 12 months •To order: annualcreditreport.com 1-877-322-8228
  • 8. Reduce Your Risk Read your bank, credit and account statements, and Explanation of Medical benefits. •Look for charges you didn’t make. •Be alert for bills that don’t arrive when you expect them. •Follow up if you get account statements you don’t expect.
  • 9. Reduce Your Risk Respond quickly to notices from the Internal Revenue Service. •If someone has used your Social Security number on a tax return, contact IRS’s Specialized Identity Theft Protection Unit –1-800-908-4490
  • 10. Reduce Your Risk Secure your Social Security Number. •If someone asks for it, ask: –Why do you need it? –How will it be used? –How do you protect it?
  • 11. Reduce Your Risk Protect Your Personal Information. •Keep your important papers secure. •Be careful with your mail. •Shred sensitive documents. •Don’t overshare on social networking sites.
  • 12. Reduce Your Risk Be alert to online impersonators. •Do you know who is getting your personal information? •Don’t click on links in emails. •Contact customer service.
  • 13. Reduce Your Risk Protect your computer. •Use anti-virus software, anti-spyware software, and a firewall. •Create strong passwords. •Keep your computer’s operating system, browser, and security up to date.
  • 14. Reduce Your Risk Protect your computer. •Encrypt your data. •Be wise about wi-fi.
  • 15. Reduce Your Risk Protect your computer. •Lock up your laptop. •Read privacy policies.
  • 16. What to do if someone has stolen your identity? • •Act fast to limit the damage. •Take these steps immediately.
  • 17. If your identity is stolen… STEP 1: Place an initial fraud alert on your credit report. •Contact any one of the three nationwide credit reporting companies. •Equifax 1-800-525-6285 •Experian 1-888-397-3742 •TransUnion 1-800-680-7289
  • 18. If your identity is stolen… Step 2: Order your credit reports. •Contact each of the three credit reporting companies. •ID theft victims get a copy of their reports for free. •Read your reports carefully and correct any errors.
  • 19. If your identity is stolen… Step 3: Create an Identity Theft Report. •Gives you rights that help you to recover more quickly. • File a complaint with the FTC. – Ftc.gov/complaint or 1-877-438-4338. – This will become your FTC Affidavit. •File a police report.
  • 20. Your FTC Affidavit and police report make an Identity Theft Report.
  • 21. Contact the FTC •File an identity theft complaint with the FTC: – ftc.gov/complaint – 1-877-ID-THEFT – 1-877-438-4338 •Learn more identity theft: –ftc.gov/idtheft •Order free materials: –bulkorder.ftc.gov