SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
THURSDAY
INTERACTIVE TOOLKIT
PROTECT YOUR IDENTITY DAY
interactive too
lkit
FEDERAL TRADE COMMISSION
F i g h t i n g B a c k A g a i n s t
Identity Theft
Protect
your
Identity
Days
how
to
plan
&
host
1
About this toolkit
The Federal Trade Commission has developed this toolkit to help organizations
combat identity theft by raising awareness and educating people through a
Protect Your Identity Day. This kit provides information and sample materials
to help plan and host a successful Protect Your Identity Day.
Included in this kit is a CD that contains the entire kit contents, which you
can customize and print. The CD also includes Deter, Detect, Defend videos
for computer broadcast and Talking About Identity Theft: A How-To Guide,
which offers more sample materials, including a speech, presentation, and
template media materials in English and Spanish. You also can download
that guide at ftc.gov/idtheft.
This kit also includes a DVD that features Deter, Detect, Defend videos for
television broadcast.
THURSDAY
ID THEFT PARTNERSHIPS EVENTS INTERACTIVE TOOLKIT
TOOLKIT MEDIA RESOURCES PROTECT YOUR IDENTITY DAY
How to use the CD-ROM:
1. Load the CD-ROM in your computer.
2. PC: If you use Windows, Autorun will
launch the program automatically. If
Autorun is not active, double-click the
“My Computer” icon and then double-
click on the “Interactive Toolkit” icon.
	MAC: Double-click the “Interactive
Toolkit” icon then double-click the file
you would like to view.
How to use the DVD:
Follow the normal loading instructions for
your DVD player.
how to plan  host
protect your identity days
Table of Contents
About Identity Theft. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Tips: Avoid ID Theft: Deter, Detect, Defend•	
About Protect Your Identity Day. . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Host a•	 Protect Your Identity Day
Outreach To Media. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
6 Steps to Media Success•	
Plan a Media Event•	
Outreach To Partners. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5 Steps to Successful Partnerships•	
Plan Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
8 Steps to a Successful Event•	
Sample Run of Show•	
Sample Talking Points•	
Sample Official Proclamation•	
Sample Consumer Quiz•	
Additional Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3
About Identity Theft
What is Identity Theft?
Identity theft occurs when someone uses your personally identifying
information, like your name, Social Security number, or credit card
number, without your permission, to commit fraud or other crimes.
The Federal Trade Commission estimates that as many as 10 million
Americans have their identities stolen each year. In fact, you or someone you
know may have experienced some form of identity theft.
Identity theft is serious. People whose identities have been stolen can spend
hundreds of dollars and dozens of hours cleaning up the mess thieves
have made of their good name and credit record. Consumers victimized
by identity theft may lose out on job opportunities, or be denied loans for
education, housing, or cars because of negative information on their credit
reports. They may even be arrested for crimes they did not commit. The
potential for damage, loss, and stress is considerable.
How do thieves steal an identity?
Identity theft starts with the misuse of your personally identifying information.
For identity thieves,your name and Social Security number,credit card
numbers,or other financial account information is as good as gold.
Skilled identity thieves may use a variety of methods to get hold of your
information:
3 They may steal your mail, wallet, or purse.
3 They may get personal information from you by posing as
legitimate companies through email, in a practice known as
“phishing.” Or they might lie to you on the phone.
3 They may take your information from businesses or other
institutions by stealing personnel records, bribing or conning an
employee who has access to these records, or breaking into your
records electronically.
Some identity theft victims even report that their information has been
stolen by someone they know.
Tips Avoid ID Theft: Deter, Detect, Defend
While nothing can guarantee that you won’t become a victim of identity
theft, you can take specific steps to minimize your risk, and minimize the
damage if a problem develops. It’s about following the “3 D’s” of identity
theft protection – Deter, Detect, Defend.
ID THEFT
TOOLKIT
4 5
Order your credit report:
3 The law requires the major nationwide consumer reporting companies
– Equifax, Experian, and TransUnion – to give you a free copy of your
credit report each year if you ask for it.
3 Visit www.AnnualCreditReport.com or call 1-877-322-8228, a
service created by these three companies, to order your free credit
reports each year. Or you can write: Annual Credit Report Request
Service, P.O. Box 105281, Atlanta, GA 30348-5281.
DEFEND:
Defend against Identity Theft as soon as
you suspect a problem
Place a “Fraud Alert” on your credit reports, and review the
reports carefully. The alert tells creditors to follow certain procedures
before they open new accounts in your name or make certain changes
to your existing accounts. The three nationwide consumer reporting
companies have toll-free numbers for placing an initial 90-day fraud
alert; a call to one company is sufficient:
Equifax: 1-800-525-6285
Experian: 1-888-EXPERIAN (397-3742)
TransUnion: 1-800-680-7289
Placing a fraud alert entitles you to free copies of your credit reports.
Look for inquiries from companies you haven’t contacted, accounts you
didn’t open, and debts on your accounts that you can’t explain.
Close accounts. Close any accounts that have been tampered with or
established fraudulently.
3 Call the security or fraud departments of each company where
an account was opened or changed without your okay. Follow up in
writing, with copies of supporting documents.
3 Use the Identity Theft Affidavit at ftc.gov/idtheft to support your
written statement.
3 Ask for written verification that the disputed account has been
closed and the fraudulent debts discharged.
3 Keep copies of documents and records of your conversations
about the theft.
File a police report. File a report with law enforcement officials to
help you with creditors who may want proof of the crime.
Report your complaint to the Federal Trade Commission. Your
report helps law enforcement officials across the country in their
investigations.
Online: ftc.gov/idtheft
By phone: 1-877-ID-THEFT (438-4338) or TTY, 1-866-653-4261
ID THEFT
TOOLKIT
DETER:
Deter identity thieves by safeguarding
your information
Shred financial documents and paperwork with personal
information before you discard them.
Protect your Social Security number. Don’t carry your Social
Security card in your wallet or write your Social Security number on
a check. Give it out only if absolutely necessary or ask to use another
identifier.
Don’t give out personal information on the phone, through
the mail, or over the Internet unless you have initiated the
contact and know who you are dealing with.
Never click on links sent in unsolicited emails; instead, type in
a Web address you know. Use firewalls, anti-spyware, and anti-virus
software to protect your home computer; keep them up-to-date. Visit
OnGuardOnline.gov for more information.
Don’t use an obvious password like your birth date, your mother’s
maiden name, or the last four digits of your Social Security number.
Keep your personal information in a secure place at home,
especially if you have roommates, employ outside help, or are having
work done in your house.
DETECT:
Detect suspicious activity by routinely
monitoring your financial accounts 
billing statements
Be alert to signs that require immediate attention:
3 Mail or bills that do not arrive as expected.
3 Unexpected credit cards or account statements.
3 Denials of credit for no apparent reason.
3 Calls or letters about purchases you did not make.
Inspect:
3 Your credit report. Credit reports have information about you,
including what accounts you have and your bill paying history.
3 Your financial statements. Review financial accounts and billing
statements regularly, looking for charges you did not make.
6 7
About Protect Your
Identity Day
The Federal Trade Commission, the nation’s consumer protection agency,
helps people learn how to minimize the risk of becoming a victim of
identity theft.
While there is no fool-proof way to avoid identity theft, there are ways to
minimize the chances of becoming a victim and minimize the damage
should a theft occur. Hosting a Protect Your Identity Day can show
your community how.
Law enforcement officials, state attorneys general, state and local
government, and community and business leaders each can play a pivotal
role in educating the public. We encourage you to host a Protect Your
Identity Day in your community.
There is no single date for a Protect Your Identity Day. You can
designate any day that works for your community or organization.
The important thing is to take the lead in educating your particular
community about avoiding identity theft.
Host A Protect Your Identity Day
Hosting a Protect Your Identity Day is easy, and there are many ways
to do it. When, where, and how it happens is up to you. Consider hosting
a media event, such as a press conference, to raise awareness of the Day
and the issue. Or stage a dedicated event at your local civic center, police
station, mall, public library, or university. Or arrange a booth at an
existing community event, such as a county fair or festival. You might
consider hosting a “shred event” so people in your community can shred
unwanted personal information and records. This could be a half-day
or full-day event. If you are interested in expanding your reach and
resources, recruit a partner organization as a co-sponsor.
Here are three possible approaches for implementing your Day:
1.	Media outreach
2.	Partnership outreach
3.	Events
We offer step-by-step guidance and customizable template materials to
help you implement each approach. Different levels of engagement will
enable you to use your resources to maximum effect.
THURSDAY
TOOLKIT MEDIA RESOURCES PROTECT YOUR IDENTITY DAY
8 9
Outreach To Media
When hosting a Protect Your Identity Day, you can work with local
media to spread the word to your community about identity theft and
demonstrate your group’s commitment to fighting this crime.
Media outreach takes many forms – from a call to a reporter to suggest
a story to issuing a formal press release to organizing a media event. All
can be effective. The important thing is to tailor the outreach to your
organization’s particular approach to Protect Your Identity Day.
Following are two sections that offer basic guidance about reaching out to
media and planning a media event.
For more information on media outreach and template media materials,
please visit ftc.gov/idtheft, and refer to the CD in this kit. See Section 7 of
Talking About Identity Theft: A How-To Guide.
6 Steps to Media Success on
Protect Your Identity Day
Whether your organization plans on releasing helpful tips to consumers
about how to combat identity theft on its Protect Your Identity Day or
hosting a full scale media event, six general steps can help you get positive
media coverage for your event.
1 Select a Target Audience
Determine who you want to reach. This may include businessmen, financial
planners, teachers, your employees or organization’s members, or local
officials. You may wish to focus on a particular population, such as senior
citizens or students.
2 Develop a Media List
Once you have identified your target audience, create a media list. It
should be comprised of media outlets (local newspapers, television/cable
stations, and radio stations) and reporters at each outlet who may find the
identity theft issue relevant to the subject area they cover. Include these
journalists’ names and contact information (phone, email, fax, address)
on your list. By communicating with specific individuals at news outlets,
you are more likely to get a response.
3 Find the News Angle
Identity theft is an issue that gets coverage. However, to generate local
media interest, your organization should consider what will make your
Protect Your Identity Day a compelling story. Consider including some
of the following to strengthen your local news hook:
TOOLKIT MEDIA
10 11
Plan a Media Event on Protect Your
Identity Day
Media events or press conferences allow you to deliver your story to many
media outlets at once. When planning a media event, consider:
Timing. Check your local calendar listings before planning an event to
make sure it doesn’t conflict with another major media event. The best
time to schedule a media event is 10 a.m. This allows time in the morning
for the media to review the story options for the day. Consider also that
your event might be more successful at certain times of the year (for
example: during tax season when financial issues and identity theft are
more top-of-mind for consumers).
Location. Ideally, the location of the event should be relevant to
the issue or story being presented. Take the time to scout your location
before you choose it, and visit it again a few times before you host the
event. Think about what equipment you will need (for example: podium,
microphone, other A/V items, media check-in table), as well as space
requirements to accommodate attendees and potential press.
Inviting Guests. Consider inviting community leaders, including
the mayor, local law enforcement, local city council members, and noted
identity theft experts to speak at a news conference. Also, be sure to invite
individuals from the community who may wish to learn more about
identity theft (for example: religious groups, fraternal organizations,
military, business people, and educators).
Inviting Media. The most effective way to invite media to a press
conference is through a media advisory. Send your advisory to the reporter
about 10 days before your event and again the day before the event.
other Considerations.
Do you need to prepare signs, like banners and podium signs, that
can be placed in front of cameras and photographers?
Do you have an agenda or “run of show” that outlines the flow of the
media event?
When will you brief assigned spokesperson(s) before the media
event, go over the event agenda, and prepare for potential questions?
Who is creating the press kits, including the agenda, fact sheet, bios
of speakers, press release, and other relevant materials?
TOOLKIT MEDIATime the event around a major identity theft story in the news, possibly
when arrests, indictments, or prosecutions are made; during National
Consumer Protection Week (early March); or around spring cleaning or
back-to-school times, when people are thinking of financial issues.
Local statistics that highlight the prevalence of identity theft in
your county, city, or state. The FTC compiles statistics on identity theft
complaints by state and city.
Tips and resources consumers can use to deter, detect, and defend
against identity theft.
Any partners your organization has chosen to work with to hold a
Protect Your Identity Day.
4 Prepare Media Materials  Information
Once you have your core story idea in place, prepare press materials. Key
materials include:
Press release – A one- to two-page document with information about
your group’s Protect Your Identity Day and a quote from your
spokesperson(s).
Media advisory – A one-page document inviting journalists to attend
a Protect Your Identity Day media event, should your organization
decide to host one as part of the day. The advisory should highlight
basic information (who, what, when, and where).
Talking points – A one- to two-page document with basic talking
points for your spokesperson(s), which highlight how to deter, detect,
and defend against identity theft.
For a full suite of template media materials, please visit ftc.gov/idtheft
or refer to the DVD in this kit and see Section 7 of Talking About
Identity Theft: A How-To Guide.
5 Identify a Media Spokesperson
It will be helpful to identify possible spokespersons early on whom
the media can interview. These could be a victim who can offer first-
hand testimonial and an expert – either a law enforcement officer or a
politician. A strong spokesperson is credentialed and knowledgeable about
the identity theft issue and is comfortable speaking to the media. If your
spokesperson wants more information on identity theft, he or she can get
up to speed at ftc.gov/idtheft.
6 Contact (or “Pitch”) the Media
Contact the media about 10 days prior to Protect Your Identity Day.
Typically, it is helpful to send an email pitch first that includes your press
release. Follow up with a phone call to the reporter the next day.
12 13
Outreach to Partners
Developing relationships with like-minded organizations is an important
part of outreach efforts as you work to deter, detect, and defend against
identity theft. By joining credible partners who can help expound on your
identity theft messages, you can add depth, multiply your “arms and legs,”
and increase consumer awareness about identity theft.
5 Steps to Successful Protect Your
Identity Day Partnerships
1 IDentify Your Partners
To decide which partners are a good fit, list local organizations that
your audience knows and trusts. Seek advice from others like local law
enforcement agencies, for example, on which organizations they would
recommend aligning with for a Protect Your Identity Day.
Some partners that may be appropriate for identity theft prevention
include:
ID THEFT PARTNERSHIPS
TOOLKIT MEDIA
Consumer groups (victims’
assistance, legal aid…)
Law enforcement agencies
(police departments, state
attorney general’s office…)
City, county, and state
government (Department of
Motor Vehicles, local Social
Security office…)
Faith-based organizations
(churches, temples, mosques,
synagogues…)
Media organizations (radio
stations, television stations,
newspapers…)
Business and labor
organizations (grocery stores,
real estate offices, financial
advisors, local unions, utility
companies…)
Seniors’ groups (assisted living
facilities, area agencies on
aging, senior centers…)
Education groups (schools,
libraries, universities…)
Medical community (hospital
administrators, pharmacies,
health centers…)
Military (base officials, veterans,
family support offices…)
14 15
ID THEFT PARTNERSHIPS
TOOLKIT MEDIA
4 Be Clear on Who is Doing What
Confirm your partnership arrangements in a letter or email to your new
partner organization. This document can be a simple list of the details
of the partnership. You may want to include a summary of the role and
responsibilities of each partner, as well.
5 Communicate Clearly  Frequently
Once your partnership is established and outreach is underway, keep
your partner(s) informed and involved. It is important to keep local law
enforcement agencies aware of your work, too, because they are your allies
in the fight against identity theft. Give them notice of any events or special
projects that you host.
2 Do Your Homework  Make Contact
Learn as much as you can about any prospective partners: their role in the
community, how they are impacted by identity theft, and how their mission
relates to the community or consumer protection and/or privacy.
As you approach potential partners, remember that enthusiasm goes a
long way. Call or set up a meeting to start the ball rolling and gauge their
interest. During this meeting, tailor your presentation to the particular
group as much as possible, and highlight how the partnership could
benefit their group. Be prepared to speak about the benefits of addressing
identity theft together, the potential “win-win” of a partnership, and
background about Protect Your Identity Day and identity theft.
3 Plan a Protect Your Identity Day
Once you and your partner(s) have agreed to work together, establish
a plan for your Protect Your Identity Day, starting with a group
brainstorm about how this day could look. Clarify roles and responsibilities,
and reach consensus on your goals and strategies for success.
16 17
plan Events
A successful Protect Your Identity Day event can raise awareness about
identity theft by bringing together a wide range of participants and reach-
ing a wide range of people – either directly or through media coverage.
8 Steps to a Successful Protect Your
Identity Day Event
Following are some important considerations for planning a Protect
Your Identity Day event.
1 Determine Timing
Check your newspaper’s local calendar listings before planning an event to
avoid conflicts. If you plan on inviting the media, the best time to schedule
an event is 10 a.m.
2 Establish a Budget
What the event looks like and where it is held will be determined largely
by your budget. For example, holding your event at a hotel will involve
considerable fees. However, a local police station may be more than willing
to offer space at no cost. It is important to prioritize the elements you want
in place to make your Protect Your Identity Day a success.
3 Secure a Location
The location of the event should be relevant to the issue or story being
presented, be accessible to public transportation, and have ample parking.
Scout a few locations before making your choice, and visit a few times
before you host the event. Anticipate what equipment will be necessary (for
example: podium, microphone, other A/V items, media check-in table), as
well as space requirements to accommodate attendees and potential press.
Think about police stations, law enforcement offices, grocery stores, places of
worship, senior centers, community recreation centers, schools, universities,
libraries, public parks, museums, or other community locations.
4 Develop the Run of Show
Another important element to consider is the agenda or general run of
show for the day. Think through the full event agenda, considering a
variety of factors: food and beverages; hand-outs; parking; audiovisual
needs; room set-up, and length of program. See Sample Run of Show
on page 19.
ID THEFT PARTNERSHIPS EVENTS INTE
TOOLKIT MEDIA RESOURCES PROTECT
18 19
Sample Run of Show
9:30 am –10:00 am	 Arrivals / Refreshments
	 Guests, media (if invited) check in
10:00 am –10:05 am	 Introductions / Opening Remarks
	 Your organization’s leader makes welcoming remarks
Local official makes remarks about identity theft
10:05 am –10:20 am	 Deterring, Detecting, and Defending
Against Identity Theft in Our Community
10:20 am – 10:30 am	 Identity Theft Panel Discussion
	 Several victims of identity theft share their experiences
	 and convey lessons learned
10:30 am – 10:50 am	 Questions  Answers 	
	 All
10:50 am – 10:55 am	 Closing Remarks
	 Distinguished guest makes closing remarks
	 (mayor or other “VIP” figure)
10:55 am – 11:00 am	 Conclusion
	 Your organization’s leader thanks everyone for attending
Sample Talking Points
The following are suggested talking points to include in your Protect Your
Identity Day.They are general and can be tailored to fit your particular event.
The Federal Trade Commission is working with law enforcement
agencies, businesses, consumer groups, and organizations
across the country to educate people about identity theft. The agency
is encouraging organizations to host Protect Your Identity Days
throughout the year and throughout the nation to increase awareness
about deterring, detecting, and defending against the crime.
Identity theft is a serious crime. It occurs when your personal
information is stolen and used without your knowledge to commit
fraud or other crimes.
Identity theft can cost you time and money. It can destroy your
credit and ruin your good name.
While there are no guaranteed ways to avoid identity theft, you
can minimize your chances of becoming a victim and minimize the
damage should a theft occur.
3 Deter thieves by safeguarding your information. Shred sensitive
materials, protect your Social Security number, and never give out
personal information on the phone or Internet.
3 Detect suspicious activity by routinely monitoring your financial
accounts and billing statements. Inspect your credit report, and be
alert to unusual signs, like bills that don’t arrive or denials of credit.
ID THEFT PARTNERSHIPS EVENTS INTE
TOOLKIT MEDIA RESOURCES PROTECT
5 Invite Guests
Consider inviting community leaders, including the mayor, local council
members, law enforcement experienced in dealing with identity theft, and
identity theft experts. A proclamation from a prominent official is useful,
whether the official is attending or not. See Sample Proclamation
on page 20. Invite other guests, including all the organizations and
individuals you support or with which you’re involved.
They may include:
6 Invite Press
The most common way to invite media to a press conference is by
developing and distributing a media advisory to reporters. Send the
advisory to the reporter about 10 days before your event and again the day
before the event. See Outreach to Media, Step 6: Contact (or “Pitch”)
the Media on page 10 for details.
7 Create Materials
Whether you are developing a basic invitation and agenda for the day, or
a full suite of Protect Your Identity Day materials (for example: flier,
poster, press materials, agenda, identity theft tips, t-shirts, balloons), build
in enough time to create the materials, get input on them from others,
revise them appropriately, and produce them. One way to engage the
audience on identity theft is to test their knowledge of the issue, with an
informative quiz that can be used as a handout. See Sample Consumer
Quiz on page 20. The FTC’s “Avoid ID Theft: Deter, Detect, Defend” logo
and materials are available for your use at no cost.
This kit and many of the FTC publications listed on page 23 can be
ordered in bulk, for free, from ftc.gov/bulkorder.
8 Finalize Logistics
Ensure that all logistical details are thought out, implemented, and double-
checked. This could include A/V, invitations, spokespersons, and materials.
For more information about Events, see Outreach to Media,
Plan a Media Event on Protect Your Identity Day, on page 11.
Consumer groups
Victim advocacy groups
Community or neighborhood
associations
Volunteer and/or charitable
organizations
Civic organizations, local business
groups, or chambers of commerce
Law enforcers
Professional associations
(outside the workplace)
High school or college alumni
groups
General public (families,
individuals)
Former identity theft victims
Media
Other
20 21
5.	 If I think my identity has been stolen, I need to close any accounts
that have been tampered with, place a “Fraud Alert” on my credit
reports, file a police report, and contact the Federal Trade Commission
to file a complaint.
6.	 If I don’t enter my personal information online, I probably don’t have
to worry about identity theft.
Answers
1.	 False. Identity thieves are clever and can do quite a bit of damage using
your Social Security number. Your Social Security number is as good as gold.
Protect your Social Security number. Don’t carry your Social Security card in
your wallet or write your Social Security number on a check. Find out why
someone needs it, or ask to use another identification number.
2.	 True. Our trash can be a treasure trove for identity thieves because
some of what we might throw away, like bank or credit card statements,
can include sensitive information on it. Shred all mail or documents that
include personal information.
3.	 False. It is crucial to monitor your financial accounts and billing
statements regularly. Identity thieves are sneaky and sophisticated, and
sometimes, the way people find out their identity has been stolen is by
checking their credit reports. Visit www.AnnualCreditReport.com or call
1-877-322-8228 to order your free credit reports each year. Regularly
read your financial statements as well. Identity thieves strike everywhere,
even in the safest of communities.
4.	 False. Don’t use obvious passwords like your birth date, or your
mother’s maiden name. Identity thieves are likely to start with this
information, knowing that many consumers rely on “easy-to-remember”
passwords like these to protect their most sensitive information.
5.	 True. Once your identity has been stolen, the thief has your good name
and credit at his/her fingertips. Alerting the relevant authorities can stop
further damage to your identity and help law enforcement work to protect
you (and others who may be impacted).
6.	 False. Skilled identity thieves may use a variety of methods to get
your information, such as stealing your mail, wallet, or purse; obtaining
personal information from you by posing as legitimate business people;
stealing personnel records from employers; or hacking into computers.
ID THEFT PARTNERSHIPS EVENTS INTE
TOOLKIT MEDIA RESOURCES PROTECT
3 Defend against identity theft as soon as you suspect it. Place
a fraud alert on your credit reports, close accounts that have been
tampered with, file a police report, and report the theft to the FTC.
To combat identity theft, the FTC leads a nationwide education
program: Avoid ID Theft: Deter, Detect, Defend.
To learn more, visit ftc.gov/idtheft.
Sample Proclamation
Whereas, identity theft is a serious crime, one that impacts people from all
walks of life and in our community; and
Whereas [insert organization] is committed to fighting identity theft by
collaborating with local residents and other organizations to educate the
public about this issue; and
Whereas [insert organization] has a proud history of [insert your
organization’s mission descriptor such as “fighting for justice,” or “serving
all peoples,” etc.]; and
Whereas the Federal Trade Commission wishes to educate all Americans
about how to avoid identity theft by deterring, detecting and defending
against it; and
Whereas [insert name of city, state] recognizes that ongoing education and
preparation for safe communities is necessary for a peaceful quality of life,
Now, therefore, I, [insert official’s name], of the City of [insert city], do
hereby proclaim the day of [insert month, date, year] as: Protect Your
Identity Day.
Be it further resolved that [insert name of city, state] agrees to support
this effort in our community in order to become a leading model of safety,
shared learning, and prosperity.
Sample Consumer Quiz
True or False?
1.	 It’s okay if I carry my Social Security card around with me. Identity
thieves need far more than this number to successfully steal my identity.
2.	 By shredding a lot of mail that contains my personal information on it,
I am helping to deter potential dumpster divers, who might take my mail
and then steal my identity.
3.	 I don’t need to check my credit that often; I know it’s rock solid and I
live in a safe community where identity thieves aren’t likely to strike.
4.	 I can use passwords like my birthday, my mother’s maiden name, or
the last four digits of my Social Security number when I’m online. Identity
thieves are clever, but they’re not likely to take the time to figure these
things out.
22 23
Additional Resources
More information on identity theft is available online at ftc.gov/idtheft,
or by phone at 1-877-ID-THEFT (438-4338).
Many of the FTC publications listed here can be ordered in bulk, for free,
from ftc.gov/bulkorder.
AvoID id Theft: Deter, Detect, Defend Toolkit
A toolkit to educate organizations or constituents about identity theft and
how to deter, detect, and defend against it. It includes:
Talking About Identity Theft: A How-to Guide
Take Charge: Fighting Back Against Identity Theft
Avoid ID Theft: Deter, Detect, Defend brochure
Avoid ID Theft: Deter, Detect, Defend video
FTC Publications:
Deter, Detect, Defend: Avoid ID Theft. Tri-fold brochure with tips
for consumers on how to deter, detect, and defend against identity theft.
This is the best publication to share with the audience at your Protect
Your Identity Day event.
Take Charge: Fighting Back Against Identity Theft. The FTC’s
comprehensive guide for victims of identity theft. Includes the ID
Theft Affidavit.
Remedying the Effects of Identity Theft. Summarizes your rights if
you’re a victim of identity theft.
What To Do If Your Personal Information Has Been
Compromised. How to respond if your personal information is
compromised as a result of a security breach at another organization.
Identity Crisis…What to Do If Your Identity Is Stolen. Advice on
dealing with identity theft.
How Not to Get Hooked by a Phishing Scam. How to avoid online
scammers who want to steal your personal information.
Credit, ATM, and Debit Cards: What To Do If They’re Lost
or Stolen. Outlines procedures for reporting loss or theft, and for
minimizing your risk.
Your Access to Free Credit Reports. Explains your right to a free copy
of your credit reports and how to order online, by phone, or through the
mail. Also includes a copy of the standard credit report request form.
How to Dispute Credit Report Errors. Explains how to dispute and
correct inaccurate information in your credit report, and includes a
sample dispute letter.
TOOLKIT MEDIA RESOURCES PROTECT
24
Fair Credit Billing. Explains the Fair Credit Billing Act, which
establishes procedures for resolving billing errors on your credit card
accounts, and includes a sample dispute letter.
Fair Debt Collection. Answers commonly asked questions about your
rights under the Fair Debt Collection Practices Act, which prohibits debt
collectors from using unfair or deceptive practices to collect overdue bills.
Stop. Think. Click. 7 Practices for Safer Computing. Provides
practical tips to help you be on guard against Internet fraud, secure
your computer, and protect your personal information. Available at
OnGuardOnline.gov.
To Buy or Not To Buy: Identity Theft Spawns New Products and
Services to Help Minimize Risk. Explains when you should initiate
fraud alerts or credit freezes and how to evaluate credit monitoring
products and services.
Extra! Extra! Count on Scammers and Schemers to Follow
the News. Warns consumers that scammers claiming to be from the
Internal Revenue Service or the Social Security Administration may call
or send emails saying they need personal or financial information to
deposit a tax or government rebate check directly. The scammers then
use that information to commit identity theft.
Military Personnel  Families Fighting Back Against Identity
Theft. Explains how to deter, detect, and defend against identity theft to
military personnel and their families, who have special rights.
Protecting Personal Information: A Guide for Business. Offers
tips for business on creating and implementing a plan for safeguarding
personal information. Interactive tutorial is available at
ftc.gov/infosecurity.
Consumer Sentinel network
A free tool from the FTC for law enforcement. Consumer Sentinel
enables searches of millions of fraud and identity theft complaints
online. To become a member of the network, visit
Register.ConsumerSentinel.gov.
To learn more about identity theft and how to deter,
detect, and defend against it, visit ftc.gov/idtheft. Or
request bulk orders for free, from ftc.gov/bulkorder.

Más contenido relacionado

La actualidad más candente

What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kitupsettinginfo
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 

La actualidad más candente (20)

What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 

Destacado (6)

Debt Collections
Debt CollectionsDebt Collections
Debt Collections
 
Spread the Word!
Spread the Word!Spread the Word!
Spread the Word!
 
Protecting the Credit of Youth in Foster Care
Protecting the Credit of Youth in Foster CareProtecting the Credit of Youth in Foster Care
Protecting the Credit of Youth in Foster Care
 
Consumer Financial Rights
Consumer Financial RightsConsumer Financial Rights
Consumer Financial Rights
 
Heads up!
Heads up!Heads up!
Heads up!
 
Putting Telephone Scams... on Hold
Putting Telephone Scams... on HoldPutting Telephone Scams... on Hold
Putting Telephone Scams... on Hold
 

Similar a Identity Theft Toolkit

Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Reclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To RecoveryReclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To Recoveryjonmcdowall
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Identity Advocate
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameSpringboard
 

Similar a Identity Theft Toolkit (20)

Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
Reclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To RecoveryReclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To Recovery
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity Theft
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Guarding Vanderbilt information
Guarding Vanderbilt informationGuarding Vanderbilt information
Guarding Vanderbilt information
 
Protecting Vanderbilt Information
Protecting Vanderbilt InformationProtecting Vanderbilt Information
Protecting Vanderbilt Information
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 

Más de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Más de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

Oxidative phosphorylation and energy calculation of aerobic respiration
Oxidative phosphorylation and energy calculation of aerobic respirationOxidative phosphorylation and energy calculation of aerobic respiration
Oxidative phosphorylation and energy calculation of aerobic respirationTRIDIP BORUAH
 
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...DrVipulVKapoor
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
SUBSTRATE LEVEL PHOSPHORYLATION IN GLYCOLYSIS
SUBSTRATE LEVEL PHOSPHORYLATION IN GLYCOLYSISSUBSTRATE LEVEL PHOSPHORYLATION IN GLYCOLYSIS
SUBSTRATE LEVEL PHOSPHORYLATION IN GLYCOLYSISTRIDIP BORUAH
 
How to Override Delete Function in Odoo 17
How to Override Delete Function in Odoo 17How to Override Delete Function in Odoo 17
How to Override Delete Function in Odoo 17Celine George
 
Farrington HS Streamlines Guest Entrance
Farrington HS Streamlines Guest EntranceFarrington HS Streamlines Guest Entrance
Farrington HS Streamlines Guest Entrancejulius27264
 
Jordan Chrietzberg In Media Res Media Component
Jordan Chrietzberg In Media Res Media ComponentJordan Chrietzberg In Media Res Media Component
Jordan Chrietzberg In Media Res Media ComponentInMediaRes1
 
18. Training and prunning of horicultural crops.pptx
18. Training and prunning of horicultural crops.pptx18. Training and prunning of horicultural crops.pptx
18. Training and prunning of horicultural crops.pptxUmeshTimilsina1
 
Calendar, Budget, Evaluation of a PR Campaign
Calendar, Budget, Evaluation of a PR CampaignCalendar, Budget, Evaluation of a PR Campaign
Calendar, Budget, Evaluation of a PR CampaignCorinne Weisgerber
 
Patterns of Evolution Slides for Canvas Notes.pptx
Patterns of Evolution Slides for Canvas Notes.pptxPatterns of Evolution Slides for Canvas Notes.pptx
Patterns of Evolution Slides for Canvas Notes.pptxAlexandraSwartzwelde
 
STRAND 5 SST 7 ,,FOR GRADE 7 POLITICAL D
STRAND 5 SST  7 ,,FOR GRADE 7 POLITICAL DSTRAND 5 SST  7 ,,FOR GRADE 7 POLITICAL D
STRAND 5 SST 7 ,,FOR GRADE 7 POLITICAL Dkimdan468
 
Writing2, Topic Sentence, Outline, Controlling Idea
Writing2, Topic Sentence, Outline, Controlling IdeaWriting2, Topic Sentence, Outline, Controlling Idea
Writing2, Topic Sentence, Outline, Controlling IdeaNetziValdelomar1
 
Grade 6 Elementary Science-6-NAT-reviewer.pptx
Grade 6 Elementary Science-6-NAT-reviewer.pptxGrade 6 Elementary Science-6-NAT-reviewer.pptx
Grade 6 Elementary Science-6-NAT-reviewer.pptxJOHNPHILIPSBaynosa1
 
Self directed Learning - SDL, introduction to SDL
Self directed Learning - SDL, introduction to SDLSelf directed Learning - SDL, introduction to SDL
Self directed Learning - SDL, introduction to SDLspmdoc
 
(Part 1) CHILDREN'S DISABILITIES AND EXCEPTIONALITIES.pdf
(Part 1) CHILDREN'S DISABILITIES AND EXCEPTIONALITIES.pdf(Part 1) CHILDREN'S DISABILITIES AND EXCEPTIONALITIES.pdf
(Part 1) CHILDREN'S DISABILITIES AND EXCEPTIONALITIES.pdfMJDuyan
 
4.4.24 Economic Precarity and Global Economic Forces.pptx
4.4.24 Economic Precarity and Global Economic Forces.pptx4.4.24 Economic Precarity and Global Economic Forces.pptx
4.4.24 Economic Precarity and Global Economic Forces.pptxmary850239
 
Q4 PPT-Health 9_Lesson 1 (Intentional Injuries).pptx
Q4 PPT-Health 9_Lesson 1 (Intentional Injuries).pptxQ4 PPT-Health 9_Lesson 1 (Intentional Injuries).pptx
Q4 PPT-Health 9_Lesson 1 (Intentional Injuries).pptxSherwinTamayao2
 
Statistics and Probability Testing Hypothesis.pptx
Statistics and Probability Testing Hypothesis.pptxStatistics and Probability Testing Hypothesis.pptx
Statistics and Probability Testing Hypothesis.pptxClarizaJaneMetro1
 
Air Quality Presentation - EEH Chapter 10
Air Quality Presentation - EEH Chapter 10Air Quality Presentation - EEH Chapter 10
Air Quality Presentation - EEH Chapter 10misteraugie
 
16. Discovery, function and commercial uses of different PGRS.pptx
16. Discovery, function and commercial uses of different PGRS.pptx16. Discovery, function and commercial uses of different PGRS.pptx
16. Discovery, function and commercial uses of different PGRS.pptxUmeshTimilsina1
 

Último (20)

Oxidative phosphorylation and energy calculation of aerobic respiration
Oxidative phosphorylation and energy calculation of aerobic respirationOxidative phosphorylation and energy calculation of aerobic respiration
Oxidative phosphorylation and energy calculation of aerobic respiration
 
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
SUBSTRATE LEVEL PHOSPHORYLATION IN GLYCOLYSIS
SUBSTRATE LEVEL PHOSPHORYLATION IN GLYCOLYSISSUBSTRATE LEVEL PHOSPHORYLATION IN GLYCOLYSIS
SUBSTRATE LEVEL PHOSPHORYLATION IN GLYCOLYSIS
 
How to Override Delete Function in Odoo 17
How to Override Delete Function in Odoo 17How to Override Delete Function in Odoo 17
How to Override Delete Function in Odoo 17
 
Farrington HS Streamlines Guest Entrance
Farrington HS Streamlines Guest EntranceFarrington HS Streamlines Guest Entrance
Farrington HS Streamlines Guest Entrance
 
Jordan Chrietzberg In Media Res Media Component
Jordan Chrietzberg In Media Res Media ComponentJordan Chrietzberg In Media Res Media Component
Jordan Chrietzberg In Media Res Media Component
 
18. Training and prunning of horicultural crops.pptx
18. Training and prunning of horicultural crops.pptx18. Training and prunning of horicultural crops.pptx
18. Training and prunning of horicultural crops.pptx
 
Calendar, Budget, Evaluation of a PR Campaign
Calendar, Budget, Evaluation of a PR CampaignCalendar, Budget, Evaluation of a PR Campaign
Calendar, Budget, Evaluation of a PR Campaign
 
Patterns of Evolution Slides for Canvas Notes.pptx
Patterns of Evolution Slides for Canvas Notes.pptxPatterns of Evolution Slides for Canvas Notes.pptx
Patterns of Evolution Slides for Canvas Notes.pptx
 
STRAND 5 SST 7 ,,FOR GRADE 7 POLITICAL D
STRAND 5 SST  7 ,,FOR GRADE 7 POLITICAL DSTRAND 5 SST  7 ,,FOR GRADE 7 POLITICAL D
STRAND 5 SST 7 ,,FOR GRADE 7 POLITICAL D
 
Writing2, Topic Sentence, Outline, Controlling Idea
Writing2, Topic Sentence, Outline, Controlling IdeaWriting2, Topic Sentence, Outline, Controlling Idea
Writing2, Topic Sentence, Outline, Controlling Idea
 
Grade 6 Elementary Science-6-NAT-reviewer.pptx
Grade 6 Elementary Science-6-NAT-reviewer.pptxGrade 6 Elementary Science-6-NAT-reviewer.pptx
Grade 6 Elementary Science-6-NAT-reviewer.pptx
 
Self directed Learning - SDL, introduction to SDL
Self directed Learning - SDL, introduction to SDLSelf directed Learning - SDL, introduction to SDL
Self directed Learning - SDL, introduction to SDL
 
(Part 1) CHILDREN'S DISABILITIES AND EXCEPTIONALITIES.pdf
(Part 1) CHILDREN'S DISABILITIES AND EXCEPTIONALITIES.pdf(Part 1) CHILDREN'S DISABILITIES AND EXCEPTIONALITIES.pdf
(Part 1) CHILDREN'S DISABILITIES AND EXCEPTIONALITIES.pdf
 
4.4.24 Economic Precarity and Global Economic Forces.pptx
4.4.24 Economic Precarity and Global Economic Forces.pptx4.4.24 Economic Precarity and Global Economic Forces.pptx
4.4.24 Economic Precarity and Global Economic Forces.pptx
 
Q4 PPT-Health 9_Lesson 1 (Intentional Injuries).pptx
Q4 PPT-Health 9_Lesson 1 (Intentional Injuries).pptxQ4 PPT-Health 9_Lesson 1 (Intentional Injuries).pptx
Q4 PPT-Health 9_Lesson 1 (Intentional Injuries).pptx
 
Statistics and Probability Testing Hypothesis.pptx
Statistics and Probability Testing Hypothesis.pptxStatistics and Probability Testing Hypothesis.pptx
Statistics and Probability Testing Hypothesis.pptx
 
Air Quality Presentation - EEH Chapter 10
Air Quality Presentation - EEH Chapter 10Air Quality Presentation - EEH Chapter 10
Air Quality Presentation - EEH Chapter 10
 
16. Discovery, function and commercial uses of different PGRS.pptx
16. Discovery, function and commercial uses of different PGRS.pptx16. Discovery, function and commercial uses of different PGRS.pptx
16. Discovery, function and commercial uses of different PGRS.pptx
 

Identity Theft Toolkit

  • 1. THURSDAY INTERACTIVE TOOLKIT PROTECT YOUR IDENTITY DAY interactive too lkit FEDERAL TRADE COMMISSION F i g h t i n g B a c k A g a i n s t Identity Theft Protect your Identity Days how to plan & host
  • 2. 1 About this toolkit The Federal Trade Commission has developed this toolkit to help organizations combat identity theft by raising awareness and educating people through a Protect Your Identity Day. This kit provides information and sample materials to help plan and host a successful Protect Your Identity Day. Included in this kit is a CD that contains the entire kit contents, which you can customize and print. The CD also includes Deter, Detect, Defend videos for computer broadcast and Talking About Identity Theft: A How-To Guide, which offers more sample materials, including a speech, presentation, and template media materials in English and Spanish. You also can download that guide at ftc.gov/idtheft. This kit also includes a DVD that features Deter, Detect, Defend videos for television broadcast. THURSDAY ID THEFT PARTNERSHIPS EVENTS INTERACTIVE TOOLKIT TOOLKIT MEDIA RESOURCES PROTECT YOUR IDENTITY DAY How to use the CD-ROM: 1. Load the CD-ROM in your computer. 2. PC: If you use Windows, Autorun will launch the program automatically. If Autorun is not active, double-click the “My Computer” icon and then double- click on the “Interactive Toolkit” icon. MAC: Double-click the “Interactive Toolkit” icon then double-click the file you would like to view. How to use the DVD: Follow the normal loading instructions for your DVD player. how to plan host protect your identity days Table of Contents About Identity Theft. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Tips: Avoid ID Theft: Deter, Detect, Defend• About Protect Your Identity Day. . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Host a• Protect Your Identity Day Outreach To Media. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 6 Steps to Media Success• Plan a Media Event• Outreach To Partners. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 5 Steps to Successful Partnerships• Plan Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 8 Steps to a Successful Event• Sample Run of Show• Sample Talking Points• Sample Official Proclamation• Sample Consumer Quiz• Additional Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
  • 3. 3 About Identity Theft What is Identity Theft? Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. The Federal Trade Commission estimates that as many as 10 million Americans have their identities stolen each year. In fact, you or someone you know may have experienced some form of identity theft. Identity theft is serious. People whose identities have been stolen can spend hundreds of dollars and dozens of hours cleaning up the mess thieves have made of their good name and credit record. Consumers victimized by identity theft may lose out on job opportunities, or be denied loans for education, housing, or cars because of negative information on their credit reports. They may even be arrested for crimes they did not commit. The potential for damage, loss, and stress is considerable. How do thieves steal an identity? Identity theft starts with the misuse of your personally identifying information. For identity thieves,your name and Social Security number,credit card numbers,or other financial account information is as good as gold. Skilled identity thieves may use a variety of methods to get hold of your information: 3 They may steal your mail, wallet, or purse. 3 They may get personal information from you by posing as legitimate companies through email, in a practice known as “phishing.” Or they might lie to you on the phone. 3 They may take your information from businesses or other institutions by stealing personnel records, bribing or conning an employee who has access to these records, or breaking into your records electronically. Some identity theft victims even report that their information has been stolen by someone they know. Tips Avoid ID Theft: Deter, Detect, Defend While nothing can guarantee that you won’t become a victim of identity theft, you can take specific steps to minimize your risk, and minimize the damage if a problem develops. It’s about following the “3 D’s” of identity theft protection – Deter, Detect, Defend. ID THEFT TOOLKIT
  • 4. 4 5 Order your credit report: 3 The law requires the major nationwide consumer reporting companies – Equifax, Experian, and TransUnion – to give you a free copy of your credit report each year if you ask for it. 3 Visit www.AnnualCreditReport.com or call 1-877-322-8228, a service created by these three companies, to order your free credit reports each year. Or you can write: Annual Credit Report Request Service, P.O. Box 105281, Atlanta, GA 30348-5281. DEFEND: Defend against Identity Theft as soon as you suspect a problem Place a “Fraud Alert” on your credit reports, and review the reports carefully. The alert tells creditors to follow certain procedures before they open new accounts in your name or make certain changes to your existing accounts. The three nationwide consumer reporting companies have toll-free numbers for placing an initial 90-day fraud alert; a call to one company is sufficient: Equifax: 1-800-525-6285 Experian: 1-888-EXPERIAN (397-3742) TransUnion: 1-800-680-7289 Placing a fraud alert entitles you to free copies of your credit reports. Look for inquiries from companies you haven’t contacted, accounts you didn’t open, and debts on your accounts that you can’t explain. Close accounts. Close any accounts that have been tampered with or established fraudulently. 3 Call the security or fraud departments of each company where an account was opened or changed without your okay. Follow up in writing, with copies of supporting documents. 3 Use the Identity Theft Affidavit at ftc.gov/idtheft to support your written statement. 3 Ask for written verification that the disputed account has been closed and the fraudulent debts discharged. 3 Keep copies of documents and records of your conversations about the theft. File a police report. File a report with law enforcement officials to help you with creditors who may want proof of the crime. Report your complaint to the Federal Trade Commission. Your report helps law enforcement officials across the country in their investigations. Online: ftc.gov/idtheft By phone: 1-877-ID-THEFT (438-4338) or TTY, 1-866-653-4261 ID THEFT TOOLKIT DETER: Deter identity thieves by safeguarding your information Shred financial documents and paperwork with personal information before you discard them. Protect your Social Security number. Don’t carry your Social Security card in your wallet or write your Social Security number on a check. Give it out only if absolutely necessary or ask to use another identifier. Don’t give out personal information on the phone, through the mail, or over the Internet unless you have initiated the contact and know who you are dealing with. Never click on links sent in unsolicited emails; instead, type in a Web address you know. Use firewalls, anti-spyware, and anti-virus software to protect your home computer; keep them up-to-date. Visit OnGuardOnline.gov for more information. Don’t use an obvious password like your birth date, your mother’s maiden name, or the last four digits of your Social Security number. Keep your personal information in a secure place at home, especially if you have roommates, employ outside help, or are having work done in your house. DETECT: Detect suspicious activity by routinely monitoring your financial accounts billing statements Be alert to signs that require immediate attention: 3 Mail or bills that do not arrive as expected. 3 Unexpected credit cards or account statements. 3 Denials of credit for no apparent reason. 3 Calls or letters about purchases you did not make. Inspect: 3 Your credit report. Credit reports have information about you, including what accounts you have and your bill paying history. 3 Your financial statements. Review financial accounts and billing statements regularly, looking for charges you did not make.
  • 5. 6 7 About Protect Your Identity Day The Federal Trade Commission, the nation’s consumer protection agency, helps people learn how to minimize the risk of becoming a victim of identity theft. While there is no fool-proof way to avoid identity theft, there are ways to minimize the chances of becoming a victim and minimize the damage should a theft occur. Hosting a Protect Your Identity Day can show your community how. Law enforcement officials, state attorneys general, state and local government, and community and business leaders each can play a pivotal role in educating the public. We encourage you to host a Protect Your Identity Day in your community. There is no single date for a Protect Your Identity Day. You can designate any day that works for your community or organization. The important thing is to take the lead in educating your particular community about avoiding identity theft. Host A Protect Your Identity Day Hosting a Protect Your Identity Day is easy, and there are many ways to do it. When, where, and how it happens is up to you. Consider hosting a media event, such as a press conference, to raise awareness of the Day and the issue. Or stage a dedicated event at your local civic center, police station, mall, public library, or university. Or arrange a booth at an existing community event, such as a county fair or festival. You might consider hosting a “shred event” so people in your community can shred unwanted personal information and records. This could be a half-day or full-day event. If you are interested in expanding your reach and resources, recruit a partner organization as a co-sponsor. Here are three possible approaches for implementing your Day: 1. Media outreach 2. Partnership outreach 3. Events We offer step-by-step guidance and customizable template materials to help you implement each approach. Different levels of engagement will enable you to use your resources to maximum effect. THURSDAY TOOLKIT MEDIA RESOURCES PROTECT YOUR IDENTITY DAY
  • 6. 8 9 Outreach To Media When hosting a Protect Your Identity Day, you can work with local media to spread the word to your community about identity theft and demonstrate your group’s commitment to fighting this crime. Media outreach takes many forms – from a call to a reporter to suggest a story to issuing a formal press release to organizing a media event. All can be effective. The important thing is to tailor the outreach to your organization’s particular approach to Protect Your Identity Day. Following are two sections that offer basic guidance about reaching out to media and planning a media event. For more information on media outreach and template media materials, please visit ftc.gov/idtheft, and refer to the CD in this kit. See Section 7 of Talking About Identity Theft: A How-To Guide. 6 Steps to Media Success on Protect Your Identity Day Whether your organization plans on releasing helpful tips to consumers about how to combat identity theft on its Protect Your Identity Day or hosting a full scale media event, six general steps can help you get positive media coverage for your event. 1 Select a Target Audience Determine who you want to reach. This may include businessmen, financial planners, teachers, your employees or organization’s members, or local officials. You may wish to focus on a particular population, such as senior citizens or students. 2 Develop a Media List Once you have identified your target audience, create a media list. It should be comprised of media outlets (local newspapers, television/cable stations, and radio stations) and reporters at each outlet who may find the identity theft issue relevant to the subject area they cover. Include these journalists’ names and contact information (phone, email, fax, address) on your list. By communicating with specific individuals at news outlets, you are more likely to get a response. 3 Find the News Angle Identity theft is an issue that gets coverage. However, to generate local media interest, your organization should consider what will make your Protect Your Identity Day a compelling story. Consider including some of the following to strengthen your local news hook: TOOLKIT MEDIA
  • 7. 10 11 Plan a Media Event on Protect Your Identity Day Media events or press conferences allow you to deliver your story to many media outlets at once. When planning a media event, consider: Timing. Check your local calendar listings before planning an event to make sure it doesn’t conflict with another major media event. The best time to schedule a media event is 10 a.m. This allows time in the morning for the media to review the story options for the day. Consider also that your event might be more successful at certain times of the year (for example: during tax season when financial issues and identity theft are more top-of-mind for consumers). Location. Ideally, the location of the event should be relevant to the issue or story being presented. Take the time to scout your location before you choose it, and visit it again a few times before you host the event. Think about what equipment you will need (for example: podium, microphone, other A/V items, media check-in table), as well as space requirements to accommodate attendees and potential press. Inviting Guests. Consider inviting community leaders, including the mayor, local law enforcement, local city council members, and noted identity theft experts to speak at a news conference. Also, be sure to invite individuals from the community who may wish to learn more about identity theft (for example: religious groups, fraternal organizations, military, business people, and educators). Inviting Media. The most effective way to invite media to a press conference is through a media advisory. Send your advisory to the reporter about 10 days before your event and again the day before the event. other Considerations. Do you need to prepare signs, like banners and podium signs, that can be placed in front of cameras and photographers? Do you have an agenda or “run of show” that outlines the flow of the media event? When will you brief assigned spokesperson(s) before the media event, go over the event agenda, and prepare for potential questions? Who is creating the press kits, including the agenda, fact sheet, bios of speakers, press release, and other relevant materials? TOOLKIT MEDIATime the event around a major identity theft story in the news, possibly when arrests, indictments, or prosecutions are made; during National Consumer Protection Week (early March); or around spring cleaning or back-to-school times, when people are thinking of financial issues. Local statistics that highlight the prevalence of identity theft in your county, city, or state. The FTC compiles statistics on identity theft complaints by state and city. Tips and resources consumers can use to deter, detect, and defend against identity theft. Any partners your organization has chosen to work with to hold a Protect Your Identity Day. 4 Prepare Media Materials Information Once you have your core story idea in place, prepare press materials. Key materials include: Press release – A one- to two-page document with information about your group’s Protect Your Identity Day and a quote from your spokesperson(s). Media advisory – A one-page document inviting journalists to attend a Protect Your Identity Day media event, should your organization decide to host one as part of the day. The advisory should highlight basic information (who, what, when, and where). Talking points – A one- to two-page document with basic talking points for your spokesperson(s), which highlight how to deter, detect, and defend against identity theft. For a full suite of template media materials, please visit ftc.gov/idtheft or refer to the DVD in this kit and see Section 7 of Talking About Identity Theft: A How-To Guide. 5 Identify a Media Spokesperson It will be helpful to identify possible spokespersons early on whom the media can interview. These could be a victim who can offer first- hand testimonial and an expert – either a law enforcement officer or a politician. A strong spokesperson is credentialed and knowledgeable about the identity theft issue and is comfortable speaking to the media. If your spokesperson wants more information on identity theft, he or she can get up to speed at ftc.gov/idtheft. 6 Contact (or “Pitch”) the Media Contact the media about 10 days prior to Protect Your Identity Day. Typically, it is helpful to send an email pitch first that includes your press release. Follow up with a phone call to the reporter the next day.
  • 8. 12 13 Outreach to Partners Developing relationships with like-minded organizations is an important part of outreach efforts as you work to deter, detect, and defend against identity theft. By joining credible partners who can help expound on your identity theft messages, you can add depth, multiply your “arms and legs,” and increase consumer awareness about identity theft. 5 Steps to Successful Protect Your Identity Day Partnerships 1 IDentify Your Partners To decide which partners are a good fit, list local organizations that your audience knows and trusts. Seek advice from others like local law enforcement agencies, for example, on which organizations they would recommend aligning with for a Protect Your Identity Day. Some partners that may be appropriate for identity theft prevention include: ID THEFT PARTNERSHIPS TOOLKIT MEDIA Consumer groups (victims’ assistance, legal aid…) Law enforcement agencies (police departments, state attorney general’s office…) City, county, and state government (Department of Motor Vehicles, local Social Security office…) Faith-based organizations (churches, temples, mosques, synagogues…) Media organizations (radio stations, television stations, newspapers…) Business and labor organizations (grocery stores, real estate offices, financial advisors, local unions, utility companies…) Seniors’ groups (assisted living facilities, area agencies on aging, senior centers…) Education groups (schools, libraries, universities…) Medical community (hospital administrators, pharmacies, health centers…) Military (base officials, veterans, family support offices…)
  • 9. 14 15 ID THEFT PARTNERSHIPS TOOLKIT MEDIA 4 Be Clear on Who is Doing What Confirm your partnership arrangements in a letter or email to your new partner organization. This document can be a simple list of the details of the partnership. You may want to include a summary of the role and responsibilities of each partner, as well. 5 Communicate Clearly Frequently Once your partnership is established and outreach is underway, keep your partner(s) informed and involved. It is important to keep local law enforcement agencies aware of your work, too, because they are your allies in the fight against identity theft. Give them notice of any events or special projects that you host. 2 Do Your Homework Make Contact Learn as much as you can about any prospective partners: their role in the community, how they are impacted by identity theft, and how their mission relates to the community or consumer protection and/or privacy. As you approach potential partners, remember that enthusiasm goes a long way. Call or set up a meeting to start the ball rolling and gauge their interest. During this meeting, tailor your presentation to the particular group as much as possible, and highlight how the partnership could benefit their group. Be prepared to speak about the benefits of addressing identity theft together, the potential “win-win” of a partnership, and background about Protect Your Identity Day and identity theft. 3 Plan a Protect Your Identity Day Once you and your partner(s) have agreed to work together, establish a plan for your Protect Your Identity Day, starting with a group brainstorm about how this day could look. Clarify roles and responsibilities, and reach consensus on your goals and strategies for success.
  • 10. 16 17 plan Events A successful Protect Your Identity Day event can raise awareness about identity theft by bringing together a wide range of participants and reach- ing a wide range of people – either directly or through media coverage. 8 Steps to a Successful Protect Your Identity Day Event Following are some important considerations for planning a Protect Your Identity Day event. 1 Determine Timing Check your newspaper’s local calendar listings before planning an event to avoid conflicts. If you plan on inviting the media, the best time to schedule an event is 10 a.m. 2 Establish a Budget What the event looks like and where it is held will be determined largely by your budget. For example, holding your event at a hotel will involve considerable fees. However, a local police station may be more than willing to offer space at no cost. It is important to prioritize the elements you want in place to make your Protect Your Identity Day a success. 3 Secure a Location The location of the event should be relevant to the issue or story being presented, be accessible to public transportation, and have ample parking. Scout a few locations before making your choice, and visit a few times before you host the event. Anticipate what equipment will be necessary (for example: podium, microphone, other A/V items, media check-in table), as well as space requirements to accommodate attendees and potential press. Think about police stations, law enforcement offices, grocery stores, places of worship, senior centers, community recreation centers, schools, universities, libraries, public parks, museums, or other community locations. 4 Develop the Run of Show Another important element to consider is the agenda or general run of show for the day. Think through the full event agenda, considering a variety of factors: food and beverages; hand-outs; parking; audiovisual needs; room set-up, and length of program. See Sample Run of Show on page 19. ID THEFT PARTNERSHIPS EVENTS INTE TOOLKIT MEDIA RESOURCES PROTECT
  • 11. 18 19 Sample Run of Show 9:30 am –10:00 am Arrivals / Refreshments Guests, media (if invited) check in 10:00 am –10:05 am Introductions / Opening Remarks Your organization’s leader makes welcoming remarks Local official makes remarks about identity theft 10:05 am –10:20 am Deterring, Detecting, and Defending Against Identity Theft in Our Community 10:20 am – 10:30 am Identity Theft Panel Discussion Several victims of identity theft share their experiences and convey lessons learned 10:30 am – 10:50 am Questions Answers All 10:50 am – 10:55 am Closing Remarks Distinguished guest makes closing remarks (mayor or other “VIP” figure) 10:55 am – 11:00 am Conclusion Your organization’s leader thanks everyone for attending Sample Talking Points The following are suggested talking points to include in your Protect Your Identity Day.They are general and can be tailored to fit your particular event. The Federal Trade Commission is working with law enforcement agencies, businesses, consumer groups, and organizations across the country to educate people about identity theft. The agency is encouraging organizations to host Protect Your Identity Days throughout the year and throughout the nation to increase awareness about deterring, detecting, and defending against the crime. Identity theft is a serious crime. It occurs when your personal information is stolen and used without your knowledge to commit fraud or other crimes. Identity theft can cost you time and money. It can destroy your credit and ruin your good name. While there are no guaranteed ways to avoid identity theft, you can minimize your chances of becoming a victim and minimize the damage should a theft occur. 3 Deter thieves by safeguarding your information. Shred sensitive materials, protect your Social Security number, and never give out personal information on the phone or Internet. 3 Detect suspicious activity by routinely monitoring your financial accounts and billing statements. Inspect your credit report, and be alert to unusual signs, like bills that don’t arrive or denials of credit. ID THEFT PARTNERSHIPS EVENTS INTE TOOLKIT MEDIA RESOURCES PROTECT 5 Invite Guests Consider inviting community leaders, including the mayor, local council members, law enforcement experienced in dealing with identity theft, and identity theft experts. A proclamation from a prominent official is useful, whether the official is attending or not. See Sample Proclamation on page 20. Invite other guests, including all the organizations and individuals you support or with which you’re involved. They may include: 6 Invite Press The most common way to invite media to a press conference is by developing and distributing a media advisory to reporters. Send the advisory to the reporter about 10 days before your event and again the day before the event. See Outreach to Media, Step 6: Contact (or “Pitch”) the Media on page 10 for details. 7 Create Materials Whether you are developing a basic invitation and agenda for the day, or a full suite of Protect Your Identity Day materials (for example: flier, poster, press materials, agenda, identity theft tips, t-shirts, balloons), build in enough time to create the materials, get input on them from others, revise them appropriately, and produce them. One way to engage the audience on identity theft is to test their knowledge of the issue, with an informative quiz that can be used as a handout. See Sample Consumer Quiz on page 20. The FTC’s “Avoid ID Theft: Deter, Detect, Defend” logo and materials are available for your use at no cost. This kit and many of the FTC publications listed on page 23 can be ordered in bulk, for free, from ftc.gov/bulkorder. 8 Finalize Logistics Ensure that all logistical details are thought out, implemented, and double- checked. This could include A/V, invitations, spokespersons, and materials. For more information about Events, see Outreach to Media, Plan a Media Event on Protect Your Identity Day, on page 11. Consumer groups Victim advocacy groups Community or neighborhood associations Volunteer and/or charitable organizations Civic organizations, local business groups, or chambers of commerce Law enforcers Professional associations (outside the workplace) High school or college alumni groups General public (families, individuals) Former identity theft victims Media Other
  • 12. 20 21 5. If I think my identity has been stolen, I need to close any accounts that have been tampered with, place a “Fraud Alert” on my credit reports, file a police report, and contact the Federal Trade Commission to file a complaint. 6. If I don’t enter my personal information online, I probably don’t have to worry about identity theft. Answers 1. False. Identity thieves are clever and can do quite a bit of damage using your Social Security number. Your Social Security number is as good as gold. Protect your Social Security number. Don’t carry your Social Security card in your wallet or write your Social Security number on a check. Find out why someone needs it, or ask to use another identification number. 2. True. Our trash can be a treasure trove for identity thieves because some of what we might throw away, like bank or credit card statements, can include sensitive information on it. Shred all mail or documents that include personal information. 3. False. It is crucial to monitor your financial accounts and billing statements regularly. Identity thieves are sneaky and sophisticated, and sometimes, the way people find out their identity has been stolen is by checking their credit reports. Visit www.AnnualCreditReport.com or call 1-877-322-8228 to order your free credit reports each year. Regularly read your financial statements as well. Identity thieves strike everywhere, even in the safest of communities. 4. False. Don’t use obvious passwords like your birth date, or your mother’s maiden name. Identity thieves are likely to start with this information, knowing that many consumers rely on “easy-to-remember” passwords like these to protect their most sensitive information. 5. True. Once your identity has been stolen, the thief has your good name and credit at his/her fingertips. Alerting the relevant authorities can stop further damage to your identity and help law enforcement work to protect you (and others who may be impacted). 6. False. Skilled identity thieves may use a variety of methods to get your information, such as stealing your mail, wallet, or purse; obtaining personal information from you by posing as legitimate business people; stealing personnel records from employers; or hacking into computers. ID THEFT PARTNERSHIPS EVENTS INTE TOOLKIT MEDIA RESOURCES PROTECT 3 Defend against identity theft as soon as you suspect it. Place a fraud alert on your credit reports, close accounts that have been tampered with, file a police report, and report the theft to the FTC. To combat identity theft, the FTC leads a nationwide education program: Avoid ID Theft: Deter, Detect, Defend. To learn more, visit ftc.gov/idtheft. Sample Proclamation Whereas, identity theft is a serious crime, one that impacts people from all walks of life and in our community; and Whereas [insert organization] is committed to fighting identity theft by collaborating with local residents and other organizations to educate the public about this issue; and Whereas [insert organization] has a proud history of [insert your organization’s mission descriptor such as “fighting for justice,” or “serving all peoples,” etc.]; and Whereas the Federal Trade Commission wishes to educate all Americans about how to avoid identity theft by deterring, detecting and defending against it; and Whereas [insert name of city, state] recognizes that ongoing education and preparation for safe communities is necessary for a peaceful quality of life, Now, therefore, I, [insert official’s name], of the City of [insert city], do hereby proclaim the day of [insert month, date, year] as: Protect Your Identity Day. Be it further resolved that [insert name of city, state] agrees to support this effort in our community in order to become a leading model of safety, shared learning, and prosperity. Sample Consumer Quiz True or False? 1. It’s okay if I carry my Social Security card around with me. Identity thieves need far more than this number to successfully steal my identity. 2. By shredding a lot of mail that contains my personal information on it, I am helping to deter potential dumpster divers, who might take my mail and then steal my identity. 3. I don’t need to check my credit that often; I know it’s rock solid and I live in a safe community where identity thieves aren’t likely to strike. 4. I can use passwords like my birthday, my mother’s maiden name, or the last four digits of my Social Security number when I’m online. Identity thieves are clever, but they’re not likely to take the time to figure these things out.
  • 13. 22 23 Additional Resources More information on identity theft is available online at ftc.gov/idtheft, or by phone at 1-877-ID-THEFT (438-4338). Many of the FTC publications listed here can be ordered in bulk, for free, from ftc.gov/bulkorder. AvoID id Theft: Deter, Detect, Defend Toolkit A toolkit to educate organizations or constituents about identity theft and how to deter, detect, and defend against it. It includes: Talking About Identity Theft: A How-to Guide Take Charge: Fighting Back Against Identity Theft Avoid ID Theft: Deter, Detect, Defend brochure Avoid ID Theft: Deter, Detect, Defend video FTC Publications: Deter, Detect, Defend: Avoid ID Theft. Tri-fold brochure with tips for consumers on how to deter, detect, and defend against identity theft. This is the best publication to share with the audience at your Protect Your Identity Day event. Take Charge: Fighting Back Against Identity Theft. The FTC’s comprehensive guide for victims of identity theft. Includes the ID Theft Affidavit. Remedying the Effects of Identity Theft. Summarizes your rights if you’re a victim of identity theft. What To Do If Your Personal Information Has Been Compromised. How to respond if your personal information is compromised as a result of a security breach at another organization. Identity Crisis…What to Do If Your Identity Is Stolen. Advice on dealing with identity theft. How Not to Get Hooked by a Phishing Scam. How to avoid online scammers who want to steal your personal information. Credit, ATM, and Debit Cards: What To Do If They’re Lost or Stolen. Outlines procedures for reporting loss or theft, and for minimizing your risk. Your Access to Free Credit Reports. Explains your right to a free copy of your credit reports and how to order online, by phone, or through the mail. Also includes a copy of the standard credit report request form. How to Dispute Credit Report Errors. Explains how to dispute and correct inaccurate information in your credit report, and includes a sample dispute letter. TOOLKIT MEDIA RESOURCES PROTECT
  • 14. 24 Fair Credit Billing. Explains the Fair Credit Billing Act, which establishes procedures for resolving billing errors on your credit card accounts, and includes a sample dispute letter. Fair Debt Collection. Answers commonly asked questions about your rights under the Fair Debt Collection Practices Act, which prohibits debt collectors from using unfair or deceptive practices to collect overdue bills. Stop. Think. Click. 7 Practices for Safer Computing. Provides practical tips to help you be on guard against Internet fraud, secure your computer, and protect your personal information. Available at OnGuardOnline.gov. To Buy or Not To Buy: Identity Theft Spawns New Products and Services to Help Minimize Risk. Explains when you should initiate fraud alerts or credit freezes and how to evaluate credit monitoring products and services. Extra! Extra! Count on Scammers and Schemers to Follow the News. Warns consumers that scammers claiming to be from the Internal Revenue Service or the Social Security Administration may call or send emails saying they need personal or financial information to deposit a tax or government rebate check directly. The scammers then use that information to commit identity theft. Military Personnel Families Fighting Back Against Identity Theft. Explains how to deter, detect, and defend against identity theft to military personnel and their families, who have special rights. Protecting Personal Information: A Guide for Business. Offers tips for business on creating and implementing a plan for safeguarding personal information. Interactive tutorial is available at ftc.gov/infosecurity. Consumer Sentinel network A free tool from the FTC for law enforcement. Consumer Sentinel enables searches of millions of fraud and identity theft complaints online. To become a member of the network, visit Register.ConsumerSentinel.gov.
  • 15. To learn more about identity theft and how to deter, detect, and defend against it, visit ftc.gov/idtheft. Or request bulk orders for free, from ftc.gov/bulkorder.