SlideShare a Scribd company logo
1 of 50
ID THEFT PREVENTION
AND ID THEFT INSURANCE
PAT CROW
KEEPMYID.ORG
pat@keepmyID.org
www.keepmyID.org
1-800-664-5936
IDENTITY THEFT AND
INSURANCE
• (1) THE PROBLEM:
WHY IS THIS A CONCERN?
• (2) HOW DOES IT AFFECT ME?
• (3) CURRENT CLIMATE: A GROWING CONCERN
CORPORATE AMERICA…THE WAVE
BEGINS
THE PROBLEM
• THOSE WHO DO NOT STUDY HISTORY…ARE
DOOMED TO REPEAT IT.
• WE ARE REPEATING IT….
THE PROBLEM
• HISTORY OF ID THEFT
THE PROBLEM
SPREADING LIKE A VIRUS
• FBI, US Postal, Secret Service, FTC all agree:
“ID Theft Is The Fastest Growing Crime In The
United States.”
THE PROBLEM
• 2011: 11.6 Million Victims
• 2012: 12.6 Million Victims
• 2013: 13.1 Million Victims
 Your Chances: 1 in 3 every year.
 Your Average Cost If Victimized: $3,000.
 Each victim will spend (on average): 331 HOURS trying to
correct the problems.
• Note: You will still have problems on your credit 71% of the time
 1.152 Million Arrest Warrants were issued for the wrong
people due to ID theft in just one year.
ID Theft:
FBI STATISTICS
• Do you have automobile insurance?
• 1 in 88 chance of an automobile accident
• Do you have a homeowner’s policy for fire?
• 1 in 728 chance of a house fire
• Do you have Identity (ID) Theft insurance?
• 1 in 3 chance of becoming an ID theft victim
ID Theft:
It Won’t Happen To Me!
2013 VICTIMS:
•The Chief Justice of the Supreme Court
•The First Lady
•The Vice President
•Beyonce
•Mark Cuban
•Think You Are Better Protected Than Them?
ID Theft:
It Won’t Happen To Me!
THE OTHER HALF OF ID THEFT
• FINANCIAL ID THEFT = 51% OF ID
THEFT
• WHAT ELSE???
• THE OTHER 49% OF ID THEFT:
– TAX
– MEDICAL
– EMPLOYMENT
– BENEFITS
– CHILD/ELDERLY
– CRIMINAL
– FAMILY FRAUD
WHAT ELSE: TAX ID THEFT
• SOMEONE FILES A TAX RETURN IN
YOUR NAME
• TAX ID THEFT HAS TRIPLED
• > 938,000 FALSE TAX RETURNS IN 2012
• OVER 1 MILLION EXPECTED THIS YEAR
WHAT ELSE: MEDICAL ID
THEFT
• A PERSON GETS A MEDICAL
PROCEDURE/SURGERY IN YOUR NAME
• MEDICAL ID THEFT: UP 24%
• PROBLEMS: MEDICAL CHART ERRORS
WHAT ELSE: MEDICAL ID
THEFT
• The Michael Weatherford Case: Kenneth
Marshall took his DL
• Used the stolen DL to obtain medical
treatment by identifying himself as
Weatherford
• > $345,000 at Ohio State Wexner Medical
WHAT ELSE: EMPLOYMENT
FRAUD
• Someone gets a job in your name
• Illegal aliens, felons, people with bad credit
• Why you ask….
Common Examples
• Open New Credit Cards
• Obtain Vehicle Loans
• Open New Checking/Savings Accounts
• Lease Apartments, Vehicles, or Equip.
• Obtain Mortgages
• Employment-IRS/SSA
• Telephone, Cable, and Electric service
WHAT ELSE: BENEFITS FRAUD
• Social Security fraud
• Benefits fraud
WHAT ELSE: CHILD ID THEFT/
ELDERLY ID THEFT
• 35x MORE LIKELY NOW
• THE PERFECT VICTIM – They never check
their credit.
CHILD ID THEFT EXAMPLE
• Olivia McNamara: ID stolen at 9 YOA
• Freshman Year: $1.5 million in fraudulent
debt.
• 42 fraudulent accounts opened in her name
WHAT ELSE: CRIMINAL
LIABILITY
• Thieves will get arrested in your name.
• Over 1 Million warrants issued for the wrong
people every year due to ID Theft.
WHAT ELSE: CRIMINAL
LIABILITY
• “Stancy Nesby of Oakland has been arrested,
jailed or detained 11 times in 15 months, all
because of bogus bench warrants issued in San
Francisco….” by Michael Maloney / San
Francisco Chronicle
WHAT ELSE: FAMILY FRAUD
• “My credit is terrible…let’s use Junior’s”
• ID Analytic Study:
– In 2011: > 500,000 children under 18 years of age
had their ID stolen by their parents.
WHAT ELSE: FAMILY FRAUD
• 2011: > 2 million elderly parents were
victimized by their adult children.
• Compared to the last three years, this crime is
up by 47%.
WHO YA GONNA CALL:
Help Police!!
• The Identity Theft Statute became law in Texas on September
1, 1999
• A person commits an offense if the person obtains, possesses,
transfers, or uses identifying information of another person
without the other person’s consent and with intent to harm or
defraud another.
Help Police!!
• THE ENTIRE ID THEFT UNIT FOR ALL OF DALLAS…..
Help Police!!
Help Police!!
•One person!
•CONCLUSION:
•You are on your own!
WHO YA GONNA CALL?
• THE CREDIT CARD COMPANY WILL
PROTECT ME….
• They ONLY cover their account…that is it.
• A credit card in kindergarten: Priceless
• Sun-Times News Group
CLIFFORD HAS ID STOLEN
BUT I’M REALLY CAREFUL
• I PROTECT MY INFORMATION
• I CROSS SHRED
• I LOCK UP MY SS CARD
THEY HAVE YOUR
INFORMATION
• YES YOU, READING THIS RIGHT NOW
• 5 MINUTE CHALLENGE: Anyone who
knows where to look can find your SS#,
DOB, and address in under 5 minutes on the
Internet.
• Write me at brandon@keepmyid.org
anytime and put me to the test.
WHY IS IT SO RAMPANT?
• WHY??? IT’S EASY!
• Death Master File
• Lexis/Nexis
• Spokeo.com
• Public Mortgage Documents
• Deed Records
• And dozens of others…
WHY IS IT SO RAMPANT?
WHY IS IT SO RAMPANT?
• “…if you know where to look; SSNs can be
bought in bulk for $1 each on private online
forums, and a specific person’s SSN can
reportedly be had for as little as $3.80.”
– Adrianne Jeffries from The Verge
DO THEY GET CAUGHT?
• WE STILL CATCH THE DUMB ONES…
Altered Check (A little greedy?)
Check the math?
Fake ID
ALMOST ALL ID THIEVES GET AWAY WITH IT.
• POLICE
• CREDIT CARD COMPANIES
• FTC
• IRS
• FBI
• POSTAL
• LITTLE TO NO SUPPORT
AN UNFORTUNATE TRUTH
RELYING ON GOVERNMENT AGENCIES IS
USELESS.
YOU MUST GET YOUR OWN
COVERAGE.
FORTUNE MAGAZINE 2013: “…a standard employee
benefit”
CORPORATE AMERICA: THE WAVE
BEGINS
• Today more than 300 companies,
including T-Mobile, Ford, Toyota, and
Google offer ID theft protection as an
employee benefit.
By Dinah Eng@FortuneMagazine
June 13, 2013
THE WAVE BEGINS
WHY DO THEY CARE?
•#1 – Lost productivity. 1/3 of their
workforce will get victimized x 331 hours.
•#2 – Nice Employee (and Family) Benefit.
Helps Rankings.
Corporate America
• #3 – Liability!
• “The potential for data breach liability is
a financial risk that many companies and
public entities are just beginning to
recognize and address. Unfortunately, for
too many, the significant financial liability
they can incur becomes apparent only
when it is too late.”
– FMG Law.
IF YOU COLLECT IT…YOU MUST PROTECT IT.
• VERDICTS ALL OVER THE COUNTRY
• 2005: $275,000 against Michigan Union
• Michigan Court of Appeals became the first
appellate court to allow the victims of identity
theft to recover damages (totaling $275,000) from
an organization that failed to adequately safeguard
personal information that was subsequently used
for identity theft.
CURRENT CLIMATE: A GROWING
CONCERN
IF YOU COLLECT IT…YOU MUST PROTECT IT.
• $18.58 MILLION VERDICT 2013: Equifax
• See:
http://gigaom.com/2009/12/30/rockyou-sued-over-user-data-breach
CURRENT CLIMATE: A GROWING
CONCERN
•WHO ARE THEY GOING TO LOOK
TO….
•TARGET…NEIMANS…
MICHAELS…AND ON AND ON
•HAVE YOU GOT AN ANSWER
FOR THEM?
CURRENT CLIMATE: A GROWING
CONCERN
1. BLOCK ID THEFT
“Credit Monitoring” = RUN!
2. COVER ALL ID THEFT
51% = Financial
49% = Tax, Criminal, Employment, Benefits,
Child/Elderly, and Medical
3. THERE IS NO 100% PROTECTION SO…
GET 100% RECOVERY SERVICES: GET A TEAM
TO DO THE WORK
THE SOLUTION
Patrick Crow
1-800-664-5936
Email: pat@keepmyID.org
 
 

More Related Content

Viewers also liked

Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
16 estrategias director ponal
16 estrategias director ponal16 estrategias director ponal
16 estrategias director ponalcolegionusefa
 
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL Ministerio TIC Colombia
 
Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...
Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...
Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...Ministerio TIC Colombia
 
Estrategia contra el hurto de celulares policía nacional
Estrategia contra el hurto de celulares policía nacional Estrategia contra el hurto de celulares policía nacional
Estrategia contra el hurto de celulares policía nacional Ministerio TIC Colombia
 

Viewers also liked (6)

Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
Handset Theft - A Case Study
Handset Theft  - A Case StudyHandset Theft  - A Case Study
Handset Theft - A Case Study
 
16 estrategias director ponal
16 estrategias director ponal16 estrategias director ponal
16 estrategias director ponal
 
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
 
Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...
Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...
Estrategia Nacional contra el Hurto de Celulares Política Nacional de Segurid...
 
Estrategia contra el hurto de celulares policía nacional
Estrategia contra el hurto de celulares policía nacional Estrategia contra el hurto de celulares policía nacional
Estrategia contra el hurto de celulares policía nacional
 

Similar to Identity theft protection company keepmy id.org

Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect youIdentity Theft Protection
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Medical Identity Theft
Medical Identity TheftMedical Identity Theft
Medical Identity TheftTrasie Phan
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity TheftIDT911
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 

Similar to Identity theft protection company keepmy id.org (20)

ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Medical Identity Theft
Medical Identity TheftMedical Identity Theft
Medical Identity Theft
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
Idt workshop group benefits
Idt workshop group benefitsIdt workshop group benefits
Idt workshop group benefits
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 

Recently uploaded

Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Attestation presentation under Transfer of property Act
Attestation presentation under Transfer of property ActAttestation presentation under Transfer of property Act
Attestation presentation under Transfer of property Act2020000445musaib
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,1882Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,18822020000445musaib
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointMohdYousuf40
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 

Recently uploaded (20)

Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Attestation presentation under Transfer of property Act
Attestation presentation under Transfer of property ActAttestation presentation under Transfer of property Act
Attestation presentation under Transfer of property Act
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,1882Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,1882
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal point
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 

Identity theft protection company keepmy id.org

  • 1. ID THEFT PREVENTION AND ID THEFT INSURANCE PAT CROW KEEPMYID.ORG pat@keepmyID.org www.keepmyID.org 1-800-664-5936
  • 2. IDENTITY THEFT AND INSURANCE • (1) THE PROBLEM: WHY IS THIS A CONCERN? • (2) HOW DOES IT AFFECT ME? • (3) CURRENT CLIMATE: A GROWING CONCERN CORPORATE AMERICA…THE WAVE BEGINS
  • 3. THE PROBLEM • THOSE WHO DO NOT STUDY HISTORY…ARE DOOMED TO REPEAT IT. • WE ARE REPEATING IT….
  • 5. THE PROBLEM SPREADING LIKE A VIRUS • FBI, US Postal, Secret Service, FTC all agree: “ID Theft Is The Fastest Growing Crime In The United States.”
  • 6. THE PROBLEM • 2011: 11.6 Million Victims • 2012: 12.6 Million Victims • 2013: 13.1 Million Victims
  • 7.  Your Chances: 1 in 3 every year.  Your Average Cost If Victimized: $3,000.  Each victim will spend (on average): 331 HOURS trying to correct the problems. • Note: You will still have problems on your credit 71% of the time  1.152 Million Arrest Warrants were issued for the wrong people due to ID theft in just one year. ID Theft: FBI STATISTICS
  • 8. • Do you have automobile insurance? • 1 in 88 chance of an automobile accident • Do you have a homeowner’s policy for fire? • 1 in 728 chance of a house fire • Do you have Identity (ID) Theft insurance? • 1 in 3 chance of becoming an ID theft victim ID Theft: It Won’t Happen To Me!
  • 9. 2013 VICTIMS: •The Chief Justice of the Supreme Court •The First Lady •The Vice President •Beyonce •Mark Cuban •Think You Are Better Protected Than Them? ID Theft: It Won’t Happen To Me!
  • 10. THE OTHER HALF OF ID THEFT • FINANCIAL ID THEFT = 51% OF ID THEFT • WHAT ELSE??? • THE OTHER 49% OF ID THEFT: – TAX – MEDICAL – EMPLOYMENT – BENEFITS – CHILD/ELDERLY – CRIMINAL – FAMILY FRAUD
  • 11. WHAT ELSE: TAX ID THEFT • SOMEONE FILES A TAX RETURN IN YOUR NAME • TAX ID THEFT HAS TRIPLED • > 938,000 FALSE TAX RETURNS IN 2012 • OVER 1 MILLION EXPECTED THIS YEAR
  • 12. WHAT ELSE: MEDICAL ID THEFT • A PERSON GETS A MEDICAL PROCEDURE/SURGERY IN YOUR NAME • MEDICAL ID THEFT: UP 24% • PROBLEMS: MEDICAL CHART ERRORS
  • 13. WHAT ELSE: MEDICAL ID THEFT • The Michael Weatherford Case: Kenneth Marshall took his DL • Used the stolen DL to obtain medical treatment by identifying himself as Weatherford • > $345,000 at Ohio State Wexner Medical
  • 14. WHAT ELSE: EMPLOYMENT FRAUD • Someone gets a job in your name • Illegal aliens, felons, people with bad credit • Why you ask….
  • 15. Common Examples • Open New Credit Cards • Obtain Vehicle Loans • Open New Checking/Savings Accounts • Lease Apartments, Vehicles, or Equip. • Obtain Mortgages • Employment-IRS/SSA • Telephone, Cable, and Electric service
  • 16. WHAT ELSE: BENEFITS FRAUD • Social Security fraud • Benefits fraud
  • 17. WHAT ELSE: CHILD ID THEFT/ ELDERLY ID THEFT • 35x MORE LIKELY NOW • THE PERFECT VICTIM – They never check their credit.
  • 18. CHILD ID THEFT EXAMPLE • Olivia McNamara: ID stolen at 9 YOA • Freshman Year: $1.5 million in fraudulent debt. • 42 fraudulent accounts opened in her name
  • 19. WHAT ELSE: CRIMINAL LIABILITY • Thieves will get arrested in your name. • Over 1 Million warrants issued for the wrong people every year due to ID Theft.
  • 20. WHAT ELSE: CRIMINAL LIABILITY • “Stancy Nesby of Oakland has been arrested, jailed or detained 11 times in 15 months, all because of bogus bench warrants issued in San Francisco….” by Michael Maloney / San Francisco Chronicle
  • 21. WHAT ELSE: FAMILY FRAUD • “My credit is terrible…let’s use Junior’s” • ID Analytic Study: – In 2011: > 500,000 children under 18 years of age had their ID stolen by their parents.
  • 22. WHAT ELSE: FAMILY FRAUD • 2011: > 2 million elderly parents were victimized by their adult children. • Compared to the last three years, this crime is up by 47%.
  • 23. WHO YA GONNA CALL: Help Police!! • The Identity Theft Statute became law in Texas on September 1, 1999 • A person commits an offense if the person obtains, possesses, transfers, or uses identifying information of another person without the other person’s consent and with intent to harm or defraud another.
  • 24. Help Police!! • THE ENTIRE ID THEFT UNIT FOR ALL OF DALLAS…..
  • 27. WHO YA GONNA CALL? • THE CREDIT CARD COMPANY WILL PROTECT ME…. • They ONLY cover their account…that is it.
  • 28. • A credit card in kindergarten: Priceless • Sun-Times News Group
  • 29. CLIFFORD HAS ID STOLEN
  • 30. BUT I’M REALLY CAREFUL • I PROTECT MY INFORMATION • I CROSS SHRED • I LOCK UP MY SS CARD
  • 31. THEY HAVE YOUR INFORMATION • YES YOU, READING THIS RIGHT NOW • 5 MINUTE CHALLENGE: Anyone who knows where to look can find your SS#, DOB, and address in under 5 minutes on the Internet. • Write me at brandon@keepmyid.org anytime and put me to the test.
  • 32. WHY IS IT SO RAMPANT? • WHY??? IT’S EASY! • Death Master File • Lexis/Nexis • Spokeo.com • Public Mortgage Documents • Deed Records • And dozens of others…
  • 33. WHY IS IT SO RAMPANT?
  • 34. WHY IS IT SO RAMPANT? • “…if you know where to look; SSNs can be bought in bulk for $1 each on private online forums, and a specific person’s SSN can reportedly be had for as little as $3.80.” – Adrianne Jeffries from The Verge
  • 35. DO THEY GET CAUGHT? • WE STILL CATCH THE DUMB ONES…
  • 36. Altered Check (A little greedy?)
  • 39. ALMOST ALL ID THIEVES GET AWAY WITH IT. • POLICE • CREDIT CARD COMPANIES • FTC • IRS • FBI • POSTAL • LITTLE TO NO SUPPORT AN UNFORTUNATE TRUTH
  • 40. RELYING ON GOVERNMENT AGENCIES IS USELESS. YOU MUST GET YOUR OWN COVERAGE.
  • 41. FORTUNE MAGAZINE 2013: “…a standard employee benefit” CORPORATE AMERICA: THE WAVE BEGINS
  • 42. • Today more than 300 companies, including T-Mobile, Ford, Toyota, and Google offer ID theft protection as an employee benefit. By Dinah Eng@FortuneMagazine June 13, 2013 THE WAVE BEGINS
  • 43. WHY DO THEY CARE? •#1 – Lost productivity. 1/3 of their workforce will get victimized x 331 hours. •#2 – Nice Employee (and Family) Benefit. Helps Rankings. Corporate America
  • 44. • #3 – Liability! • “The potential for data breach liability is a financial risk that many companies and public entities are just beginning to recognize and address. Unfortunately, for too many, the significant financial liability they can incur becomes apparent only when it is too late.” – FMG Law.
  • 45. IF YOU COLLECT IT…YOU MUST PROTECT IT. • VERDICTS ALL OVER THE COUNTRY • 2005: $275,000 against Michigan Union • Michigan Court of Appeals became the first appellate court to allow the victims of identity theft to recover damages (totaling $275,000) from an organization that failed to adequately safeguard personal information that was subsequently used for identity theft. CURRENT CLIMATE: A GROWING CONCERN
  • 46. IF YOU COLLECT IT…YOU MUST PROTECT IT. • $18.58 MILLION VERDICT 2013: Equifax • See: http://gigaom.com/2009/12/30/rockyou-sued-over-user-data-breach CURRENT CLIMATE: A GROWING CONCERN
  • 47. •WHO ARE THEY GOING TO LOOK TO…. •TARGET…NEIMANS… MICHAELS…AND ON AND ON •HAVE YOU GOT AN ANSWER FOR THEM? CURRENT CLIMATE: A GROWING CONCERN
  • 48. 1. BLOCK ID THEFT “Credit Monitoring” = RUN! 2. COVER ALL ID THEFT 51% = Financial 49% = Tax, Criminal, Employment, Benefits, Child/Elderly, and Medical 3. THERE IS NO 100% PROTECTION SO… GET 100% RECOVERY SERVICES: GET A TEAM TO DO THE WORK THE SOLUTION
  • 50.    

Editor's Notes

  1. Business Can not have their Identity Stolen (Other offense)
  2. Business Can not have their Identity Stolen (Other offense)
  3. Business Can not have their Identity Stolen (Other offense)
  4. Business Can not have their Identity Stolen (Other offense)
  5. Business Can not have their Identity Stolen (Other offense)
  6. Business Can not have their Identity Stolen (Other offense)
  7. Business Can not have their Identity Stolen (Other offense)
  8. Car Dealerships/Auto Loans-Texas DL Electric/Phone- Not the resident( Bad Credit or Illegal Immigrant)
  9. Business Can not have their Identity Stolen (Other offense)
  10. Business Can not have their Identity Stolen (Other offense)
  11. Business Can not have their Identity Stolen (Other offense)
  12. Business Can not have their Identity Stolen (Other offense)
  13. Business Can not have their Identity Stolen (Other offense)
  14. Business Can not have their Identity Stolen (Other offense)
  15. Business Can not have their Identity Stolen (Other offense)
  16. Business Can not have their Identity Stolen (Other offense)
  17. Business Can not have their Identity Stolen (Other offense)
  18. Business Can not have their Identity Stolen (Other offense)
  19. Business Can not have their Identity Stolen (Other offense)