SlideShare una empresa de Scribd logo
1 de 15
Police Report Vs. Incident
Report
A Resource for Identity Theft Victims
Advocate Tip
• Requesting a police and investigation is a not
always available to victims of identity theft.
• Victims are often left to gather facts from credit
reports, statements and documented phone calls.
• This document will provide a guideline on steps to
take.
• A well detailed police/incident report will always
help your case and be an important key to resolve
your identity theft case.
• Not every identity theft case is the same. Use what
you need. Don’t feel you have place a fraud alert
and freeze after getting a wrong call about a debt.
Police Report
• Basically a police report is a description of facts
detailing a crime written up by the officer or
representative of a police department who was
deployed to the scene.
• A well-drafted report is an important tool in solving
a crime.
• It's important to make sure your report is detailed,
factual and specific to what happened.
• Police reports also require an investigation follow
up. Generally by a detective. However that is not a
guarantee your case will be investigated.
Incident Report
• Similar to Police Reports, an Incident Report is a
victims statement regarding a crime.
• Often bank statements, letters and other
supporting documents are included.
• These reports are generally not investigated and
are for insurance purposes or businesses
requesting a police report.
Online Police Report
• Many states offer the option to file an incident
report online. Make sure you make a copy
and keep any confirmation numbers for your
records.
• These may or may not be reviewed by an
officer or investigated.
• Generally this option does not allow
documents to be submitted.
• Follow up with supporting documents with
your police department.
Key Points
–
–
–
–

How much money was stolen?
When did you find out about the crime?
Do you have a suspect?
Which part of your identity was used:
• Name only?
• Social Security Number?
– Have you reviewed your credit report?
– Are you being contacted by a bank or debt collector?
– Are you being accused of:
Opening a checking account
Taking out a loan or line of credit
Committing a crime
The Fair Credit Reporting Act
(FCRA)
• The Federal Trade Commission (FTC), the nation’s consumer
protection agency, enforces the FCRA including this
requirement, which is known as Section 609(e).
• The law applies to a business that has provided credit, goods,
or services to, accepted payment from, or otherwise entered
into a transaction with someone who is believed to have
fraudulently used another person’s identification.
• Businesses Must Provide Victims and Law Enforcement with
Transaction Records Relating to Identity Theft
• http://www.business.ftc.gov/documents/bus66-businessesmust-provide-victims-and-law-enforcement-transactionrecords-relating-identity
Common Types of Identity Theft
•
•
•
•
•
•
•
•

Utility Fraud
Tax Fraud
Employment Fraud
Driver’s License Identity
Theft
Synthetic Identity Theft
Child Identity Theft
Debt Tagging
Data Breach

• Criminal Fraud
• Document - Benefit
Fraud
• Financial Fraud
• Wire Fraud or HELOC
• Check Fraud
• Medical Identity Theft
• Credit Card Fraud
– New Account
– Account Take Over
Credit Reporting Agencies
• All information that is considered part of the
identity theft committed against you should be
listed on your police/incident report.
• It’s imperative to closely review your credit
reports for inaccuracies:
→Names not belonging to you
→Addresses not belonging to you
→Credit Accounts, including collection accounts
Identity Theft Affidavit
• The Federal Trade Commission is the
agency to obtain your Identity Theft
Affidavit.
• This detailed report and your
Police/Incident Report are the best tools to
clear your good name.
• Two ways to file your complaint
– Online
– Identity Theft Affidavit
Identity Theft Report
Credit Reporting Agencies
National Reporting
Agencies
•
•
•
•
•

Experian
Equifax
TransUnion
Annual Credit Report
IRS
! Remember !
If you are a victim of Identity
Theft these reports are free!

Specialty Reporting
Agencies
•
•
•
•
•

•
•
•
•

ChexSystems
Clarity Services
TeleTrack
C.L.U.E.® Report
LexisNexis Personal
Reports
Innovis
Medical Information Bureau
Certegy
TeleCheck
Fraud Alerts
• After you confirm fraudulent accounts or criminal
charges have been filed against you.
• Per The Fair and Accurate Credit Transactions Act
you can order free credit reports and place fraud
alerts to protect our credit files.
• Financial institutions, Credit Bureaus and
Collection Agencies may require a copy of your
credit report.
• Use caution and only provide one if required.
• If mailing, send certified mail, receipt requested.
Free Consumer Resources
• Identity Theft Resource Center, Non-Profit
Organization
• Federal Trade Commission
• OnGuardOnline
• IRS
• The Internet Crime Complaint Center (IC3)
• Bureau of Consumer Protection Business
Center
• Consumer Protection
Compiled and designed by Mark Fullbright , Certified Identity Theft
Risk Management Specialist™ (CITRMS) as a free service for
consumers to protect themselves and reduce their exposure to identity
theft.
Stay Safe, Stay Secure

* THE FAIR CREDIT REPORTING ACT (FCRA)
* IDENTITY THEFT RESOURCE CENTER, NON-PROFIT ORGANIZATION
* FEDERAL TRADE COMMISSION

Más contenido relacionado

La actualidad más candente

Criminological research and statistics
Criminological research and statisticsCriminological research and statistics
Criminological research and statisticsArvin Kim Arnilla
 
Filipino youth delinquency
Filipino youth delinquencyFilipino youth delinquency
Filipino youth delinquencyArnel Rivera
 
Title ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateTitle ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateJose Van Tan
 
Classes of questioned documents
Classes of questioned documentsClasses of questioned documents
Classes of questioned documentskiran malik
 
Four Types of Police Reports
Four Types of Police ReportsFour Types of Police Reports
Four Types of Police ReportsJean Reynolds
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewFrancis Postrado
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015monde24836
 
Primer Tc (Presentation)
Primer Tc (Presentation)Primer Tc (Presentation)
Primer Tc (Presentation)probation
 
Q&A On Probation (Presentation)
Q&A On Probation (Presentation)Q&A On Probation (Presentation)
Q&A On Probation (Presentation)probation
 
Jurat example
Jurat exampleJurat example
Jurat exampleattyakc
 

La actualidad más candente (20)

Criminological research and statistics
Criminological research and statisticsCriminological research and statistics
Criminological research and statistics
 
Criminal procedure simplified
Criminal procedure simplifiedCriminal procedure simplified
Criminal procedure simplified
 
PNP MASTER PLANS
PNP MASTER PLANSPNP MASTER PLANS
PNP MASTER PLANS
 
ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Who are criminally liable
Who are criminally liableWho are criminally liable
Who are criminally liable
 
Filipino youth delinquency
Filipino youth delinquencyFilipino youth delinquency
Filipino youth delinquency
 
Title ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateTitle ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the state
 
criminal justice system
criminal justice systemcriminal justice system
criminal justice system
 
Classes of questioned documents
Classes of questioned documentsClasses of questioned documents
Classes of questioned documents
 
Four Types of Police Reports
Four Types of Police ReportsFour Types of Police Reports
Four Types of Police Reports
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and Overview
 
Justifyingcircumstance
JustifyingcircumstanceJustifyingcircumstance
Justifyingcircumstance
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
 
Pnp operational procedure
Pnp operational procedurePnp operational procedure
Pnp operational procedure
 
Primer Tc (Presentation)
Primer Tc (Presentation)Primer Tc (Presentation)
Primer Tc (Presentation)
 
Q&A On Probation (Presentation)
Q&A On Probation (Presentation)Q&A On Probation (Presentation)
Q&A On Probation (Presentation)
 
Aggravating circumstances
Aggravating circumstancesAggravating circumstances
Aggravating circumstances
 
Jurat example
Jurat exampleJurat example
Jurat example
 
Rule 117 motion to quash
Rule 117 motion to quashRule 117 motion to quash
Rule 117 motion to quash
 

Destacado

Four Types of Police Reports
Four Types of Police ReportsFour Types of Police Reports
Four Types of Police ReportsJean Reynolds
 
Nursing records & reports
Nursing records & reportsNursing records & reports
Nursing records & reportsjasleenbrar03
 
Terminating Unsafe Employees
Terminating  Unsafe EmployeesTerminating  Unsafe Employees
Terminating Unsafe EmployeesMary Wright
 
Criminal Justice 5: Types of Reports
Criminal Justice 5: Types of ReportsCriminal Justice 5: Types of Reports
Criminal Justice 5: Types of ReportsJean Reynolds
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps - Mark - Fullbright
 
Accident Investigation Report - Sample 1
Accident Investigation Report - Sample 1Accident Investigation Report - Sample 1
Accident Investigation Report - Sample 1John Keller
 

Destacado (8)

Four Types of Police Reports
Four Types of Police ReportsFour Types of Police Reports
Four Types of Police Reports
 
Incident report
Incident reportIncident report
Incident report
 
Nursing records & reports
Nursing records & reportsNursing records & reports
Nursing records & reports
 
Terminating Unsafe Employees
Terminating  Unsafe EmployeesTerminating  Unsafe Employees
Terminating Unsafe Employees
 
Criminal Justice 5: Types of Reports
Criminal Justice 5: Types of ReportsCriminal Justice 5: Types of Reports
Criminal Justice 5: Types of Reports
 
Police Report Writing
Police Report WritingPolice Report Writing
Police Report Writing
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
Accident Investigation Report - Sample 1
Accident Investigation Report - Sample 1Accident Investigation Report - Sample 1
Accident Investigation Report - Sample 1
 

Similar a Police Report Vs. Incident Report

West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedAdam Singer
 
Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims - Mark - Fullbright
 
mr neeraj - day 2 - aml kyc
mr neeraj - day 2 - aml kycmr neeraj - day 2 - aml kyc
mr neeraj - day 2 - aml kycNeeraj Verma
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Understanding your credit report
Understanding your credit reportUnderstanding your credit report
Understanding your credit reportrick zimmerman
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do listSandy Kleinhenz
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 

Similar a Police Report Vs. Incident Report (20)

Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
 
West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updated
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
 
Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
 
mr neeraj - day 2 - aml kyc
mr neeraj - day 2 - aml kycmr neeraj - day 2 - aml kyc
mr neeraj - day 2 - aml kyc
 
Check Your Credit Report
Check Your Credit ReportCheck Your Credit Report
Check Your Credit Report
 
ONLINE FRAUD GUIDE
ONLINE FRAUD GUIDEONLINE FRAUD GUIDE
ONLINE FRAUD GUIDE
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Understanding your credit report
Understanding your credit reportUnderstanding your credit report
Understanding your credit report
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Shelf Corps CPNs and Tradelines
Shelf Corps CPNs and TradelinesShelf Corps CPNs and Tradelines
Shelf Corps CPNs and Tradelines
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 

Más de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Más de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Último (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Police Report Vs. Incident Report

  • 1. Police Report Vs. Incident Report A Resource for Identity Theft Victims
  • 2. Advocate Tip • Requesting a police and investigation is a not always available to victims of identity theft. • Victims are often left to gather facts from credit reports, statements and documented phone calls. • This document will provide a guideline on steps to take. • A well detailed police/incident report will always help your case and be an important key to resolve your identity theft case. • Not every identity theft case is the same. Use what you need. Don’t feel you have place a fraud alert and freeze after getting a wrong call about a debt.
  • 3. Police Report • Basically a police report is a description of facts detailing a crime written up by the officer or representative of a police department who was deployed to the scene. • A well-drafted report is an important tool in solving a crime. • It's important to make sure your report is detailed, factual and specific to what happened. • Police reports also require an investigation follow up. Generally by a detective. However that is not a guarantee your case will be investigated.
  • 4. Incident Report • Similar to Police Reports, an Incident Report is a victims statement regarding a crime. • Often bank statements, letters and other supporting documents are included. • These reports are generally not investigated and are for insurance purposes or businesses requesting a police report.
  • 5. Online Police Report • Many states offer the option to file an incident report online. Make sure you make a copy and keep any confirmation numbers for your records. • These may or may not be reviewed by an officer or investigated. • Generally this option does not allow documents to be submitted. • Follow up with supporting documents with your police department.
  • 6. Key Points – – – – How much money was stolen? When did you find out about the crime? Do you have a suspect? Which part of your identity was used: • Name only? • Social Security Number? – Have you reviewed your credit report? – Are you being contacted by a bank or debt collector? – Are you being accused of: Opening a checking account Taking out a loan or line of credit Committing a crime
  • 7. The Fair Credit Reporting Act (FCRA) • The Federal Trade Commission (FTC), the nation’s consumer protection agency, enforces the FCRA including this requirement, which is known as Section 609(e). • The law applies to a business that has provided credit, goods, or services to, accepted payment from, or otherwise entered into a transaction with someone who is believed to have fraudulently used another person’s identification. • Businesses Must Provide Victims and Law Enforcement with Transaction Records Relating to Identity Theft • http://www.business.ftc.gov/documents/bus66-businessesmust-provide-victims-and-law-enforcement-transactionrecords-relating-identity
  • 8. Common Types of Identity Theft • • • • • • • • Utility Fraud Tax Fraud Employment Fraud Driver’s License Identity Theft Synthetic Identity Theft Child Identity Theft Debt Tagging Data Breach • Criminal Fraud • Document - Benefit Fraud • Financial Fraud • Wire Fraud or HELOC • Check Fraud • Medical Identity Theft • Credit Card Fraud – New Account – Account Take Over
  • 9. Credit Reporting Agencies • All information that is considered part of the identity theft committed against you should be listed on your police/incident report. • It’s imperative to closely review your credit reports for inaccuracies: →Names not belonging to you →Addresses not belonging to you →Credit Accounts, including collection accounts
  • 10. Identity Theft Affidavit • The Federal Trade Commission is the agency to obtain your Identity Theft Affidavit. • This detailed report and your Police/Incident Report are the best tools to clear your good name. • Two ways to file your complaint – Online – Identity Theft Affidavit
  • 12. Credit Reporting Agencies National Reporting Agencies • • • • • Experian Equifax TransUnion Annual Credit Report IRS ! Remember ! If you are a victim of Identity Theft these reports are free! Specialty Reporting Agencies • • • • • • • • • ChexSystems Clarity Services TeleTrack C.L.U.E.® Report LexisNexis Personal Reports Innovis Medical Information Bureau Certegy TeleCheck
  • 13. Fraud Alerts • After you confirm fraudulent accounts or criminal charges have been filed against you. • Per The Fair and Accurate Credit Transactions Act you can order free credit reports and place fraud alerts to protect our credit files. • Financial institutions, Credit Bureaus and Collection Agencies may require a copy of your credit report. • Use caution and only provide one if required. • If mailing, send certified mail, receipt requested.
  • 14. Free Consumer Resources • Identity Theft Resource Center, Non-Profit Organization • Federal Trade Commission • OnGuardOnline • IRS • The Internet Crime Complaint Center (IC3) • Bureau of Consumer Protection Business Center • Consumer Protection
  • 15. Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free service for consumers to protect themselves and reduce their exposure to identity theft. Stay Safe, Stay Secure * THE FAIR CREDIT REPORTING ACT (FCRA) * IDENTITY THEFT RESOURCE CENTER, NON-PROFIT ORGANIZATION * FEDERAL TRADE COMMISSION