SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
U.S. Department
of Justice

Public Advisory: Special Report for
Retail Businesses on
IDENTITY THEFT
Summary
The United States Department of Justice and Department of the Solicitor General
of Canada are jointly issuing a Special Report to advise retail businesses on current
trends and developments in Identity Theft.
Identity theft refers to all types of crime in which someone wrongfully obtains and
uses another person's personal data in some way that involves fraud or deception,
typically for economic gain. United States and Canadian law enforcement agencies are
seeing a growing trend in both countries towards greater use of identity theft as a
means of furthering or facilitating other types of crime, from fraud to organized crime to
terrorism. This Public Advisory will highlight some of the most significant forms of
identity theft in Canada and the United States, and explain how to recognize them and
respond if your business becomes a victim of identity theft.
Facts
Identity theft has become one of the fastest-growing crimes in Canada and the
United States. In the United States, identity theft complaints to the Federal Trade
Commission have increased fivefold in the last three years, from 31,117 in 2000 to
161,819 in 2002. In Canada, the PhoneBusters National Call Centre received 7,629
identity theft complaints by Canadians in 2002, that reported total losses of more than
$8.5 million, and an additional 2,250 complaints in the first quarter of 2003 that reported
total losses of more than $5.3 million. In addition, two major Canadian credit bureaus,
Equifax and Trans Union, indicate that they receive approximately 1,400 to 1,800
Canadian identity theft complaints per month, the majority of which are from the
province of Ontario.
One reason for the increase in identity theft may be that consumers often
become victims of identity theft without having any direct contact with the identity
thieves who acquire their personal data. Simply by doing things that are part of
everyda y routine – charging dinner at a restaurant, using payment cards to purchase
gasoline or rent a car, or submitting personal information to employers and various
levels of government – consumers may be leaving or exposing their personal data
where identity thieves can access and use it without the consumers’ knowledge or
permission.
How Identity Theft Occurs
Here are just a few examples of how identity theft is committed:

·

·

·

·

·

Theft of Payment Cards and Documents
Identity thieves often steal purses or wallets, and steal newly issued cards or
credit-card applications from residential mail boxes. Some, known as “dumpster
divers,” will even rummage through trash to pick out bank and credit card
statements. Letters that contain “pre-approved credit-card” offers, if not
shredded or destroyed, can be sent back to the issuing bank requesting that the
card be sent to the recipient, but at a new address of the identity thief’s choosing
“Shoulder Surfing”
Some identity thieves also engage in “shoulder surfing”: looking over a
customer’s shoulder or from a nearby location as he enters his Personal
Identification Number (PIN) at an ATM machine. By installing a fake ATM de vice
that reads the card’s encoded data, or by distracting the consumer while his card
is taken or switched with another, an identity thief can then use his PIN to drain
that bank account without his knowledge.
“Skimming”
Identity thieves also “skim” or “swipe” customer credit cards at restaurants or
cash stations, using an electronic device known as a skimmer. The skimmer
records the personal information data from the magnetic stripes on the backs of
the cards. Identity thieves then transfer or transmit the data to another location,
sometimes overseas, where it is reencoded on to fraudulently made credit cards.
E-Mail and Web site “Spoofing”
Many criminals who want to obtain personal data from people online use a
technique known as “spoofing”: the creation of e-mails and websites that appear
to belong to legitimate businesses, such as financial institutions or online auction
sites. Consumers who receive e-mails claiming to be from a legitimate business
are often directed to a website, appearing to be from that business, at which the
consumers are directed to enter large amounts of personal data. In fact, the
criminals who created these e-mails and websites have no real connection with
those businesses. Their sole purpose is to obtain the consumers’ personal data
to engage in various fraud schemes.
Theft from Company or Government Datab ases
Law enforcement agencies in both Canada and the United States have noticed a
significant increase in efforts by identity thieves to access large databases of
personal information that private companies and government agencies maintain.
Criminals have broken into offices to steal computer hard drives, bribed or
compromised employees into obtaining personal data for them, and hacked into
databases.
What Businesses Can Do Today to Reduce The Risk of Identity Theft

·
·

·

·

·

Keep valuable customer data, such as credit-card or bank account numbers, in a
secure location in your business so that it is not readily visible to others who may
have access to the premises.
Shred or destroy paperwork you no longer need, such as bank machine receipts,
receipts from electronic and credit card purchases, utility bills, and any other
document from customer transactions that contains personal and/or financial
information.
If part of your business involves online transactions, check regularly to see
whether someone has set up a “spoof site” in the name of your business. If you
find a spoof site, check the Uniform Resource Locator (URL) of the site to find
the domain name (e.g., “www.what-a-scam.com”), look up that domain name
through domain name registrar sites to find out which web hosting service or
Internet service provider the spoof site is using, and contact that service or
provider immediately.
If your business has a website that customers can use to order merchandise or
enter valuable personal data, have your information technology staff check
regularly to ensure that there are no security “holes” through which others can
improperly access customer data. This includes all upgrades of software used
on your site. Security holes are sometimes inadvertently created as current
programs are upgraded or patched, but may expose customer data for long
periods of time if they are not found and fixed promptly.
Regardless of what size your business is, decide on a fraud prevention and
detection program that you can afford and implement it promptly. Online
businesses, which often depend on credit cards for payment, should consult the
financial institutions with which they have merchant relationships, and the major
payment-card associations as appropriate, to learn what programs or
mechanisms may be most suitable for their businesses.
Ø
Online merchants should be especially vigilant because when they handle
“card-not-present” transactions, they may be held financially responsible
for a fraudulent transaction even when the card issuer has approved that
transaction.
Ø
Merchants who conduct business face-to-face with their customers should
consider establishing a uniform policy of requiring more than one form of
identification when a customer is paying by check or credit card. In any
event, all card-present merchants also need to ensure that they abide by
all operating regulations of their payment-card associations, including
taking all necessary steps to ensure, for each consumer transaction
involving a payment card, that the card, the cardholder, and the
transaction are legitimate.
·

Order a copy of your credit report from the major credit reporting agencies at
least once every year. Check with the credit bureaus to see whether there is a
charge for this service. Make sure your credit report is accurate and includes
only those activities that you have authorized.

If You Are A Victim
The United States Department of Justice and the Department of the Solicitor General of
Canada advise that if your business has become a victim of identity theft, you should
take three immediate steps. First, contact the financial institution with which you have
your merchant relationship. Second, report the matter to your local police of jurisdiction.
Police authorities often will take reports even if the crime ultimately may be investigated
by another law enforcement agency. In addition, the police report may be useful in
dealing with your financial institution or other businesses about the identity theft.
Third, report your identity theft case immediately to the appropriate government and
private-sector organizations listed below. American and Canadian agencies such as
these are compiling information on identity theft to identify theft trends and patterns, and
using the information to assist law enforcement agencies in possible investigations.
Resources for American Victims of Identity Theft
Federal Trade Commission Identity Theft Hotline
Toll free: (877) IDTHEFT (438-4338)
Web: www.consumer.gov/idtheft
Credit Reporting Agencies: Place fraud alerts on your credit reports by contacting the
credit bureaus that operate in the United States.
Equifax
Report fraud: (800) 525-6285
Web: www.equifax.com
Experian
Report fraud: (888)-EXPERIAN (397-3742)
Web: www.experian.com
TransUnion
Report fraud: (800) 916-8800
Web: www.transunion.com
If you need other information or have other questions concerning identity theft,
please contact the PNCC in Canada, or the FTC in the United States, as listed above.
Resources for Canadian Victims of Identity Theft
PhoneBusters National Call Centre (PNCC)
Ontario Provincial Police Anti-Rackets
Toll Free: (888) 495-8501
Toll Free Fax: (888) 654-9426
Email: info@phonebusters.com
Web: www.phonebusters.com
Credit Reporting Agencies: Place fraud alerts on your credit reports by contacting the
credit bureaus that operate in Canada.
Equifax Canada
Report fraud: (800) 465-7166
Web: www.euifax.com/EFX_Canada
Trans Union Canada
Report fraud: (877) 525-3823
Web: www.tuc.ca/TUCorp/consumer/personalsolutions.htm
Further Information
For further information on identity theft and how you can protect your valuable
personal information, please consult the following sources: PNCC, Identity Theft,
http://www.phonebusters.com/Eng/SpotaScam/scams_identity_theft.html Federal Trade
Commission, Identity Theft, http://www.consumer.gov/idtheft.
###

Más contenido relacionado

La actualidad más candente

Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet FraudGoose & Gander
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International PerspectiveSteve Mitchinson
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameSpringboard
 

La actualidad más candente (20)

Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Training for Bank Employees
Training for Bank EmployeesTraining for Bank Employees
Training for Bank Employees
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 

Destacado

Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014- Mark - Fullbright
 
Business Peer Peer File Sharing Guide
Business Peer Peer File Sharing GuideBusiness Peer Peer File Sharing Guide
Business Peer Peer File Sharing Guide- Mark - Fullbright
 
False Personation aka Identity Theft
False Personation aka Identity TheftFalse Personation aka Identity Theft
False Personation aka Identity Theft- Mark - Fullbright
 
From Consumer to Citizen - Digital Media and Youth Civic Engagement
From Consumer to Citizen - Digital Media and Youth Civic EngagementFrom Consumer to Citizen - Digital Media and Youth Civic Engagement
From Consumer to Citizen - Digital Media and Youth Civic Engagement- Mark - Fullbright
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report- Mark - Fullbright
 
Saskatchewan Privacy Commish investigative report reveals misdirected faxes c...
Saskatchewan Privacy Commish investigative report reveals misdirected faxes c...Saskatchewan Privacy Commish investigative report reveals misdirected faxes c...
Saskatchewan Privacy Commish investigative report reveals misdirected faxes c...- Mark - Fullbright
 
Interlink Interchange Reimbursement Fees – April 2013
Interlink Interchange Reimbursement Fees – April 2013Interlink Interchange Reimbursement Fees – April 2013
Interlink Interchange Reimbursement Fees – April 2013- Mark - Fullbright
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard- Mark - Fullbright
 

Destacado (9)

Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014
 
Business Peer Peer File Sharing Guide
Business Peer Peer File Sharing GuideBusiness Peer Peer File Sharing Guide
Business Peer Peer File Sharing Guide
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 
False Personation aka Identity Theft
False Personation aka Identity TheftFalse Personation aka Identity Theft
False Personation aka Identity Theft
 
From Consumer to Citizen - Digital Media and Youth Civic Engagement
From Consumer to Citizen - Digital Media and Youth Civic EngagementFrom Consumer to Citizen - Digital Media and Youth Civic Engagement
From Consumer to Citizen - Digital Media and Youth Civic Engagement
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report
 
Saskatchewan Privacy Commish investigative report reveals misdirected faxes c...
Saskatchewan Privacy Commish investigative report reveals misdirected faxes c...Saskatchewan Privacy Commish investigative report reveals misdirected faxes c...
Saskatchewan Privacy Commish investigative report reveals misdirected faxes c...
 
Interlink Interchange Reimbursement Fees – April 2013
Interlink Interchange Reimbursement Fees – April 2013Interlink Interchange Reimbursement Fees – April 2013
Interlink Interchange Reimbursement Fees – April 2013
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard
 

Similar a Special Report for Retail Businesses on IDENTITY THEFT - ca

Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theftnewsusa01
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Identity Theft
Identity TheftIdentity Theft
Identity TheftBlinsink
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautionsquentinz52
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautionsquentinz52
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisIT-oLogy
 
Scams 0710
Scams 0710Scams 0710
Scams 0710KEIRO2
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 

Similar a Special Report for Retail Businesses on IDENTITY THEFT - ca (20)

Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
Scams 0710
Scams 0710Scams 0710
Scams 0710
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 

Más de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Más de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 

Último (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Special Report for Retail Businesses on IDENTITY THEFT - ca

  • 1. U.S. Department of Justice Public Advisory: Special Report for Retail Businesses on IDENTITY THEFT Summary The United States Department of Justice and Department of the Solicitor General of Canada are jointly issuing a Special Report to advise retail businesses on current trends and developments in Identity Theft. Identity theft refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. United States and Canadian law enforcement agencies are seeing a growing trend in both countries towards greater use of identity theft as a means of furthering or facilitating other types of crime, from fraud to organized crime to terrorism. This Public Advisory will highlight some of the most significant forms of identity theft in Canada and the United States, and explain how to recognize them and respond if your business becomes a victim of identity theft. Facts Identity theft has become one of the fastest-growing crimes in Canada and the United States. In the United States, identity theft complaints to the Federal Trade Commission have increased fivefold in the last three years, from 31,117 in 2000 to 161,819 in 2002. In Canada, the PhoneBusters National Call Centre received 7,629 identity theft complaints by Canadians in 2002, that reported total losses of more than $8.5 million, and an additional 2,250 complaints in the first quarter of 2003 that reported total losses of more than $5.3 million. In addition, two major Canadian credit bureaus, Equifax and Trans Union, indicate that they receive approximately 1,400 to 1,800 Canadian identity theft complaints per month, the majority of which are from the province of Ontario. One reason for the increase in identity theft may be that consumers often become victims of identity theft without having any direct contact with the identity thieves who acquire their personal data. Simply by doing things that are part of everyda y routine – charging dinner at a restaurant, using payment cards to purchase gasoline or rent a car, or submitting personal information to employers and various levels of government – consumers may be leaving or exposing their personal data
  • 2. where identity thieves can access and use it without the consumers’ knowledge or permission. How Identity Theft Occurs Here are just a few examples of how identity theft is committed: · · · · · Theft of Payment Cards and Documents Identity thieves often steal purses or wallets, and steal newly issued cards or credit-card applications from residential mail boxes. Some, known as “dumpster divers,” will even rummage through trash to pick out bank and credit card statements. Letters that contain “pre-approved credit-card” offers, if not shredded or destroyed, can be sent back to the issuing bank requesting that the card be sent to the recipient, but at a new address of the identity thief’s choosing “Shoulder Surfing” Some identity thieves also engage in “shoulder surfing”: looking over a customer’s shoulder or from a nearby location as he enters his Personal Identification Number (PIN) at an ATM machine. By installing a fake ATM de vice that reads the card’s encoded data, or by distracting the consumer while his card is taken or switched with another, an identity thief can then use his PIN to drain that bank account without his knowledge. “Skimming” Identity thieves also “skim” or “swipe” customer credit cards at restaurants or cash stations, using an electronic device known as a skimmer. The skimmer records the personal information data from the magnetic stripes on the backs of the cards. Identity thieves then transfer or transmit the data to another location, sometimes overseas, where it is reencoded on to fraudulently made credit cards. E-Mail and Web site “Spoofing” Many criminals who want to obtain personal data from people online use a technique known as “spoofing”: the creation of e-mails and websites that appear to belong to legitimate businesses, such as financial institutions or online auction sites. Consumers who receive e-mails claiming to be from a legitimate business are often directed to a website, appearing to be from that business, at which the consumers are directed to enter large amounts of personal data. In fact, the criminals who created these e-mails and websites have no real connection with those businesses. Their sole purpose is to obtain the consumers’ personal data to engage in various fraud schemes. Theft from Company or Government Datab ases Law enforcement agencies in both Canada and the United States have noticed a significant increase in efforts by identity thieves to access large databases of personal information that private companies and government agencies maintain. Criminals have broken into offices to steal computer hard drives, bribed or compromised employees into obtaining personal data for them, and hacked into
  • 3. databases. What Businesses Can Do Today to Reduce The Risk of Identity Theft · · · · · Keep valuable customer data, such as credit-card or bank account numbers, in a secure location in your business so that it is not readily visible to others who may have access to the premises. Shred or destroy paperwork you no longer need, such as bank machine receipts, receipts from electronic and credit card purchases, utility bills, and any other document from customer transactions that contains personal and/or financial information. If part of your business involves online transactions, check regularly to see whether someone has set up a “spoof site” in the name of your business. If you find a spoof site, check the Uniform Resource Locator (URL) of the site to find the domain name (e.g., “www.what-a-scam.com”), look up that domain name through domain name registrar sites to find out which web hosting service or Internet service provider the spoof site is using, and contact that service or provider immediately. If your business has a website that customers can use to order merchandise or enter valuable personal data, have your information technology staff check regularly to ensure that there are no security “holes” through which others can improperly access customer data. This includes all upgrades of software used on your site. Security holes are sometimes inadvertently created as current programs are upgraded or patched, but may expose customer data for long periods of time if they are not found and fixed promptly. Regardless of what size your business is, decide on a fraud prevention and detection program that you can afford and implement it promptly. Online businesses, which often depend on credit cards for payment, should consult the financial institutions with which they have merchant relationships, and the major payment-card associations as appropriate, to learn what programs or mechanisms may be most suitable for their businesses. Ø Online merchants should be especially vigilant because when they handle “card-not-present” transactions, they may be held financially responsible for a fraudulent transaction even when the card issuer has approved that transaction. Ø Merchants who conduct business face-to-face with their customers should consider establishing a uniform policy of requiring more than one form of identification when a customer is paying by check or credit card. In any event, all card-present merchants also need to ensure that they abide by all operating regulations of their payment-card associations, including taking all necessary steps to ensure, for each consumer transaction involving a payment card, that the card, the cardholder, and the transaction are legitimate.
  • 4. · Order a copy of your credit report from the major credit reporting agencies at least once every year. Check with the credit bureaus to see whether there is a charge for this service. Make sure your credit report is accurate and includes only those activities that you have authorized. If You Are A Victim The United States Department of Justice and the Department of the Solicitor General of Canada advise that if your business has become a victim of identity theft, you should take three immediate steps. First, contact the financial institution with which you have your merchant relationship. Second, report the matter to your local police of jurisdiction. Police authorities often will take reports even if the crime ultimately may be investigated by another law enforcement agency. In addition, the police report may be useful in dealing with your financial institution or other businesses about the identity theft. Third, report your identity theft case immediately to the appropriate government and private-sector organizations listed below. American and Canadian agencies such as these are compiling information on identity theft to identify theft trends and patterns, and using the information to assist law enforcement agencies in possible investigations. Resources for American Victims of Identity Theft Federal Trade Commission Identity Theft Hotline Toll free: (877) IDTHEFT (438-4338) Web: www.consumer.gov/idtheft Credit Reporting Agencies: Place fraud alerts on your credit reports by contacting the credit bureaus that operate in the United States. Equifax Report fraud: (800) 525-6285 Web: www.equifax.com Experian Report fraud: (888)-EXPERIAN (397-3742) Web: www.experian.com TransUnion Report fraud: (800) 916-8800 Web: www.transunion.com If you need other information or have other questions concerning identity theft, please contact the PNCC in Canada, or the FTC in the United States, as listed above.
  • 5. Resources for Canadian Victims of Identity Theft PhoneBusters National Call Centre (PNCC) Ontario Provincial Police Anti-Rackets Toll Free: (888) 495-8501 Toll Free Fax: (888) 654-9426 Email: info@phonebusters.com Web: www.phonebusters.com Credit Reporting Agencies: Place fraud alerts on your credit reports by contacting the credit bureaus that operate in Canada. Equifax Canada Report fraud: (800) 465-7166 Web: www.euifax.com/EFX_Canada Trans Union Canada Report fraud: (877) 525-3823 Web: www.tuc.ca/TUCorp/consumer/personalsolutions.htm Further Information For further information on identity theft and how you can protect your valuable personal information, please consult the following sources: PNCC, Identity Theft, http://www.phonebusters.com/Eng/SpotaScam/scams_identity_theft.html Federal Trade Commission, Identity Theft, http://www.consumer.gov/idtheft. ###