Identity Theft - PowerPoint PPT Presentation

1 / 22
About This Presentation
Title:

Identity Theft

Description:

Identity theft occurs when someone uses your information without your permission ... Phone Number Reverse Lookup. If you are a victim. File a police report ... – PowerPoint PPT presentation

Number of Views:141
Avg rating:3.0/5.0
Slides: 23
Provided by: black
Category:

less

Transcript and Presenter's Notes

Title: Identity Theft


1
Identity Theft
  • Cyber Security Awareness Month
  • October 2006

2
Identity Theft
  • What are we going to talk about?
  • Information
  • Identity theft the crime
  • Minimizing Risk
  • What is GU doing?
  • Resources

3
Identity Theft
  • Identity theft occurs when someone uses your
    information without your permission to commit
    fraud or other crimes.
  • You will never be able to fully control whether
    you will become a victim.

4
Information
  • Personally Identifiable Information (PII)
  • Any information which can potentially be used to
    uniquely identify, contact, or locate a single
    person.

5
Information (PII) Types
COMOMON Social Security Number (TIN) Name Stree
t Address Date of birth Maiden name Personal Em
ail address
More PII Home phone Work email address IP Addre
ss (Internet address) Vehicle Registration Number

Drivers license number License plate
Face Eyes Fingerprints Handwriting Credit ca
rd number
Bank account Business cards
Workplace Junk mail Job position Criminal recor
d
ON-Star Birthmarks - Scars
Country, State, City of residence
Age Gender - Race High school Cell phone Medi
cal / Dental
6
PII
  • Where is it?
  • Everywhere!
  • Public record mortgage deeds
  • Businesses use Social to identify you
  • Junk mail
  • On-Line

7
PII cont
  • What is most important?
  • Social Security Number
  • Date of birth
  • Email address
  • Home address
  • Drivers License Number
  • Accounts Credit, Bank, Mortgage

8
PII Related Laws
  • Health Insurance Portability and Accountability
    Act (HIPAA)
  • Anti-Phishing Act of 2005
  • Social Security Number Protection act of 2005
  • Identity Theft Prevention Act
  • Proposed
  • Privacy Act

9
Identity theft the crime
  • How does it happen?
  • Stealing records while on the job
  • Bribing employees
  • Hacking
  • Con
  • Mail theft
  • Dumpster diving
  • Illegal credit checking
  • Credit or debit card theft
  • Stolen wallet or purse
  • Information inside your home
  • Phishing scams

10
Identity theft the crime
  • How do criminals use the information?
  • Change billing address on your credit card
  • Open new credit or bank accounts
  • Establish phone or wireless service
  • Counterfeit checks
  • File for bankruptcy
  • Take out a loan
  • Get a drivers license
  • Get a job
  • Give your name to police during an arrest

11
Minimizing Risk
  • Impossible to fully control your PII
  • Order copies of your credit report annually.
  • Credit companies required by law to send you a
    free report every 12 months (upon request)
  • Secure the personal information in your home
  • Fireproof safe

12
Minimizing Risk cont
  • Passwords Passwords Passwords
  • Place unique passwords and PIN numbers on your
    accounts
  • Bank accounts
  • Phone accounts
  • Email accounts
  • Ecommerce accounts
  • Businesses may allow a pin instead of your SSN

13
Minimizing Risk cont
  • Read the fine print
  • Information security procedures in the work place
    and for transactions
  • DO NOT GIVE YOUR INFORMATION OUT UNLESS YOU HAVE
    INITIATED THE CONTACT
  • Shred your trash
  • Confetti type shredder

14
Minimizing Risk cont
  • Do not carry your Social Security Card or Tax ID
    Number
  • Make sure that companies do not use your SSN as
    your identification number
  • HealthCare card
  • Utilities
  • Carry only the ID and credit cards that you
    need.

15
Minimizing Risk cont
  • Be cautious when responding to promotions
  • The car sitting in the hallway at the mall
  • Raffles
  • Online surveys
  • Keep your purse or wallet in a safe place at
    work
  • When ordering new checks, pick them up at the bank

16
Minimizing Risk cont
  • Minimize the risk to others!
  • Think of what PII you handle
  • When you came to this session how did you leave
    your PII or that of others?

17
Minimizing Risk cont
  • Online records
  • Take a look
  • Phone Number Reverse Lookup

18
If you are a victim
  • File a police report
  • Close all financial accounts
  • Call the Social Security Office fraud department
  • Cancel your state ID
  • Place fraud alert on your credit reports
  • File a complaint with the Federal Trade
    Commission
  • Guilty until proven innocent prove that you are
    a victim

19
What is GU doing
  • Creation of an information security program is
    underway
  • User education awareness
  • Incident response team
  • Launching major data classification and control
    initiative

20
Resources
  • TAKE CHARGE Fighting Back Against Identity Theft
    http//www.ftc.gov/bcp/conline/pubs/credit/idtheft
    .pdf
  • Free Credit Reports www.annualcreditreport.com or
    877-322-8228
  • Credit reporting agencies
  • Equifax 800-525-6285 www.equifax.com
  • Experian 888-397-3742 www.experian.com
  • TransUnion 800-680-7289 www.transunion.com

21
Resources
  • Classic Cons www.fdic.gov/consumers/consumer/news/
    cnsprg98/cons.html
  • Mail theft www.usps.gov/websites/depart/inspect
  • Social Security Number misuse www.ssa.gov

22
Contact Information
  • Help Desk
  • Extension 5550
  • Jim Jones IT Asset Manager
  • jonesj_at_its.gonzaga.edu
  • Extension 5926
  • Http//cybersecurity.gonzaga.edu
Write a Comment
User Comments (0)
About PowerShow.com