Identity Theft: Risks for Teens and How to Protect Yourself

 
Identity Theft-
C
ould it happen to me?
Teens and ID 
Theft
 
Presented by Marilyn Albertson
Utah State University
Extension Associate Professor – FCS/4-H Salt Lake
County
Developed by Lucas Martin & Marilyn Albertson
 
extension.usu.edu
 
Utah State University Extension
 
I
d
e
n
t
i
t
y
 
T
h
e
f
t
 
 
What is Identity Theft?
 
 
W
h
a
t
 
i
s
 
I
d
e
n
t
i
t
y
 
T
h
e
f
t
?
 
the illegal use of someone else's personal
information (such as a Social Security
number) in order to obtain money or credit.
 
 
*http://www.merriam-webster.com/dictionary/identity%20theftt
 
 
 
T
e
e
n
s
 
a
r
e
 
y
o
u
 
a
t
 
r
i
s
k
?
 
 
W
h
a
t
 
I
d
e
n
t
i
t
y
 
T
h
e
f
t
 
L
o
o
k
s
 
L
i
k
e
 
N
o
w
 
Children are 35 times more likely to be targeted as
adults. 1
Nearly 78 million confirmed data breach thefts in 2014
so far. 2
25% of data breach victims become ID theft victims. 3
 
 
1. May, J. (2012). Child ID theft report 2012.
2. ID Theft Center, 2014 Data Breach Report.
3. Javelin Strategy and Research (2013). Identity fraud report 2014.
 
W
h
a
t
 
w
i
l
l
 
t
h
e
y
 
d
o
 
w
 
w
i
t
h
 
y
o
u
r
 
i
d
e
n
t
i
t
y
?
 
Create new identities
Spend your money
Checking account
Credit
Tax returns
Obtain new credit
Cars
Homes
Rentals, utilities, phone, employment, criminal
activities etc.
 
 
I
D
 
T
h
e
f
t
 
C
o
n
t
i
n
u
i
n
g
 
t
o
 
E
v
o
l
v
e
 
 
H
o
w
 
C
a
n
 
y
o
u
r
 
I
d
e
n
t
i
t
y
 
b
e
 
s
t
o
l
e
n
?
c
o
m
p
r
o
m
i
s
e
d
 
Physical ID Theft
 
 
T
r
a
d
i
t
i
o
n
a
l
l
y
 
50% know the victim 
1
In the past most ID theft took place offline. 
1
13.1 million reported cases in 2013 (11
million in 2011). 
2
Top FTC complaint for the last 13 years. 
3
1
.
N
a
t
i
o
n
a
l
 
C
r
i
m
e
 
P
r
e
v
e
n
t
i
o
n
 
C
o
u
n
c
i
l
 
(
2
0
0
5
)
.
 
P
r
e
v
e
n
t
i
n
g
 
i
d
e
n
t
i
t
y
 
t
h
e
f
t
:
 
A
 
g
u
i
d
e
 
f
o
r
c
o
n
s
u
m
e
r
s
.
2
.
 
J
a
v
e
l
i
n
 
S
t
r
a
t
e
g
y
 
a
n
d
 
R
e
s
e
a
r
c
h
 
(
2
0
1
3
)
.
 
I
d
e
n
t
i
t
y
 
f
r
a
u
d
 
r
e
p
o
r
t
 
2
0
1
4
.
3
.
 
F
T
C
 
(
2
0
1
4
)
.
 
T
o
p
 
1
0
 
c
o
m
p
l
a
i
n
t
 
c
a
t
e
g
o
r
i
e
s
 
f
o
r
 
2
0
1
3
.
 
 
W
h
e
r
e
 
d
o
 
t
h
e
y
 
g
e
t
 
i
t
?
 
Mail Theft
Watch billing cycles for important bills
Credit card applications, insurance offers, business records
Personal details
Dumpster Diving
Personal Theft
Home
Car
Person
Work
   
US Department of Justice (n.d.). Identity Theft and Identity Fraud.
 
 
 
H
o
w
 
d
o
 
I
 
p
r
o
t
e
c
t
 
m
y
 
i
d
e
n
t
i
t
y
?
 
Physical Protection
Shred:
Name
Address
SS#
Birthdate
Account Numbers
Personal contact information (phone numbers etc).
 
 
 
W
a
l
l
e
t
 
o
r
 
P
u
r
s
e
 
Don’t keep in your wallet/purse:
SS Card
PIN/passcodes
Only carry essential documents
Make a copy:
Credit Cards
Identification
Insurance/Medicaid cards
 
 
P
r
o
t
e
c
t
 
 
i
n
 
Y
o
u
r
 
H
o
m
e
 
L
o
c
a
t
i
o
n
,
 
L
o
c
a
t
i
o
n
,
 
L
o
c
a
t
i
o
n
.
Storage
Emergency Financial Binder
Out of sight, safe place
Locked
File cabinet
Room
Desk
 
 
P
h
i
s
h
i
n
g
 
 
(
P
h
i
s
h
i
n
g
)
 
&
 
S
c
a
m
s
 
Phishing – pretending to be financial institutions on
the internet
 
Malware – Malicious software affects computers to
capture personal information via the internet
 
Social Engineering – tricking a person into revealing
information, memorizing access codes and
passwords by shoulder surfing, pretending to be
landlord, employee , loan officer to obtain your
credit report
 
 
M
a
i
l
 
a
n
d
 
C
o
m
p
u
t
e
r
 
S
o
u
r
c
e
s
 
Mail
Credit card offers
Lotteries/prizes
Fake Credit/Insurance Offers
Email
Phone
Social media
 
 
S
o
c
i
a
l
 
M
e
d
i
a
 
Facebook
Twitter
LinkedIn
-
Their purpose is to share information with others in
your network – friends, relatives, etc.  ID fraudsters will
“like” what you are posting and make you a victim.
Be careful sharing key bits of information that will
make it easier for them to apply for a loan in your
name or fool a customer service representative.
 
 
M
o
b
i
l
e
 
P
h
o
n
e
s
 
 
Tweat, share photos on Instagram,
Facebook updates
Buy games and other apps
Handle online banking
 
Don’t share full address or phone number
online.
 
B
a
n
k
 
A
c
c
o
u
n
t
s
 
a
n
d
 
C
r
e
d
i
t
 
C
a
r
d
s
 
K
e
e
p
 
y
o
u
r
 
a
c
c
o
u
n
t
 
i
n
f
o
r
m
a
t
i
o
n
 
a
n
d
 
p
i
n
n
u
m
b
e
r
s
 
t
o
 
y
o
u
r
s
e
l
f
.
Example:  Don’t give ATM card and pin to friend to
handle transaction at ATM.
*
S
h
r
e
d
 
c
r
e
d
i
t
 
c
a
r
d
 
n
u
m
b
e
r
s
*
C
h
e
c
k
 
c
r
e
d
i
t
 
w
i
t
h
 
y
o
u
r
 
p
a
r
e
n
t
s
 
Identify any problems on your credit report
 
Contact Police, bank, Attorney General’s
 
office IRIS immediately
 
 
H
o
w
 
t
o
 
P
r
e
v
e
n
t
 
I
d
e
n
t
i
t
y
 
T
h
e
f
t
?
 
Vender Transactions
:
Be careful when swiping debit or credit cards and signing.
If it is a touch pad, rub hand over touch pad after
transaction has gone through to erase signature or pin
number.
Computer:
Never leave personal information on a computer without a
firewall in place
Never keep passwords to financial data on computer
Be cautious what you post on public computers, on social media
sites – facebook, etc.
Mail:
A
l
w
a
y
s
 
s
h
r
e
d
 
u
n
u
s
e
d
 
c
r
e
d
i
t
 
c
a
r
d
 
o
f
f
e
r
s
,
 
u
n
u
s
e
d
 
c
o
n
v
e
n
i
e
n
c
e
c
h
e
c
k
s
,
 
a
n
d
 
o
t
h
e
r
 
m
a
i
l
 
w
i
t
h
 
i
d
e
n
t
i
f
y
i
n
g
 
i
n
f
o
r
m
a
t
i
o
n
 
 
P
r
e
v
e
n
t
i
o
n
 
Never keep ATM or credit card, debit card pin
numbers in your wallet or car
 
Have a lock on cellphone if store pins and
passwords on phone
 
Never use mother’s maiden name, last 4 digits of
Social Security number, birthdate, pet’s name or
easily recognized letter, numbers as pin or password
 
 
P
r
o
t
e
c
t
i
o
n
 
o
n
 
t
h
e
 
I
n
t
e
r
n
e
t
 
Be very cautious when posting information
online
Social Security Number
Drivers License Number
State ID number
Banking information
Student ID number
 
 
A
v
o
i
d
 
P
h
i
s
h
i
n
g
 
 
Be a skeptic
Call them back
Research online
 
If you didn’t ask for it…
 
Don’t click links
Example: Calls about default on taxes and
threats of being arrested
 
 
 
A
v
o
i
d
 
P
h
i
s
h
i
n
g
 
Opt out
Mail, Insurance, Phone Calls, and Emails that
use credit bureaus
www.optoutprescreen.com
 
National Do Not Call Registry
https://www.donotcall.gov/
 
 
 
R
e
v
i
e
w
 
D
o
c
u
m
e
n
t
s
 
Credit Cards
Review credit cards transactions every
month for unusual activity or errors
Shred expired credit cards before putting in
the trash
Mail
Install a locking mail box
Mail all payment and documents at the post
office, not in your mailbox
 
 
E
l
e
c
t
r
o
n
i
c
 
T
h
e
f
t
 
Delete electronic
computer files you no
longer need, empty
online trash or recycle
bin.
Remove personal
information from
computer, cellphone or
other device before
disposing of it.
 
 
W
h
e
r
e
 
d
o
 
t
h
e
y
 
g
e
t
 
i
t
?
 
Electronic Theft
Physical Locations
Credit Card readers (number, exp date, name)
ATM
WIFI
Online Theft
Hackers
Your computer
A Business Computer
 
Online Purchases
Credit vs Debit
 
 
E
l
e
c
t
r
o
n
i
c
 
P
r
o
t
e
c
t
i
o
n
 
Internet Firewalls and Virus Detection
Run full scans weekly
Strong passwords.
Fraud Alerts
Minimize Accounts
 
 
H
o
w
 
t
o
 
C
a
t
c
h
 
i
t
?
 
 
Keep and reconcile receipts
Check your credit report
 
D
a
t
a
 
B
r
e
a
c
h
e
s
 
/
S
y
n
t
h
e
t
i
c
 
T
h
e
f
t
 
 
 
Mountain West Medical Center in
Tooele
Home Depot
Albertsons
JP Morgan
Summit County Fair
American Federation of
Government Employees
 
 
WHAT DO THEY ALL HAVE IN
COMMON?
 
O
c
t
o
b
e
r
 
2
0
1
4
 
t
o
 
2
0
1
5
 
 
621 reported breaches
 
77,890,487 confirmed records
compromised
 
4,000,000 current and former
federal employees data breach
 
 
Identity Theft Resource Center- 2014;   Data
breach report,  Fox News Politics Webpage
June 12, 2015
 
I
f
 
y
o
u
 
a
r
e
 
a
 
v
i
c
t
i
m
 
 
-
 
B
a
d
 
N
e
w
s
 
Credit Card number stolen
Act quickly to have your lender reissue
compromised cards
 
Change:
Credit card #
Debit card #
Bank account numbers
 
 
 
 
W
o
r
s
t
 
N
e
w
s
 
S
o
m
e
o
n
e
 
h
a
s
 
s
t
o
l
e
n
 
a
 
c
h
i
l
d
'
s
 
o
r
 
T
e
e
n
s
:
 
Name
Address
Birthdate
Social Security Number
 
 
 
W
h
y
 
y
o
u
r
 
i
d
e
n
t
i
t
y
 
 
C
h
i
l
d
 
o
r
 
T
e
e
n
?
 
Your credit is unmonitored
 
Your credit is a blank slate
 
Your are perfect for synthetic identity theft
 
2012 study found 10.7% of children had been
victims
 
 
S
y
n
t
h
e
t
i
c
 
I
d
e
n
t
i
t
y
 
T
h
e
f
t
 
 
T
e
e
n
s
C
h
i
 
Combining real and fake information to create new
identities.
 
For example:
Fake Name + Your SSN
Real Name +  Your  SSN
Synthetic ID theft is much more difficult to find and
resolve.
 
100% growth in synthetic ID theft over last 3 years.
 
 
H
o
w
 
d
o
 
I
 
k
n
o
w
 
?
 
H
o
w
 
c
a
n
 
y
o
u
 
o
r
 
y
o
u
r
 
p
a
r
e
n
t
s
 
k
n
o
w
 
i
f
y
o
u
 
h
a
v
e
 
h
a
d
 
y
o
u
r
 
i
d
e
n
t
i
t
y
 
s
t
o
l
e
n
:
Utah Attorney General
IRIS: CIP (Child Identity Protection)
 
Minor Credit File Check  (Be sure to check by age
16)
Request from each credit bureau
 
Suspicious mail and phone calls asking for you
 
 
 
 
 
W
h
a
t
 
i
f
 
I
 
a
m
 
a
 
v
i
c
t
i
m
?
 
Identity Theft Report
IRIS- Links to help you
FTC- complaint, affidavit
Police report
With complete ID theft report:
Credit freeze
Pull credit reports
Contact lenders/credit issuers
Contact appropriate agencies
 
 
I
f
 
a
 
V
i
c
t
i
m
 
C
o
n
t
i
n
u
e
d
 
Keep a file
ID theft report
Documents from lenders on bad accounts
Proof of resolved issues
Change:
Account numbers and card numbers
Account passwords
Monitor:
Bank and credit card statements
Credit history
 
 
P
r
o
t
e
c
t
 
Y
o
u
r
s
e
l
f
 
T
h
a
n
k
 
Y
o
u
 
Q
u
e
s
t
i
o
n
s
?
 
C
o
n
t
a
c
t
 
m
e
 
f
o
r
 
m
o
r
e
 
i
n
f
o
r
m
a
t
i
o
n
 
a
t
:
M
a
r
i
l
y
n
.
A
l
b
e
r
t
s
o
n
@
u
s
u
.
e
d
u
P
h
o
n
e
:
3
8
5
-
4
6
8
-
4
8
3
6
 
 
R
e
s
o
u
r
c
e
s
 
http://www.foxnews.com/politics/2015/06/12/union-hackers-have-personnel-
data-on-every-federal-employee/
http://www.idtheftcenter.org/id-theft/teen-space.html
Utah Office of Attorney General, 
http://attorneygeneral.utah.gov/
  For
Identity Theft Information and IRIS and CIP programs.
MoneyWatch January 13, 2014 
http://www.cbsnews.com/news/target-data-
breach-9-ways-to-protect-yourself/
K
n
o
w
 
H
o
w
 
I
d
e
n
t
i
t
y
 
T
h
e
f
t
 
O
c
c
u
r
s
http://www.smartaboutmoney.org/Your-Money/Daily-Decisions/Know-How-
Identity-Theft-Occurs.aspx
B
o
o
k
s
:
 
 
S
t
e
a
l
i
n
g
 
Y
o
u
r
 
L
i
f
e
 
 
F
r
a
n
k
 
W
.
 
A
b
a
g
n
a
l
e
V
i
d
e
o
 
c
l
i
p
s
 
:
 
 
I
d
e
n
t
i
t
y
 
t
h
e
f
t
 
i
s
 
n
o
t
 
a
 
j
o
k
e
,
 
J
i
m
!
 
 
D
w
i
g
h
t
 
f
r
o
m
 
T
h
e
 
O
f
f
i
c
e
 
*
h
t
t
p
s
:
/
/
w
w
w
.
y
o
u
t
u
b
e
.
c
o
m
/
w
a
t
c
h
?
v
=
U
t
u
5
S
n
O
9
P
I
g
 
o
r
 
s
h
o
r
t
 
v
e
r
s
i
o
n
h
t
t
p
s
:
/
/
w
w
w
.
y
o
u
t
u
b
e
.
c
o
m
/
w
a
t
c
h
?
v
=
R
C
5
i
m
k
9
s
G
1
M
 
 
 
 
R
e
s
o
u
r
c
e
s
 
P
r
o
t
e
c
t
i
n
g
 
Y
o
u
r
 
C
h
i
l
d
s
 
P
e
r
s
o
n
a
l
 
I
n
f
o
r
m
a
t
i
o
n
 
a
t
 
S
c
h
o
o
l
 
a
n
d
S
a
f
e
g
u
a
r
d
i
n
g
 
Y
o
u
r
 
C
h
i
l
d
s
 
F
u
t
u
r
e
.
 
h
t
t
p
:
/
/
w
w
w
.
f
t
c
.
g
o
v
/
n
e
w
s
-
e
v
e
n
t
s
/
p
r
e
s
s
-
r
e
l
e
a
s
e
s
/
2
0
1
2
/
0
8
/
f
t
c
-
a
d
v
i
s
e
s
-
p
a
r
e
n
t
s
-
h
o
w
-
p
r
o
t
e
c
t
-
k
i
d
s
-
p
e
r
s
o
n
a
l
-
i
n
f
o
r
m
a
t
i
o
n
-
s
c
h
o
o
l
https://postalinspectors.uspis.gov/investigations/MailFraud/fraudsch
emes/mailtheft/IdentityTheft.aspx
http://www.consumer.ftc.gov/articles/0274-immediate-steps-repair-
identity-theft
http://www.consumer.ftc.gov/articles/0171-medical-identity-
theft#protecting
 
Slide Note
Embed
Share

Explore the world of identity theft and its potential impact on teenagers. Learn what identity theft entails, why teens are at risk, and the evolving tactics used by criminals. Discover how stolen identities are misused and ways to prevent falling victim to such crimes.

  • Identity theft
  • Teenagers
  • Risk
  • Prevention
  • Security

Uploaded on Oct 02, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Utah State University Extension Identity Theft- Could it happen to me? Teens and ID Theft Presented by Marilyn Albertson Utah State University Extension Associate Professor FCS/4-H Salt Lake County Developed by Lucas Martin & Marilyn Albertson extension.usu.edu

  2. Identity Theft What is Identity Theft?

  3. What is Identity Theft? the illegal use of someone else's personal information (such as a Social Security number) in order to obtain money or credit. *http://www.merriam-webster.com/dictionary/identity%20theftt

  4. Teens are you at risk?

  5. What Identity Theft Looks Like Now Children are 35 times more likely to be targeted as adults. 1 Nearly 78 million confirmed data breach thefts in 2014 so far. 2 25% of data breach victims become ID theft victims. 3 1. May, J. (2012). Child ID theft report 2012. 2. ID Theft Center, 2014 Data Breach Report. 3. Javelin Strategy and Research (2013). Identity fraud report 2014.

  6. What will they do w with your identity? Create new identities Spend your money Checking account Credit Tax returns Obtain new credit Cars Homes Rentals, utilities, phone, employment, criminal activities etc.

  7. ID Theft Continuing to Evolve

  8. How Can your Identity be stolen ?compromised Physical ID Theft

  9. Traditionally 50% know the victim 1 In the past most ID theft took place offline. 1 13.1 million reported cases in 2013 (11 million in 2011). 2 Top FTC complaint for the last 13 years. 3 1.National Crime Prevention Council (2005). Preventing identity theft: A guide for consumers. 2. Javelin Strategy and Research (2013). Identity fraud report 2014. 3. FTC (2014). Top 10 complaint categories for 2013.

  10. Where do they get it? Mail Theft Watch billing cycles for important bills Credit card applications, insurance offers, business records Personal details Dumpster Diving Personal Theft Home Car Person Work US Department of Justice (n.d.). Identity Theft and Identity Fraud.

  11. How do I protect my identity? Physical Protection Shred: Name Address SS# Birthdate Account Numbers Personal contact information (phone numbers etc).

  12. Wallet or Purse Don t keep in your wallet/purse: SS Card PIN/passcodes Only carry essential documents Make a copy: Credit Cards Identification Insurance/Medicaid cards

  13. Protect in Your Home Location, Location, Location. Storage Emergency Financial Binder Out of sight, safe place Locked File cabinet Room Desk

  14. Phishing

  15. (Phishing) & Scams Phishing pretending to be financial institutions on the internet Malware Malicious software affects computers to capture personal information via the internet Social Engineering tricking a person into revealing information, memorizing access codes and passwords by shoulder surfing, pretending to be landlord, employee , loan officer to obtain your credit report

  16. Mail and Computer Sources Mail Credit card offers Lotteries/prizes Fake Credit/Insurance Offers Email Phone Social media

  17. Social Media Facebook Twitter LinkedIn -Their purpose is to share information with others in your network friends, relatives, etc. ID fraudsters will like what you are posting and make you a victim. Be careful sharing key bits of information that will make it easier for them to apply for a loan in your name or fool a customer service representative.

  18. Mobile Phones Tweat, share photos on Instagram, Facebook updates Buy games and other apps Handle online banking Don t share full address or phone number online.

  19. Bank Accounts and Credit Cards Keep your account information and pin numbers to yourself. Example: Don t give ATM card and pin to friend to handle transaction at ATM. *Shred credit card numbers *Check credit with your parents Identify any problems on your credit report Contact Police, bank, Attorney General s office IRIS immediately

  20. How to Prevent Identity Theft? Vender Transactions: Be careful when swiping debit or credit cards and signing. If it is a touch pad, rub hand over touch pad after transaction has gone through to erase signature or pin number. Computer: Never leave personal information on a computer without a firewall in place Never keep passwords to financial data on computer Be cautious what you post on public computers, on social media sites facebook, etc. Mail: Always shred unused credit card offers, unused convenience checks, and other mail with identifying information

  21. Prevention Never keep ATM or credit card, debit card pin numbers in your wallet or car Have a lock on cellphone if store pins and passwords on phone Never use mother s maiden name, last 4 digits of Social Security number, birthdate, pet s name or easily recognized letter, numbers as pin or password

  22. Protection on the Internet Be very cautious when posting information online Social Security Number Drivers License Number State ID number Banking information Student ID number

  23. Avoid Phishing Be a skeptic Call them back Research online If you didn t ask for it Don t click links Example: Calls about default on taxes and threats of being arrested

  24. Avoid Phishing Opt out Mail, Insurance, Phone Calls, and Emails that use credit bureaus www.optoutprescreen.com National Do Not Call Registry https://www.donotcall.gov/

  25. Review Documents Credit Cards Review credit cards transactions every month for unusual activity or errors Shred expired credit cards before putting in the trash Mail Install a locking mail box Mail all payment and documents at the post office, not in your mailbox

  26. Electronic Theft Delete electronic computer files you no longer need, empty online trash or recycle bin. Remove personal information from computer, cellphone or other device before disposing of it.

  27. Where do they get it? Electronic Theft Physical Locations Credit Card readers (number, exp date, name) ATM WIFI Online Theft Hackers Your computer A Business Computer Online Purchases Credit vs Debit

  28. Electronic Protection Internet Firewalls and Virus Detection Run full scans weekly Strong passwords. Fraud Alerts Minimize Accounts

  29. How to Catch it? Keep and reconcile receipts Check your credit report

  30. Data Breaches /Synthetic Theft Mountain West Medical Center in Tooele Home Depot Albertsons JP Morgan Summit County Fair American Federation of Government Employees WHAT DO THEY ALL HAVE IN COMMON?

  31. October 2014 to 2015 621 reported breaches 77,890,487 confirmed records compromised 4,000,000 current and former federal employees data breach Identity Theft Resource Center- 2014; Data breach report, Fox News Politics Webpage June 12, 2015

  32. If you are a victim - Bad News Credit Card number stolen Act quickly to have your lender reissue compromised cards Change: Credit card # Debit card # Bank account numbers

  33. Worst News Someone has stolen a child's or Teens: Name Address Birthdate Social Security Number

  34. Why your identity Child or Teen? Your credit is unmonitored Your credit is a blank slate Your are perfect for synthetic identity theft 2012 study found 10.7% of children had been victims

  35. Synthetic Identity Theft Teens Chi Combining real and fake information to create new identities. For example: Fake Name + Your SSN Real Name + Your SSN Synthetic ID theft is much more difficult to find and resolve. 100% growth in synthetic ID theft over last 3 years.

  36. How do I know ? How can you or your parents know if you have had your identity stolen: Utah Attorney General IRIS: CIP (Child Identity Protection) Minor Credit File Check (Be sure to check by age 16) Request from each credit bureau Suspicious mail and phone calls asking for you

  37. What if I am a victim? Identity Theft Report IRIS- Links to help you FTC- complaint, affidavit Police report With complete ID theft report: Credit freeze Pull credit reports Contact lenders/credit issuers Contact appropriate agencies

  38. If a Victim Continued Keep a file ID theft report Documents from lenders on bad accounts Proof of resolved issues Change: Account numbers and card numbers Account passwords Monitor: Bank and credit card statements Credit history

  39. Protect Yourself Thank You Questions? Contact me for more information at: Marilyn.Albertson@usu.edu Phone: 385-468-4836

  40. Resources http://www.foxnews.com/politics/2015/06/12/union-hackers-have-personnel- data-on-every-federal-employee/ http://www.idtheftcenter.org/id-theft/teen-space.html Utah Office of Attorney General, http://attorneygeneral.utah.gov/ For Identity Theft Information and IRIS and CIP programs. MoneyWatch January 13, 2014 http://www.cbsnews.com/news/target-data- breach-9-ways-to-protect-yourself/ Know How Identity Theft Occurs http://www.smartaboutmoney.org/Your-Money/Daily-Decisions/Know-How- Identity-Theft-Occurs.aspx Books:Stealing Your Life Frank W. Abagnale Video clips : Identity theft is not a joke, Jim! Dwight from The Office * https://www.youtube.com/watch?v=Utu5SnO9PIg or short version https://www.youtube.com/watch?v=RC5imk9sG1M

  41. Resources Protecting Your Child s Personal Information at School and Safeguarding Your Child s Future . http://www.ftc.gov/news- events/press-releases/2012/08/ftc-advises-parents-how-protect- kids-personal-information-school https://postalinspectors.uspis.gov/investigations/MailFraud/fraudsch emes/mailtheft/IdentityTheft.aspx http://www.consumer.ftc.gov/articles/0274-immediate-steps-repair- identity-theft http://www.consumer.ftc.gov/articles/0171-medical-identity- theft#protecting

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#