Académique Documents
Professionnel Documents
Culture Documents
THEFT
THE
INFORMATION
PROTECTOR
“America’s
Most
Dynamic
Identity
Theft
Protection
Speaker!”
“This Page Is Intentionally Left Blank.”
Identity Theft Protection Strategies
ISBN 978-0-9818265-0-9
DEDICATED TO:
Acknowledgments
I would like to extend my deepest appreciation to the dedicated team of family members,
advisors, consultants, businesses, friends, and countless others who unconditionally
contributed to and supported my efforts in the creation of this book.
Murray Montgomery, Jr., CPP, is the Founder, President and CEO of Womple, LLC.
Womple, LLC is a leading consulting services company, headquartered in South Carolina,
specializing in educating and training individuals and businesses on how to protect their
privacy information.
Murray is a native South Carolinian and graduate of South Carolina State University,
where he earned a Bachelor of Science Degree in Education. He is board certified in
Security Management by the American Society for Industrial Security (ASIS) as a
Certified Protection Professional (CPP).
Table of Contents
SECTION 1 ................................................................................................................................................... 9
SECTION 2 ................................................................................................................................................. 12
SECTION 3 ................................................................................................................................................. 15
HOW TO KNOW WHEN YOU HAVE BECOME A VICTIM OF IDENTITY THEFT ....................... 19
SECTION 4 ................................................................................................................................................. 22
SECTION 5 ................................................................................................................................................. 54
HOW TO REMOVE YOUR NAME FROM PRE-SCREENED CREDIT & INSURANCE OFFERS . 56
SECTION 6 ................................................................................................................................................. 59
SECTION 7 ................................................................................................................................................. 63
SECTION 8 ................................................................................................................................................. 68
SECTION 9 ................................................................................................................................................. 83
SECTION 10 ............................................................................................................................................... 85
Introduction
Below are some facts from the Federal Trade Commission (FTC) that will help you better
understand the importance of protecting your identity:
Identity theft victims spend on average 120 hours and $3,000 to recover their
credit and good name
SECTION 1
When someone obtains your personal identifying information (PII) name, address, social
security number, etc., without your permission to commit fraud or some other type of
crime.
Listed below are several PII items that describe your identity:
Full name
Date of birth
Addresses
Telephone numbers
Email addresses
Medical information
Birth Certificate
Passport
Anything you can do to keep criminals away from your personal data helps to reduce
your risk of identity theft. Following is a list of items identity thieves covet most:
Passport
Birth Certificate
SECTION 2
Steal your wallet or purse (driver’s license, credit/debit card, checkbook, etc.)
File a “Change of Address Request” with the postal service to re-route your mail
“Red-Flagging” – flip-up your unsecure home mailbox red flag to notify the
postal service person you have outgoing mail for pick-up
Burglarize your home, business, or automobile and remove items with your
personal identifying information (PII) on them
“Skimming” – copy magnetic strip information from the back of your credit, debit,
ATM, and other plastic cards
“Shoulder Surfing” – use digital cameras and smart phones to capture your ATM
and point-of-sale terminal personal identification number (PIN) information
“Computer Hacking” – hackers gain access to your computer to steal your PII
“Mobile Hacking” – identity thieves use malware and viruses to steal your PII
from your mobile devices (smart phone, eReader – iPad/Kindle, laptop, etc.)
Install malware or virus software to steal your PII (usernames, passwords, etc.)
“War-Driving” – remotely steal your PII from your unsecure wireless network
SECTION 3
Place a “security freeze” on your credit file maintained by the three major credit
reporting agencies (Equifax, TransUnion, Experian)
Place a 90-day “fraud alert” on your credit file with one of the three major credit
reporting agencies (you only need to place it on one of the three and the others
will be contacted to do the same). To keep the fraud alert on your credit file, it
must be renewed every ninety (90) days
Sign the back of all cards you receive from creditors (if not signed, creditors are
not legally obligated to honor reimbursement agreements for cards lost/stolen)
Provide your photo ID to merchants before they process your card payments
Photocopy all cards and identification documents (front and back) that you may
carry in your wallet/purse and keep the copies in a secure location – safe deposit
box or locked container/draw
Shred all unused pre-approved credit card and insurance offers that you receive in
the mail before disposing them in your trash
Place a PIN or password on all accounts (bank, credit, debit, utilities, etc.), do not
share them with others and keep them in a secure location
Keep all usernames, PINs and passwords in a secure location and do not share
them with others
Request all new and replacement cards and checks be sent to a secure mailbox or
your bank and not to your home address
Request your free annual credit report from each of the three major credit
reporting agencies (that’s a total of three per year). A good strategy is to request
one credit report every four months
Regularly monitor your credit file from each of the three major credit reporting
agencies to identify any fraudulent accounts or errors. Dispute them and have
them removed as quickly as possible…if not, they will affect your credit score
Limit the amount of personal identifying information (PII) you list on your checks
(no SSN, driver’s license number, telephone number, date of birth, etc.).
REMEMBER, your checks flow through many hands before being processed for
payment
Use an “anti-fraud” check writing pen when writing checks to prevent “check-
washing.” They often can be found at most office supply stores
Deliver all outgoing mail to the post office. NEVER leave outgoing mail in your
unsecure mailbox at home (remember “red-flagging”)
Never use public computers, public hotspots or public wireless networks for
personal use. Computers, public hotspots and wireless networks that are unsecure
can potentially expose you to malware and viruses that identity thieves use to
capture your usernames, passwords and other personal identifying information
Install and use secure browsers when surfing the internet and set them to update
automatically
Statements or other mail not arriving in your mailbox or email inbox on time or
not at all
Statements from medical providers for medical services you did not receive
Medical claims rejected for services that had already been reimbursed in your
name
IRS denies your claim for a tax refund because one had already been issued in
your name
Notified your privacy information was stolen because of a data breach incident
The police arrive at your door with an arrest warrant for a crime committed by
someone else using your name
Document who, what, when, where, and how you became a victim
Contact the three credit reporting agencies (Equifax, TransUnion and Experian)
and place a “security freeze” on your credit file. You can lift, re-freeze or remove
the security freeze on your credit file via the telephone or the internet using a PIN
provided by each of the three credit reporting agencies. You should keep your
PINs in a secure location
Contact one of the three credit reporting agencies and place an “initial” 90-day
fraud alert on your credit file (the company you call must tell the other two
companies about your alert). The initial fraud alert also allows you to order 1 free
copy of your credit report from each of the 3 credit reporting companies
Request a FREE copy of your credit file from each of the three credit reporting
agencies
Submit an identity theft “victim statement” to the three credit reporting agencies
to be added to your credit file
Contact creditors and banks immediately and notify them of fraudulent activities.
Close any accounts that may have been compromised and establish new ones
File a Police Report. Get a copy (preferred) or at a minimum, the number of the
police report
Create an Identity Theft Report (FTC Affidavit + Police Report = Identity Theft
Report)
Once you have confirm you are a victim of identity theft and created an Identity
Theft Report, contact each of the three credit reporting agencies and request an
“extended” fraud alert be placed on your credit file. It will remain on your credit
file for seven (7) years and provide some additional protections…IT’S FREE
Send copies of original documents and all correspondence via certified mail
return receipt requested. Keep original copies of documents in a secure location
Keep a record of all monies spent and time lost recovering from being a victim
Regularly monitor your credit file. Contact one of the three credit reporting
agencies and set-up credit monitoring services. This is a PAID service
SECTION 4
Keep your PIN a secret. Don't use your address, birth date, phone or Social
Security number as the PIN and try to memorize the number
Be cautious about disclosing your account number over the phone unless you are
dealing with a reputable company
Draw a line through blank spaces on debit slips above the total so the amount
cannot be changed
Tear up carbons and save your receipts to check against your monthly statements
Cut up old cards and cut through the account number before disposing them
Open monthly statements promptly and compare them with your receipts. Contact
the issuer immediately if you detect any discrepancies
Keep a record (in a safe place separate from your cards) of your account numbers,
expiration dates, and the telephone numbers of each card issuer so you can report
fraudulent activity quickly
Don't carry your PIN in your wallet or purse or write it on your ATM or debit
card
Carefully check ATM or debit card transactions before you enter the PIN or
before you sign the receipt
If you have access to your bank account online, check your ATM or debit card
account activity frequently
If your debit or ATM card is lost or stolen, contact the issuer immediately and
follow up in writing. Request a new card with a different number, PIN and
password. If possible, have the new card sent to your bank for pick up instead of
having it mailed to your home
Safeguard your PIN from “shoulder surfers”. These are people who attempt to
obtain your PIN by looking over your shoulder while you are entering it in an
ATM or point-of-sale terminal. Also, occasionally they will use a cell phone or
digital camera to obtain your PIN
Protect your ATM and debit card from a concept known as “skimming”. Identity
thieves will swipe your ATM or debit card through a magnetic strip card reader
device known as a “skimmer” to capture your personal information embedded on
the magnetic strip printed on the back of your ATM or debit card. The
information can then be used to create a fraudulent card
Scan your surroundings before using an ATM. Look for suspicious persons in the
area. If you see any, leave immediately and go to another ATM
Don’t use ATMs in non-banking locations. These ATMs may have a pen-size
camera attached, phony keypads, or skimmers to capture your personal
information and PIN
Regularly monitor your bank account. If possible, try to use online banking as
much as possible. It allows for regularly monitoring of your bank account
between monthly statements
Eliminate bank statements sent to you by mail. Request your bank statements be
sent to you electronically. GO PAPERLESS
Make a copy of a check and keep it in a secure location. You may need the
information on the bottom (bank routing number and account number) to fight
check fraud
Use an “anti-fraud” check writing pen when writing checks to prevent “check-
washing”. They often can be found at most office supply stores
If your check book is lost or stolen, contact your bank immediately. Close the
account, open a new one and place a PIN/password on the new account. Also,
request the bank contact the check verification service with which it does business
to stop retailers from excepting your lost/stolen checks
If your ATM or debit card is lost or stolen, report it immediately because the
amount you can be held responsible for depends on how quickly you report the
loss
If you report the loss or theft within two business days after discovery, your losses
are limited to a maximum of $50. Most financial institutions will waive the $50
fee
If you report the loss or theft after two business days of discovery, but within 60
days after the unauthorized electronic withdrawal appears on your statement, you
could lose up to a maximum of $500. Most financial institutions will not waive
this fee
If you wait more than 60 days to report the loss or theft after receiving your
monthly statements, you could lose all the money that was taken from your
account after the end of the 60 days. It is critical to regularly monitor your
accounts and statements
In general, if an identity thief steals your checks, you need to stop payment, close
the account, open a new one, place a PIN/password on the new account and ask
your bank to notify ChexSystems, Inc. and the check verification service with
which it does business
Enable auto-lock
2. Connect to secure Wi-Fi networks and disable Wi-Fi when not in use
Read the “small print” before installing an app on any mobile device. Know what
you're downloading
Limit your activities while using public Wi-Fi. Public Wi-Fi is NOT secure
Check URLs before making a purchase using your mobile devices. Any secure
URL site should start with “https”
Security Tips For Apple iPhone, Android And Blackberry Smart Phones
Apple iPhone
Turn off the simple passcode feature so you can enter more than a 4-digit
passcode
Set the Auto Lock feature to require a new passcode after a set period of time.
Recommendation –maximum 5 minutes
In conjunction with Auto Lock, also set the Require Passcode feature, which
activates after the display has been idle for a certain period of time or if you press
the iPhone Sleep button. You will be required to enter a passcode on wakeup
Enable Data Erase by setting the number of failed passcodes that can be entered
prior to all data being erased from the phone. Recommendation – maximum 10
attempts
Set up "Find my iPhone" to help you locate your phone if it’s lost/stolen and to
remotely wipe information from the iPhone
Only connect to networks you trust. To ensure you don't randomly connect to any
available Wi-Fi networks, set the "Ask to Join Networks" function
For applications that contain sensitive data, set a separate passcode (different than
any others you are using) for each application
Apple's iCloud service offers backup for your Apple devices with iOS6. Once you
set the service up, it encrypts your data and backs up daily as long as you are
connected to the Internet via Wi-Fi, are connected to a power source and have
your screen locked
Apple provides updates to the operating system, which may contain security
patches. To receive the latest updates, connect to iTunes. If you are running iOS5
or greater, you can receive these updates over the air by using
Settings/General/Software Updates
Android
Create a password that is easy for you to remember, but difficult for others to
guess
Set the "Lock phone after" feature (Note: feature names may differ depending on
your device) to require a new password after a set period of time.
Recommendation – maximum 5 minutes
Turn off the "Visible Passwords" feature to keep your password from displaying
on the screen so others can't easily learn your password
Turn off "Wi-Fi" when you are not connecting to a secure wireless network to
ensure you don't inadvertently connect to an unsecure wireless network
Download applications only from trusted app stores such as the Android Market
or the Amazon App Store
There are other app stores selling Android apps; take the time to research them
prior to downloading
Set a separate password for every application you access that contains sensitive
data or information
Google provides updates to the Android operating system, which may contain
security patches. Check with your service provider or the manual that came with
your device for information on how to get the most recent updates
Blackberry
Follow the menu through Options - Security Options - General Settings. This is
where you set the password to enable. Using this menu, you can also set the
number of password attempts and security timeout
Encrypt Data
Follow the menu through Options - Security Options - General Settings - Content
Protection, set the value as enable and select the strength to strong, stronger or
strongest
Clearing Memory
This option lets you delete sensitive data such as unencrypted email messages and
user ID /password combinations. Follow the menu through Options - Security
Options - Memory Cleaning
This is an important tip, NEVER save user ID and passwords on your BlackBerry
Tablet Computers
Apple iPad
Your iPad is just as powerful as your laptop or desktop. Your iPad is only
encrypted when you enable the passcode features (Settings/General)
Rather than using only an easy to crack 4-digit passcode, create a full-fledged
alphanumeric password (letters, numbers, and symbols)
Set your iPad to automatically lock into passcode mode anytime you leave it
alone for a few minutes
Secure your iPad by setting the auto lock feature to 2 minutes (the minimum
allowed). This will minimize the opportunity for anyone to gain access to
information on your iPad when not in use
This setting wipes out all iPad data after 10 failed passcode attempts
Not all applications are friendly. Despite Apple’s well-designed vetting process,
there are still malicious apps that slip through the cracks to siphon data out of
your device
Don’t jail-break your iPad to download Apps outside of iTunes. Short-term gain
equals long-term risk
Turn off "Wi-Fi" when you are not connecting to a secure wireless network to
ensure you don't inadvertently connect to an unsecure wireless network
Under the “General” tab, keep the Bluetooth feature turned “off” until necessary
Under the “iCloud” tab, set the “Find My iPad” to on. This allows you to locate
your iPad on a map and remotely lock or erase all data if necessary
Samsung Galaxy
In the submenu Lock screen, enter the Configuration screen key, and select a PIN
or password. Although both must consist of at least 4 characters, the PIN only
allows you to enter numbers, while the password will allow you to enter letters
only, numbers only, or a combination of both
As with your ATM PIN, do not use birth dates, home address, or other personal
identifying information, which is easy for someone to get or guess
In the submenu Lock screen enter the Configuration screen key select Pattern
On the next page will display 3 x 3 points that you can draw a line forming an
image with a specific pattern, with a minimum number of 4 points
In the submenu Lock screen, enter the Configuration screen key, select the Owner
information, check the box “show info on the owner of the lock screen”, and enter
your brief data in the appropriate boxes
Amazon Kindle
Scroll down until the words “turn on” are highlighted and select it. A Set
Password window will appear
Enter the password you want to use, and type it again to confirm it
Click Submit
You can set the maximum charge allowed for a single personal document sent
wirelessly to your Kindle. Any personal document that exceeds this charge will be
sent to your @free.kindle.com address and a notification will be sent to your
Kindle. We recommend setting the maximum personal document charge to $0 so
you never incur unknown or unwanted charges
Login to your Amazon Kindle account and click Personal Document Settings in
the left navigation panel
Login to your Amazon Kindle account and click Personal Document Settings in
the left navigation panel
In the Approved Personal Document Email List section, click Add a new
approved email address
Where do the criminals get mobile phone numbers to send scam text messages?
You give your mobile number away to enter contests, vote on reality shows, etc.
Most likely, the thieves simply use a computer to automatically generate a text to
every potential mobile phone number possible (a computer can make about a
million guesses a second)
If you receive a text message from any number you don’t know, don’t open it,
forward it or respond to it. Instead, immediately delete the text message
If you accidentally click on the link attached to a text message, NEVER fill out a
form requesting information or call a phone number included in the message
Stop sharing your mobile phone number except in crucial situations and with
trusted contacts
Remember when you text to vote, enter sweepstakes or take surveys via text, they
are harvesting your phone number
Resist the urge to post your mobile number on your Facebook wall or profile
Mobile Malware
Mobile malware is a rising threat to privacy and security. What is mobile malware?
Mobile malware may present itself through fake mobile applications, web-
browsing, and SMS/Text messages such as:
Never let merchants write your social security number on your checks. It's illegal
in many states
Limit the amount of information printed on your checks. Do not include your
address, social security number, driver's license number, date of birth or phone
number on your checks. Recommendation: only have your name printed on your
checks. Merchants will ask for additional identity information if needed
When ordering checks, if possible, request new checks be delivered to your bank
for pick up instead of having them mailed to your home address
Deliver all outgoing mail to the Post Office rather than placing it in an unsecured
mailbox at home or at work
Use a check fraud prevention pen, like Uni-Ball 207, when writing checks to
prevent identity thieves from “washing” the ink from your checks, thus preventing
the checks from being altered
Shred all old checks and their carbon copies before disposing them
Limit the use of checks as much as possible. Instead, use your bank’s online-
banking bill pay service
Install virus, spyware and malware protection software. Set them update
automatically
Set your computer operating system to update automatically when security repairs
and patches are recommended from your computer operating system’s website
Do not download files from strangers or click on hyperlinks from people you
don’t know. Opening a file could expose your system to a computer virus or a
program that could hijack your computer or modem
Use a secure browser when accessing the internet. Secure browsers allow you to
communicate with websites in a protected session by encrypting information that
flows between you and the site. To verify your session is secure, look for https:
instead of http: in the URL address line, and a secure symbol (for example, closed
padlock or key) on the status bar of your browser located on the lower part of the
screen. For greater security when viewing your account information via the
Internet, we recommend you use a browser with 128-bit encryption
Avoid using an automatic login feature that saves your user name and password
Enable the “time out” feature that locks your computer when it is unattended
Never leave your computer unattended while using any online banking or
investing service
Never share your password or PIN with anyone and never write down your
password/PIN where others may find it. When selecting a password, don’t use
information easily linked to you (including your date of birth, pet’s name, social
security number, mother’s maiden name, etc.). Change your password frequently
for greater protection
Delete any personal information stored on your computer before you dispose of it.
Use a “wipe” utility program that overwrites the entire hard drive and makes the
files virtually unrecoverable. Do not rely on the "delete" function to remove files
containing sensitive information
Setup your computer to request a unique “strong” password to gain access. Select
a password that you do not use to access other accounts
Keep an eye on your credit card every time you use it, and make sure you get it
back as quickly as possible. Try not to let your credit card out of your sight
whenever possible
Don't give out your account number over the phone unless you initiate the call.
Never give your credit card info out when you receive a phone call. Legitimate
companies don't call you to ask for a credit card number over the phone
Never respond to emails requesting your credit card information and don't ever
respond to emails that ask you to go to a website to verify personal or credit card
information
Never provide your credit card information on a website that is not a secure site
Shred all pre-approved credit card applications you receive that you don’t plan to
use
Don't write your PIN number on your credit card or have it anywhere near your
credit card (in the event that your wallet or purse is lost or stolen). Try your best
to memorize your PIN
Shield your credit card number so that others around you can't copy it or capture it
on a cell phone or camera
Photocopy the front and back of all cards and keep the copies in a secure place.
These copies should include all your cards account numbers, expiration dates,
customer service numbers, and credit verification numbers. Update this list each
time you receive a new credit card
Only carry credit cards that you absolutely need. Don't carry extra credit cards
that you rarely use
Check your credit card statements promptly to detect any fraudulent charges. Save
your receipts so you can compare them with your monthly statements
If you find any charges that you don't have a receipt for -- or that you don't
recognize -- report these charges promptly (and in writing) to the credit card
issuer
Never sign a blank credit card receipt. Carefully draw a line through blank
portions of the receipt where additional charges could be fraudulently added
Carbon paper is rarely used these days, but if there is a carbon that is used in a
credit card transaction, destroy it immediately
If you move, notify your credit card issuers in advance of your change of address
If your credit cards are lost or stolen, contact the issuer(s) immediately
Most credit card companies have toll-free numbers and 24-hour service to deal
with these emergencies
According to US law, once you have reported the loss or theft of your credit card,
you have no more responsibility for unauthorized charges. Further, your
maximum liability under federal US law is $50 per credit card -- and many credit
card issuers will even waive that fee for good customers
Write to the creditor at the address given for "billing inquiries," NOT the address
for sending your payments. Include your name, address, account number, and a
description of the billing error, including the amount and date of the error
Send your letter so that it reaches the creditor within 60 days after the first bill
containing the error was mailed to you. If an identity thief changed the address on
your account and you didn't receive the bill, your dispute letter still must reach the
creditor within 60 days of when the creditor would have mailed the bill. This is
one reason it's essential to keep track of your billing statements, and follow up
quickly if your billing statements don't arrive on time
You should send your letter by certified mail, and request a return receipt. It
becomes your proof of the date the creditor received the letter. Include copies
(NOT originals) of your police report or other documents that support your
position. Keep a copy of your dispute letter
The U.S. Postal Inspection Service (USPIS) is the law enforcement arm of the U.S. Postal
Service that investigates cases of identity theft. You can locate the nearest USPIS district
office by visiting http://postalinspectors.uspis.gov
Never place outgoing mail (at work or at home) in an open, unlocked mailbox.
Take all outgoing mail to the post office. Also, during long absences, have mail
held at the post office until you return
Go PAPERLESS! Try and have as many of your bills and other statements sent
to you electronically (via email)
Make a list of all monthly bills and other statements and their expected delivery
date. Investigate immediately if bills or statements do not arrive on time. An
identity thief may have submitted a “Change-of-Address” request in your name to
the postal service re-routing your incoming mail
Never discard in the trash pre-approved credit and insurance offers and other mail
with your personal identifying information listed on it. Always SHRED them
first to prevent becoming a victim of identity theft by “dumpster-divers”
Never flip-up the “red flag” on your unsecure mailbox at home to alert the postal
employee you have outgoing mail for pickup. This also alerts identity thieves to
the possibility that valuable outgoing mail is available for the taking
Never leave mail lying around in your house for others to see. Place all unopened
mail in a secure location until you are ready to open and process it
Remove labels and your address from magazines, letters and “junk mail” and
shred them before discarding them in the trash
Limit the amount of unwanted “junk mail” you receive by removing your name
and email address from member companies of the Direct Marketing Association
(DMA) mail preference service at www.dmachoice.org
Create passwords that are easy to remember but difficult to guess by others by
using a combination of upper and lower-case letters, numbers, and symbols
(minimum eight characters long)
Avoid using passwords that contain any form of your name or the names of
family members, children, mother’s maiden name, friends, pets, celebrities,
birthdays, hobbies, sports teams, etc.
Avoid using passwords that contain any information that would be easily
available from your social networking sites (Facebook, Twitter, etc.) such as an
address, telephone number, date of birth, city of birth, high school, etc.
Avoid using passwords that contain commonly known titles of songs, books,
movies, books, poems, etc.
Passwords should never be sent in email or text messages or shared with anyone
over the phone
Passwords should never be shared with anyone, including family members or co-
workers
If your financial institution uses the last four digits of your social security number
as your default PIN, change it
Memorize all your passwords. Don't record them on anything you carry in a
wallet or purse
Shield your hand at an ATM or when making long distance calls with a phone
card. Shoulder surfers may be nearby with binoculars or cameras
Your social security number (SSN) is the key to cloning your identity. Take the
following precautions:
Do not carry your social security card in your wallet/purse. Avoid carrying cards
that display your SSN — such as health insurance cards, military ID card, etc.
unless needed to receive services
Never give your SSN, credit card number, or other personal data by phone unless
you have an existing relationship with the business or agency AND you initiated
the call using a verified phone number. Always verify the other party's
authenticity
Avoid including your SSN on job applications. Provide it only when absolutely
necessary — for tax, employment, and student records; and stock and property
transactions
If someone has misused your SSN or other personal information to create credit
or other problems for you, the Social Security Administration cannot resolve these
problems
If you have done all you can to fix the problems resulting from misuse of your SSN and
someone still is using your number, the Social Security Administration may assign you a
new number. You cannot get a new SSN under the following conditions:
If your social security card is lost or stolen, but there is no evidence that someone
is using your number
If you decide to apply for a new number, you will need to prove your age, U.S.
citizenship, or lawful immigration status and identity. For more information, ask for Your
Social Security Number and Card (http://www.ssa.gov/pubs/10002.html) (Publication
Number 05-10002).
You also will need to provide evidence that you still are being disadvantaged by the
misuse. Keep in mind that a new number probably will not solve all your problems. This
is because other governmental agencies (such as the Internal Revenue Service and state
motor vehicle agencies) and private businesses (such as banks and credit reporting
companies) likely will have records under your old number.
Also, because credit reporting companies use the number, along with other personal
information, to identify your credit record, using a new number will not guarantee you a
fresh start. This is especially true if your other personal information, such as your name
and address, remain the same.
If you receive a new SSN, you will not be able use the old number anymore.
For some victims of identity theft, a new number actually creates more problems. If the
old credit information is not associated with the new number, the absence of any credit
history under the new number may make it more difficult for you to get credit.
In addition to using the website, you can call toll-free at 1-800-772-1213. Customer
Service Representatives (CSR) can answer specific questions from 7 a.m. to 7 p.m.,
Monday through Friday. Information can also be provided by automated phone service
24 hours a day. (You can use the automated response system to update a new address or
request a replacement Medicare card.) If you are hearing impaired, you may call TTY
number, 1-800-325-0778.
Listed below are several identity items that should NEVER be thrown in the trash
before they are shredded:
Pay stubs
Utility bills
Phone bills
Cancelled checks
Insurance/medical statements
Bank statements
Brokerage statements
Don't discard sensitive documents at work unless you're sure they'll be shredded
properly
If possible, take your trash out just before it is due to be collected. Don't give
identity thieves time to go through your trash
Your passport
A driver's license or insurance card with your SSN (or that of a family member)
Deposit slips
Make a photocopy or list in writing the front and back of all identity documents that you
may carry in your wallet or purse and store this information in a secure location like a
safe deposit box or a secure home safe.
The factory default user name and password for access to most routers is well known
publicly, and can easily be found by searching the Internet. So is the default SSID (the
name that is publicly broadcast by the wireless transmitter to identify your network to any
user that wishes to connect their computer to your network). These default settings should
be reset immediately, preferably during the initial setup, to secure your wireless network
Always reset the SSID (Service Set Identifier) to a new name. It is also smart to
pick a name that does not identify your family or business, since the SSID will be
visible to any wireless computer within range
Disable remote management of the router. As a rule, unless you absolutely need
this capability, it’s best to keep remote administration turned off. It’s usually is
turned off by default, but it’s always a good idea to check
Ensure that wireless encryption is enabled. All wireless devices that connect to
your network must use the same type of encryption, such as WPA, WPA2, WEP,
etc. If at all possible, use one of the newer standards, such as WPA2, or WPA,
which are much harder to decrypt/hack than the earlier WEP standard
After setting a wireless “key” for the router (eight or more characters…including
a mix of letters, numbers, and special characters), protect it by storing it in a
secure location. It is the password that will allow anyone in range of your wireless
transmitter to easily join your network
Ensure firewall software is enabled on each computer with access to your network,
both those with wired and wireless capability
If possible, locate the router in a central part of the home or business. In addition
to providing the best average coverage for your intended wireless devices, this
also limits the exterior coverage of the wireless transmitter. This decreases the
possibility that an unauthorized user will be physically close enough to query your
wireless network
Turn off the router when you are away from your home or business for an
extended period of time. Hackers cannot access a wireless router when it is turned
off
Check online to see if the router model you are considering provides a thorough
user manual. You should be able to download a PDF user manual that is thorough
in explaining the setup and operation of your intended purchase, especially the
security, encryption, and firewall settings available to you to protect your network
Set your computer operating system, antivirus and malware software programs to
update automatically with security patches and new virus definitions. Your
antivirus, malware and personal firewall software must be enabled. A secure
wireless network will do little if your computer is open to viruses, malware, pop-
ups, and other threats that can be imported through your firewall by ordinary web
browsing and email
When using a public Wi-Fi hotspot, only log in or send personal information to
websites that you know are fully encrypted. If you think you’re logged into an
encrypted site but find yourself on an unencrypted page, log out immediately
Don’t use public Wi-Fi networks to access personal accounts (banking, credit card,
etc.) requiring sensitive information. But if you must, make sure it is an encrypted
website. When you’ve finish using an account, log out and close the browser
immediately
Do not use the same password on different personal accounts. If you use the same
password for all accounts, it could give someone who gains access to one of your
accounts, access to others
Many web browsers alert users who try to visit fraudulent websites or download
malicious programs. Pay attention to these warnings, and keep your browser and
security software up-to-date
If you regularly access online accounts through public Wi-Fi hotspots, use a
virtual private network (VPN). VPNs encrypt traffic between your computer and
the Internet, even on unsecured networks. You can obtain a personal VPN account
from a VPN service provider
Some Public Wi-Fi networks do use encryption: WEP and WPA are the most
common. WPA2 is the strongest. WEP is the weakest. You can tell if a public
Wi-Fi is using encryption, because a network “key” will be required to gain
access to the network
Your Wi-Fi setup depends on the router you have and the devices you want to
connect. Thus it’s essential to read the respective user manuals and follow their
instructions. Some of the following mistakes can be avoided simply by reading
manuals
Your wireless router comes with a default password for its administration
interface. The password is required to log into the device and configure countless
critical settings. To avoid damage it’s essential to secure this area by replacing the
default password with a strong password (eight or more characters…including a
mix of upper and lower-case letters, numbers, and special characters)
Most mobile devices (laptops, mobile phones, eReaders, etc.) have buttons or
software settings that allow you to turn on or off wireless transmissions. Make
sure your device Wi-Fi option is turned on when connecting to a Wi-Fi network.
Failing to do so will prevent you from locating and connecting to a wireless
network
In general, it’s best not to mix wireless standards. Select one that supports all of
your wireless devices. You’ll see the best performance, if all connected devices
"speak the same language"
Spelling
Your data is transmitted over the air and it is an easy target for anyone trying to
spy on you or hack into your system. Apply effective security measures when
securing your wireless network. Change the default passwords to a strong
passwords (eight or more characters…including a mix of upper and lower-case
letters, numbers, and special characters). Use Wi-Fi Protected Access (WPA)
encryption and make sure your firewall is configured properly and turned on
SECTION 5
The Fair Credit Reporting Act (FCRA) requires each of the nationwide consumer
reporting companies — Equifax, Experian, and TransUnion — to provide you with a free
copy of your credit report, at your request, once every 12 months. The Federal Trade
Commission (FTC), the nation’s consumer protection agency, enforces the FCRA with
respect to consumer reporting companies
A credit report includes information on where you live, how you pay your bills, and
whether you’ve been sued or arrested, or have filed for bankruptcy. Nationwide consumer
reporting companies sell the information in your report to creditors, insurers, employers,
and other businesses that use it to evaluate your applications for credit, insurance,
employment, or renting a home
The three nationwide consumer reporting companies have set up a central website, a toll-
free telephone number, and a mailing address through which you can order your free
annual credit report
ONLINE:
BY PHONE:
Call 1-877-322-8228; you will go through a simple verification process over the
phone
Your reports will be mailed to you within 15 days. Please allow 2-3 weeks for delivery
BY MAIL:
Complete the Annual Credit Report Request Form and mail it to: Annual Credit
Report Request Service, P.O. Box 105281, Atlanta, GA 30348-5281. The form
can be found and printed from
https://www.annualcreditreport.com/cra/requestformfinal.pdf
Your reports will be mailed to you within 15 days. Please allow 2-3 weeks for delivery
Regardless of how you request your report, you have the option to request all three
reports at once or to order one report at a time. By requesting the reports separately, you
can monitor your credit more frequently throughout the year
Direct Marketing Association (DMA) Mail Preference Service will allow you to
receive less of the mail you do not want (junk mail). You may remove your name
from individual organization lists. Complete the form and DMA will send it to
their members and ask them to honor your preferences. Visit www.dmachoice.org
to register your choices
If you would like to reduce the number of pre-screened credit and insurance offers
that you receive, visit www.optoutprescreen.com or call 1-888-5OPTOUT (1-
888-567-8688) to opt out of these offers. This is a free service to consumers
offered by the major credit reporting agencies (Equifax, Experian and
TransUnion)
Telephone marketers and their service providers must honor the requests of
consumers who have placed their telephone numbers on the registry
The Email Preference Service (eMPS) is a consumer service sponsored by the Direct
Marketing Association (DMA). Established in 1917, DMA is the oldest and largest
national trade association serving the direct marketing field.
You may register with the eMPS removal file online at www.dmachoice.org.
Registration is good for five years after which you must renew your registration.
When you register with eMPS, your name is placed on a "delete" file which is made
available to companies.
No. You will continue to receive mail from companies with which you do business and
from charitable or commercial organizations which do not choose to use eMPS. In
addition, you may continue to receive email from many local merchants, professional and
alumni associations, and political candidates. Unfortunately, there are many individuals
who do not adhere to best business practices and do not remove people who do not wish
to receive unsolicited email.
The Direct Marketing Association (DMA) created in October 2005 a Deceased Do Not
Contact List (DDNC) which all DMA members are required to honor. The DDNC list is
available to companies and non-profit organizations for the sole purpose of removing
names and addresses from their marketing lists.
When you register a name with DDNC, the person's name, address, phone number, and e-
mail address are placed in a special do not contact file. All DMA members are required to
eliminate these individuals from their prospecting campaigns.
The service is also available to non-members of DMA so that all marketers may take
advantage of this service.
A new, updated file is distributed to members at least once every three months. Therefore
the number of commercial contacts from DMA members should begin to decrease within
three months.
How to Register
Go to Deceased Do Not Contact Registration and complete the online form. There is no
charge to register for the DDNC list. Consumers will be asked for a credit card number to
validate their identity and mailing address when registering. The credit card number will
be used to authenticate and validate the consumer's identity through a no-charge
transaction. As with many credit card verification programs, consumers may see an
authorization pending for 3–7 days, and no charge will be issued to the monthly bill.
The DMA will not keep personal, identifiable information and will not use the
information for marketing purposes.
SECTION 6
The Identity Theft Report is the most valuable tool you should have in your toolkit to use
after discovering you have become a victim of identity theft. It has proven especially
helpful when dealing with creditors, debt collectors, financial institutions and credit
reporting agencies when attempting to regain your credit and good name.
An Identity Theft Report is an official, valid, law enforcement report that documents a
consumer’s statement that they are a victim of identity theft. To discourage false filings,
the Identity Theft Report exposes the consumer to criminal penalties if found to have
filed false information. The Identity Theft Report should contain as much specific
information as possible about the identity theft.
An Identity Theft Report can be obtained by following these steps: (1) complete the FTC
Identity Theft Universal Complaint and Affidavit form available at
www.ftccomplaintassistant.gov (2) print a copy of the completed form (ID Theft
Affidavit), and (3) take a copy of the completed ID Theft Affidavit to the police for
inclusion in your police report. A police report that includes the victim’s ID Theft
Affidavit creates an Identity Theft Report.
Not all states require the police to take a report from an identity theft victim. If you are
unable to obtain a report, you should provide the police with a copy of the Federal Trade
Commission’s memorandum to law enforcement on the importance of writing a police
report for victims of identity theft, available the
http://www.consumer.ftc.gov/articles/pdf-0088-ftc-memo-law-enforcement.pdf.
If you are still unsuccessful with your local police, attempt to make a report with another
law enforcement agency such as the state police, sheriff, district attorney, or state
attorney general. If you are unable to get any law enforcement agency to take your report,
a section of the FTC ID Theft Affidavit allows you to indicate this fact.
You can use your Identity Theft Report to invoke many of the rights granted to identity
theft victims under the Fair Credit Reporting Act (FCRA). For example:
Preventing a company from selling or placing for collection debts that were
created from identity theft: Once a company is informed by a CRA that you
filed an Identity Theft Report and it has blocked your account, the company is
prohibited from selling, transferring, or placing for collection that debt
Getting documents from businesses: You have the right to obtain documents
related to fraudulent transactions resulting from identity theft. These records can
be obtained by submitting your Identity Theft Report, along with proper proof of
identification, to the company where the fraudulent transaction occurred
ID THEFT COMPLAINT
________________________________________________________________________
Filing a complaint with the FTC is one of several important steps that victims of identity
theft should take. The links below will walk you how to file a complaint with the FTC,
and how you can get the protections that you, as a victim of ID theft, may be entitled to.
However, if you’re ready to go directly to the Complaint Form, click here.
SECTION 7
Three ways to place, temporary lift or permanently remove an Equifax security freeze:
ONLINE
The easiest and fastest way is via Equifax’s online process, which can be found at the
following link:
https://www.freeze.equifax.com
BY PHONE
If you choose, you may place, temporary lift or permanently remove an Equifax security
freeze by calling their automated line at 1-800-685-1111 (NY residents please call 1-800-
349-9960).
BY MAIL
If you choose, you may place, temporary lift or permanently remove an Equifax security
freeze by mail. Submit your request in writing to:
When using the phone or mail options to place, temporary lift or permanently remove an
Equifax security freeze, please be prepared to provide the following information:
Your complete name including any suffix (e.g. Jr., Sr., etc.)
Complete address
Social Security Number
Date of Birth
In addition, when using the mail option, please also send some proof of
identification. See Acceptable Forms of Identification for Verification . Equifax will
mail you a personal identification number (PIN) that will be required to temporarily lift
or remove the security freeze. Payment, if applicable, to place, lift or remove an Equifax
security freeze depends on your state of residents. Please check security fees and
requirements for your state.
There are three (3) ways to place, temporary lift or permanently remove a security freeze
on your Experian credit file:
ONLINE
The easiest and fastest way is via Experian’s online process, which can be found at the
following link:
www.experian.com/freeze
BY PHONE
If you choose, you may place, temporary lift or permanently remove an Experian security
freeze by calling their automated line at 1-888-EXPERIAN or (1-888-397-3742).
BY MAIL
If you choose, you may place, temporary lift or permanently remove an Experian security
freeze by mail. Submit your request in writing to:
Experian
P.O. Box 9554
Allen, TX, 75013
When using the phone or mail options to place, temporary lift or permanently remove an
Experian security freeze, please be prepared to provide the following information:
Your complete name including middle initial and any suffix (e.g. Jr., Sr., etc.)
Complete address and previous addresses for the past two years
Social Security Number
Date of Birth
In addition, when using the mail option, please provide one copy of a government issued
identification card, such as a driver’s license, state or military ID card, etc., and one copy
of a utility bill, bank or insurance statement, etc. Experian will mail you a personal
identification number (PIN) that will be required to temporarily lift or remove the
security freeze. Payment, if applicable, to place, lift or remove an Experian Security
Freeze depends on your state of residency.
There are three (3) ways to place, temporary lift or permanently remove a security freeze
on your TransUnion credit file:
ONLINE
The easiest and fastest way is via TransUnion’s online process, which can be found at the
following link:
https://freeze.transunion.com
BY PHONE
If you choose, you may place, temporary lift or permanently remove a TransUnion
security freeze by calling their automated line at 1-888-909-8872.
BY MAIL
If you choose, you may place, temporary lift or permanently remove a TransUnion
security freeze by mail. Submit your request in writing to:
TransUnion
P.O. Box 6790
Fullerton, CA 92834
When using the phone or mail options to place, temporary lift or permanently remove a
TransUnion security freeze, please be prepared to provide the following information:
Your complete name including middle initial and any suffix (e.g. Jr., Sr., etc.)
Complete address and previous addresses for the past two years
Social Security Number
Date of Birth
In addition, when using the mail option, please provide one copy of a government issued
identification card, such as a driver’s license, state or military ID card, etc., and one copy
of a utility bill, bank or insurance statement, etc. TransUnion will mail you a personal
identification number (PIN) that will be required to temporarily lift or remove the
security freeze. Payment, if applicable, to place, lift or remove a TransUnion Security
Freeze depends on your state of residents
Initial or 90-day Fraud Alert – must be renewed after 90 days. Anyone can place an
initial fraud alert on their credit file. You do not have to be a victim of identity theft.
Extended Fraud Alert – remains on credit file for seven years. A valid police report
showing that you have been a victim of identity theft is required to place an extended
fraud alert. Also, your name is removed from prescreened credit and insurance offers for
five years.
Active-duty Military Fraud Alert – remains on your credit file for one year for active
duty military personnel who are away from their duty station. Also, your name is
removed from pre-screened credit and insurance offers for two years.
When you request an alert through one of the credit reporting agencies, your request is
automatically sent to the other two agencies.
EQUIFAX
Phone: 1-800-525-6285
Online: https://www.alerts.equifax.com/AutoFraud_Online/jsp/fraudAlert.jsp
Mail: Equifax Information Services LLC, P.O. Box 105069, Atlanta, GA 30348-5069
EXPERIAN
Online: https://www.experian.com/fraud/center.html
TRANSUNION
Phone: 1-800-680-7289
Online: https://fraud.transunion.com
SECTION 8
As a college student, you might think you're immune to identity theft. THINK AGAIN!
College students are mainly at risk because their credit records are mostly blank, which
means that their personal identifying information (PII) can be easily used to secure new
credit. Identity thieves know this; so they specifically target students for identity theft.
Identity theft can affect college students’ credit rating, criminal record, borrowing
possibilities for the future and even job opportunities.
The good news is that there are steps students can take to protect their identity. Check out
the following tips:
Don't leave documents on your desk or in your dorm room that include your
personal information
Keep your credit card and bank account statements locked in a safe place
Always keep your front door and/or dorm room locked, even if you expect
company
Purchase a shedder and use it to destroy all documents that contains your personal
identifying information
Install and keep updated anti-virus, anti-spyware, and firewall software on your
computer
Never display your full name in an online profile (Facebook, Twitter, etc.)
Never fall for e-mail hoaxes that ask for money. Even better, NEVER respond to
spam
Never post your picture and/or personal information on social networking sites
Apply for federal student aid by filling out the Free Application for Federal
Student Aid (FAFSA) at www.fafsa.ed.gov
When completing the FAFSA electronically, remember to exit the application and
close the browser
Keep your U.S. Department of Education (ED) PIN in a secure place. Get your
PIN at www.pin.ed.gov. Don’t reveal your PIN to anyone, even if that person is
helping you fill out the FAFSA. The only time you should be using your PIN is
when you are on ED websites, which are secure
Review your financial aid award documents and keep track of the amount of aid
applied for and awarded
Additional Tips
Keep personal information under lock and key and shred your old records
Write “Check My Photo ID” on the front and back of all cards
Request that new and replacement cards and checks be sent to your bank instead
of your home
Request your free annual credit report from each of the three credit reporting
agencies
Document who, what, when, where, and how you became a victim
Request a copy of your credit reports from the three credit reporting agencies
Contact creditors and banks immediately and notify them of fraudulent activities
Create an “Identity Theft Report” (FTC complaint, FTC affidavit, and police
report)
Send copies of original documents and all correspondence via “Certified Mail
Return Receipt Requested”
Keep a record of all monies spent and time lost recovering from becoming a
victim
Seniors often have higher cash reserves and home equity than younger folks
Seniors are usually less technologically savvy and do not research scams online
Seniors do not monitor their credit and financial accounts very closely
Retirement home staff and other assistants may have access to and take advantage
of a senior's personal records
Funds may also be withdrawn in smaller amounts via remotely created checks
(drafts); this could indicate the elder has fallen victim to a telemarketing fraud
The person who has Power of Attorney makes large withdrawals that do not
appear to benefit the elderly person
Write “Check My Photo ID” on the front and back of all cards
Request that new and replacement cards and checks be sent to your bank instead
of your home
Request your free annual credit report from all three credit reporting agencies
Guard against shoulder surfing (someone looking over your shoulder when you
are using an ATM or when you are entering your PIN at a store’s check out
terminal)
Document who, what, when, where, and how you became a victim
Request a copy of your credit reports from the three credit reporting agencies
Create an Identity Theft Report (FTC Complaint, FTC Affidavit, and Police
Report)
Send copies of original documents and all correspondence via certified mail
return receipt requested
Maintain a record of all monies spent and time lost recovering from being a
victim
Identity thieves obtain information about deceased individuals in various ways. They may
scan the obituaries and genealogy websites, steal death certificates, or get the information
from websites that offer the Social Security Death Master File.
Financial institutions are not immediately made aware that their customer is deceased. It
takes time for the Social Security Administration to transmit the Death Master File to the
financial industry. Until the institution receives word that the individual is deceased, the
account remains active.
Until you notify the credit reporting agencies and creditors, they do not know of a death.
The accounts of the deceased will remain open. An active credit file will stay open for up
to ten (10) years without activity.
Steps To Take To Decrease the Risk of Identity Theft When A Loved One Passes
Obtain at least 12 certified copies of the official death certificate when it becomes
available and place them in a secure location
Immediately notify all relevant credit card companies, banks, stock brokers,
loan/lien holders, mortgage companies, and any other financial institutions of the
death by telephone and follow-up in writing. Mail all correspondence certified,
return receipt requested. Keep photocopies of all correspondence, including letters
that you send
The executor or surviving spouse will need to discuss all outstanding debts and
how to handle them. You will need to transfer the account to another person or
close the account. If you close the account, ask the financial institution to list it as:
“Closed. Account holder is deceased”
Immediately contact the three major credit reporting agencies in writing. Request
that the credit report of the deceased be flagged with the following alert:
“Deceased. Do not issue credit. If an application is made for credit, notify the
following person(s) immediately: (executor/trustee of the estate)”
Request copies of all three credit files of the deceased. A review of each report
will let you know of any active credit accounts that needs to be closed
If there is a surviving spouse or other joint account holders, be sure to notify the
company that the deceased’s name(s) needs to be removed from the account(s). A
certified copy of the death certificate may be required
Obtain a P.O. Box and submit a change-of-address request to re-route all mail of
the deceased from his/her home to the P.O. Box
Secure all sensitive documents in the deceased’s home. For example, mail, bills,
statements, social security earnings, and benefits statements, etc
Photocopy or write down the information from the front and back of all cards of
the deceased. For example, Social Security card, driver’s license, birth certificate,
health insurance cards, credit, debit, and ATM cards, etc. The spouse/executor
should immediately secure these documents in a safe deposit box
Opt-out the deceased from all pre-screened credit and insurance offers at
www.optoutprescreen.com
Remove the name of the deceased from marketing lists at Deceased Do Not
Contact Registration
Close all financial accounts and destroy all checks and credit cards
The spouse/executor should close utility accounts of the deceased that are no
longer in use and submit a name change for all remaining utility accounts
Department of Motor Vehicles if the person had a driver’s license or state ID card.
Also make sure that any vehicle registration papers are transferred to the new
owners
Any membership programs – video rental, public library, fitness club, etc.
Members of the military away from their usual duty station may place an "active duty
military fraud alert" on their credit report to help minimize the risk of identity theft while
deployed. When a business sees the alert on their credit report, it must verify the
individual’s identity before issuing credit.
Active duty alerts on your report are effective for one year, unless you request that the
alert be removed sooner. If your deployment lasts longer than one year, you may place
another alert on your report. Also, when you place an “active duty alert” on your credit
file, your name will be removed from the nationwide consumer reporting companies
marketing lists for prescreened offers of credit and insurance for two years.
There are three ways to place, temporary lift or permanently remove an Active Duty
Military Fraud Alert on your Equifax, Experian and TransUnion credit file:
EQUIFAX
Phone: 1-800-525-6285
Online: https://www.alerts.equifax.com/AutoFraud_Online/jsp/fraudAlert.jsp
Mail: Equifax Information Services LLC, P.O. Box 105069, Atlanta, GA 30348-5069
EXPERIAN
Online: https://www.experian.com/fraud/center.html#addAlert
TRANSUNION
Phone: 1-800-680-7289
Online: https://fraud.transunion.com
Participate in quizzes (e.g. How well do you know me?), which may require you
to divulge a lot of personal information
Click on links that lead you to other websites, even if the link was sent to you by a
friend or posted on your friend’s profile
Respond to email scams (phishing) that ask you to update your social networking
profiles
Use a strong password (combination of eight or more letters… upper and lower
case, numbers and special characters) that is different from passwords you use to
access other sites
For password security verification questions, make up a fake answer and use it for
all security questions (rather than answering, truthfully, a specific question, like
“What is your mother’s maiden name?”)
Never use your work email address for a social networking site. Instead, create a
new email address, to be used solely for connecting to your social networking
profile(s)
Review the privacy policy and terms of service before signing up for an account
Become familiar with the privacy settings available on any social networking site.
Configure them to provide maximum protection for your privacy information
Be very cautious of pop-up windows, especially any that state your security
software is out of date or that security threats and/or viruses have been detected
on your computer
Don’t post information or photos of yourself that you would not want your mother
or a potential employer to see on social networking site(s)
Don’t publicize your daily routine, vacation plans or where you live
Turn off “geo-tagging” or GPS location services that may be associated with
some social networking sites
NEVER post the following information: your home address, date of birth,
mother’s maiden name, phone number, driver’s license number, social security
number (SSN), email address, student ID number, year of your high school or
college graduation or your home town. This information could be useful to
identity thieves and to data mining companies
Use caution when using third-party applications. For the highest level of safety
and privacy, avoid them completely
If you receive a request to connect with someone you know, verify the account
holder’s identity before accepting the request. Consider calling the individual,
sending an email to his or her personal account or even asking a question only
your contact would be able to answer
If you decide to accept the request, use privacy settings to limit what information
is viewable to the stranger
In the event that your social networking account is compromised, report it to the
site immediately and alert your contacts. You will need to change passwords and
proceed with caution because your computer may have also been compromised
Be sure to log off from social networking sites and close the browser when you no
longer have a need to be connected
BE CAREFUL! Verify emails and links in emails you supposedly get from others
on your social networking site. These are often designed to gain access to your
user name, password, and ultimately your personal information
SECTION 9
Request one free copy of your credit report annually from each of the three credit
reporting agencies
Request that creditors block fraudulent information from being shared with credit
reporting agencies
SECTION 10
INDEX
A
About the Author ............................................................................................................................................ 5
D
Deceased Do Not Contact List (DDNC) ...................................................................................................... 58
E
Experian Security Freeze .............................................................................................................................. 65
F
FTC Identity Theft Complaint and Affidavit................................................................................................ 60
H
How Identity Thieves Get Your Identity Information .................................................................................. 13
How To:
How To Protect:
Checks ............................................................................................................................................ 37
Mail ................................................................................................................................................ 42
Wallet/Purse ................................................................................................................................... 49
I
ID Theft Protection Strategies For:
Seniors....................................................................................................................................... 74-77
Introduction .................................................................................................................................................... 8
O
Opt-Out Prescreened Credit and Insurance Offers ....................................................................................... 56
S
Steps To Take If You Become A Victim Of Identity Theft .................................................................... 20-21
T
Table of Contents ........................................................................................................................................ 6-7
W
What Is Your Identity ................................................................................................................................... 10
U
U.S. Postal Inspection Service (USPIS) ....................................................................................................... 42