Identity Theft Protection
Identity theft is the unlawful use of another person's identification and can take many forms. Common methods of identity theft include credit card or other financial institution fraud, phone or utility service theft, and the taking of government documents or benefits. However, thieves are finding new ways of using the identity of their victims every day.
The tragic events of September 11th have helped financial institutions and federal regulators learn more about the ways in which terrorists and terrorist organizations finance their activities. Some of their methods included opening accounts and moving funds using false identities or stolen information about real account holders. One way you may be able to help stop these activities and make our financial institutions safer is to protect your account information from thieves and unauthorized users.
It is surprising to most people that identity theft is actually a very easy crime to commit. In fact, over 1,400 people are victimized each day. That being the case, it is important for you to know how these thieves operate so you can protect your personal information.
At the heart of the crime is the thief obtaining information that most people would assume only the true owner of the information would know. Common examples are social security numbers, driver's license numbers, financial institution account numbers, mother's maiden names, and passport information.
Thieves obtain this information in numerous ways. Some thieves will steal wallets, purses, and even mail. Others will listen and/or watch a person conduct personal business, such as talking on the telephone or getting cash from an ATM. Thieves will also deceive or trick people into disclosing personal information through phone scams, via the mail, or on the internet.
Very aggressive thieves will even obtain personal information by using a process referred to as "pretext calling." Pretext calling occurs when an individual contacts an entity in possession of a customer's personal information and cons the entity into releasing the information by acting as the customer or someone authorized to have the customer's information.
Once a thief has possession of the information, the thief will apply for credit cards, loans, phone services, or just about any other service where economic gain can be realized without actual payment. When applying for credit cards, loans, or other services, thieves will often intentionally use incorrect addresses or complete change of address forms on existing accounts so that the victim will not be immediately aware of the crime.
Identity theft can cause its victims numerous problems. Most significantly, it can destroy the financial history you have worked so hard to obtain. Repairing your credit history can require significant time and money. You may not be able to stop a thief until thousands of dollars of debt have been attributed to you. The following are just some of the ways you can reduce the risk of identity theft:
- Keep your credit cards, debit cards, personal identification numbers (PINs) and other passwords, checks, social security cards, other cards or documents which bear your social security number, health insurance cards, driver's license and number, and other personal information where they will be safe. When disposing of these items, do so by shredding.
- Keep your deposit and withdrawal slips, credit card purchase receipts, financial institution statements, credit card statements, utility bills, medical bills, insurance information, investment updates, and credit card solicitations where they will be safe. When disposing of them, do so by shredding.
- Don't put your trash out until shortly before it will be picked up.
- Mail bill payments and other items that contain personal information at a U.S. Postal Service drop box rather than in your curbside mailbox. Don't put any mail in your curbside mailbox until shortly before it will be picked up.
- Take your mail out of your curbside mailbox as soon as possible once it has been delivered. If you are traveling, have the U.S. Postal Service hold your mail or have someone you trust pick it up daily.
- Limit the information on your checks and don't carry around more cards than necessary.
- Don't give any of your personal information in person, over the telephone, or over the Internet to anyone – unless you have a very good reason to trust them.
- Don't give any of your personal information in response to an unsolicited e-mail claiming to be from your financial institution or some other highly credible source. This is a technique referred to as "phishing." Be sure to validate the request before providing the information (for example, contact the customer service telephone number on your account statement to ask about the request).
- Don't give any of your personal information to any web sites that do not use encryption or other secure methods to protect it.
- Use a firewall if you have a high-speed internet connection. This software can be purchased online or from most software retailers.
- Don't use PINs or passwords that are easy to guess or find through your social media accounts (for example, don't use birth dates or spouse, child, or pet names).
- Examine your credit card and financial institution statements immediately upon receipt to determine whether there were any unauthorized transactions. Report any that you find immediately to the financial institution.
- Make a prompt inquiry if bills or statements are not received in a timely fashion – this could mean that they are being diverted by an identity thief.
- Use the D.L. Evans Bank CreditSense service to help monitor activity on your credit, receive alerts of changes to your credit score, and view a snapshot of the overall health of your credit. You can also obtain copies of your credit report annually from each of the three major credit reporting agencies (Equifax®,1-800-685-1111; Experian®, 1-888-397-3742; TransUnion®, 1-800-888-4213) to be sure that they are accurate.
It is also a good idea to request not to receive any further preapproved offers of credit by calling 1-888-5-OPT-OUT. As well as asking to be removed from national direct mail lists by writing to the DMA Mail Preference Service, P.O. Box 643, Carmel, NY 10512, or going online to www.dmachoice.org. Include your name and address. Finally, you can register with the National Do Not Call Registry by calling 1-888-382-1222 or going online at www.donotcall.gov.
If you suspect your identity has been stolen or you are, in fact, certain that it has been stolen, follow these simple steps:
1. Contact the fraud department of at least one of the following three major credit reporting agencies and ask that a fraud alert be placed in your credit file and for a free credit report (to be on the safe side you may wish to contact all three):
Equifax® | Experian® | TransUnion® |
---|---|---|
1-800-525-6285 P.O. Box 740241, Atlanta, GA 30374-0241 |
1-888-EXPERIAN (397-3742) P.O. Box 9532, Allen, TX 75013 |
1-800-680-7289 Fraud Victim Assistance Division P.O. Box 6790, Fullerton, CA 92834-6790 |
2. Close all accounts that are or may be affected by the identity theft.
3. Also, regarding any checking accounts thus closed, contact the following major check verification companies and ask that retailers using their databases not accept checks drawn on the closed accounts:
TeleCheck® | Certegy, Inc. | International Check Services® |
---|---|---|
1-800-710-9898 or 927-0188 |
1-800-437-5120 | 1-800-631-9656 |
4. File a police report and obtain a copy for submission to credit reporting agencies, creditors, and others.
5. Contact the Federal Trade Commission to report the theft and obtain further guidance as to how to protect yourself: www.ftc.gov/idtheft or call 1-877-IDTHEFT (438-4338)
Identity Theft Clearinghouse
Federal Trade Commission
600 Pennsylvania Avenue
Washington, DC 20580
6. If you know or suspect that your mail has been stolen, contact the United States Postal Service.
7. Keep detailed records of any theft of your identity and of your efforts to resolve any theft. Make sure to log the date, time, and amount of any unauthorized activity on your accounts. Log the date, time, duration, and cost of any phone calls and keep copies of any mailings as well as what you spent sending the mailing.
© 2002 Bankers Systems, Inc., St. Cloud, MN IDT-BRO-3 12/13/2004
Helpful links
- ACH Fraud Resources
- Check Fraud Resources
- Ransomware Resources
- Card Holder Fraud
- Phishing
- Money Mule Awareness Booklet
- Older Adult Financial Exploitation Brochure
- Elder Fraud Prevention Brochure
- Malware & Spyware Software
- Computer Security Education
- Firewalls
- Updating Software-Security Updates
- Mobile Device Security
- Fraud Resource Guide
- Protecting Your Business from Embezzlement
- Protecting Your Password
- Tax Return ID Theft
- Wallet Vault