Sei sulla pagina 1di 94

IDENTITY

 

THEFT

THE
 

INFORMATION
PROTECTOR

“America’s
 

Most
 

Dynamic
 

Identity
 

Theft
 

Protection
 

Speaker!”
“This Page Is Intentionally Left Blank.”
Identity Theft Protection Strategies

WOMPLE, LLC PUBLISHING • COLUMBIA, SOUTH CAROLINA

THE INFORMATION PROTECTOR


A COMPLETE IDENTITY THEFT PROTECTION RESOURCE GUIDE

Copyright © 2018 by Murray Montgomery, Jr., CPP


All rights reserved. No part of this book may be reproduced or transmitted in any form or by any
means, electronic or mechanical, including photocopying, recording or by any information storage
and retrieval system, without written permission from the author, except for the inclusion of brief
quotations in a review.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR


MAKE NO WARRANTIES OR REPRESENTATIONS REGARDING THE ACCURACY OR
COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL
WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A
PARTICULAR PURPOSE. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE
SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT
THE PUBLISHER AND AUTHOR ARE NOT ENGAGED IN RENDERING PROFESSIONAL
SERVICES SUCH AS LEGAL, ACCOUNTING OR OTHER. IF PROFESSIONAL ASSISTANCE IS
REQUIRED, A COMPETENT PROFESSIONAL PERSON SHOULD BE CONSULTED. NEITHER THE
PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HERE FROM.
THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A
CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN
THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE
ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE.
FURTHER, INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR
DISAPPEARED BETWEEN THE TIME THIS WORK WAS WRITTEN AND WHEN IT IS READ. NO
WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS.
FULFILLMENT OF EACH COUPON OFFER IS THE SOLE RESPONSIBILITY OF THE OFFEROR.

To order copies or to request permission to reprint, contact the publisher at


Womple, LLC Publishing, P.O. Box 210367, Columbia, SC 29221
or email: info@womplellc.com

ISBN 978-0-9818265-0-9

Printed in the United States of America.

Womple, LLC Publishing


P.O. Box 210367
Columbia, SC 29221

Back to Table of Contents


1
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

DEDICATED TO:

All the people of the world whose identity is at risk

Mom and Dad


For whom I will always love and cherish

Back to Table of Contents


2
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

“This Page Is Intentionally Left Blank.”

Back to Table of Contents


3
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Acknowledgments

I would like to extend my deepest appreciation to the dedicated team of family members,
advisors, consultants, businesses, friends, and countless others who unconditionally
contributed to and supported my efforts in the creation of this book.

Back to Table of Contents


4
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

About the Author

Murray Montgomery, Jr., CPP, is the Founder, President and CEO of Womple, LLC.
Womple, LLC is a leading consulting services company, headquartered in South Carolina,
specializing in educating and training individuals and businesses on how to protect their
privacy information.

Murray is a native South Carolinian and graduate of South Carolina State University,
where he earned a Bachelor of Science Degree in Education. He is board certified in
Security Management by the American Society for Industrial Security (ASIS) as a
Certified Protection Professional (CPP).

Murray is a law enforcement professional with over eighteen years of


experience protecting the citizens of the United States at the local, state and federal
level.

Murray is an Identity Theft Protection Expert, delivering effective identity theft


protection strategies in an informative and entertaining manner through keynote and
break-out presentations, workshops, seminars, and other learning platforms.

Murray is also the author of THE INFORMATION PROTECTOR: A Complete


Identity Theft Protection Resource Guide. The guide is packed full of helpful
identity theft protection information, tools and strategies

Murray believes passionately that by empowering consumers and businesses with


effective identity theft protection information, tools, and strategies…then and only then
will they be prepared to fight back against identity theft criminals and protect their credit,
reputation and good name.

Back to Table of Contents

Copyright @ 2018 Womple, LLC – All Rights Reserved. 5


Identity Theft Protection Strategies

Table of Contents
SECTION 1 ................................................................................................................................................... 9

DEFINITION OF IDENTITY THEFT .................................................................................................... 10

WHAT IS YOUR IDENTITY .................................................................................................................. 10

WHAT TYPE OF INFORMATION DO IDENTITY THIEVES WANT MOST.................................... 11

SECTION 2 ................................................................................................................................................. 12

HOW IDENTITY THIEVES GET YOUR IDENTITY INFORMATION .............................................. 13

HOW IDENTITY THIEVES USE YOUR IDENTITY INFORMATION .............................................. 14

SECTION 3 ................................................................................................................................................. 15

HOW TO AVOID BECOMING A VICTIM OF IDENTITY THEFT .................................................... 16

HOW TO KNOW WHEN YOU HAVE BECOME A VICTIM OF IDENTITY THEFT ....................... 19

STEPS TO TAKE IF YOU BECOME A VICTIM OF IDENTITY THEFT ........................................... 20

SECTION 4 ................................................................................................................................................. 22

HOW TO PROTECT ATM AND DEBIT CARDS ................................................................................. 23

HOW TO PROTECT BANK ACCOUNTS ............................................................................................. 25

HOW TO PROTECT MOBILE DEVICES ............................................................................................. 27

HOW TO PROTECT YOUR CHECKS................................................................................................... 37

HOW TO PROTECT YOUR COMPUTER............................................................................................. 38

HOW TO PROTECT YOUR CREDIT CARDS...................................................................................... 40

HOW TO PROTECT YOUR MAIL ........................................................................................................ 42

HOW TO PROTECT YOUR PASSWORDS .......................................................................................... 43

HOW TO PROTECT YOUR SOCIAL SECURITY NUMBER.............................................................. 45

HOW TO PROTECT YOUR TRASH ..................................................................................................... 47

HOW TO PROTECT YOUR WALLET/PURSE .................................................................................... 49

HOW TO PROTECT YOUR WIRELESS NETWORK .......................................................................... 50

Back to Table of Contents


6
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

SECTION 5 ................................................................................................................................................. 54

HOW TO REQUEST YOUR FREE ANNUAL CREDIT REPORT ....................................................... 55

HOW TO REMOVE YOUR NAME FROM MAILING LISTS ............................................................. 56

HOW TO REMOVE YOUR NAME FROM PRE-SCREENED CREDIT & INSURANCE OFFERS . 56

HOW TO BE REMOVED FROM TELEPHONE CALL LISTS ............................................................ 56

HOW TO BE REMOVED FROM EMAIL LISTS .................................................................................. 57

HOW TO REMOVE THE NAMES OF DECEASED INDIVIDUALS FROM MARKETING LISTS.. 58

SECTION 6 ................................................................................................................................................. 59

UNDERSTANDING THE IMPORTANCE OF AN IDENTITY THEFT REPORT............................... 60

HOW TO FILE A FEDERAL TRADE COMMISSION (FTC) ID THEFT COMPLAINT .................... 62

SECTION 7 ................................................................................................................................................. 63

HOW TO PLACE A SECURITY FREEZE ON YOUR EQUIFAX CREDIT FILE ............................... 64

HOW TO PLACE A SECURITY FREEZE ON YOUR EXPERIAN CREDIT FILE ............................ 65

HOW TO PLACE A SECURITY FREEZE ON YOUR TRANSUNION CREDIT FILE ...................... 66

HOW TO PLACE A SECURITY FRAUD ALERT ON CREDIT FILES .............................................. 67

SECTION 8 ................................................................................................................................................. 68

ID THEFT PROTECTION STRATEGIES FOR COLLEGE STUDENTS ............................................. 69

ID THEFT PROTECTION STRATEGIES FOR SENIORS.................................................................... 74

ID THEFT PROTECTION STRATEGIES FOR THE DECEASED ....................................................... 78

ID THEFT PROTECTION STRATEGIES FOR MILITARY PERSONNEL ......................................... 80

ID THEFT PROTECTION STRATEGIES FOR SOCIAL NETWORKING WEBSITES...................... 81

SECTION 9 ................................................................................................................................................. 83

IDENTITY THEFT VICTIM’S RIGHTS ................................................................................................ 84

SECTION 10 ............................................................................................................................................... 85

APPENDIX: HELPFUL RESOURCES LIST ........................................................................................ 86

Back to Table of Contents


7
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Introduction

IDENTITY THEFT…The Fastest Growing Crime in America!

THE INFORMATION PROTECTOR: A Complete Identity Theft Protection


Resource Guide was written to provide consumers and businesses with a single resource
to aid in minimizing their exposure to the crime of identity theft. The goal of this guide
is EMPOWERMENT! Once you are empowered, you will feel confident that you have
the information you need to fight back against this destructive crime

Below are some facts from the Federal Trade Commission (FTC) that will help you better
understand the importance of protecting your identity:

Almost 10 million Americans become victims of identity theft each year

Identity thieves attack businesses and people of all ages

Identity theft victims spend on average 120 hours and $3,000 to recover their
credit and good name

By using this guide, you will learn how to:

Protect your identity

Avoid becoming a victim of identity theft

Respond appropriately if your identity is stolen

Report identity theft properly and avoid legal problems

Restore your credit and good name

Back to Table of Contents


8
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

SECTION 1

Back to Table of Contents


9
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

DEFINITION OF IDENTITY THEFT


_________________________________________________________________

When someone obtains your personal identifying information (PII) name, address, social
security number, etc., without your permission to commit fraud or some other type of
crime.

WHAT IS YOUR IDENTITY


________________________________________________________________________

Listed below are several PII items that describe your identity:

Full name

Social Security number

Bank account numbers

Date of birth

Addresses

Mother’s maiden name

Automated Teller Machine (ATM) Personal Identification Number (PIN)

Credit card numbers

Driver’s license number

Telephone numbers

Email addresses

Username and Password

Medical information

Birth Certificate

Passport

Back to Table of Contents


10
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

WHAT TYPE OF INFORMATION DO IDENTITY THIEVES WANT


MOST
________________________________________________________________________

Anything you can do to keep criminals away from your personal data helps to reduce
your risk of identity theft. Following is a list of items identity thieves covet most:

Your name, address, and phone number(s)

Your date of birth

Your Social Security number

Your driver's license number

Your credit and debit card information

Your bank account information

Your mother's maiden name

Your username and password

Passport

Birth Certificate

Back to Table of Contents


11
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

SECTION 2

Back to Table of Contents


12
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW IDENTITY THIEVES GET YOUR IDENTITY INFORMATION


________________________________________________________________________

Steal your wallet or purse (driver’s license, credit/debit card, checkbook, etc.)

Steal mail from your unsecure home or work mailboxes

File a “Change of Address Request” with the postal service to re-route your mail

“Red-Flagging” – flip-up your unsecure home mailbox red flag to notify the
postal service person you have outgoing mail for pick-up

Burglarize your home, business, or automobile and remove items with your
personal identifying information (PII) on them

“Dumpster Diving” – steal/rummage through your trash for PII

“Pretexting” – fraudulent telemarketing calls and email messages to capture your


PII

“Skimming” – copy magnetic strip information from the back of your credit, debit,
ATM, and other plastic cards

“Shoulder Surfing” – use digital cameras and smart phones to capture your ATM
and point-of-sale terminal personal identification number (PIN) information

“Eavesdropping” – listen to your telephone and mobile phone conversations

“Computer Hacking” – hackers gain access to your computer to steal your PII

“Mobile Hacking” – identity thieves use malware and viruses to steal your PII
from your mobile devices (smart phone, eReader – iPad/Kindle, laptop, etc.)

Install malware or virus software to steal your PII (usernames, passwords, etc.)

Data lost or stolen from businesses, governments, and educational institutions

Collect credit, debit, and ATM card receipts

“War-Driving” – remotely steal your PII from your unsecure wireless network

“Evil Twinning” – create fraudulent websites on unsecure public wireless network


hotspots to steal your PII

Back to Table of Contents


13
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW IDENTITY THIEVES USE YOUR IDENTITY INFORMATION


________________________________________________________________________

Open new accounts in your name

“High Jack” existing accounts in your name

Obtain a driver’s license in your name

Obtain a passport in your name

Create counterfeit checks in your name

File for government benefits in your name

File for bankruptcy in your name

Make fraudulent withdrawals from your bank account

Purchase cars and furniture in your name

Set up utility services in your name

Create counterfeit debit and ATM cards in your name

Apply for credit cards in your name

Apply for loans and mortgages in your name

Apply for tax refunds in your name

Commit crimes in your name

Back to Table of Contents


14
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

SECTION 3

Back to Table of Contents


15
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO AVOID BECOMING A VICTIM OF IDENTITY THEFT


________________________________________________________________________

Place a “security freeze” on your credit file maintained by the three major credit
reporting agencies (Equifax, TransUnion, Experian)

Place a 90-day “fraud alert” on your credit file with one of the three major credit
reporting agencies (you only need to place it on one of the three and the others
will be contacted to do the same). To keep the fraud alert on your credit file, it
must be renewed every ninety (90) days

Put your wallet/purse on an “Identity Diet” (i.e. remove as many unnecessary


identity documents as possible from your wallet/purse and keep them in a secure
location – safe deposit box or locked container/draw)

Sign the back of all cards you receive from creditors (if not signed, creditors are
not legally obligated to honor reimbursement agreements for cards lost/stolen)

Provide your photo ID to merchants before they process your card payments

Photocopy all cards and identification documents (front and back) that you may
carry in your wallet/purse and keep the copies in a secure location – safe deposit
box or locked container/draw

Safeguard your debit, credit, and ATM cards

Purchase a “Cross-Cut or Micro-cut” paper shredder

Shred all documents before disposing them in your trash

Shred all old checks before disposing them in your trash

Shred all unused pre-approved credit card and insurance offers that you receive in
the mail before disposing them in your trash

Shred all letter, envelope and magazine address labels

Place a PIN or password on all accounts (bank, credit, debit, utilities, etc.), do not
share them with others and keep them in a secure location

Keep all usernames, PINs and passwords in a secure location and do not share
them with others

Back to Table of Contents


16
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Request all new and replacement cards and checks be sent to a secure mailbox or
your bank and not to your home address

Request your free annual credit report from each of the three major credit
reporting agencies (that’s a total of three per year). A good strategy is to request
one credit report every four months

Regularly monitor your credit file from each of the three major credit reporting
agencies to identify any fraudulent accounts or errors. Dispute them and have
them removed as quickly as possible…if not, they will affect your credit score

Cancel and close inactive accounts on your credit file

Reconcile all bank statements against your check book register

Limit the amount of personal identifying information (PII) you list on your checks
(no SSN, driver’s license number, telephone number, date of birth, etc.).
REMEMBER, your checks flow through many hands before being processed for
payment

Use an “anti-fraud” check writing pen when writing checks to prevent “check-
washing.” They often can be found at most office supply stores

Get a P.O. Box or install a “lock mailbox” at home

Deliver all outgoing mail to the post office. NEVER leave outgoing mail in your
unsecure mailbox at home (remember “red-flagging”)

Don’t talk to strangers on the phone

Don’t open email messages from strangers

Don’t click on unknown links or pop-up advertisements while browsing the


Internet

Don’t click on links sent to you in email messages

Request all billing statements be sent to you electronically. GO PAPERLESS as


much as possible (it minimizes the opportunity for identity thieves to steal your
mail)

Store all paper billing statements in a locked file cabinet or draw

Back to Table of Contents


17
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Pay bills online (as much as possible)

Never use public computers, public hotspots or public wireless networks for
personal use. Computers, public hotspots and wireless networks that are unsecure
can potentially expose you to malware and viruses that identity thieves use to
capture your usernames, passwords and other personal identifying information

Secure your computer by installing anti-virus, anti-spyware/malware and firewall


software and set them to update automatically

Install and use secure browsers when surfing the internet and set them to update
automatically

Set your computer operating system to update automatically

Opt out of receiving credit cards and convenient check offers

Opt out of receiving telemarketing calls

Opt out of receiving junk mail

List your telephone numbers on the Do Not Call list

Guard against “Shoulder Surfing”

Guard against “Eavesdropping” of calls

Back to Table of Contents


18
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO KNOW WHEN YOU HAVE BECOME A VICTIM OF


IDENTITY THEFT
________________________________________________________________________

Statements or other mail not arriving in your mailbox or email inbox on time or
not at all

Fraudulent accounts listed on your credit file

Receive fraudulent statements from unknown creditors

Merchants refusal to accept your checks for unknown reasons

Debt collectors calling about fraudulent delinquent accounts in your name

Denied credit, loans or job opportunities because of fraudulent delinquent


accounts listed on your credit file

Statements from medical providers for medical services you did not receive

Medical claims rejected for services that had already been reimbursed in your
name

Fraudulent information listed on your “Explanation of Medical Benefits”


statement

IRS denies your claim for a tax refund because one had already been issued in
your name

Social Security Statement list income from an unknown employer

Notified your privacy information was stolen because of a data breach incident

Unauthorized withdrawals from your bank accounts

Cancelled checks that don’t match your check book register

The police arrive at your door with an arrest warrant for a crime committed by
someone else using your name

Back to Table of Contents


19
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

STEPS TO TAKE IF YOU BECOME A VICTIM OF IDENTITY


THEFT
________________________________________________________________________

Document who, what, when, where, and how you became a victim

ORGANIZE! Establish an identity theft filing system to keep records of the


incident

Contact the three credit reporting agencies (Equifax, TransUnion and Experian)
and place a “security freeze” on your credit file. You can lift, re-freeze or remove
the security freeze on your credit file via the telephone or the internet using a PIN
provided by each of the three credit reporting agencies. You should keep your
PINs in a secure location

Contact one of the three credit reporting agencies and place an “initial” 90-day
fraud alert on your credit file (the company you call must tell the other two
companies about your alert). The initial fraud alert also allows you to order 1 free
copy of your credit report from each of the 3 credit reporting companies

Review them carefully for errors or fraudulent accounts. REMEMBER, it expires


in 90 days; therefore, if you want it to continue, you must renew it every 90
days…IT’S FREE

Request a FREE copy of your credit file from each of the three credit reporting
agencies

Submit an identity theft “victim statement” to the three credit reporting agencies
to be added to your credit file

Contact creditors and banks immediately and notify them of fraudulent activities.
Close any accounts that may have been compromised and establish new ones

If possible, place or change PIN(s) and/or password(s) on all accounts

File a complaint with the FTC at www.ftc.gov/complaint. Once you have


completed the complaint, it will generate a FTC ID Theft Affidavit

File a Police Report. Get a copy (preferred) or at a minimum, the number of the
police report

Back to Table of Contents


20
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Create an Identity Theft Report (FTC Affidavit + Police Report = Identity Theft
Report)

Once you have confirm you are a victim of identity theft and created an Identity
Theft Report, contact each of the three credit reporting agencies and request an
“extended” fraud alert be placed on your credit file. It will remain on your credit
file for seven (7) years and provide some additional protections…IT’S FREE

Send copies of original documents and all correspondence via certified mail
return receipt requested. Keep original copies of documents in a secure location

Keep a record of all monies spent and time lost recovering from being a victim

Regularly monitor your credit file. Contact one of the three credit reporting
agencies and set-up credit monitoring services. This is a PAID service

Back to Table of Contents


21
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

SECTION 4

Back to Table of Contents


22
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PROTECT ATM AND DEBIT CARDS


________________________________________________________________________

Keep your PIN a secret. Don't use your address, birth date, phone or Social
Security number as the PIN and try to memorize the number

Be cautious about disclosing your account number over the phone unless you are
dealing with a reputable company

Draw a line through blank spaces on debit slips above the total so the amount
cannot be changed

Don't sign a blank debit slip

Tear up carbons and save your receipts to check against your monthly statements

Cut up old cards and cut through the account number before disposing them

Open monthly statements promptly and compare them with your receipts. Contact
the issuer immediately if you detect any discrepancies

Keep a record (in a safe place separate from your cards) of your account numbers,
expiration dates, and the telephone numbers of each card issuer so you can report
fraudulent activity quickly

Don't carry your PIN in your wallet or purse or write it on your ATM or debit
card

Carefully check ATM or debit card transactions before you enter the PIN or
before you sign the receipt

If you have access to your bank account online, check your ATM or debit card
account activity frequently

If your debit or ATM card is lost or stolen, contact the issuer immediately and
follow up in writing. Request a new card with a different number, PIN and
password. If possible, have the new card sent to your bank for pick up instead of
having it mailed to your home

Safeguard your PIN from “shoulder surfers”. These are people who attempt to
obtain your PIN by looking over your shoulder while you are entering it in an

Back to Table of Contents


23
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

ATM or point-of-sale terminal. Also, occasionally they will use a cell phone or
digital camera to obtain your PIN

Protect your ATM and debit card from a concept known as “skimming”. Identity
thieves will swipe your ATM or debit card through a magnetic strip card reader
device known as a “skimmer” to capture your personal information embedded on
the magnetic strip printed on the back of your ATM or debit card. The
information can then be used to create a fraudulent card

Scan your surroundings before using an ATM. Look for suspicious persons in the
area. If you see any, leave immediately and go to another ATM

Don’t use ATMs in non-banking locations. These ATMs may have a pen-size
camera attached, phony keypads, or skimmers to capture your personal
information and PIN

Back to Table of Contents


24
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PROTECT BANK ACCOUNTS


________________________________________________________________________

Regularly monitor your bank account. If possible, try to use online banking as
much as possible. It allows for regularly monitoring of your bank account
between monthly statements

Eliminate bank statements sent to you by mail. Request your bank statements be
sent to you electronically. GO PAPERLESS

Limit the amount of personal identifying information printed on checks. No


driver’s license, social security number, address or telephone number

Guard your check book and keep it in a secure location

Make a copy of a check and keep it in a secure location. You may need the
information on the bottom (bank routing number and account number) to fight
check fraud

Use an “anti-fraud” check writing pen when writing checks to prevent “check-
washing”. They often can be found at most office supply stores

If your check book is lost or stolen, contact your bank immediately. Close the
account, open a new one and place a PIN/password on the new account. Also,
request the bank contact the check verification service with which it does business
to stop retailers from excepting your lost/stolen checks

Fraudulent Electronic Withdrawals

If your ATM or debit card is lost or stolen, report it immediately because the
amount you can be held responsible for depends on how quickly you report the
loss

If you report the loss or theft within two business days after discovery, your losses
are limited to a maximum of $50. Most financial institutions will waive the $50
fee

If you report the loss or theft after two business days of discovery, but within 60
days after the unauthorized electronic withdrawal appears on your statement, you
could lose up to a maximum of $500. Most financial institutions will not waive
this fee

Back to Table of Contents


25
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

If you wait more than 60 days to report the loss or theft after receiving your
monthly statements, you could lose all the money that was taken from your
account after the end of the 60 days. It is critical to regularly monitor your
accounts and statements

Fraudulent Checks and Other "Paper" Transactions

In general, if an identity thief steals your checks, you need to stop payment, close
the account, open a new one, place a PIN/password on the new account and ask
your bank to notify ChexSystems, Inc. and the check verification service with
which it does business

Back to Table of Contents


26
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PROTECT MOBILE DEVICES


________________________________________________________________________

7 Steps to Secure Your Mobile Device

1. Configure mobile devices securely

Enable auto-lock

Enable password protection and create complex passwords (including letters,


numbers and symbols)

Avoid using auto-complete features that remember user names or passwords

Ensure your Internet browser security settings are configured appropriately

Enable remote wiping of all data stored on a mobile device

Ensure that Secure Sockets Layer (SSL) protection is enabled, if available

2. Connect to secure Wi-Fi networks and disable Wi-Fi when not in use

Disable features not currently in use such as Bluetooth, infrared, or Wi-Fi

Set Bluetooth-enabled devices to non-discoverable to render them invisible to


unauthenticated devices

Avoid joining unknown Wi-Fi networks

3. Update mobile devices frequently. Select the automatic update option if


available

Maintain up-to-date software, including operating systems and applications


and have them update automatically

4. Utilize anti-virus/anti-malware programs and configure automatic updates if


possible

Install anti-virus/anti-malware software as it becomes available

Back to Table of Contents


27
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

5. Use an encryption solution to keep portable data secure in transit

Data protection is essential. If confidential data must be accessed or stored


using a mobile device, make sure you install an encryption solution

Whenever possible, you should avoid using or storing confidential data on a


mobile device

6. Take appropriate physical security measures to prevent theft or enable


recovery of mobile devices

For laptops, use cable locks

Use tracing and tracking software

Never leave your mobile device unattended

Report lost or stolen devices immediately

Remember to back up data on your mobile device on a regular basis

7. Use appropriate sanitization and disposal procedures for mobile devices

Delete/wipe all information stored on a mobile device prior to discarding,


exchanging, or donating it

Other Mobile Device Security Tips

Do not “jail-break” or use a “jail-broken” phone

Read the “small print” before installing an app on any mobile device. Know what
you're downloading

Make sure you download apps from reputable developers

Review the information the app requires access to before downloading it

Install a “phone finder” app to locate a smart phone if loss/stolen

Enroll in a backup / wiping program

Limit your activities while using public Wi-Fi. Public Wi-Fi is NOT secure

Back to Table of Contents


28
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Check URLs before making a purchase using your mobile devices. Any secure
URL site should start with “https”

Be cautious when opening e-mail and text message attachments or clicking on


links

Avoid opening files, clicking links, or calling numbers contained in unsolicited e-


mails or text messages

Be aware of current threats affecting mobile devices

Security Tips For Apple iPhone, Android And Blackberry Smart Phones

Apple iPhone

Turn off the simple passcode feature so you can enter more than a 4-digit
passcode

Set the Auto Lock feature to require a new passcode after a set period of time.
Recommendation –maximum 5 minutes

In conjunction with Auto Lock, also set the Require Passcode feature, which
activates after the display has been idle for a certain period of time or if you press
the iPhone Sleep button. You will be required to enter a passcode on wakeup

Enable Data Erase by setting the number of failed passcodes that can be entered
prior to all data being erased from the phone. Recommendation – maximum 10
attempts

Set up "Find my iPhone" to help you locate your phone if it’s lost/stolen and to
remotely wipe information from the iPhone

Only connect to networks you trust. To ensure you don't randomly connect to any
available Wi-Fi networks, set the "Ask to Join Networks" function

For applications that contain sensitive data, set a separate passcode (different than
any others you are using) for each application

Delete any messages with sensitive information

Only download applications from the Apple App Store

Apple's iCloud service offers backup for your Apple devices with iOS6. Once you

Back to Table of Contents


29
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

set the service up, it encrypts your data and backs up daily as long as you are
connected to the Internet via Wi-Fi, are connected to a power source and have
your screen locked

Apple provides updates to the operating system, which may contain security
patches. To receive the latest updates, connect to iTunes. If you are running iOS5
or greater, you can receive these updates over the air by using
Settings/General/Software Updates

Android

Create a password that is easy for you to remember, but difficult for others to
guess

Set the "Lock phone after" feature (Note: feature names may differ depending on
your device) to require a new password after a set period of time.
Recommendation – maximum 5 minutes

Turn off the "Visible Passwords" feature to keep your password from displaying
on the screen so others can't easily learn your password

Turn off "use secure credentials" which automatically allows applications to


access secure certificates and credentials

Turn off "Wi-Fi" when you are not connecting to a secure wireless network to
ensure you don't inadvertently connect to an unsecure wireless network

Download applications only from trusted app stores such as the Android Market
or the Amazon App Store

There are other app stores selling Android apps; take the time to research them
prior to downloading

Delete any messages with sensitive information

Set a separate password for every application you access that contains sensitive
data or information

Google provides updates to the Android operating system, which may contain
security patches. Check with your service provider or the manual that came with
your device for information on how to get the most recent updates

Set security updates to update automatically

Back to Table of Contents


30
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Blackberry

Enable Password Protection

Follow the menu through Options - Security Options - General Settings. This is
where you set the password to enable. Using this menu, you can also set the
number of password attempts and security timeout

Encrypt Data

Follow the menu through Options - Security Options - General Settings - Content
Protection, set the value as enable and select the strength to strong, stronger or
strongest

Clearing Memory

This option lets you delete sensitive data such as unencrypted email messages and
user ID /password combinations. Follow the menu through Options - Security
Options - Memory Cleaning

Secure Passwords with the Password Keeper Utility

This is an important tip, NEVER save user ID and passwords on your BlackBerry

Blackberry Protect Software

BlackBerry Protect is a free application designed to help find your lost


BlackBerry smart phone, and keep the information on it secure. You can use this
software to:

1. Find a lost or stolen blackberry device


2. Lock your blackberry device remotely
3. Backup your blackberry data (daily, weekly or monthly)
4. Remotely wipe sensitive data from your blackberry

Back to Table of Contents


31
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Tablet Computers

Apple iPad

Turn On Passcode Lock

Your iPad is just as powerful as your laptop or desktop. Your iPad is only
encrypted when you enable the passcode features (Settings/General)

Turn Simple Passcode to Off

Rather than using only an easy to crack 4-digit passcode, create a full-fledged
alphanumeric password (letters, numbers, and symbols)

Require Passcode Immediately

Set your iPad to automatically lock into passcode mode anytime you leave it
alone for a few minutes

Set Auto Lock to 2 Minutes

Secure your iPad by setting the auto lock feature to 2 minutes (the minimum
allowed). This will minimize the opportunity for anyone to gain access to
information on your iPad when not in use

Turn Erase Data after 10 Tries to On

This setting wipes out all iPad data after 10 failed passcode attempts

Never Use a Password Manager

Keeping your passwords in an unencrypted keychain or document is a recipe for


complete financial disaster. This is an important tip, NEVER keep your
passwords stored in software applications

Avoid Untrustworthy Apps

Not all applications are friendly. Despite Apple’s well-designed vetting process,
there are still malicious apps that slip through the cracks to siphon data out of
your device

Back to Table of Contents


32
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Other iPad Security Tips

Don’t jail-break your iPad to download Apps outside of iTunes. Short-term gain
equals long-term risk

Turn On “Ask to Join Networks” when you have Wi-Fi turned on

Turn off "Wi-Fi" when you are not connecting to a secure wireless network to
ensure you don't inadvertently connect to an unsecure wireless network

Turn On “Location Services” and turn on “Find My iPad”

Under the “General” tab, keep the Bluetooth feature turned “off” until necessary

Set the “require passcode” to “immediately”

Under the “iCloud” tab, set the “Find My iPad” to on. This allows you to locate
your iPad on a map and remotely lock or erase all data if necessary

Keep your iPad software updated

Samsung Galaxy

Secure with a PIN or password

To activate it, go to Settings menu, select the location and security

In the submenu Lock screen, enter the Configuration screen key, and select a PIN
or password. Although both must consist of at least 4 characters, the PIN only
allows you to enter numbers, while the password will allow you to enter letters
only, numbers only, or a combination of both

As with your ATM PIN, do not use birth dates, home address, or other personal
identifying information, which is easy for someone to get or guess

Secure using the pattern feature

To activate it, go to Settings menu, select the location and security

In the submenu Lock screen enter the Configuration screen key select Pattern

On the next page will display 3 x 3 points that you can draw a line forming an
image with a specific pattern, with a minimum number of 4 points

Back to Table of Contents


33
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Feature profiles on the locked screen

To activate it, go to Settings menu, select the location and security

In the submenu Lock screen, enter the Configuration screen key, select the Owner
information, check the box “show info on the owner of the lock screen”, and enter
your brief data in the appropriate boxes

Amazon Kindle

Password protect your Kindle

From the Home screen, press the Menu button

Scroll down and select Settings

Go to Device Password at the bottom of the list

Scroll down until the words “turn on” are highlighted and select it. A Set
Password window will appear

Enter the password you want to use, and type it again to confirm it

Enter a password hint

Click Submit

Set the Maximum Personal Document Charge

You can set the maximum charge allowed for a single personal document sent
wirelessly to your Kindle. Any personal document that exceeds this charge will be
sent to your @free.kindle.com address and a notification will be sent to your
Kindle. We recommend setting the maximum personal document charge to $0 so
you never incur unknown or unwanted charges

Login to your Amazon Kindle account and click Personal Document Settings in
the left navigation panel

In the Maximum Personal Document Charge section, click Change

Set the maximum charge amount

Click Update limit

Back to Table of Contents


34
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Set the Approved Personal Document Email List

Login to your Amazon Kindle account and click Personal Document Settings in
the left navigation panel

In the Approved Personal Document Email List section, click Add a new
approved email address

Enter an email address, and then click Add Address

Scam Alert: Mobile Devices And Texting Scams

Where do the criminals get mobile phone numbers to send scam text messages?

They purchase it off of black-market sites on the Internet

You give your mobile number away to enter contests, vote on reality shows, etc.

You post it on your Facebook profile for everyone to see

Data hijackers hack into databases containing millions of mobile numbers

Most likely, the thieves simply use a computer to automatically generate a text to
every potential mobile phone number possible (a computer can make about a
million guesses a second)

What can you do to protect yourself and your phone?

If you receive a text message from any number you don’t know, don’t open it,
forward it or respond to it. Instead, immediately delete the text message

If you accidentally click on the link attached to a text message, NEVER fill out a
form requesting information or call a phone number included in the message

Place your mobile number on the national DO NOT CALL list

Stop sharing your mobile phone number except in crucial situations and with
trusted contacts

Remember when you text to vote, enter sweepstakes or take surveys via text, they
are harvesting your phone number

Resist the urge to post your mobile number on your Facebook wall or profile

Back to Table of Contents


35
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Mobile Malware

Mobile malware is a rising threat to privacy and security. What is mobile malware?

Mobile malware is a malicious program especially created to wreak havoc on


your phone. Once installed on your device, it may disrupt the phone’s system, in
order to gather information stored on the device. It may also gain access to the
device’s operating system, and take over the phone

Mobile malware may present itself through fake mobile applications, web-
browsing, and SMS/Text messages such as:

App-based malware attacks: may target a user’s financial information. This


might include bank account numbers, passwords, and PINs. The access of
such information may result in the loss of money and/or account take-over

Web-based smart phone attacks: may result by clicking on an unsafe link.


This may potentially give rise to “Phishing” scams or downloading infected
files

SMS/Text message-based attacks: can also be used to spread malware through


unsolicited SMS/texts that request the user to reply or click on a link.
Unknown to the user, malware may be installed to the device, leading to
unauthorized access to the device’s information

Back to Table of Contents


36
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PROTECT YOUR CHECKS


________________________________________________________________________

Never let merchants write your social security number on your checks. It's illegal
in many states

Limit the amount of information printed on your checks. Do not include your
address, social security number, driver's license number, date of birth or phone
number on your checks. Recommendation: only have your name printed on your
checks. Merchants will ask for additional identity information if needed

When ordering checks, if possible, request new checks be delivered to your bank
for pick up instead of having them mailed to your home address

Don't leave envelopes containing payments in an unsecure home or office


mailbox for pickup, in a car, or in any other place where they might be stolen

Deliver all outgoing mail to the Post Office rather than placing it in an unsecured
mailbox at home or at work

Use a check fraud prevention pen, like Uni-Ball 207, when writing checks to
prevent identity thieves from “washing” the ink from your checks, thus preventing
the checks from being altered

Shred all old checks and their carbon copies before disposing them

Keep your checks and check book in a secure location

Limit the use of checks as much as possible. Instead, use your bank’s online-
banking bill pay service

Back to Table of Contents


37
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PROTECT YOUR COMPUTER


________________________________________________________________________

Install virus, spyware and malware protection software. Set them update
automatically

Set your computer operating system to update automatically when security repairs
and patches are recommended from your computer operating system’s website

Do not download files from strangers or click on hyperlinks from people you
don’t know. Opening a file could expose your system to a computer virus or a
program that could hijack your computer or modem

Do not respond to e-mails purporting to be from your bank, a government office,


or other entities that requests your banking access credentials such as user IDs,
passwords, PINs, etc. Always verify, first, before sharing such information

Use a firewall, especially if you have a high-speed, or “always on,” connection to


the Internet, such as DSL or cable. The firewall allows you to limit uninvited
access to your computer. Without a firewall, hackers may be able to take over
your computer and access sensitive information

Use a secure browser when accessing the internet. Secure browsers allow you to
communicate with websites in a protected session by encrypting information that
flows between you and the site. To verify your session is secure, look for https:
instead of http: in the URL address line, and a secure symbol (for example, closed
padlock or key) on the status bar of your browser located on the lower part of the
screen. For greater security when viewing your account information via the
Internet, we recommend you use a browser with 128-bit encryption

Limit financial information on your computer or other mobile devices. If you


must store this information on these devices, use a “strong” password – that is,
eight or more characters, including a combination of letters (upper and lower
case), numbers, and symbols

Avoid using an automatic login feature that saves your user name and password

Always logout of websites requiring your username and password

Enable the “time out” feature that locks your computer when it is unattended

Back to Table of Contents


38
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Never leave your computer unattended while using any online banking or
investing service

Do not access your bank, brokerage, or other financial services information at


Internet cafes, coffee shops, public libraries, airports and other public WI-FI
locations. Malicious software may be installed on these wireless networks to trap
your account numbers, usernames and passwords, leaving you vulnerable to being
a victim of fraud

Never share your password or PIN with anyone and never write down your
password/PIN where others may find it. When selecting a password, don’t use
information easily linked to you (including your date of birth, pet’s name, social
security number, mother’s maiden name, etc.). Change your password frequently
for greater protection

Delete any personal information stored on your computer before you dispose of it.
Use a “wipe” utility program that overwrites the entire hard drive and makes the
files virtually unrecoverable. Do not rely on the "delete" function to remove files
containing sensitive information

Setup your computer to request a unique “strong” password to gain access. Select
a password that you do not use to access other accounts

Setup your computer to go into password-required “sleep” mode after at a


maximum of five minutes of inactivity

Back to Table of Contents


39
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PROTECT YOUR CREDIT CARDS


________________________________________________________________________

Keep an eye on your credit card every time you use it, and make sure you get it
back as quickly as possible. Try not to let your credit card out of your sight
whenever possible

Don't give out your account number over the phone unless you initiate the call.
Never give your credit card info out when you receive a phone call. Legitimate
companies don't call you to ask for a credit card number over the phone

Never respond to emails requesting your credit card information and don't ever
respond to emails that ask you to go to a website to verify personal or credit card
information

Never provide your credit card information on a website that is not a secure site

Sign your credit cards as soon as you receive them

Shred all pre-approved credit card applications you receive that you don’t plan to
use

Don't write your PIN number on your credit card or have it anywhere near your
credit card (in the event that your wallet or purse is lost or stolen). Try your best
to memorize your PIN

Never leave your credit cards or receipts lying around

Shield your credit card number so that others around you can't copy it or capture it
on a cell phone or camera

Photocopy the front and back of all cards and keep the copies in a secure place.
These copies should include all your cards account numbers, expiration dates,
customer service numbers, and credit verification numbers. Update this list each
time you receive a new credit card

Only carry credit cards that you absolutely need. Don't carry extra credit cards
that you rarely use

Check your credit card statements promptly to detect any fraudulent charges. Save
your receipts so you can compare them with your monthly statements

Back to Table of Contents


40
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

If you find any charges that you don't have a receipt for -- or that you don't
recognize -- report these charges promptly (and in writing) to the credit card
issuer

Shred anything with your credit card number written on it

Never sign a blank credit card receipt. Carefully draw a line through blank
portions of the receipt where additional charges could be fraudulently added

Carbon paper is rarely used these days, but if there is a carbon that is used in a
credit card transaction, destroy it immediately

Never lend your credit card to anyone else

If you move, notify your credit card issuers in advance of your change of address

What To Do If Your Credit Cards Are Lost or Stolen

If your credit cards are lost or stolen, contact the issuer(s) immediately

Most credit card companies have toll-free numbers and 24-hour service to deal
with these emergencies

According to US law, once you have reported the loss or theft of your credit card,
you have no more responsibility for unauthorized charges. Further, your
maximum liability under federal US law is $50 per credit card -- and many credit
card issuers will even waive that fee for good customers

Write to the creditor at the address given for "billing inquiries," NOT the address
for sending your payments. Include your name, address, account number, and a
description of the billing error, including the amount and date of the error

Send your letter so that it reaches the creditor within 60 days after the first bill
containing the error was mailed to you. If an identity thief changed the address on
your account and you didn't receive the bill, your dispute letter still must reach the
creditor within 60 days of when the creditor would have mailed the bill. This is
one reason it's essential to keep track of your billing statements, and follow up
quickly if your billing statements don't arrive on time

You should send your letter by certified mail, and request a return receipt. It
becomes your proof of the date the creditor received the letter. Include copies
(NOT originals) of your police report or other documents that support your
position. Keep a copy of your dispute letter

Back to Table of Contents


41
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PROTECT YOUR MAIL


________________________________________________________________________

The U.S. Postal Inspection Service (USPIS) is the law enforcement arm of the U.S. Postal
Service that investigates cases of identity theft. You can locate the nearest USPIS district
office by visiting http://postalinspectors.uspis.gov

Listed below are strategies to protect your mail:

Use a secure locking mailbox or a P.O. Box to receive incoming mail

Never place outgoing mail (at work or at home) in an open, unlocked mailbox.
Take all outgoing mail to the post office. Also, during long absences, have mail
held at the post office until you return

Go PAPERLESS! Try and have as many of your bills and other statements sent
to you electronically (via email)

Make a list of all monthly bills and other statements and their expected delivery
date. Investigate immediately if bills or statements do not arrive on time. An
identity thief may have submitted a “Change-of-Address” request in your name to
the postal service re-routing your incoming mail

Never discard in the trash pre-approved credit and insurance offers and other mail
with your personal identifying information listed on it. Always SHRED them
first to prevent becoming a victim of identity theft by “dumpster-divers”

Never flip-up the “red flag” on your unsecure mailbox at home to alert the postal
employee you have outgoing mail for pickup. This also alerts identity thieves to
the possibility that valuable outgoing mail is available for the taking

Never leave mail lying around in your house for others to see. Place all unopened
mail in a secure location until you are ready to open and process it

Remove labels and your address from magazines, letters and “junk mail” and
shred them before discarding them in the trash

Opt-out of receiving pre-approved credit and insurance offer at


www.optoutprescreen.com or call 1-888-5OPTOUT (1-888-567-8688)

Limit the amount of unwanted “junk mail” you receive by removing your name
and email address from member companies of the Direct Marketing Association
(DMA) mail preference service at www.dmachoice.org

Back to Table of Contents


42
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PROTECT YOUR PASSWORDS


________________________________________________________________________

Useful Tips to Help Secure Passwords:

Do not write or copy your password on paper

Avoid storing passwords on your computer or other electronic devices

Create passwords that are easy to remember but difficult to guess by others by
using a combination of upper and lower-case letters, numbers, and symbols
(minimum eight characters long)

Avoid using passwords that contain any form of your name or the names of
family members, children, mother’s maiden name, friends, pets, celebrities,
birthdays, hobbies, sports teams, etc.

Avoid using passwords that contain any information that would be easily
available from your social networking sites (Facebook, Twitter, etc.) such as an
address, telephone number, date of birth, city of birth, high school, etc.

Avoid using passwords that contain commonly known titles of songs, books,
movies, books, poems, etc.

Avoid using the same password for all systems

Change your passwords frequently

Passwords should never be sent in email or text messages or shared with anyone
over the phone

Passwords should never be shared with anyone, including family members or co-
workers

If your financial institution uses the last four digits of your social security number
as your default PIN, change it

Memorize all your passwords. Don't record them on anything you carry in a
wallet or purse

Ask financial institutions to add extra security to your account by requiring an


additional PIN or password

Back to Table of Contents


43
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Password-protect computer files that contain sensitive personal or account data

Shield your hand at an ATM or when making long distance calls with a phone
card. Shoulder surfers may be nearby with binoculars or cameras

Avoid giving personal data by phone in a public place

Back to Table of Contents


44
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PROTECT YOUR SOCIAL SECURITY NUMBER


________________________________________________________________________

Your social security number (SSN) is the key to cloning your identity. Take the
following precautions:

Do not carry your social security card in your wallet/purse. Avoid carrying cards
that display your SSN — such as health insurance cards, military ID card, etc.
unless needed to receive services

Never give your SSN, credit card number, or other personal data by phone unless
you have an existing relationship with the business or agency AND you initiated
the call using a verified phone number. Always verify the other party's
authenticity

Avoid including your SSN on job applications. Provide it only when absolutely
necessary — for tax, employment, and student records; and stock and property
transactions

If a government agency requests your SSN, look for an accompanying Privacy


Act Notice indicating whether an SSN is required, how it will be used, and what
happens if you don't provide it

If someone has misused your SSN or other personal information to create credit
or other problems for you, the Social Security Administration cannot resolve these
problems

Should you get a new Social Security number?

If you have done all you can to fix the problems resulting from misuse of your SSN and
someone still is using your number, the Social Security Administration may assign you a
new number. You cannot get a new SSN under the following conditions:

To avoid the consequences of filing for bankruptcy

If you intend to avoid the law or your legal responsibility; or

If your social security card is lost or stolen, but there is no evidence that someone
is using your number

If you decide to apply for a new number, you will need to prove your age, U.S.
citizenship, or lawful immigration status and identity. For more information, ask for Your
Social Security Number and Card (http://www.ssa.gov/pubs/10002.html) (Publication
Number 05-10002).

Back to Table of Contents


45
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

You also will need to provide evidence that you still are being disadvantaged by the
misuse. Keep in mind that a new number probably will not solve all your problems. This
is because other governmental agencies (such as the Internal Revenue Service and state
motor vehicle agencies) and private businesses (such as banks and credit reporting
companies) likely will have records under your old number.

Also, because credit reporting companies use the number, along with other personal
information, to identify your credit record, using a new number will not guarantee you a
fresh start. This is especially true if your other personal information, such as your name
and address, remain the same.

If you receive a new SSN, you will not be able use the old number anymore.

For some victims of identity theft, a new number actually creates more problems. If the
old credit information is not associated with the new number, the absence of any credit
history under the new number may make it more difficult for you to get credit.

Contacting the Social Security Administration

The Social Security Administration’s website is a valuable resource for information.

In addition to using the website, you can call toll-free at 1-800-772-1213. Customer
Service Representatives (CSR) can answer specific questions from 7 a.m. to 7 p.m.,
Monday through Friday. Information can also be provided by automated phone service
24 hours a day. (You can use the automated response system to update a new address or
request a replacement Medicare card.) If you are hearing impaired, you may call TTY
number, 1-800-325-0778.

Back to Table of Contents


46
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PROTECT YOUR TRASH


________________________________________________________________________

Listed below are several identity items that should NEVER be thrown in the trash
before they are shredded:

Pre-approved credit card and insurance offers

Credit/debit card receipts

Convenience checks from credit card companies

Pay stubs

Copies of mortgage and loan documents

Utility bills

Social Security Annual Statements

Phone bills

Credit card statements

Cell phone bills

Cancelled checks

Insurance/medical statements

Bank statements

Car registration/insurance information

Brokerage statements

Expired driver’s licenses

Copies of tax records or notes

Expired credit cards

Back to Table of Contents


47
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Magazine/envelope labels with your name and address

Additional information to protect your trash:

Purchase a crosscut/microcut shredder instead of a horizontal shredder to shred


your identity documents

Don't discard sensitive documents at work unless you're sure they'll be shredded
properly

If possible, take your trash out just before it is due to be collected. Don't give
identity thieves time to go through your trash

Back to Table of Contents


48
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PROTECT YOUR WALLET/PURSE


________________________________________________________________________

Avoid carrying the following items in your wallet or purse:

Your Social Security card (or those of your dependents)

Your birth certificate

Your passport

Your military identification card

A driver's license or insurance card with your SSN (or that of a family member)

A list of your banking information (PINs, logins, passwords, or account numbers)

Paychecks or pay stubs

Deposit slips

More than two credit or debit cards

Receipts with your full credit card number displayed

Make a photocopy or list in writing the front and back of all identity documents that you
may carry in your wallet or purse and store this information in a secure location like a
safe deposit box or a secure home safe.

Back to Table of Contents


49
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PROTECT YOUR WIRELESS NETWORK


________________________________________________________________________

Important Default Settings Information

The factory default user name and password for access to most routers is well known
publicly, and can easily be found by searching the Internet. So is the default SSID (the
name that is publicly broadcast by the wireless transmitter to identify your network to any
user that wishes to connect their computer to your network). These default settings should
be reset immediately, preferably during the initial setup, to secure your wireless network

Steps to Secure and Protect Your Wireless Network

Always reset the administrator default user name and password

Use a strong password for the administrator password (eight or more


characters…including a mix of letters, numbers, and special characters)

Always reset the SSID (Service Set Identifier) to a new name. It is also smart to
pick a name that does not identify your family or business, since the SSID will be
visible to any wireless computer within range

Disable remote management of the router. As a rule, unless you absolutely need
this capability, it’s best to keep remote administration turned off. It’s usually is
turned off by default, but it’s always a good idea to check

Ensure that the router firewall is enabled

Ensure that wireless encryption is enabled. All wireless devices that connect to
your network must use the same type of encryption, such as WPA, WPA2, WEP,
etc. If at all possible, use one of the newer standards, such as WPA2, or WPA,
which are much harder to decrypt/hack than the earlier WEP standard

After setting a wireless “key” for the router (eight or more characters…including
a mix of letters, numbers, and special characters), protect it by storing it in a
secure location. It is the password that will allow anyone in range of your wireless
transmitter to easily join your network

Ensure firewall software is enabled on each computer with access to your network,
both those with wired and wireless capability

If possible, locate the router in a central part of the home or business. In addition
to providing the best average coverage for your intended wireless devices, this

Back to Table of Contents


50
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

also limits the exterior coverage of the wireless transmitter. This decreases the
possibility that an unauthorized user will be physically close enough to query your
wireless network

Turn off the router when you are away from your home or business for an
extended period of time. Hackers cannot access a wireless router when it is turned
off

Check online to see if the router model you are considering provides a thorough
user manual. You should be able to download a PDF user manual that is thorough
in explaining the setup and operation of your intended purchase, especially the
security, encryption, and firewall settings available to you to protect your network

Set your computer operating system, antivirus and malware software programs to
update automatically with security patches and new virus definitions. Your
antivirus, malware and personal firewall software must be enabled. A secure
wireless network will do little if your computer is open to viruses, malware, pop-
ups, and other threats that can be imported through your firewall by ordinary web
browsing and email

STEPS TO PROTECT YOURSELF WHEN USING PUBLIC Wi-Fi

When using a public Wi-Fi hotspot, only log in or send personal information to
websites that you know are fully encrypted. If you think you’re logged into an
encrypted site but find yourself on an unencrypted page, log out immediately

Don’t use public Wi-Fi networks to access personal accounts (banking, credit card,
etc.) requiring sensitive information. But if you must, make sure it is an encrypted
website. When you’ve finish using an account, log out and close the browser
immediately

Do not use the same password on different personal accounts. If you use the same
password for all accounts, it could give someone who gains access to one of your
accounts, access to others

Many web browsers alert users who try to visit fraudulent websites or download
malicious programs. Pay attention to these warnings, and keep your browser and
security software up-to-date

If you regularly access online accounts through public Wi-Fi hotspots, use a
virtual private network (VPN). VPNs encrypt traffic between your computer and
the Internet, even on unsecured networks. You can obtain a personal VPN account
from a VPN service provider

Back to Table of Contents


51
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Some Public Wi-Fi networks do use encryption: WEP and WPA are the most
common. WPA2 is the strongest. WEP is the weakest. You can tell if a public
Wi-Fi is using encryption, because a network “key” will be required to gain
access to the network

8 COMMON MISTAKES WHEN SETTING UP A WIRELESS NETWORK

Not reading user manuals

Your Wi-Fi setup depends on the router you have and the devices you want to
connect. Thus it’s essential to read the respective user manuals and follow their
instructions. Some of the following mistakes can be avoided simply by reading
manuals

Using default passwords

Your wireless router comes with a default password for its administration
interface. The password is required to log into the device and configure countless
critical settings. To avoid damage it’s essential to secure this area by replacing the
default password with a strong password (eight or more characters…including a
mix of upper and lower-case letters, numbers, and special characters)

Failing to turn on Wi-Fi transmission

Most mobile devices (laptops, mobile phones, eReaders, etc.) have buttons or
software settings that allow you to turn on or off wireless transmissions. Make
sure your device Wi-Fi option is turned on when connecting to a Wi-Fi network.
Failing to do so will prevent you from locating and connecting to a wireless
network

Mixing or excluding wireless standards

There are several wireless standards or Wi-Fi technologies available: 802.11a,


802.11b, 802.11g, 802.11n and 802.11n, are the latest standards and support
higher bandwidths as well as multiple wireless signals and antennas (MIMO
technology)

In general, it’s best not to mix wireless standards. Select one that supports all of
your wireless devices. You’ll see the best performance, if all connected devices
"speak the same language"

Using “outdated” encryption standards

New devices support different forms of WPA (Wi-Fi Protected Access)


encryption. The old encryption standard WEP (Wired Equivalent Privacy) should
be avoided because it’s easily cracked

Back to Table of Contents


52
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Badly configured firewall

One of the main reasons a computer won’t connect to a wireless network is a


firewall that denies the connection. To test this, simply turn off the firewall and
try again. If the firewall was the cause, learn how to configure it properly

Spelling

Another mistake could be transposed digits or wrong spelling of manually entered


IDs, passwords, etc. that are required to setup the network or connect a device.
When you’re receiving a signal, but cannot connect, make sure your encryption
key (hopefully some type of WPA) is correct

Not using any security

Your data is transmitted over the air and it is an easy target for anyone trying to
spy on you or hack into your system. Apply effective security measures when
securing your wireless network. Change the default passwords to a strong
passwords (eight or more characters…including a mix of upper and lower-case
letters, numbers, and special characters). Use Wi-Fi Protected Access (WPA)
encryption and make sure your firewall is configured properly and turned on

Back to Table of Contents


53
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

SECTION 5

Back to Table of Contents


54
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO REQUEST YOUR FREE ANNUAL CREDIT REPORT


________________________________________________________________________

The Fair Credit Reporting Act (FCRA) requires each of the nationwide consumer
reporting companies — Equifax, Experian, and TransUnion — to provide you with a free
copy of your credit report, at your request, once every 12 months. The Federal Trade
Commission (FTC), the nation’s consumer protection agency, enforces the FCRA with
respect to consumer reporting companies

A credit report includes information on where you live, how you pay your bills, and
whether you’ve been sued or arrested, or have filed for bankruptcy. Nationwide consumer
reporting companies sell the information in your report to creditors, insurers, employers,
and other businesses that use it to evaluate your applications for credit, insurance,
employment, or renting a home

The three nationwide consumer reporting companies have set up a central website, a toll-
free telephone number, and a mailing address through which you can order your free
annual credit report

ONLINE:

Request your free annual credit report online at www.annualcreditreport.com

BY PHONE:

Call 1-877-322-8228; you will go through a simple verification process over the
phone

Your reports will be mailed to you within 15 days. Please allow 2-3 weeks for delivery

BY MAIL:

Complete the Annual Credit Report Request Form and mail it to: Annual Credit
Report Request Service, P.O. Box 105281, Atlanta, GA 30348-5281. The form
can be found and printed from
https://www.annualcreditreport.com/cra/requestformfinal.pdf

Your reports will be mailed to you within 15 days. Please allow 2-3 weeks for delivery

Regardless of how you request your report, you have the option to request all three
reports at once or to order one report at a time. By requesting the reports separately, you
can monitor your credit more frequently throughout the year

Back to Table of Contents


55
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO REMOVE YOUR NAME FROM MAILING LISTS


________________________________________________________________________

Direct Marketing Association (DMA) Mail Preference Service will allow you to
receive less of the mail you do not want (junk mail). You may remove your name
from individual organization lists. Complete the form and DMA will send it to
their members and ask them to honor your preferences. Visit www.dmachoice.org
to register your choices

HOW TO REMOVE YOUR NAME FROM PRE-SCREENED CREDIT


& INSURANCE OFFERS
________________________________________________________________________

If you would like to reduce the number of pre-screened credit and insurance offers
that you receive, visit www.optoutprescreen.com or call 1-888-5OPTOUT (1-
888-567-8688) to opt out of these offers. This is a free service to consumers
offered by the major credit reporting agencies (Equifax, Experian and
TransUnion)

HOW TO BE REMOVED FROM TELEPHONE CALL LISTS


________________________________________________________________________

Federal Trade Commission's National Do Not Call Registry

Consumers who wish to decrease the amount of unsolicited telemarketing calls


they receive should register with the Federal Trade Commission's National Do
Not Call Registry at: www.donotcall.gov or by phone at 1-888-382-1222

Telephone marketers and their service providers must honor the requests of
consumers who have placed their telephone numbers on the registry

Back to Table of Contents


56
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO BE REMOVED FROM EMAIL LISTS


________________________________________________________________________

The Email Preference Service (eMPS) is a consumer service sponsored by the Direct
Marketing Association (DMA). Established in 1917, DMA is the oldest and largest
national trade association serving the direct marketing field.

How can I be removed from email lists?

You may register with the eMPS removal file online at www.dmachoice.org.

How long is this registration good for?

Registration is good for five years after which you must renew your registration.

What happens after I request that my email address be removed?

When you register with eMPS, your name is placed on a "delete" file which is made
available to companies.

Will registration with eMPS end all advertising mail?

No. You will continue to receive mail from companies with which you do business and
from charitable or commercial organizations which do not choose to use eMPS. In
addition, you may continue to receive email from many local merchants, professional and
alumni associations, and political candidates. Unfortunately, there are many individuals
who do not adhere to best business practices and do not remove people who do not wish
to receive unsolicited email.

Back to Table of Contents


57
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO REMOVE THE NAMES OF DECEASED INDIVIDUALS


FROM MARKETING LISTS
________________________________________________________________________

The Deceased Do Not Contact List

The Direct Marketing Association (DMA) created in October 2005 a Deceased Do Not
Contact List (DDNC) which all DMA members are required to honor. The DDNC list is
available to companies and non-profit organizations for the sole purpose of removing
names and addresses from their marketing lists.

What are the expected results?

When you register a name with DDNC, the person's name, address, phone number, and e-
mail address are placed in a special do not contact file. All DMA members are required to
eliminate these individuals from their prospecting campaigns.

The service is also available to non-members of DMA so that all marketers may take
advantage of this service.

A new, updated file is distributed to members at least once every three months. Therefore
the number of commercial contacts from DMA members should begin to decrease within
three months.

How to Register

Go to Deceased Do Not Contact Registration and complete the online form. There is no
charge to register for the DDNC list. Consumers will be asked for a credit card number to
validate their identity and mailing address when registering. The credit card number will
be used to authenticate and validate the consumer's identity through a no-charge
transaction. As with many credit card verification programs, consumers may see an
authorization pending for 3–7 days, and no charge will be issued to the monthly bill.

The DMA will not keep personal, identifiable information and will not use the
information for marketing purposes.

Back to Table of Contents


58
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

SECTION 6

Back to Table of Contents


59
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

UNDERSTANDING THE IMPORTANCE OF AN IDENTITY THEFT


REPORT
________________________________________________________________________

The Identity Theft Report is the most valuable tool you should have in your toolkit to use
after discovering you have become a victim of identity theft. It has proven especially
helpful when dealing with creditors, debt collectors, financial institutions and credit
reporting agencies when attempting to regain your credit and good name.

What is an Identity Theft Report?

An Identity Theft Report is an official, valid, law enforcement report that documents a
consumer’s statement that they are a victim of identity theft. To discourage false filings,
the Identity Theft Report exposes the consumer to criminal penalties if found to have
filed false information. The Identity Theft Report should contain as much specific
information as possible about the identity theft.

How do you obtain an Identity Theft Report?

An Identity Theft Report can be obtained by following these steps: (1) complete the FTC
Identity Theft Universal Complaint and Affidavit form available at
www.ftccomplaintassistant.gov (2) print a copy of the completed form (ID Theft
Affidavit), and (3) take a copy of the completed ID Theft Affidavit to the police for
inclusion in your police report. A police report that includes the victim’s ID Theft
Affidavit creates an Identity Theft Report.

Not all states require the police to take a report from an identity theft victim. If you are
unable to obtain a report, you should provide the police with a copy of the Federal Trade
Commission’s memorandum to law enforcement on the importance of writing a police
report for victims of identity theft, available the
http://www.consumer.ftc.gov/articles/pdf-0088-ftc-memo-law-enforcement.pdf.

If you are still unsuccessful with your local police, attempt to make a report with another
law enforcement agency such as the state police, sheriff, district attorney, or state
attorney general. If you are unable to get any law enforcement agency to take your report,
a section of the FTC ID Theft Affidavit allows you to indicate this fact.

How do you use the Identity Theft Report?

You can use your Identity Theft Report to invoke many of the rights granted to identity
theft victims under the Fair Credit Reporting Act (FCRA). For example:

Back to Table of Contents


60
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Blocking fraudulent information from a credit report: You can stop a


consumer reporting agency (CRA) from reporting information about you that is
the result of identity theft by submitting your Identity Theft Report to the CRA.
The CRA may ask for additional documentation to verify the validity of your
request, such as your driver’s license

Preventing a company from refurnishing fraudulent information to a CRA:


Once a company is informed by a CRA that you filed an Identity Theft Report
and it has blocked the information it furnished, the company is prohibited from
ever refurnishing that information to a CRA again

Preventing a company from selling or placing for collection debts that were
created from identity theft: Once a company is informed by a CRA that you
filed an Identity Theft Report and it has blocked your account, the company is
prohibited from selling, transferring, or placing for collection that debt

Placing an Extended Fraud alert: An extended fraud alert requires potential


creditors to contact you by phone or in person to verify the identity of a person
applying for credit in your name. An extended fraud alert remains on your report
for seven years

Getting documents from businesses: You have the right to obtain documents
related to fraudulent transactions resulting from identity theft. These records can
be obtained by submitting your Identity Theft Report, along with proper proof of
identification, to the company where the fraudulent transaction occurred

Back to Table of Contents


61
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO FILE A FEDERAL TRADE COMMISSION (FTC)

ID THEFT COMPLAINT
________________________________________________________________________

Filing a complaint with the FTC is one of several important steps that victims of identity
theft should take. The links below will walk you how to file a complaint with the FTC,
and how you can get the protections that you, as a victim of ID theft, may be entitled to.
However, if you’re ready to go directly to the Complaint Form, click here.

Back to Table of Contents


62
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

SECTION 7

Back to Table of Contents


63
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PLACE A SECURITY FREEZE ON YOUR EQUIFAX


CREDIT FILE
________________________________________________________________________

Three ways to place, temporary lift or permanently remove an Equifax security freeze:

ONLINE

The easiest and fastest way is via Equifax’s online process, which can be found at the
following link:

https://www.freeze.equifax.com

BY PHONE

If you choose, you may place, temporary lift or permanently remove an Equifax security
freeze by calling their automated line at 1-800-685-1111 (NY residents please call 1-800-
349-9960).

BY MAIL

If you choose, you may place, temporary lift or permanently remove an Equifax security
freeze by mail. Submit your request in writing to:

Equifax Security Freeze


P.O. Box 105788
Atlanta, Georgia 30348

When using the phone or mail options to place, temporary lift or permanently remove an
Equifax security freeze, please be prepared to provide the following information:

Your complete name including any suffix (e.g. Jr., Sr., etc.)
Complete address
Social Security Number
Date of Birth

In addition, when using the mail option, please also send some proof of
identification. See Acceptable Forms of Identification for Verification . Equifax will
mail you a personal identification number (PIN) that will be required to temporarily lift
or remove the security freeze. Payment, if applicable, to place, lift or remove an Equifax
security freeze depends on your state of residents. Please check security fees and
requirements for your state.

Back to Table of Contents


64
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PLACE A SECURITY FREEZE ON YOUR EXPERIAN


CREDIT FILE
________________________________________________________________________

There are three (3) ways to place, temporary lift or permanently remove a security freeze
on your Experian credit file:

ONLINE

The easiest and fastest way is via Experian’s online process, which can be found at the
following link:

www.experian.com/freeze

BY PHONE

If you choose, you may place, temporary lift or permanently remove an Experian security
freeze by calling their automated line at 1-888-EXPERIAN or (1-888-397-3742).

BY MAIL

If you choose, you may place, temporary lift or permanently remove an Experian security
freeze by mail. Submit your request in writing to:

Experian
P.O. Box 9554
Allen, TX, 75013

When using the phone or mail options to place, temporary lift or permanently remove an
Experian security freeze, please be prepared to provide the following information:

Your complete name including middle initial and any suffix (e.g. Jr., Sr., etc.)
Complete address and previous addresses for the past two years
Social Security Number
Date of Birth

In addition, when using the mail option, please provide one copy of a government issued
identification card, such as a driver’s license, state or military ID card, etc., and one copy
of a utility bill, bank or insurance statement, etc. Experian will mail you a personal
identification number (PIN) that will be required to temporarily lift or remove the
security freeze. Payment, if applicable, to place, lift or remove an Experian Security
Freeze depends on your state of residency.

Back to Table of Contents


65
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PLACE A SECURITY FREEZE ON YOUR TRANSUNION


CREDIT FILE
________________________________________________________________________

There are three (3) ways to place, temporary lift or permanently remove a security freeze
on your TransUnion credit file:

ONLINE

The easiest and fastest way is via TransUnion’s online process, which can be found at the
following link:

https://freeze.transunion.com

BY PHONE

If you choose, you may place, temporary lift or permanently remove a TransUnion
security freeze by calling their automated line at 1-888-909-8872.

BY MAIL

If you choose, you may place, temporary lift or permanently remove a TransUnion
security freeze by mail. Submit your request in writing to:

TransUnion
P.O. Box 6790
Fullerton, CA 92834

When using the phone or mail options to place, temporary lift or permanently remove a
TransUnion security freeze, please be prepared to provide the following information:

Your complete name including middle initial and any suffix (e.g. Jr., Sr., etc.)
Complete address and previous addresses for the past two years
Social Security Number
Date of Birth

In addition, when using the mail option, please provide one copy of a government issued
identification card, such as a driver’s license, state or military ID card, etc., and one copy
of a utility bill, bank or insurance statement, etc. TransUnion will mail you a personal
identification number (PIN) that will be required to temporarily lift or remove the
security freeze. Payment, if applicable, to place, lift or remove a TransUnion Security
Freeze depends on your state of residents

Back to Table of Contents


66
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

HOW TO PLACE A SECURITY FRAUD ALERT ON CREDIT FILES


________________________________________________________________________

There are three (3) types of security fraud alerts:

Initial or 90-day Fraud Alert – must be renewed after 90 days. Anyone can place an
initial fraud alert on their credit file. You do not have to be a victim of identity theft.

Extended Fraud Alert – remains on credit file for seven years. A valid police report
showing that you have been a victim of identity theft is required to place an extended
fraud alert. Also, your name is removed from prescreened credit and insurance offers for
five years.

Active-duty Military Fraud Alert – remains on your credit file for one year for active
duty military personnel who are away from their duty station. Also, your name is
removed from pre-screened credit and insurance offers for two years.

When you request an alert through one of the credit reporting agencies, your request is
automatically sent to the other two agencies.

EQUIFAX

Phone: 1-800-525-6285

Online: https://www.alerts.equifax.com/AutoFraud_Online/jsp/fraudAlert.jsp

Mail: Equifax Information Services LLC, P.O. Box 105069, Atlanta, GA 30348-5069

EXPERIAN

Phone: 1-888-EXPERIAN (888-397-3742)

Online: https://www.experian.com/fraud/center.html

Mail: Experian, P.O. Box 9554, Allen, TX, 75013

TRANSUNION

Phone: 1-800-680-7289

Online: https://fraud.transunion.com

Mail: TransUnion LLC, P.O. Box 6790, Fullerton, CA 92834

Back to Table of Contents


67
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

SECTION 8

Back to Table of Contents


68
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

ID THEFT PROTECTION STRATEGIES FOR COLLEGE


STUDENTS
________________________________________________________________________

As a college student, you might think you're immune to identity theft. THINK AGAIN!

College students are mainly at risk because their credit records are mostly blank, which
means that their personal identifying information (PII) can be easily used to secure new
credit. Identity thieves know this; so they specifically target students for identity theft.
Identity theft can affect college students’ credit rating, criminal record, borrowing
possibilities for the future and even job opportunities.

The good news is that there are steps students can take to protect their identity. Check out
the following tips:

Tips on Hiding your Valuables

Invest in a lockbox or safe to store your private documents

Never leave your wallet in plain sight

Don't leave documents on your desk or in your dorm room that include your
personal information

Keep your credit card and bank account statements locked in a safe place

Don't let roommates see where you store your valuables

Always keep your front door and/or dorm room locked, even if you expect
company

Purchase a shedder and use it to destroy all documents that contains your personal
identifying information

Tips When Surfing the Net

Always use a secure browser like Mozilla Firefox

Don’t use public computers to conduct online business

Install and keep updated anti-virus, anti-spyware, and firewall software on your
computer

Back to Table of Contents


69
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Never display your full name in an online profile (Facebook, Twitter, etc.)

Only shop with reputable online merchants

Never fall for e-mail hoaxes that ask for money. Even better, NEVER respond to
spam

Avoid e-mail surveys that ask for your personal information

Always log out of a website before continuing to surf the internet

Never post your picture and/or personal information on social networking sites

Tips to Protect your Student Loan

Apply for federal student aid by filling out the Free Application for Federal
Student Aid (FAFSA) at www.fafsa.ed.gov

When completing the FAFSA electronically, remember to exit the application and
close the browser

Keep your U.S. Department of Education (ED) PIN in a secure place. Get your
PIN at www.pin.ed.gov. Don’t reveal your PIN to anyone, even if that person is
helping you fill out the FAFSA. The only time you should be using your PIN is
when you are on ED websites, which are secure

Review your financial aid award documents and keep track of the amount of aid
applied for and awarded

Additional Tips

Keep personal information under lock and key and shred your old records

Keep your computer information and access secure

Keep your credit data confidential

Create strong passwords (a combination of eight or more upper and lower-case


letters, numbers and symbols)

Limit sharing personal information about your home and family

Be careful on the type of personal information you include on job applications


and provide in job interviews. Never share your social security number until a
background investigation is required or an employment offer is made

Back to Table of Contents


70
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

How College Students Can Avoid Becoming a Victim of Identity Theft:

Put your wallet/purse on an “Identity Diet”

Purchase a “Cross-Cut Shedder”

Shred all documents before disposing them

Shred all checks and their carbon copies

Shred unused pre-approved credit card offers

Place a PIN/password on all accounts

Keep PIN(s) and password(s) in a secure location

Safeguard your debit, credit, and ATM cards

Photocopy all cards and identification documents (front and back)

Sign the back of all cards

Write “Check My Photo ID” on the front and back of all cards

Request that new and replacement cards and checks be sent to your bank instead
of your home

Regularly monitor your credit file

Request your free annual credit report from each of the three credit reporting
agencies

Cancel and close inactive accounts on your credit file

Reconcile statements and your check register

Get a P.O. Box or install a lock mailbox

Deliver all outgoing mail to the post office

Don’t talk to strangers on the phone

Don’t open email messages from strangers

Back to Table of Contents


71
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Don’t click on unknown links or pop-up advertisement on the internet

Don’t click on links sent to you in email messages

Store all statements in a locked file cabinet

Eliminate as much paper as possible

Pay bills online (if possible)

Never use public computers for personal use

Secure your computer (anti-virus, anti-spyware, firewall, secure browser and


automatic windows operating system updates)

Opt-out of receiving credit cards and convenient check offers

Opt-out of receiving telemarketing calls

Opt-out of receiving junk mail

List your telephone numbers on the “Do Not Call List”

Guard against “Shoulder Surfing”

Guard against “Eavesdropping” of calls

Back to Table of Contents


72
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Steps To Take If You (College Student) Become a Victim of Identity Theft:

Document who, what, when, where, and how you became a victim

Establish an identity theft file

Contact the three credit reporting agencies

Place a “Fraud Alert” on your credit file

Place a “Victim Statement” on your credit file

Request a copy of your credit reports from the three credit reporting agencies

Contact creditors and banks immediately and notify them of fraudulent activities

Place or change PIN(s) and/or password(s) on all accounts

File a complaint with the Federal Trade Commission (FTC)

Complete the FTC “ID Theft Affidavit”

File a police report

Create an “Identity Theft Report” (FTC complaint, FTC affidavit, and police
report)

Send copies of original documents and all correspondence via “Certified Mail
Return Receipt Requested”

Keep a record of all monies spent and time lost recovering from becoming a
victim

Monitor your credit report regularly

Back to Table of Contents


73
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

ID THEFT PROTECTION STRATEGIES FOR SENIORS


________________________________________________________________________

Why Seniors are Easy Prey:

Seniors often have higher cash reserves and home equity than younger folks

Seniors are usually less technologically savvy and do not research scams online

Seniors do not monitor their credit and financial accounts very closely

Retirement home staff and other assistants may have access to and take advantage
of a senior's personal records

Warning Signs of Identity Fraud Against Seniors:

Sudden changes in banking behaviors, including withdrawals of large sums of


money

Funds may also be withdrawn in smaller amounts via remotely created checks
(drafts); this could indicate the elder has fallen victim to a telemarketing fraud

The person who has Power of Attorney makes large withdrawals that do not
appear to benefit the elderly person

Abrupt changes in a will or other financial documents

Sudden appearance of previously uninvolved relatives claiming rights to


someone's affairs and possessions. Or a new companion who appears to be in
charge and calling the shots

Caregivers receiving too much pay or too often

Excitement about winning a sweepstakes or lottery

A decline in the senior's physical appearance

Back to Table of Contents


74
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

How Seniors Can Avoid Becoming a Victim of Identity Theft:

Freeze your credit file

Put your wallet or purse on an “Identity Diet”

Purchase a Cross-Cut Shedder

Shred all documents before disposing of them

Shred all checks

Shred unused pre-approved credit card offers

Place a PIN/password on all accounts

Keep PIN(s) and password(s) in a secure location

Safeguard your debit, credit, and ATM cards

Photocopy all cards and identification documents (front and back)

Sign the back of all cards

Write “Check My Photo ID” on the front and back of all cards

Request that new and replacement cards and checks be sent to your bank instead
of your home

Regularly monitor your credit file

Request your free annual credit report from all three credit reporting agencies

Cancel and close inactive accounts on your credit file

Reconcile statements and your check register

Get a P.O. Box or install a lock mailbox

Deliver all outgoing mail to the post office

Don’t talk to strangers on the phone

Don’t open email messages from strangers

Back to Table of Contents


75
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Don’t click on unknown links or pop-up ads on the Internet

Don’t click on links sent to you in email messages

Store all statements in a locked file cabinet

Eliminate as much paper as possible

Pay bills online (if possible)

Never use public computers for personal use

Secure your computer by using anti-virus, anti-spyware, firewall, secure browser,


and automatic Windows Operating System updates)

Decline receiving credit cards and convenient check offers

Opt-out from receiving telemarketing calls

Opt-out from receiving junk mail

List your telephone numbers on the Do Not Call list

Guard against shoulder surfing (someone looking over your shoulder when you
are using an ATM or when you are entering your PIN at a store’s check out
terminal)

Guard against eavesdropping of calls

Back to Table of Contents


76
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Steps To Take If You (Seniors) Become a Victim of Identity Theft:

Document who, what, when, where, and how you became a victim

Establish an identity theft file

Contact the three credit reporting agencies

Place a Fraud Alert on your credit file

Place a Victim Statement on your credit file

Request a copy of your credit reports from the three credit reporting agencies

Contact creditors and banks immediately to inform them of fraudulent activities

Place or change PIN(s) and/or password(s) on all accounts

File a complaint with the FTC

Complete the FTC ID Theft Affidavit

File a police report

Create an Identity Theft Report (FTC Complaint, FTC Affidavit, and Police
Report)

Send copies of original documents and all correspondence via certified mail
return receipt requested

Maintain a record of all monies spent and time lost recovering from being a
victim

Monitor your credit report regularly

Back to Table of Contents


77
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

ID THEFT PROTECTION STRATEGIES FOR THE DECEASED


________________________________________________________________________

Identity thieves obtain information about deceased individuals in various ways. They may
scan the obituaries and genealogy websites, steal death certificates, or get the information
from websites that offer the Social Security Death Master File.

Financial institutions are not immediately made aware that their customer is deceased. It
takes time for the Social Security Administration to transmit the Death Master File to the
financial industry. Until the institution receives word that the individual is deceased, the
account remains active.

Until you notify the credit reporting agencies and creditors, they do not know of a death.
The accounts of the deceased will remain open. An active credit file will stay open for up
to ten (10) years without activity.

Steps To Take To Decrease the Risk of Identity Theft When A Loved One Passes

Obtain at least 12 certified copies of the official death certificate when it becomes
available and place them in a secure location

Immediately notify all relevant credit card companies, banks, stock brokers,
loan/lien holders, mortgage companies, and any other financial institutions of the
death by telephone and follow-up in writing. Mail all correspondence certified,
return receipt requested. Keep photocopies of all correspondence, including letters
that you send

The executor or surviving spouse will need to discuss all outstanding debts and
how to handle them. You will need to transfer the account to another person or
close the account. If you close the account, ask the financial institution to list it as:
“Closed. Account holder is deceased”

Immediately contact the three major credit reporting agencies in writing. Request
that the credit report of the deceased be flagged with the following alert:
“Deceased. Do not issue credit. If an application is made for credit, notify the
following person(s) immediately: (executor/trustee of the estate)”

Request copies of all three credit files of the deceased. A review of each report
will let you know of any active credit accounts that needs to be closed

If there is a surviving spouse or other joint account holders, be sure to notify the
company that the deceased’s name(s) needs to be removed from the account(s). A
certified copy of the death certificate may be required

Back to Table of Contents


78
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Contact the Social Security Administration at 1-800-772-1213 to inform them


about the deceased. Ask them to flag the deceased’s social security number as
"inactive"

Obtain a P.O. Box and submit a change-of-address request to re-route all mail of
the deceased from his/her home to the P.O. Box

Secure all items in the deceased’s wallet or purse

Secure all sensitive documents in the deceased’s home. For example, mail, bills,
statements, social security earnings, and benefits statements, etc

Photocopy or write down the information from the front and back of all cards of
the deceased. For example, Social Security card, driver’s license, birth certificate,
health insurance cards, credit, debit, and ATM cards, etc. The spouse/executor
should immediately secure these documents in a safe deposit box

Opt-out the deceased from all pre-screened credit and insurance offers at
www.optoutprescreen.com

Remove the name of the deceased from marketing lists at Deceased Do Not
Contact Registration

Close all financial accounts and destroy all checks and credit cards

The spouse/executor should close utility accounts of the deceased that are no
longer in use and submit a name change for all remaining utility accounts

Other Groups to Notify When A Loved One Passes:

Insurance companies – auto, health, life, etc.

Veteran’s Administration – if the person was a former member of the military or


the spouse

Immigration Services – if the decedent is not a U.S. citizen

Department of Motor Vehicles if the person had a driver’s license or state ID card.
Also make sure that any vehicle registration papers are transferred to the new
owners

Agencies that may be involved due to professional licenses – bar association,


medical licenses, cosmetician, etc.

Any membership programs – video rental, public library, fitness club, etc.

Back to Table of Contents


79
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

ID THEFT PROTECTION STRATEGIES FOR MILITARY


PERSONNEL
________________________________________________________________________

Members of the military away from their usual duty station may place an "active duty
military fraud alert" on their credit report to help minimize the risk of identity theft while
deployed. When a business sees the alert on their credit report, it must verify the
individual’s identity before issuing credit.

Active duty alerts on your report are effective for one year, unless you request that the
alert be removed sooner. If your deployment lasts longer than one year, you may place
another alert on your report. Also, when you place an “active duty alert” on your credit
file, your name will be removed from the nationwide consumer reporting companies
marketing lists for prescreened offers of credit and insurance for two years.

There are three ways to place, temporary lift or permanently remove an Active Duty
Military Fraud Alert on your Equifax, Experian and TransUnion credit file:

EQUIFAX

Phone: 1-800-525-6285

Online: https://www.alerts.equifax.com/AutoFraud_Online/jsp/fraudAlert.jsp

Mail: Equifax Information Services LLC, P.O. Box 105069, Atlanta, GA 30348-5069

EXPERIAN

Phone: 1-888-EXPERIAN (888-397-3742)

Online: https://www.experian.com/fraud/center.html#addAlert

Mail: Experian, P.O. Box 9554, Allen, TX, 75013

TRANSUNION

Phone: 1-800-680-7289

Online: https://fraud.transunion.com

Mail: TransUnion LLC, P.O. Box 6790, Fullerton, CA 92834

Back to Table of Contents


80
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

ID THEFT PROTECTION STRATEGIES FOR SOCIAL


NETWORKING WEBSITES
________________________________________________________________________

Things you should NOT do when using social networking websites:

Use low or no privacy settings

Accept invitations to connect from unfamiliar persons or contacts

Download free applications for use on your profile

Give your password or other account details to people you know

Participate in quizzes (e.g. How well do you know me?), which may require you
to divulge a lot of personal information

Click on links that lead you to other websites, even if the link was sent to you by a
friend or posted on your friend’s profile

Respond to email scams (phishing) that ask you to update your social networking
profiles

Use no or out-of-date computer security software (anti-virus, anti-malware,


firewall)

Best practices for using social networking websites:

Use a strong password (combination of eight or more letters… upper and lower
case, numbers and special characters) that is different from passwords you use to
access other sites

For password security verification questions, make up a fake answer and use it for
all security questions (rather than answering, truthfully, a specific question, like
“What is your mother’s maiden name?”)

Never use your work email address for a social networking site. Instead, create a
new email address, to be used solely for connecting to your social networking
profile(s)

Review the privacy policy and terms of service before signing up for an account

Be sure to keep strong anti-virus and anti-spyware protection on your computer

Back to Table of Contents


81
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Become familiar with the privacy settings available on any social networking site.
Configure them to provide maximum protection for your privacy information

Be very cautious of pop-up windows, especially any that state your security
software is out of date or that security threats and/or viruses have been detected
on your computer

Don’t post information or photos of yourself that you would not want your mother
or a potential employer to see on social networking site(s)

Don’t publicize your daily routine, vacation plans or where you live

Turn off “geo-tagging” or GPS location services that may be associated with
some social networking sites

NEVER post the following information: your home address, date of birth,
mother’s maiden name, phone number, driver’s license number, social security
number (SSN), email address, student ID number, year of your high school or
college graduation or your home town. This information could be useful to
identity thieves and to data mining companies

Use caution when using third-party applications. For the highest level of safety
and privacy, avoid them completely

If you receive a request to connect with someone you know, verify the account
holder’s identity before accepting the request. Consider calling the individual,
sending an email to his or her personal account or even asking a question only
your contact would be able to answer

If you receive a connection request from a stranger, the safest thing to do is to


reject the request

If you decide to accept the request, use privacy settings to limit what information
is viewable to the stranger

In the event that your social networking account is compromised, report it to the
site immediately and alert your contacts. You will need to change passwords and
proceed with caution because your computer may have also been compromised

Be sure to log off from social networking sites and close the browser when you no
longer have a need to be connected

BE CAREFUL! Verify emails and links in emails you supposedly get from others
on your social networking site. These are often designed to gain access to your
user name, password, and ultimately your personal information

Back to Table of Contents


82
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

SECTION 9

Back to Table of Contents


83
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

IDENTITY THEFT VICTIM’S RIGHTS


________________________________________________________________________

An identity theft victim has the right to:

File a report with law enforcement

Place a Fraud Alert on your credit file

Place a Security Freeze on your credit file

Request one free copy of your credit report annually from each of the three credit
reporting agencies

Request credit reporting agencies block fraudulent information from appearing on


your credit report

Dispute fraudulent or inaccurate information on your credit report

Close fraudulently opened or compromised accounts

Request copies of all documents related to the theft of your identity

Stop the collection of fraudulent debts by debt collectors

Request that creditors block fraudulent information from being shared with credit
reporting agencies

Back to Table of Contents


84
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

SECTION 10

Back to Table of Contents


85
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

APPENDIX: HELPFUL RESOURCES LIST


________________________________________________________________________

Resource Resource Telephone # Website


Name Type

Equifax Credit (800) 525-6285 www.equifax.com


Reporting
Agency
Experian Credit (888) 397-3742 www.experian.com
Reporting
Agency
TransUnion Credit (800) 680-7289 www.transunion.com
Reporting
Agency
Federal Trade Federal (877) 438-4338 www.ftc.gov/idtheft
Commission Government
(FTC) Agency
US Postal Federal (800) 372-8347 https://postalinspectors.uspis.gov
Service Government
(Fraud Dept) Agency
Identity Theft ID Theft (858) 693-7935 www.idtheftcenter.org
Resource Protection
Center Service
Privacy Rights ID Theft (619) 298-3396 www.privacyrights.org
Clearinghouse Protection
service
Direct Opt out of www.dmachoice.org
Marketing telemarketing
Association offers and junk
mail
Social Security Federal (800) 772-1213 http://oig.ssa.gov/report-fraud-
Administration Government waste-or-abuse
(Fraud Dept) Agency
ChexSystems Check (800) 428-9623
(Fraud Dept) Verification
Service

TeleCheck Check (800) 835-3243


Verification or
Service (800) 710-9898

Back to Table of Contents


86
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Free Annual Federal (877) www.annualcreditreport.com


Credit Report Government 322-8228
Service
Social Security Federal (800) www.socialsecurity.gov/mystatement
Earnings Government 772-1213
and Benefits Agency
Statement
National Do Federal (888) www.donotcall.gov
Not Call Government 382-1222
Registry Agency
Opt Out Consumer (888) www.optoutprescreen.com
Pre-Screened Credit 5OptOut
Credit and Reporting or
Insurance Agencies (888)
Offers Service 567-8688
File an FTC ID Federal (877) www.ftc.gov/complaint
Theft Government 438-4338
Complaint Agency
File an FTC Federal (877) www.ftc.gov/complaint
Military ID Government 438-4338
Theft Agency
Complaint
Deceased Do Opt-Out https://www.ims-dm.com/cgi/ddnc.php
Not Contact Service for the
Registration Deceased
FTC Federal http://www.consumer.ftc.gov/
Memorandum Government articles/pdf-0088-
to Law Agency ftc-memo-law-enforcement.pdf
Enforcement
Equifax Credit (800) https://www.freeze.equifax.com
Security Freeze Reporting 685-1111
Agency
Experian Credit (888) www.experian.com/freeze
Security Freeze Reporting 397-3742
Agency
TransUnion Credit (888) https://freeze.transunion.com
Security Freeze Reporting 909-8872
Agency
Equifax Credit (800) https://www.alerts.equifax.com
Fraud Alert Reporting 525-6285
Agency

Back to Table of Contents


87
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

Experian Credit (888) https://www.experian.com/fraud/center.


Fraud Alert Reporting 397-3742 html
Agency
TransUnion Credit (800) https://fraud.transunion.com
Fraud Alert Reporting 680-7289
Agency
Free Federal www.fafsa.ed.gov
Application Government
for Federal Agency
Student Aid
Federal Federal www.pin.ed.gov
Student Aid Government
PIN Agency

Back to Table of Contents


88
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

INDEX

A
About the Author ............................................................................................................................................ 5

Appendix: Helpful Resources List ......................................................................................................... 86-88

D
Deceased Do Not Contact List (DDNC) ...................................................................................................... 58

Definition of Identity Theft .......................................................................................................................... 10

Direct Marketing Association (DMA) Mail Preference Service .................................................................. 56

E
Experian Security Freeze .............................................................................................................................. 65

Equifax Security Freeze ............................................................................................................................... 64

F
FTC Identity Theft Complaint and Affidavit................................................................................................ 60

FTC National Do Not Call Registry ............................................................................................................. 56

H
How Identity Thieves Get Your Identity Information .................................................................................. 13

How To:

Avoid Becoming A Victim of Identity Theft ............................................................................ 16-18

Be Removed From Email Lists ...................................................................................................... 57

File An FTC ID Theft Complaint ................................................................................................... 62

Know When You Have Become A Victim Of Identity Theft ........................................................ 19

Request Your Free Annual Credit Report ...................................................................................... 55

Remove Your Name From Mailing Lists ....................................................................................... 56

Back to Table of Contents


89
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

How To Protect:

ATM and Debit Cards ............................................................................................................... 23-24

Bank Accounts .......................................................................................................................... 25-26

Checks ............................................................................................................................................ 37

Computer ................................................................................................................................... 38-39

Credit Cards .............................................................................................................................. 40-41

Mail ................................................................................................................................................ 42

Mobile Devices ......................................................................................................................... 27-36

Passwords .................................................................................................................................. 43-44

Social Security Number ............................................................................................................ 45-46

Trash ......................................................................................................................................... 47-48

Wallet/Purse ................................................................................................................................... 49

Wireless Network ...................................................................................................................... 50-53

I
ID Theft Protection Strategies For:

College Students........................................................................................................................ 69-73

Deceased ................................................................................................................................... 78-79

Military Personnel .......................................................................................................................... 80

Seniors....................................................................................................................................... 74-77

Social Networking Websites ..................................................................................................... 81-82

Identity Theft Victim's Rights ...................................................................................................................... 84

Importance Of An Identity Theft Report ................................................................................................. 60-61

Index ........................................................................................................................................................ 89-91

Introduction .................................................................................................................................................... 8

Back to Table of Contents


90
Copyright @ 2018 Womple, LLC – All Rights Reserved.
Identity Theft Protection Strategies

O
Opt-Out Prescreened Credit and Insurance Offers ....................................................................................... 56

S
Steps To Take If You Become A Victim Of Identity Theft .................................................................... 20-21

Security Fraud Alerts.................................................................................................................................... 67

T
Table of Contents ........................................................................................................................................ 6-7

TransUnion Security Freeze ......................................................................................................................... 66

W
What Is Your Identity ................................................................................................................................... 10

What Type of Information Do Identity Thieves Want Most ........................................................................ 11

U
U.S. Postal Inspection Service (USPIS) ....................................................................................................... 42

Back to Table of Contents


91
Copyright @ 2018 Womple, LLC – All Rights Reserved.

Potrebbero piacerti anche