Skip to main content

Author: Crown Information Managment

Individual Identity Theft

Individual ID Theft
During various season throughout the year, many of us will be traveling on vacations and to share holiday time with our friends and loved ones. We laugh, shop, eat, attend parties and do whatever we can to bring joy the trip!

Below are a few “Helpful Hints” to protect you and your family from becoming possible victims of Fraud or Identity Theft. Also remember that Children are often victims of identity theft too – so check those credit reports for everyone in the family!
Make the Call: If you’re traveling during vacations or holidays take the time to let your credit card companies know in advance.

Air Travel: When traveling by plane keep all important documents with you in the plane. Never put them in luggage others will have access to when you’re not around!

Secure Locations: Don’t use ATM’s from any location except banks and reputable stores. This will help protect you from temporary and fly by night machines set up to access your sensitive information.

Shoulder Surfing: Those who either purposely overhear conversations or look over shoulders for information to “borrow” sensitive information. Take a few extra moments to protect credit cards, driver’s licenses and checks from wandering eyes.

Credit Card Receipts: Businesses must now truncate all but the last five numbers on credit card numbers on the customer copy of receipts. Place that receipt in a secure location in your wallet.

Credit Card Skimming: Credit card skimming occurs when a clerk slides your credit card through a second machine that scans the information from the magnetic strip and stores it until it is downloaded onto a counterfeit card. The golden rule is “Out of sight, out of control.” Information Protection: Shred any receipts you no longer want, especially those with credit card numbers on them. Lock up any documents with financial, credit or social security information on them BEFORE allowing guests into your home for that holiday party.

Dumpster Diving: We all get more mail than we can deal with at this time of year. Take the time to look through each envelope. Don’t assume an envelope contains a business gift card or advertisement. It may well be a pre-approved credit card offer or transfer balance check that looks a greeting card.

On-line Shopping: Keep a printout of the web page(s) describing the item you ordered, any email messages, and the page that shows the seller’s name, address, telephone number and return policies should you have any problems. Never provide a social security number.

In Your Wallet: Minimize what you carry with you. Leave extra credit cards, check books, deposit slips and debit cards at home. Debit cards are not credit cards: They are a direct link to your bank account. Debit cards electronically transfer money immediately. Don’t use bank cards, ATM cards or checks. Fraudulent charges are much easier to remove from a credit card versus a bank card.

Victim of Identity Theft?

What to do if you might be a victim of identity theft . . .

Those of us in the information security business talk about identity theft all the time. Identity Theft has risen 13% from 2010 to 2011. We thought it might be a good idea for our clients to have a check list of things to do if you feel you have become a victim. Remember: “THIS IS NOT LEGAL ADVICE”. It’s just a suggestion on where you can start when you feel victimized!

Call the IRS and inform them you believe you are a victim of identity theft. (Often the way you will find out that something is amiss is when you don’t receive your refund check. It may have been issued to the thief who has assumed your identity).

Fill out IRS Form 14039 and fax or mail back to IRS.

Contact the Social Security Administration ( If you go to their website they have an Identity Theft webpage). If you contact them by phone they will tell you to contact the Federal Trade Commission.

Contact the Federal Trade Commission (877-438-4338). After you contact them by phone, you will be sent an Identity Theft Complaint Affidavit.

Contact your local police department and tell them you have been a victim of identity theft. Make sure you get a case number and follow up in a few days to get the full police report. Make sure you put that police report in your Credit bureau file.

Contact one of the three credit bureaus:
Equifax at 800-525-6285, Trans Union at 800-680-7289, or Experian at 888-397-3742.Tell them you are entitled to make a victim-of-fraud statement that will be put into your credit history along with your police report.

Corporate Identity Theft

Corporate ID TheftYou and your staff work hard at meeting all the compliance requirements for HIPAA. It would be easy to forget that as a business you also are required to be FACTA compliant as well. FACTA stands for Fair and Accurate Credit Transaction Act. It is generally known as the law which allows Americans access to their credit report once per year. So what could this law possibly have to do with you?

Whether you have 1 employee or 1 million, the liabilities associated with the privacy laws apply to your business. If you’re not keeping up it could destroy your bottom line. In 2006, the VA had 1.6 million records stolen. Fallout from that one incident led to the end of many careers and the individuals whose records were compromised have the right to sue for financial damages.

That’s a lot of lawsuits and even more money. As businesses, we can no longer afford to be lax about protecting our customers’ personal information – and our own. Business identity theft, like personal identity theft, is also rising significantly.

What can Businesses Do to Prevent Identity Theft?
First, to prevent identity theft, we need to follow basic security practices to physically protect our customers’ personal information and other business data. Second, we need to ensure that our information systems, such as computer networks, aren’t open targets for identity theft.

Secure your business premises with locks and alarms.
Alarm systems are effective deterrents to criminals thinking of breaking into your business, including those persons intent on identity theft – especially alarm systems that are monitored by a security company. Make sure external doors have deadbolts and that exposed windows are secured with security film, bars, screens or shatter-proof glass.

Put your business records under lock and key.
Store your physical business records, such as customer records and other data on paper, in locking filing cabinets – and lock the filing cabinets at night, or at those times during the day that you and your staff will not be “supervising” access (such as lunch time). Put copies of system and database backups and “important” business data in your safe (or in your security deposit box at the bank if you don’t have an on-site safe).

Shred, Shred, Shred!  
Business records of any kind should never just be tossed into the trash or recycling bin where they can become a bonanza for criminals intent on identity theft; instead, all business records that you no longer have a use for should be shredded. Businesses that operate out of small and home offices can buy inexpensive shredders at any office supply store; for businesses with volumes of material to be disposed of, there are shredding services that will come and do what needs to be done.Pay special attention to the mail, a favorite source for identity theft. Anything that has your name and address on it should be shredded, and that includes most bills.

Be cautious on the phone.
It’s easy for someone to pretend to be someone they’re not on the phone. Whether it’s someone who wants personal information on a particular customer, or someone who claims they need to verify one of your personal accounts, don’t give out information over the phone unless you can positively confirm the caller’s identity.
The Better Business Bureau warns “Information thieves and stalkers tell authorities over and over how easily they were able to obtain all sorts of valuable information simply by calling small business owners or personnel departments and asking. Posing as government agencies or credit grantors or health insurance providers, these thieves have found that a well-crafted, believable story can often get past the best locking file cabinets or password-protected computers,”

Limit access to your computers.
Your computer network needs to be password protected, of course, so that anyone who wanders through your office can’t just access your network. But you also need to consider issues of internal network access. Does every employee need to be able to access programs or databases that may contain sensitive information? Passwords protect these, too, and grant access on a “need-to-know” basis to help cut down identity theft.

Protect your computer from hackers.
Hacking into company systems and databases appears to have become a favorite identity theft technique – perhaps because in so many cases, it’s so easy. Your computer network needs to be protected by firewalls, which help keep out intruders by shutting out unauthorized people and letting others go only to the areas they have privileges to use. You can purchase firewalls at any computer store (or online). Another option for small or home businesses is to purchase and install a small (four to eight port) router. These often have firewall protection capability. If you’re running Windows operating systems, it’s also important that you keep your operating system updated, installing the various patches as they come out. Often these patches are fixes for security holes. (If you use Windows XP, you will be alerted automatically to these updates.)

Be aware the Internet is a dangerous place.
Ordering something off the ‘Net using a credit card is not dangerous, as long as you are placing your order through a secure site. However, there are other dangers, such as Spy ware and viruses that attempt to download automatically when you or your employees visit certain sites. If you are using Internet Explorer, make sure that you go to “Internet Options” and set the security options to a higher setting on each computer; the default is set to allow just about anything to download.
If your company has a web site, be careful as to what kind of information you post on your site and how. If you are going to place sensitive information on the ‘Net, (something you should be very cautious about), such as financial data or customer databases, it needs to be password protected and encrypted.

Avoid broadcasting information.
The other day I made a purchase at a computer store. The associate asked me for my phone number and popped up all my personal information on a terminal in front of him – right in plain view of five other customers! I was tempted to ask him if he wanted to read it all off out loud to make it even easier for them all to remember it.
This sort of cavalier sharing of personal information, which makes identity theft so easy, has to stop. Train your employees to be sensitive to customer information issues, making sure they keep customer information private when they’re dealing with individual customers. Turning computer screens so that they can’t be viewed by anyone except the operator is a simple thing. Practices such as not repeating customer information out loud or not leaving files with customer information lying open on counters should also be put in place.

Create and enforce a company wide security policy.
The purpose of your security policy is to educate your employees about issues such as identity theft and data protection. It should include information on email policies (such as what email filters are in place and how to deal with suspicious email), computer network access, Internet use policies (such as how to increase browser security settings and safe practices, such as disconnecting from the ‘Net when they’re done using it), customer information protection strategies, and how to report incidents or violations. In other words, a manual of the issues involved with security and threats such as identity theft and what to do about them.

Disconnect ex-employees immediately.
When employees no longer work for your business, you need to be sure that their access to your computer network and company data is cut off immediately.
Will all this create more trouble and expense for your small business? Yes. But unfortunately, with identity theft becoming rampant, taking these steps to prevent identity theft for you and your customers is necessary.

Victim of Identity Theft?

What to do if you might be a victim of identity theft . . .

Those of us in the information security business talk about identity theft all the time. Identity Theft has risen 13% from 2010 to 2011. We thought it might be a good idea for our clients to have a check list of things to do if you feel you have become a victim. Remember: “THIS IS NOT LEGAL ADVICE”. It’s just a suggestion on where you can start when you feel victimized!

Call the IRS and inform them you believe you are a victim of identity theft. (Often the way you will find out that something is amiss is when you don’t receive your refund check. It may have been issued to the thief who has assumed your identity).

Fill out IRS Form 14039 and fax or mail back to IRS.

Contact the Social Security Administration ( If you go to their website they have an Identity Theft webpage). If you contact them by phone they will tell you to contact the Federal Trade Commission.

Contact the Federal Trade Commission (877-438-4338). After you contact them by phone, you will be sent an Identity Theft Complaint Affidavit.

Contact your local police department and tell them you have been a victim of identity theft. Make sure you get a case number and follow up in a few days to get the full police report. Make sure you put that police report in your Credit bureau file.

Contact one of the three credit bureaus:
Equifax at 800-525-6285, Trans Union at 800-680-7289, or Experian at 888-397-3742.Tell them you are entitled to make a victim-of-fraud statement that will be put into your credit history along with your police report.

Defining a Business Record and Developing a Records Management Framework

Since we are starting a new year, I thought it might be nice to start with some information helpful to creating a records management system. Since information is the most import asset an organization has, the beginning seemed like a great place to start.

The International Standard on Records Management defines records as such:
ISO 15489: “information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction of business”.

This definition makes it clear that we are not just talking about our old archival records but about everyday information that we create in our work situations. This information may take several forms and include audio files, photographs, video, emails, and any form of social media.

ARMA International has created a framework referred to as “The Principles” which are generally accepted recordkeeping principles. These guidelines were examined by legal and IT professionals who reviewed and distilled global best practice resources. These included the international records management standard ISO15489-1 from the American National Standards Institute and court case law. The principles were vetted through a public call-for-comment process involving the professional records information management (RIM) community.

This framework supports organizations immediate and future regulatory, legal, risk mitigation, environmental and operational requirements.

The Principles have eight points for creating information governance best practices:
Principle of Accountability – An organization shall assign a senior executive who will oversee a recordkeeping program and delegate program responsibility to appropriate individuals, adopt policies and procedures to guide personnel and ensure program audit ability.
Principle of Transparency – The processes and activities of an organization’s recordkeeping program shall be documented in an understandable manner and be available to all personnel and appropriate interested parties.
Principle of Integrity – A recordkeeping program shall be constructed so the records and information generated or managed by or for the organization have a reasonable and suitable guarantee of authenticity and reliability.
Principle of Protection – A recordkeeping program shall be constructed to ensure a reasonable level of protection to records and information that are private, confidential, privileged, secret, or essential to business continuity.
Principle of Compliance – The recordkeeping program shall be constructed to comply with applicable laws and other binding authorities, as well as the organization’s policies.
Principle of Availability – An organization shall maintain records in a manner that ensures timely, efficient, and accurate retrieval of needed information.
Principle of Retention – An organization shall maintain its records and information for an appropriate time, taking into account legal, regulatory, fiscal, operational and historical requirements.
Principle of Disposition – An organization shall provide secure and appropriate disposition for records that are no longer required to be maintained by laws and organizational policies.

10 Million Fell Victim To ID Theft in 2002

Comprehensive government study of identity theft turns up . . .

WASHINGTON DC – Even federal regulators were surprised by what the most comprehensive government study of identity theft turned up: nearly 10 million victims and a loss of $53 billion for businesses and consumers last year alone. And those numbers probably are low because many identity thefts go unreported, Federal Trade Commission officials said Wednesday.

It is a crime of the times. It is a growing crime, said Howard Beales, the FTC’s consumer protection director. “Unfortunately, a fair number of thieves have found it’s a fairly easy way to make money.” The FTC did a random telephone survey of 4,057 adults to try to gauge the extent of identity theft crimes in the last five years. It found 27.3 million people were victimized when someone made unauthorized charges on their credit cards, took money from their bank accounts, or obtained a credit card or official document in their name.

In 2002 alone, the cost was $48 billion for businesses and $5 billion for consumers. Beales said the number of victims was higher than he expected. In 2002, for example, the FTC received 161,819 complaints about identity theft. The commission has set up a Web site with tips on how to avoid identity theft, www.consumer.gov/idtheft and urges consumers to carefully review their credit card statements each month, destroy charge slips rather than simply throw them in the trash, and check their accounts annually with the three credit reporting bureaus. |

The agency also urged financial institutions to pay more attention to whom they are extending credit. Wayne Abernathy, the Treasury Department’s assistant secretary for financial institutions, said the FTC’s report underscores the need for Congress to act. The Bush administration favors legislation that would create a national fraud alert system and improve the accuracy of credit reports. “The problem is so great and its impact on consumers so terrible that we should not delay giving consumers and law enforcers these important new tools to fight identity theft,” he said.

But Rob Schneider of Consumers Union said the administration backed bill- the Fair Credit Reporting Act – would undermine efforts to curtail identity theft. One provision would invalidate state laws such as on recently signed by California Gov. Gray Davis that lets consumers bar companies from sharing information with an affiliated firm in a different business.

The FTC survey found more than half the victims discovered the problem by checking their accounts, and another quarter was alerted by their banks to suspicious activity on their cards. Of the 9.9 million victims last year, 5.2 million discovered unauthorized charges on existing credit card accounts, and 1.5 million found new accounts were opened by others in their names.

By Jonathan D. Salant,  Associated Press

Protect your Child’s Identity

The Office of Privacy Protection reminds parents to tell their children not to give out personal information…

Now that school is in full-swing, many children are spending extra hours in front of a computer or on their cell phone with Internet access. Unfortunately, this also makes them ideal targets for identity thieves.
“The younger the victim, the more time these thieves have to exploit the child’s identity,” said Sandy Chalmers, Administrator of the Wisconsin Division of Trade and Consumer Protection. “Identity theft against a child can go undetected for years and do a lot of damage to their good name.”
The Office of Privacy Protection, part of the Bureau of Consumer Protection, reminds parents to tell their children not to give out personal information unless it’s vitally important and exchanged with a reliable source.

In addition to talking to children about potential online dangers, the Bureau of Consumer Protection’s Office of Privacy Protection also encourages parents to occasionally check their child’s credit report. If a report exists, that is a red flag, and often the first sign of identity theft.
“The credit reporting agencies do not knowingly maintain credit files on children,” Chalmers explained. “A check of your child’s credit should turn up nothing until the age of 18 unless they are the victim of identity theft or a secondary user on a credit card authorized by a parent.”

ConsumerAffairs.com

HITECH Changes Again?

Proposed rule requires an accounting of detailed information for disclosures that affect a person’s rights or interests…

The U.S. Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) is proposing changes to the Privacy Rule, pursuant to the Health Information Technology for Economic and Clinical Health (HITECH) Act. HITECH is part of the American Recovery and Reinvestment Act of 2009.

“This proposed rule represents an important step in our continued efforts to promote accountability across the health care system, ensuring that providers properly safeguard private health information,” said OCR Director Georgina Verdugo. “We need to protect peoples’ rights so that they know how their health information has been used or disclosed.”

People would obtain this information by requesting an access report, which would document the particular persons who electronically accessed their protected health information. Although covered entities are currently required by the HIPAA Security Rule to track access to electronic protected health information, they are not required to share this information.

The proposed rule requires an accounting of more detailed information for certain disclosures that are most likely to affect a person’s rights or interests. The proposed changes to the accounting requirements provide information of value to individuals while placing a reasonable burden on covered entities and business associates.

Article provided by Human Health Services

Monetary, Practical & Emotional Costs of Identity Theft

Nearly half of all identity theft victims have difficulties…

The monetary costs of identity theft can be quite hefty. In fact, victims of identity theft lose an average of $2,000 to 15,000 in wages trying to deal with their cases. This is because victims spend between a day and 9 months trying to repair the financial damage caused by identity thieves, and some even spend up to a year trying to deal with their cases. On average, victims spend between $850 to $1400 in expenses related to their cases, which includes paperwork and any other legal fees.

As a result of identity theft, nearly half of all identity theft victims have difficulties obtaining credit and loans, and roughly 1/5 of victims have higher credit interest rates. Over 2/3 of victims have difficulties removing negative information from their credit scores.

The psychological impact of identity theft is also extensive on both the victims and their families. Victims often times experience anger, anxiety and depression as a result of losing their finances. Nearly half of all victims experience denial, disbelief, feel filed, and develop an inability to trust others, and over half feel unprotected by the police as well as experience rage.

IdentityTheftFacts.com

FL Man Arrested for Cybercrime

Strict security should be practiced when using smart phones, laptops, iPads . . .

Christopher Chaney, of Jacksonville Florida, has been accused of targeting the entertainment industry, by hacking into the personal e-mail accounts of celebrities. He was arrested after being charged with a range of cyber-related crimes. Investigators believe that Chaney used publicly available sources to mine for data about his victims, all of whom are associated with the entertainment industry.

Once Chaney gained access and control of an e-mail account, he would obtain private information, such as e-mails and file attachments, according to the indictment. In addition, investigators believe that Chaney was led to new victims by accessing the address books of victims whose computers he already controlled. “It’s important to remember that, although these victims appear to have been targeted based on their celebrity, similar methods may be used to illegally access any one of our computers,” said Steven Martinez, Assistant Director in Charge of the FBI’s Los Angeles Field Office. “Strict computer security should be practiced when using smart phones, laptops, desktops, iPads, or any other device that provides Internet access.”

-Associated Press

 

Travel, Identity Theft, and Bluetooth Technology

Thieves are using unsecured wireless networks to infiltrate smartphones . . .

Imagine this:  You’ve been invited to deliver a speech, to the United States Treasury Department, on Identity Theft.  The Conference will be held at Disney World, so you take your family along to enjoy the resort and parks.  When you return home you find you have become a victim of identity theft.  Likely, the thief used a smartphone to snap a picture of you purchasing an item, when you pulled out your credit card and ID for verification.

Thieves are also, now using unsecured wireless networks and infiltrating smartphones through Bluetooth technology.  Experts say it is best to have updated virus software, and to encrypt sensitive data and never type passwords or credit card number over an unsecured wireless network.  They also recommend that you keep your phone’s Bluetooth turned off unless you are actively using it and monitoring it, to prevent unauthorized access to the phone.

Info provided by Sarrelson Law