The Identity Theft Toolkit

Table of Contents

 

Section I - Introduction

1. Introduction
    1A. A word about Identity Theft Products
2. What is Identity Theft
    2A. A word about Personal Identifiers
3. The Law is on Your side
4. How do You Know you Have Become a Victim?

Section II - Prevention

5. A New Mental State of Mind is Required
    5A. A word about Phishing
6. Steps to Minimize your Exposure
    6A. Ordering & Reviewing Your Free Credit Report
    6B. The Security Freeze
    6C. Key Web Sites and Form Letters
    6D. Opting Out
    6E. While on the Internet
    6F. Everyday Computer Use
    6G. When Traveling

Section III - Recovery

7. What to do if You do Become a Victim of Identity Theft
   7A. Let's Talk a Little About Fraud Alerts   
  7B. How to Dispute Credit Report Errors    

8. Fraudulent Electronic Withdrawals
9. Fraudulent Checks & Other "Paper" Transactions
10. Fraudulent New Accounts
11. Federal Reserve System
12. Bankruptcy Fraud
13. Correcting Fraudulent Information in Credit Reports

Section III - Recovery - cont'd

14. Credit Cards
15. Criminal Violations
16. Debt Collectors
17. Driver's License
18. Investment Fraud
19. Mail Theft
20. Passport Fraud
21. Phone Fraud  
22. Social Security Number Misuse
23. Student Loans
24. Tax Fraud
25. The Fair Credit Reporting Act (FCRA)    
   25 A Fair Credit Billing Act (FCBA)
   25 B Nationwide Specialty Consumer Reporting Agencies


Appendix A Credit Score - Glossary of Terms


Appendix B How do you read a credit report

How to Read an Equifax Credit Report
How to Read an TransUnion Credit Report

How to Read an Experian Credit Report

Bibliography

Bob Pearce & Associates

 


Down load the Prefix and Appendix for this study material - here This will provide your with a complete student manual - Click this link for MS Word File in 1997 - 2003 version. Print these two PDF files out as well - PDF 1, PDF 2 (How to read credit Reports)

Down load the Prefix and Appendix for this study material - here This will provide your with a complete student manual - Click this link for MS Word File in 2007 version. Print these two PDF files out as well - PDF 1, PDF 2 (How to read credit Reports)

 

Identity Theft Protection & Recovery
Written by Robert Pearce©
CA Licensed Private Investigator, PI-CA-23161
(661 400-3813)
Bob Pearce & Associates
www.bobpearce.com

 

Disclaimer

The information contained in this course on Identity Theft is educational and intended for informational purposes only. It does not constitute legal advice as the instructor is not an attorney, and does not represent that legal advice of any kind. The instructor is a licensed private investigator and has dealt with identity theft issues. The opinions expressed by the instructor are solely the opinions of the instructor. Furthermore, the instructor does not hold himself out to be bondable credit repair agency or service.

While much of the information provided in this course is about legal issues, it does not constitute the practice of law and should not be relied upon as such. The law changes rapidly and can differ greatly from jurisdiction to jurisdiction. Even similar laws can be interpreted differently by different courts or different jurisdictions. Bob Pearce disclaims all liability of any kind arising from the use, or misuse, of the information contained and referenced herein. Although the instructor tries to keep up with changes in laws and procedures, he does not accept responsibility for accuracy or any errors or omissions due to changes in laws and policies. If you have specific questions, please seek legal counsel to assist you with your concerns.

Section I

1. Introduction

Think of the course as a "How To Book." A plain nuts and bolts approach to Identity Theft. You will learn what to do and how to do it. It's that simple.

The subject of identity theft can be broken down into three areas. In the First section we will learn about the crime of Identity Theft in general, your rights as a victim and maybe most importantly - how to recognize if you have become a victim of Identity Theft. external events in your life will usually tell you something is wrong and in a big way. The goal here is to train oneself to recognize the breach sooner in order to limit and contain the damage before it spreads to other parts of your life.

Secondly
, we will learn what one can do to make it harder for someone to steal your identity. Think of this step as protecting your identity or reputation before is is stolen. This second part, prevention, requires some behavior modification some real work by the individual.

Next, and for the few unfortunate souls among us who learn this third part of the subject in infinite detail - what do to when it happens to you. The goal here is to have a dress rehearsal, or check list made out in advance. So if and when disaster strikes there should be absolutely NO question in your mind about what needs to be done. This will require you to have collected all the important financial information in one place ahead of time and to have that information under lock and key.

Every good treatment of Identity Theft will include a list of resources you can read at your leisure. Most of this information is in the form of web sites, class handouts and government publications. Some of which you should read now, whether you do or do not continue your readings in Identity Theft - Prevention & Recovery.

For a copy of your free credit report go to https://www.annualcreditreport.com This central site allows you to request a free credit file, commonly called a credit report, once every 12 months from each of the three nationwide consumer credit reporting companies: Equifax, Experian and TransUnion. Each of these three companies offer 1 free credit report yearly. So, chose a different company every 4 months and monitor your credit report every 4 months.

There are two books on Identity Theft I recommend . The first is a mandatory read for everyone. The second book is to be used if and when ID Theft occurs in your life. The two books, are both written by Mari Frank, an attorney who unfortunately became a victim of Identity Theft herself. The first book, "Safeguard Your Identity: Protect Yourself With A Personal Privacy Audit" will teach you, in great detail, how to guard against all kinds of Identity Theft.

Learn from her experiences and have all the tools at your disposal to guard against Identity theft. More importantly, if it does happen to you, there is the second book "Victim to Victor" which will walk you through the process, step by step in clearing your good credit and undoing the damage.

Please visit the Identity Theft Prevention and Survival web site at www.identitytheft.org. The is Mari Franks website and where you can order her books. You also find information about Mari’s mediation and training at www.marifrank.com. And last but not least check out the Privacy Rights Clearinghouse website for more information than you could ever imagine.

It is prevention, detection and recovery that everyone needs to learn. Check with your local junior college for a class on Identity Theft.

Some Important Points to Remember - from http://www.idtheftcenter.org

  • Identity theft is an emotionally destructive crime.
  • You will be scared. You will be confused. Your ability to trust anyone in the future will be severely tested.
  • Identity theft is a repetitive crime and you may display symptoms associated with repeated physical assault. It feels like it will never end, especially when you keep receiving more notices by phone or in the mail from creditors.
  • Many victims report that financial, emotional and criminal assault on their good names has either permanently impacted their lives or has continued for years.
  • Victims typically uncover more evidence in a case than does law enforcement.

Statistics

http://www.spendonlife.com/guide/identity-theft-statistics

Identity Theft Statistics

Identity Theft Statistics

Identity Theft is the fastest growing crime in America Over the past two years have seen in excess of 9 million victims a year The mean cost per victim is $500 71% of fraud happens within a week of stealing a victim’s personal data.

Stolen wallets and physical documents accounted for 43% of all identity theft While online methods accounted for only 11%. 38-48% discover someone has stolen their identity within three months, while 9-18% of victims don't learn that their identity has been stolen for four or more years

Businesses across the world lose $221 billion a year due to identity theft (Aberdeen Group). On average, victims lose between $851 and $1,378 out-of-pocket trying to resolve identity theft (ITRC Aftermath Study, 2004). The mean cost per victim is $500 (Javelin Strategy and Research, 2009).

47% of victims encounter problems qualifying for a new loan (ITRC Aftermath Study, 2004). 70% of victims have difficulty removing negative information that resulted from identity theft from their credit reports (ITRC Aftermath Study, 2004). Dollar amount lost per household averaged $1,620 (U.S. DOJ, 2005).

It can take up to 5,840 hours (the equivalent of working a full-time job for two years) to correct the damage from ID theft, depending on the severity of the case (ITRC Aftermath Study, 2004). The average victim spends 330 hours repairing the damage (ITRC Aftermath Study, 2004). It takes 26-32% of victims between 4 and 6 months to straighten out problems caused by identity theft; 11-23% of victims spend 7 months to a year resolving their cases (ITRC Aftermath Study, 2004)

Stolen wallets and physical paperwork accounts for almost half (43%) of all identity theft (Javelin Strategy and Research, 2009). * Online methods accounted for only 11% (Javelin Strategy and Research, 2009). * More than 35 million data records were compromised in corporate and government data breaches in 2008 (ITRC).

Credit Card fraud (26%): Credit card fraud can occur when someone acquires your credit card number and uses it to make a purchase. Utilities fraud (18%): Utilities are opened using the name of a child or someone who does not live at the residence. Parents desperate for water, gas, and electricity will use their child’s clean credit report to be approved for utilities. Bank fraud (17%): There are many forms of bank fraud, including check theft, changing the amount on a check, and ATM pass code theft. Employment fraud (12%): Employment fraud occurs when someone without a valid Social Security number borrows someone else’s to obtain a job.  Loan fraud (5%): Loan fraud occurs when someone applies for a loan in your name. This can occur even if the Social Security number does not match the name exactly.  Government fraud (9%): This type of fraud includes tax, Social Security, and driver license fraud. Other (13%)

http://www.spendonlife.com/guide/identity-theft-statistics

 

[Top]

Much of the following information was taken from government publications

A Word About Identity Theft Products

Recent headlines about data breaches and losses of personal information have prompted many companies to advertise products or services to help consumers prevent or minimize their risk of identity theft. The Federal Trade Commission (FTC), the nation's consumer protection agency, says before you pay for an identity theft prevention product or service, make sure you understand exactly what you're paying for. Many people find value and convenience in paying an outside party to help them exercise their rights and protect their information. At the same time, some rights and protections you have under federal or state laws can help you protect your identity and recover from identity theft at no cost.

Knowing and understanding your rights can help you determine whether - or which - commercial products or services may be appropriate for you. In this class we learn all about those rights.

Identity theft protection companies offer a range if products and services for sale. Some allow you to "lock," "flag," or "freeze" your credit reports. Often, the companies advertising these services simply are offering to place a fraud alert or credit freeze on your report. These services also may renew or update your alerts or freezes automatically, as long as you continue to pay. Under the law, initial fraud alerts and renewals are available for free if you have reason to believe you have been - or are about to be - a victim of identity theft. Some companies, including consumer reporting companies, offer subscriptions to credit monitoring services. These services track your credit report, and generally send you an email alert reflecting recent activity, such as an inquiry or new account. Typically, the more frequent or more detailed the report, the more expensive the service.

Some companies offer services to help you rebuild your identity in the event of identity theft. Typically, these services operate by obtaining a limited power of attorney from you, which enables the company to act on your behalf when dealing with consumer reporting companies, creditors, or other information sources. Many companies may offer additional services, including removing your name from mailing lists for prescreened offers of credit or insurance, representing your legal interests, "guaranteeing" . reimbursement in the event you experience a loss due to identity theft, or helping you track down whether your personal information has been exposed online.

Before you agree to pay for any of these services, read the fine print. You can get some of them yourself at no cost: for example, if you decide you don't want to receive prescreened offers of credit and insurance, you can opt out for five years or permanently by calling toll-free 1-888-5-0PTOUT (l-888-567-8688) or visiting www.optoutprescreen.com or www.donotcall.gov however using the website may cost you $5. In this course you will to do the above and much more yourself for free or very little cost!

A word about Fraud Alerts, Security Freezes and Active Duty Alerts

A fraud alert is a signal placed on your credit profile or credit report notifying potential creditors that they must use "reasonable polices and procedures" to verify your identity before they issue new credit in your name.  A fraud alert may stop someone from opening new credit in your name, however it may not prevent the misuse of your existing credit. Under the Fair Credit Reporting Act (FCRA) you are entitle to two kinds of fraud alerts: initial and extended.If: you are going to be employed away from your active duty station and you don’t expect to need new credit while you are away, consider placing an Active Duty Alert on your credit Report. It is effective for 1 year rather than 3 months as with the non-military public, unless you ask for it to be removed sooner

If you think you are about to become a victim of Identity Theft, because your purse or wallet was stolen or lost, place an initial fraud alert on your credit profile.  The initial fraud alert is good for 90 days. Notify any one of the three credit reporting agencies (CRAs) and the BRA you contacted will contact the other 2.

Contact the Fraud Victim Departments as follows:

Equifax: (800) 525-6285
Experian (888) 397-3742
Trans Union (800) 680-7289

You can also request that only the last four digits of your social security number appear on you reports.  At the time you file a fraud alert, you are entitled to one free credit report from each of the three CRAs.  As time passes and you actually become a victim of Identity Theft, go ahead and request an "Extended" fraud alert.

Your will need to provide the CRAs with a copy of your local law enforcement Identity Theft" report. Also report this crime to The Federal Trade Commission (FTC) @ (877) FTC-HELP or (877) 382-4357. The FTC maintains a nation wide database accessible by civil and law enforcement agencies through the country. The database is called the Consumer Sentinel Network

When you place an extended fraud alert on your file it is good for seven years, At this time you are entitled to two free credit reports from all three CRAs. Also, when you upgrade your initial fraud alert to an extended fraud alert, the CRAs automatically put you name on the Do Not Call List for prescreened offers of credit for 5 years.   

A security freeze is good for 5 years and may or may not cost you anything. Here in California you have to pay $10 to each of the three credit reporting agencies and if you are married the cost is double that. Like a regular security freeze potential new creditors cannot see your credit report unless you unfreeze your report for them. If a potential credit cannot see your credit history, chances are they will not grant you any additional credit.

More about fraud alerts and security freezes later, for know that fraud alerts both initial (90 days) and extended (5 years) both can be placed on your credit profile over the telephone and the security freeze must be done in writing in chapter 6B

So you notice an error in your file and you write the consumer reporting agency. They have 30 days to investigate and must provide you with all pertinent information about the transaction. But what do you do if they refuse to correct the error. Well you have the right to ask that a “statement of the dispute” be included on your file and in future reports for all to see.

How long can a consumer reporting company report negative information? A consumer reporting company can report most accurate negative information for seven years and bankruptcy information for 10 years. There is no time limit on reporting information about criminal convictions; information reported in response to your application for a job that pays more than $75,000 a year; and information reported because you've applied for more than $150,000 worth of credit or life insurance. Information about a lawsuit or an unpaid judgment against you can be reported for seven years or until the statute of limitations runs out, whichever is longer.

 

2. What is Identity Theft

If I were to break into your house while you were away at work, and I stole something of value or I stoles alot of things of value from you, when you arrived home, you would be upset, but the event would be over. You would only need wait for your insurance company to replace your material goods. How do you stop someone from using your identity to your disavantage, when you don't know who there are, where they are or what they will do next. The answer is "You Don't" All we can hope do is make it harder for him or here to do it again in the future. Law enforcement catch and convict about 3% of all identity theft crimes.

Identity theft occurs when “someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crime.” The definition Fraud is as follows: “A knowing misrepresentation of the truth or concealment of a material fact to induce another to act to his or her detriment.” There are plenty of kinds of FRAUD: Bank Fraud, Criminal Fraud, Insurance Fraud, Mail Fraud, Tax Fraud, Real-estate Fraud, Credit Card Fraud, Welfare Fraud, Workers, Compensation Fraud and Medical Practice Fraud just to name a few.

Know the Federal Trade Commission is working with law enforcement agencies, businesses, consumer groups , and organizations across the country to help deter, detect and defend against identity theft. Identity theft is a serious crime. It will cost you time and money to recover from. By taking this course you will be informed and empowered to keep these costs to a minimum

[Top]

Personal Indentifiers

Your Personal Identifiers include, but are not necessarily limited to the following:

  • - Name, first, last & middle name
    - Drivers license #
    - Your social security number
    - Date of birth
    - Home addresses
    - Place of employment
    - Work and home phone numbers
    - The name of your bank or savings & loan
    - The PIN number to one or more of your ATM type cards
    - Property you own, cars, boats planes, homes, etc.,
    - Biometric data: facial, retinal scans & fingerprints
    - Your voice print, which is a recording of your voice
    - Your physical appearance: height, height, build, tattoos, birth marks, etc.
    - Credit card numbers
    - Any and all personal identification numbers (PIN’s)
    - Any and all passwords or user names
    - Alien registration numbers
    - United States or other country passport numbers
    - School identifications number
    - Health insurance / dental insurance identification numbers
    - State or federal drivers license numbers
    - Your employee number if you work outside the home.
    - Professional or occupation numbers
    - Telephone numbers: land line, cell and FAX numbers
    - Ham radio call sign numbers and letters
    - Mother’s maiden name
    - Checking and savings account numbers
    - Any financial asset account numbers i.e. brokerage account numbers
    - Retirement plan accounts at banks and other institutions

    [Top]

 

3. The Law is on Your Side - California Penal Codes

  • 368 .0 Persons Causing Pain, Suffering, or Injury to Elder or Dependent Adult; Theft, Embezzlement, Forgery or Fraud by Caretaker.
  • 528.0 Every person who falsely personates another…
  • 529.0 Conspiracy Defined
  • 529 a Manufacture, Sale or Possession of False Birth Certificate or Baptismal Certificate
  • 529.5 Manufacture, Sale or Possession of Document Purporting to be Government Issued Identification Card or Drivers License
  • 529.7 Obtaining or Assisting in Obtaining Documents Issued by Department of Motor Vehicles for Persons Not Entitled to Documents
  • 530.0 Receiving Property in Assumed Character
  • 530.5 Unlawful Use of Personal Identifying Information
  • 530.55 For purposes of this chapter, "person" means ...
  • 530.6 Victim of Suspected Identity Theft may Initiate Investigation and Petition Court for Determination of Factual Innocence.
  • 530.7 Department of Justice Data Base of Identity Theft Victims
  • 530.8 Person’s Right to Receive Information Relating to Application Made or Account Opened in Person’s Name by Unauthorized Person: Requirements for Information Request.

Generally speaking:

368 .0 Persons Causing Pain, Suffering, or Injury to Elder or Dependent Adult; Theft, Embezzlement, Forgery or Fraud by Caretaker.

Generally speaking Penal Code 368.0 lays out the crimes & associated punishments for taking advantage of elders and dependent adults. In the past they have mentioned theft, forgery fraud, physical and emotional pain, etc. But, here in paragraphs d) and e), they specifically add identity theft to the list of crimes as defined in CA Penal Code 530.5 which is at the center of Identity Theft.

528.0 Every person who falsely personates another…

“Falsely personates another, and in such assumed character marries or pretends to marry, or to sustain the marriage” I guess you can’t pretend to be someone else and go off and get married or even try to act married.

529.0 Conspiracy Defined

There is that falsely personates another phrase again. Looks like you cannot post bail pretending to be someone else. You cannot acknowledge, publish or verify or approve of any written document nor have it notarized. You cannot pretend to be someone else for the purpose of obligating them to any debt, or penalty. Big fine here, $10,000 and / or prison time.

529 a Manufacture, Sale or Possession of False Birth Certificate or Baptismal Certificate

1 year in the county jail for falsifying / fabricating a Certificate of Birth (Birth Certificate) or a Certificate of Baptism. If you are found to be in possession of either of the above two mentioned documents belonging to someone else (excluding family members) coupled with the INTENT to represent yourself as someone else or conceal your own true identity (Only Batman is allowed to conceal his identity) you are breaking the law and could get up to a year in the county jail.

529.5 Manufacture, Sale or Possession of Document Purporting to be Government Issued Identification Card or Drivers License

If you make or sell any California Government issued Drivers License or Identification Card you can receive up to a year in the county jail and/or a $1,000 fine.

529.7 Obtaining or Assisting in Obtaining Documents Issued by Department of Motor Vehicles for Persons Not Entitled to Documents

530.0 Receiving Property in Assumed Character

If your are caught doing the previous more than once (CA DL or ID card) the fine is upped to $5,000 along with our and/or a year in the county jail. And, if you are even found to be in possession of a fake CA issued DL or ID card and you know it was a fake you’re a breaking the law. Fine $1,000 to $2,500.

$1,000 fine and/or up to 1 year in jail for helping someone else obtain a California issued Drivers License, ID Card or Vehicle Registration Certificate. Pretending to be someone else in order to receive a delivery of money or property coupled with the INTENT to do so is also against the law as is it were larceny (Theft) Penal Code 484 Larceny

530.5 Unlawful Use of Personal Identifying Information

Anyone who obtains personal identifying information of another and uses this information to obtain:

  • 1) Goods
  • 2) Services
  • 3) Credit
  • 4) Real Property
  • 5)Medical Information
Is guilty of a crime, conviction for which will include a fine and/or jail time.

530.55 For purposes of this chapter, "person" means ...

Our new laws are NOT just limited to individual human beings but also include the following forms of ownership:

  • 1) Firms
  • 2) Associations
  • 3) The Deceased
  • 4) Partnerships
  • 5) Business Trusts
  • 6) Companies
  • 7) Limited Liability Companies
  • 8) Public Entities
  • 9) Or just about any other legal entity you can think of

530.6 Victim of Suspected Identity Theft may Initiate Investigation and Petition Court for Determination of Factual Innocence.

Everyone has the right to file a report with their local law enforcement organization who shall take a report from the ID theft victim and give you, the victim, a copy of you report filed with them.

530.7 Department of Justice Data Base of Identity Theft Victims

If you accidentally get arrested, because someone else gave the local Sheriff your identification claiming to be you and he or she is arrested and prosecuted you have the right to ask the courts to look over the situation and any and all information you provide and you have the right to ask the court to so state that you were not involved in the crime in any way, shape or form and that they (being the court) will issue whatever certifying paper work deemed necessary to show your innocence in your future dealings.

The Department of Justice (State) shall keep a database, of victims who suffer from ID, theft which will include your fingerprints. Secondly, you are to have access to this database. Access in general to this database will be limited to victims, criminal justice agencies and any individuals or agencies authorized by you the victim. And finally the Department of Justice will maintain a Toll free number to the administrator of this database.

530.8 Person’s Right to Receive Information Relating to Application Made or Account Opened in Person’s Name by Unauthorized Person: Requirements for Information Request.

And finally if your impostor opens an account in your name, you or law enforcement may contact the organization that established the account and receive from them any all information provided by the impostor. They must act within 10 business day of your request. They must provide everything you ask for. This will help you to see how your impostor is actually operating, what information he or she has be using to your detriment. And the Attorney General, the district attorney, or the prosecuting city attorney will file a petition to compel them too if necessary.. [Top]


4. How do You Know You Have Become a Victim !

    • Bill collectors start showing up at your door regarding strange transactions
    • Credit card activity begins to appear on your statement- unrelated to you
    • The supermarket calls because your checks are bouncing.
    • Someone else picked up your dry cleaning.
    • Like the commercial on TV says “My report got wacked.”
    • You loose out on a slam dunk job opening.
    • Or worse yet – your are arrested following a simple traffic stop!
    • Someone may establish phone or wireless service in your name.
    • They may open a bank account in your name and write bad checks on that account.
    • Someone may buy a car by taking out an auto loan in your name.
    • Someone may get identification such as a driver’s license issued with their picture, in your name.
    • Some has used your medical information to seek treatment in another part of the state or country that your insurance company has paid for
    • Your quarterly review of your credit report show new credit granted that you did not ask for, such as a car or boat loan, new credit card etc.
      [Top]

Section II

5. A New Mental State of Mind is Required

As I mentioned earlier, this course is modeled after Mari Franks Book, “Safeguard your Identity”, however she has written an EXCELLENT companion book “From Victim to Victor”. Use this second book should identity theft creep into your life. Her second book will provide you with a step by step instructions for clearing your good name,

Your new mental state of mind will require you to do some work in the immediate future and some other work later on. When I say later on, I mean for the rest of your life on planet earth you will need to practice good, safe, identity theft hygiene.

Bottom line, you have to act, to think, to expend energy - to engage your gray matter to get the results you need out of this class! You must put into practice what you learn from this course.

First your are going to practice a little extra vigilance for the rest of your life. This world, our world today, is not the one we were born into. We are going to lean to adapt to the one we live in now and this means developing better habits.

From now on, you will trust less and question more. Question the waiter or waitress who comes back with your American Express Card 25 minutes after you gave it to him. When you go on vacation you will NOT stop the mail at the U.S. Post Office nor will you STOP the newspapers. Instead you will have a trusted neighbor, pick up your mail and newspapers daily.

You will not use the ATM machine next time if you think the person behind you is standing to close or maybe even looking directly over your shoulder, even though you really need to use the ATM machine now! Rather you, will instead, come back later to use the ATM machine.

You will order a free credit report every 4 months and scrutinize it. By rotating which credit reporting agency you use every four months, you will be able to review your credit report three (3) times a year.

You will stop using your debit cards entirely and cut them up and close out that account number card. You will use, only credit cards from now on. When the person on the other end of the phone starts asking you about personal identifies, your radar should be up and running. Consider the context of the situation and think -"Is it reasonable that this person to be asking me this information now at this point in time knowing everything I know about this person and the purpose of their phone call.

You will not respond to phishing schemes coming through your e-mail and you will learn to easily recognize them a such.

[Top]

A Few words about Phishing ------------------------------------------------------------------------

A good article on phishing, everyone should read, is in The Scientific American, December 2008, Page 104 - 110. "Can Phishing be Foiled?" By Lorrie Faith Cranor.

The Anti-Phishing Workgroup can be found a the following URL: http://APWG.org. Play the online game "Anti-Phishing Phil" to increase your ability to detect phishing emails. http://cups.cs.cmu.edu/antiphishing_phil After reading this section, hone your detection skills

Phishing is a form of online crime that lures people into giving up personal or corporate information.

It works because it exploits our human vulnerabilities.

Phishing scams are constructed by con artists to look like legitimate communications from well known, respected companies.

They work by asking their victims to take URGENT action to avoid a negative situation or stimulus, or to receive something or worth

Malware is the name given to this type of software. Software designed to retriever information the crooks are looking for.

In 2007, it is estimated that every month 55,000 attempts were successful. It is estimated that in the year 2008, around 3.6 million of us where snookered - leading to losses in excess of 3.2 billion dollars!

Computer security experts are leaning to develop email filters that recognize these phishing emails for what they are, which helps stamp them out, however the bad guys keep evolving with more sophisticated methods as well.

OK, so now we know what phishing is in general, we need to learn some NEW skills ourselves to detect them. These filters mentioned earlier are still pretty new.

Lucky for us, there are little clues to look for that will tip us off that these emails are bad news.

Look out for a new software program coming soon under the name "Wombat Security Technology/Technologies" This software will probably offer email filtering for our emails..

What is evolved in spotting a phishing email: here are 4 tips for catching these emails.

First off, the Logos and artwork they use is the real thing, lifted from the real companies website, so there is no help there in spotting a phishing email. The artwork will be the real thing.

Second, Look for the urgent situation that the sky is falling, the message of impending doom that beckons you to take immediate action. For instance:
Your account is about to be deactivated, or your users privilege's are in jeopardy or you could be facing additional unnecessary cost if you fail to act now! Or maybe it is a notification that your password has expired.

Third, Mouseover a blue hyperlink, "http://...."and compare to the value of the URL displayed. The blue hyperlinked words will not match the value you see when you roll the mouse over this web link. They may not match, which is a indication of a phony address.

Fourth, The email will offer you access to the legitimate email address/web address and then later on in the body of the email, where they prompt you to act and act now, they pull the old switch-aroo and offer a phony link.

Fifth, be suspicious of URL,s that have any one of the following characteristics:
   uses an "@"
   use an "-"
   uses an IP address
   or a URL that uses more than five dots in its address

Finally, if the email looks fishy assume it is and delete it. Make the company contact you by phone or U.S. mail if they legitimate
   
Most phishing scam projects have a relatively new domain name and automated filters can check for the age of the web site.

Lori Faith Cranor's research team learned that people can be trained to protect themselves from phishing scams. However ones skills must be constantly practiced, as the bad guys are constantly adapting and evolving.

Know that there is a international team out there working on ways to detect and nullify phishing.

There is a particular kind phishing called "Spear Phishing", where an employee receives an email, supposedly from their immediate supervisor or higher up in their management structure, (which instantly would let anyone's guard down), where perpetrators are asking for personal identifiers on a subordinate employee.

The overall goal here is to learn to recognize a Phishing e-mail before you take the requested action - thus fulfilling the bad guys request.

Web browser companies as you might expect, are already beginning to install Anti-Phishing filters.

For late breaking information go to and bookmark this working group fighting Phishing, http://apwg.org

BAD NEWS - The folks who brought you Phishing are now plying their trade via instant messaging, mobile phones, text messaging and on-line games

What does that me for us? Don't think Phishing is limited to your Internet email

In summary, the word about phishing is this. NEVER click on links asking for information found on your list of personal identifiers.

[Top]


6. Steps to Minimize Your Exposure to Identity Theft

  • Buy a cross cut shredder and use it!
  • Review you credit report every 4 months for free
  • Don’t use DEBIT cards….ever!
  • Photocopy all your credit cards front and back, and store this information under lock and key.
  • Never ever give out personal identifiers to e-mail requests
  • Every computer in your home and at work should have a good firewall application and virus protection – I recommend ..Norton or Symantec Company, they are one in the same.
  • Always take credit card receipts with you when you leave
  • Don’t let anyone write a credit card numbers on your …checks
  • PIN numbers should never ever contain parts of a social SSNs
  • Mother’s maiden name should never be used for a password
  • Do not let anyone write your CA driver's license number on one of your personal checks.
  • Never carry your social security card on your person!
  • Never subscribe to file sharing services on your computer such as for sharing music etc.
  • Don’t provide unnecessary information to retailers, drivers license numbers, dates of birth etc.
  • Don’t provide any personal information when you’re using a credit card. Some people write on the back of their credit card “see photo ID” instead of a signature. This forces retailers to check for a driver’s license. You may show your driver’s license, but don’t allow retailers to write down the number anywhere (on your credit card receipt), and don’t provide your Social Security number or other personal information.
  • What about identity theft precautions in the workplace? The workplace is a gold mine for identity thieves and probably where the bulk of the material is taken from, so exercise your duty while at work and do not leave such material accessible to others that do not have a need to know.
  • When completing an application for a job, do not provide your Social Security number until you are strongly considered for a position. If they complain, tell them you took this course and I told you to withhold it until you have a solid job offer
  • Experts suggest before you apply for a position, review your own credit report completely. Although you may believe that your credit report has nothing to do with your job, many employers fell that if you can’t manage your finances, you might be a risk for theft, especially if you’re dealing with financial information.
  • Order your Earnings and Benefits Statement form the Social Security Administration at 800 772-1213 or www.ssa.gov, and review the current earnings statement. Do this once a year.
The following 46 tips are from the Privacy Rights Website, http://www.privacyrights.org/fs/fs17-it.htm#cards

1. Reduce the number of credit card you carry in your wallet. We recommend that you do not use debit cards because of the potential for losses to your checking account (see above). Instead, carry one or two credit cards and your ATM card in your wallet. Nonetheless, debit cards are popular. If you do use them, take advantage of online access to your bank account to monitor account activity frequently. Report evidence of fraud to your financial institution immediately.

2. When using your credit and debit cards at restaurants and stores, pay close attention to how the magnetic stripe information is swiped by the waiter or clerk. Dishonest employees have been known to use small handheld devices called skimmers to quickly swipe the card and then later download the account number data onto a personal computer. The thief uses the account data for Internet shopping and/or the creation of counterfeit cards.

3. Do not use debit cards when shopping online. Use a credit card because you are better protected in case of fraud. See our online shopping guide, www.privacyrights.org/fs/fs23-shopping.htm.

4. Keep a list or photocopy of all your credit cards, debit cards, bank accounts, and investments -- the account numbers, expiration dates and telephone numbers of the customer service and fraud departments -- in a secure place (not your wallet or purse) so you can quickly contact these companies in case your credit cards have been stolen or accounts are being used fraudulently.

5. Never give out your SSN, credit or debit card number or other personal information over the phone, by mail, or on the Internet unless you have a trusted business relationship with the company and you have initiated the call. Identity thieves have been known to call their victims with a fake story that goes something like this. "Today is your lucky day! You have been chosen by the Publishers Consolidated Sweepstakes to receive a free trip to the Bahamas. All we need is your Social Security number, credit card number and expiration date to verify you as the lucky winner."

6. Always take credit card receipts with you. Never toss them in a public trash container. When shopping, put receipts in your wallet rather than in the shopping bag.

7. Never permit your credit card number to be written onto your checks. It's a violation of California law (Civil Code sec. 1725) and laws in many other states, and puts you at risk for fraud.

8. Watch the mail when you expect a new or reissued credit card to arrive. Contact the issuer if the card does not arrive.

9. Order your credit report at least once a year. Federal law gives you the right to one free credit report each year from the three credit bureaus: Equifax, Experian, and TransUnion. If you are a victim of identity theft, your credit report will contain the telltale signs – inquiries that were not generated by you, as well as credit accounts that you did not open. The earlier you detect fraud, the easier and quicker it will be to clean up your credit files and regain your financial health.

How to order your free annual credit report:

By telephone: (877) 322-8228
Online: www.annualcreditreport.com
By mail. Print out the order form here: https://www.annualcreditreport.com/cra/requestformfinal.pdf
10. Residents in seven states can obtain free annual credit reports under state law, in addition to the free reports available under federal law. These states are: Colorado, Maine, Massachusetts, Maryland, New Jersey, Vermont, and Georgia (two free reports per year in Georgia). If you live in one of these states, be sure to order both your free reports under federal law as well as state law each year – enabling you to even more effectively monitor your credit files on an ongoing basis.

11. As of November 2007, individuals nationwide are able to "freeze" their credit reports with Equifax, Experian, and TransUnion. By freezing your credit reports, you can prevent credit issuers from accessing your credit files except when you give permission. This effectively prevents thieves from opening up new credit card and loan accounts. In most states, security freezes are available at no charge to identity theft victims and for a relatively small fee for non-victims.

The California Office of Privacy Protection provides a guide on security freezes for Californians www.privacy.ca.gov/sheets/cis10securityfreeze.pdf.

For state-by-state information on security freezes, visit this Consumers Union web page: www.consumersunion.org/campaigns//learn_more/003484indiv.html

12. Several companies, including the three credit bureaus, offer credit monitoring services for an annual fee ranging from $50-$120 a year. They notify you when there is any activity on your credit report, thus alerting you to possible fraud. We do not endorse credit monitoring services because we believe that individuals should not have to pay a fee to track their credit. If you decide to subscribe, be sure to choose a service that monitors all three credit reports on an ongoing basis. You can create your own credit monitoring strategy at no cost by ordering one of your free credit reports each four months, as explained above. For more information about monitoring services, visit www.fightidentitytheft.com/credit-monitoring.html . Another source for comparative information is www.knowzy.com/credit-monitoring-comparison.htm A further resource is www.videocreditscore.com/credit-score-product-comparisons/ . No endorsements are implied.

13. There are many identity theft insurance products available to consumers. We do not recommend them unless they are available as a free or low-cost rider on an existing insurance policy. For more information on such insurance products, visit www.iii.org/individuals/other/insurance/identitytheft (no endorsements implied).

Passwords and PINS:

14. When creating passwords and PINs (personal identification numbers), do not use the last four digits of your Social Security number, mother's mother's maiden name, your birth date, middle name, pet's name, consecutive numbers or anything else that could easily be discovered by thieves. It's It's best to create passwords that combine letters and numbers.

Here's a tip to create a password that is strong and easy to remember. Think of a favorite line of poetry, like "Mary had a little lamb." Use the first or last letters to create a password. Use numbers to make it stronger. For example, MHALL, or better yet MHA2L!. The longer the string, the harder it is to crack.

15. Ask your financial institutions to add extra security protection to your account. Most will allow you to use an additional code or password (a number or word) when accessing your account. Do not use your mother's maiden name, SSN, or date or birth, as these are easily obtained by identity thieves. If asked to create a reminder question, do not use one that is easily answered by others.

16. Memorize all your passwords. Don't record them on anything in your wallet.

17. Shield your hand when using a bank ATM machine or making long distance phone calls with your phone card. "Shoulder surfers" may be nearby with binoculars or video camera.

Social Security numbers:

18. Protect your Social Security number (SSN). Release it only when absolutely necessary (like tax forms, employment records, most banking, stock and property transactions). The SSN is the key to your credit and banking accounts and is the prime target of criminals. If a business requests your SSN, ask if it has an alternative number that can be used instead. Speak to a manager or supervisor if your request is not honored. Ask to see the company's written policy on SSNs. If necessary, take your business elsewhere. If the SSN is requested by a government agency, look for the Privacy Act notice. This will tell you if your SSN is required, what will be done with it, and what happens if you refuse to provide it. If your state uses your SSN as your driver's license number, ask to substitute another number.

If possible, do not provide the SSN on job applications. Offer to provide it when you are interviewed or when a background check is conducted. (Read PRC Fact Sheet 10 on SSNs, www.privacyrights.org/fs/fs10-ssn.htm and Fact Sheet 25 on online job seeking tips, www.privacyrights.org/fs/fs25-JobSeekerPriv.htm.)

19. Do not have your SSN or driver's license number printed on your checks. Don't let merchants hand-write the SSN onto your checks because of the risk of fraud.

20. Do not say your SSN out loud when you are in a public place. And do not let merchants, health care providers, or others say your SSN out loud. Whisper or write it down on a piece of paper instead. Be sure to retrieve and shred that paper.

21. Examine your Social Security Personal Earnings and Benefits Estimate Statement each year to check for fraud. The Social Security Administration mails it to adult-age SSN holders about three months before the birthday. The SSA web site has additional information, www.ssa.gov/mystatement. Reach them by phone at (800) 772-1213.

22. Do not carry your SSN card in your wallet except for situations when it is required, the first day on the job, for example. If possible, do not carry wallet cards that display the SSN, such as insurance cards, except when needed to receive health care services. A California law places restrictions on the display and transmission of SSNs by companies. It is being phased in through 2005. For more information, read the California Office of Privacy Protection guide on SSN "recommended practices," at www.oispp.ca.gov/consumer_privacy/pdf/ssnrecommendations.pdf.

If you feel you must carry your health insurance or Medicare card with you at all times, try this. Photocopy the card and cut it down to wallet size. Then remove or cut out the last four digits of the SSN. Carry that with you rather than the actual card. But be sure to carry your original Medicare card with you the first time you visit your health care provider. They are likely to want to make a photocopy of it for their files.

23. It is a violation of federal law for state motor vehicles departments to use the Social Security number as the driver’s license (DL) number. (Intelligence Reform and Terrorism Prevention Act of 2004, implemented December 17, 2005) If you are carrying an older driver’s license containing your SSN that is not yet ready for renewal, contact the motor vehicles agency in your state and request to have your DL replaced before the actual renewal date. This way, you are not carrying a document in your wallet that contains your SSN.

Internet and computer safeguards:

24. Install a firewall on your home computer to prevent hackers from obtaining personal identifying and financial data from your hard drive. This is especially important if you connect to the Internet by DSL or cable modem.

25. Install and update virus protection software to prevent a worm or virus from causing your computer to send out files or other stored information.

26. Password-protect files that contain sensitive personal data, such as financial account information. Create passwords that combine 6-8 numbers and letters, upper and lower case. In addition, encrypt sensitive files.

27. When shopping online, do business with companies that provide transaction security protection, and that have strong privacy and security policies. For more online shopping tips, read PRC Fact Sheet 23, www.privacyrights.org/fs/fs23-shopping.htm. "https"

28. Before disposing of your computer, remove data by using a strong "wipe" utility program. Do not rely on the "delete" function to remove files containing sensitive information.

29. Never respond to "phishing" email messages. These appear to be from your bank, eBay, or PayPal. They instruct you to visit their web site, which looks just like the real thing. There, you are told to confirm your account information, provide your SSN, date of birth and other personal information. Legitimate financial companies never email their customers with such requests. These messages are the work of fraudsters attempting to obtain personal information in order to commit identity theft. Visit www.antiphishing.org.

30. Be aware that file-sharing and file-swapping programs expose your computer to illegitimate access by hackers and fraudsters. If you use such programs, make sure you comply with the law and know what you are doing. Install and update strong firewall and virus protection.

Many file-sharing programs are downloaded by youngsters without the knowledge of their parents. There are software programs available that identify file sharing software and locate shared files on home computers. For more information on safe surfing for families, visit www.getnetwise.org.

Reducing access to your personal data:

33. To reduce the amount of personal information that is "out there," take these steps:

Remove your name from the marketing lists of the three credit reporting bureaus -- Equifax, Experian, and TransUnion. Call 888-5OPTOUT or go online to www.optoutprescreen.com. This will limit the number of pre-approved offers of credit that you receive. These, when tossed into the garbage, are a potential target of identity thieves who use them to order credit cards in your name. (See PRC Fact Sheet 6 for more information, www.privacyrights.org/fs/fs6-crdt.htm.) Sign up for the Federal Trade Commission's National Do Not Call Registry. Your name is added to name deletion lists used by nationwide marketers. You may also need to register for your state's "do not call" list, if it has one

National Do Not Call Registry,
www.donotcall.gov, (888) 382-1222
FTC's Do Not Call FAQ,
https://www.donotcall.gov/faq/faqdefault.aspx


Sign up for the Direct Marketing Association's Mail Preference Service. Your name is added to name deletion lists used by nationwide marketers.
Mail Preference Service, PO Box 643, Carmel, NY 10512 (Include $1 check or money order.)

Or opt-out online: https://www.dmachoice.org/dma/member/regist.action A credit card is required for verification only. There is no fee for opting out online.

Have your name and address removed from the phone book and reverse directories. (See PRC Fact Sheet 4 on tips for reducing junk mail, c.) Opt-out of the sale or sharing of your financial information when given the opportunity by your bank, credit card companies, insurance companies, and investment firms. Read PRC Fact Sheet 24

34. Install a locked mailbox at your residence to deter mail theft. Or use a post office box or a commercial mailbox service. When you are away from home for an extended time, have your mail held at the Post Office, or ask a trusted neighbor to pick it up.

35. When ordering new checks, pick them up at the bank. Don't have them mailed to your home. If you have a post office box, use that address on your checks rather than your home address so thieves will not know where you live.

36. When you pay bills, do not leave the envelopes containing your checks at your mailbox for the postal carrier to pick up, or in open boxes at the receptionist's desk in your workplace. If stolen, your checks can be altered and then cashed by the impostor. It is best to mail bills and other sensitive items at the drop boxes inside the post office rather than neighborhood drop boxes. If you use a neighborhood drop box, always deposit the mail before the last pickup of the day.

Responsible information handling:

37. Each month, carefully review your credit card, bank and phone statements, including cellular phone bills, for unauthorized use. (For more information on cell phone fraud, see PRC Fact Sheet 2

38. Convert as much bill-paying as you can to automatic deductions from your checking account and/or credit account Consider using the Internet for banking and paying bills. With fewer account statements and bills mailed to your home, you will reduce the risk of mail theft and identity theft.

39. Do not toss pre-approved credit offers in your trash or recycling bin without first tearing them into very small pieces or shredding them with a crosscut shredder. They can be used by "dumpster divers" to order credit cards in your name and mail them to their address. Do the same with other sensitive information like credit card receipts, phone bills, bank account statements, investment account reports, and so on. Home shredders can be purchased in many office supply stores. We recommend crosscut shredders.

40. Use a gel pen for writing checks. Experts say that gel ink contains tiny particles of color that are trapped in the paper, making check washing more difficult .

41. Demand that financial institutions adequately safeguard your data. Password protect your accounts. Discourage your bank from using the last four digits of the SSN as the PIN number they assign to customers. If you have been given the last four SSN digits as a default PIN, change it to something else.

Insist they destroy paper and magnetic records before discarding them. By not adopting responsible information-handling practices, they put their customers at risk for fraud.

42. When you fill out loan or credit applications, find out how the company disposes of them. If you are not convinced that they store them in locked files and/or shred them, take your business elsewhere. Some auto dealerships, department stores, car rental agencies, and video stores have been known to be careless with customer applications.

When you pay by credit card, ask the business how it stores and disposes of the forms. Avoid paying by credit card if you think the business is not careful. When paying with credit cards on the Internet, be sure the company uses secure transmission and storage methods. See PRC Fact Sheet 23 on safe online shopping tips

43. Store canceled checks in a safe place. In the wrong hands, they could reveal a lot of information about you, including the account number, your phone number and driver's license number. If you rent a storage locker, take extra precautions when storing canceled checks, tax return information, and other sensitive financial information. Storage lockers are popular targets for robbers.

44. Store personal information securely in your home, especially if you have roommates, employ outside help, or have service work done in your home. Use a locking file cabinet or safe.

45. Any entity that handles personal information should train all its employees, from top to bottom, on responsible information-handling practices. Persuade the companies, government agencies, and nonprofit agencies with which you are associated to adopt privacy policies and conduct privacy training. (Read Fact Sheet 12 on responsible information-handling, and our workplace identity theft prevention tips, )

46. Remember, if you are a victim of identity theft, or if your wallet or SSN has been lost or stolen, read our Fact Sheet 17a, "Identity Theft: What to Do if It Happens to You," on our website at . If your wallet or your Social Security number has been lost or stolen, place fraud alerts on your three credit reports right away. Instructions are provided in step one of Fact Sheet 17a.



[Top]


6A. Ordering & Reviewing Your Free Credit Reports

Equifax Company Website                 TransUnion Company Website                  The Experian Company Website

Your credit file is a snap shot in history that includes historical information regarding your ability to make timely, regular payments on your installment debts, credit balances, mortgage, care loan, utilities, department store cards etc.

The FICO® Score isderived from the application of a credit scoring model created by the Fair, Isaac Company to a consumer's credit file held by a credit reporting company. FICO® scores range from the 300s to the 900s, but almost all consumers have a score between 500 and 850.

Go to the Annual Credit Report website at https://www.annualcreditreport.com/cra/index.jsp Order a free credit report every 4 months. Use a different credit agency every 4 months – hence 3/yr. For instance use Experian In January, Trans Union in May and Equifax in September. Then start all over again next January with Experian ! Pay special attention to the literature that comes with your Equifax credit report. Theirs are a little squirrely to understand. One can also order a credit report by calling the web site's telephone number: 877 322-8228 or by mailing in the completed Annual Credit Report Request Form to:

    Annual Credit Report Request
    P.O. Box 105281
    Atlanta, GA 30348-5281

Reading a Credit Report - Here is a PDF File that shows you how , What is a Credit Score Also check the links at the end of the course

Once you've obtained a copy of your credit report, you'll be able to see what your creditors are saying about you. There's just one problem -- credit reports can be a little confusing. In the following paragraphs you'll find a step-by-step explanation of how to read and interpret each section of your credit report.

WARNING: The Fair Credit Reporting Act requires each of the nationwide consumer reporting companies – Equifax, Experian, and TransUnion – to provide you with a free copy of your credit report, at your request, once every 12 months. The three companies have set up one central website, toll-free telephone number, and mailing address through which you can order your free credit reports. The Federal Trade Commission (FTC), the nation’s consumer protection agency, wants you to know that, if you want to order your free annual credit report online, there is only one authorized website: www.annualcreditreport.com.

When examining your credit report/profile you will find the following section:

I.D. Section

Here you'll find identifying information like your:

* name
* current address
* social security number
* date of birth
* spouse's name (if applicable)

Read all the entries to make sure everything is correct. One bad piece of information and the credit history listed on your report could be wrong.

Credit History Section

This is the meat of the report. It contains a list of your open and paid credit accounts and indicates any late payments reported by your creditors. Although it may seem a little tedious, it's essential that you read through this section very thoroughly. If you find any information that is incorrect or accounts that don't belong to you, you will want to submit a dispute letter to the credit-reporting agency.

How do you read a credit report?

The basic format for the credit history section (see sample) is as follows:

Company Name - identifies the company that is reporting the information.

Account Number - lists your account number with the company.

Whose Account - Indicates who is responsible for the account and the type of participation you have with the account. Abbreviations may vary depending on the reporting agency - here are some of the most common:

    I -    Individual
   U -  Undesignated
    J  -   Joint
   A -  Authorized User
   M - Maker
   T -  Terminated
   C -  Co-maker/Co-signer
   S -  Shared

Date Opened - This is the month and year you opened the account with the credit grantor.

Months Reviewed - Lists the number of months the account history has been reported.

Last Activity - Indicates the date of the last activity on the account. This may be the date of your last payment or last charge.

High Credit - Represents the highest amount charged or the credit limit. If the account is an installment loan, the original loan amount will be listed.

Terms - For installment loans, the number of installments may be listed or the amount of the monthly payments. For revolving accounts, this column is often     left blank.

Balance - Indicates the amount owed on the account at the time it was reported.

Past Due - This column lists any amount past due at the time the information was reported.

Status - A combination of letters and numbers are used to indicate the type of account and the timeliness of payments.

Abbreviations for the type of account are as follows:

O - Open
R - Revolving
I -  Installment
Abbreviations for timeliness of payment varies among agencies. Numbers are used to represent how current you are in your payments. Current or    paid as agreed is usually represented by 0 or 1. Larger numbers (up to 9) indicate that an account is past due - so the lower the number the better.
Date reported - Indicates the last time information on this account was updated by your creditor.

Collection Accounts Section

If you've had any accounts referred to collection agencies in the last seven years, this is where they will be reported. The name of the collection agency will be listed along with the amount you owe and, in some cases, their contact information. If a collection is listed on your report that doesn't look familiar to you, contact the credit bureau and submit a dispute letter.

For your own piece of mind, you may also want to contact the collection agency to determine the nature of the account. Here's why.

You may find out that the collection account is not yours. Perhaps it belongs to someone whose name or social security number is very similar to yours. If this is the case, ask the collection agency to acknowledge this fact in writing. They should send a copy of the letter to you AND the credit reporting agency so that the mistaken information can be cleared from your report.

You may find out that the collection account is yours. If so, it is in your best interest to determine the accuracy of the amount of the collection account and make arrangements to satisfy your obligation as quickly as possible. Once the collection account has been paid, you should request a letter from the collection agency to this effect. Again, make sure the credit reporting agency gets a copy of the letter so that they can list the account as paid.

Courthouse Records Section

This section may also be referred to as Public Records. Here you'll find a listing of public record items (obtained from local, state and federal courts) that reflect your history of meeting financial obligations. These include:

Bankruptcy records:
- Tax liens
- Judgments
- Collection accounts
- Overdue child support (in some states)

Look closely at all the information listed here. If anything is mistaken, contact the credit bureau and submit a dispute letter.

Additional Informational

This section consists primarily of former addresses and past employers as reported by your creditors.

Inquiry Section

Contains a list of the businesses that have received your credit report in the last 24 months. If you find the names of businesses that sound unfamiliar, you should find out who they are and why they're looking at your credit! The credit-reporting agency may be able to help you with contact information. Remember, only companies that have received your written authorization should be able to check your credit history.

The amount of time information is retained or the length of time that information remains in your file varies.

Credit and collection accounts will be reported for 7 years from the date of the last activity with the original creditor.
If you've filed a Chapter 7 or Chapter 11 bankruptcy, this information will be reported for 10 years from the date filed.
All other courthouse records will be reported for 7 years from date filed. [Top]

After you have reviewed your credit report you should spend an equal amount of time reviewing reports from another related industry. National Specialty Consumer Reporting Firms collect non-financial information that if wrong could create almost as many problems as an error in your credit profile.

6B. The Security Freeze

Experts suggest that everyone place a security freeze on their credit history. So how do we Freeze our credit history? Take the letters found on your CD-ROM, under the security freeze folder and fill them out on your computer and mail them to the credit bureaus along with a check for $10 per letter.. The letter looks something like this:

The Security Freeze Work Packet

===========================SAMPLE LETTER=========================


Date:


Equifax Security Freeze
P.O. Box 105788
Atlanta, GA 30348


Dear Equifax:

I would like to place a security freeze on my credit file.

My full name is:

My current home address is:

My former home address is:

My Social Security number is:

My date of birth is:

As a proof of residence, I have enclosed a copy of my ____________ utility bill from _________ (Date on Bill)

I will pay the fee of $10 for placing the freeze by check number __________.


Yours truly,

Sign Here ____________________
Your Name
Your Address
Your Home Phone
Your Work Phone

=========================== End of Letter ================================

 

The Security Freeze Letters in MS Word 1997-2003   Security Freeze Instructions On-Line at Equifax
The Security Freeze Letters in MS Word 2007   Security Freeze Instructions On-Line at TransUnion
    Security Freeze Instructions On-Line at Experian
     

The above letters are simply a fill in the blanks letter prepared in advance. Why bother to freeze your credit history ? To restrict companies from granting your look-a-like (impostor) new or extended credit…as in letting them buy some big ticket item with your good credit and sticking you with the bill.

How does a Security freeze work? With a security freeze we setup a situation where they (the credit grantors) needs a user I.D. and or PIN number provided by you and only you to bring up your credit history file on their little computer. And without seeing your credit history they are very, very reluctant to grant/extend credit for new big ticket purchases to you or your impostor, particularly in today's tight credit markets.

Does my spouse have to send the same letter to all three credit reporting agencies in order to have their file frozen too? YES. Remember, 2 people, 3 credit bureaus = 6 letters. If your single, it’s 3 separate letters at $10 per letter and if you have a significant other, its 6 letters, two per each credit bureau. And if you manage to loose the CD-ROM, just cut n-paste the above sample letter.  Remember your Look-A-Like will not have this secret Pin! So he or she will not be opening or extending credit in your name.

If you have already become a victim of identity theft, here in California, you are entitled to a FREE security freeze from the Big 3 credit bureaus. If they balk, refer them To “The California Civil Code SS 1785.11.2 to 1785.11.6." They may want to see a copy of your "police report", which in our case with be a Los Angeles County Sheriff's / Kern County Sheriff's report.(LASD).

Each credit bureau has a different method for allowing you to by-pass your security freeze. When you receive your correspondence from the credit bureaus, each letter will be slightly different than the other two – hence they will explain slightly different procedures for unlocking your credit history file for someone to see. Remember I said a security freeze means your credit file cannot be seen by potential creditor(s) well that is almost true.

The credit history industry left a few holes in the Fair Credit Reporting Act legislation big enough to drive their trucks through. They can still see records to mail out new offers of credit to your home, providing you do not opt out of their marketing plans. Credit bureaus must place the freeze no later than 5 days business days after receiving your request. They have 3 business days in which to lift a security freeze at your request. However, do not expect to receive any correspondence for about 4 to 6 weeks.

While your security freeze is in effect, new creditors can not see you credit score - which also means no new credit for you! unless you can furnish the mechant the password and or PIN number.

Do not ever use your mother-in-law’s maiden for an easy to remember password - NEVER!

[Top]




6C. Key Web Sites, Links & State / Federal Government Publications

Key Web Sites

http://www.idtheftcenter.org/ The Identity Theft Resource Center
The ITRC is located in San Diego, CA
Identity Theft Resource Center
PO Box 26833
San Diego CA 92196
Phone: (858) 693-7935
Mon-Fri 9am-4:30pm Pacific Time
Email: itrc@idtheftcenter.org

For a listing of form letters maintaiined by the above website, visit their Doument Catalogue Page for up to date forms. Once there, you will see a link at the very bottom of the page for the following form letters available for you to use.

  LF1 00 – 1 Initial Victim of Identity Theft Statement and Fraudulent Account Information Request to Credit Issuers or Merchants
LF 100 - 2 Confirmation of Conversation - Letter of Clearance
LF 100-3 To Credit Issuers: Requesting a Fraudulent Inquiry to be Removed
LF 115-1 A Letter from the Victim to the Credit Issuer when the imposter will not cooperate
LF 115-2 Imposter Accepting Responsibility for Accounts or Charges
LF 115-3 When Both Parties Reach an Agreement to Resolve the Case
LF 116 Claim of Fraudulent Account - To a Collection Agency and/or Merchant
LF 117-1 Request a Credit Report for the Deceased
LF 117-2 Identity Theft and the Deceased
LF 120 Requesting a Child's Credit Report
LF 124A Request a Credit Freeze
LF 124B Request a 7 Year Fraud Alert
LF 124C Request a 90 Day Fraud Alert
LF 124D Request the Removal of a Fraudulent Inquiry
LF 126 Initial Victim of Identity Theft Statement and Fraudulent Account Information Request for Checking Account Fraud
LF 130A Request to Receive and Correct Medical Records
 

 

WWW.IDENTITYTHEFT.ORG Mari Frank's Web Site

WWW.PRIVACY.CA.GOV The State of California's Office of Privacy Protection

WWW.ONGUARDONLINE.GOV The Federal Trade Commission (FTC) maintains OnGuardOnline.gov with significant contributions from partners on this page.

ftc.gov/bcp/edu/microsites/idtheft/ Federal Trade Commission's Microsite on Identity Theft

http://dca.lacounty.gov/ The Los Angeles County Department of Consumer Affairs

Consumer credit reporting agencies:

Equifax: 800 685-1111

Experian: 888 397-3742

Trans Union: 310 973-0161

On Guard On-Line , OnGuardOnLine.gov provides practical tips from the Federal Government and technology industry to help you be on guard against internet fraud...Their Site Map

Download Adobe Reader

California is the first state to have an agency dedicated to promoting and protecting the privacy rights of consumers. Now located in the California Office of Information Security and Privacy Protection, the Office of Privacy Protection was created by legislation in 2000 and opened in 2001. Its mission is to identify consumer problems in the privacy area and encourage the development of fair information practices

This California State Government Office of Privacy web site also has consumer information sheets on:

Here are Fact Sheets & Other Publications- Federal Government: PDF format on this CD-ROM

 

How to Read a Privacy Policy
How to “Freeze” Your Credit Files
How to Order Your Free Credit Reports
How to Use the California Identity Theft Registry
Identity Theft and the Deceased
Identity Theft Victim Checklist
Leave Me Alone, How to slow the Flow of Unwanted Communications
Protecting Your Child’s Privacy Online
Requesting Information on Fraudulent Accounts A Guide for Identity Theft Victims
Stop-Think-Click - OnGuardOnline
Top 10 Tips for Identity Theft Protection
When Your Child's Identity is Stolen
Your Financial Privacy Rights
Your Patient Privacy Rights - A Consumer Guide to Health Information Privacy in California
Your Social Security Number, Controlling the Key to Identity Theft

 

Download Adobe Reader

FDIC publications:

Classic Cons ... And How to Counter Them
A Crook Has Drained Your Account. Who Pays?
Banking and Credit, ATM and Debit Cards: What To Do If They're Lost or Stolen

OCC publications:

Check Fraud: A Guide to Avoiding Losses
How to Avoid Becoming a Victim of Identity Theft
Identity Theft and Pretext Calling Advisory Letter 2001-4


Social Security Administration (SSA) - www.ssa.gov
Office of the Comptroller of the Currency (OCC) - www.occ.treas.gov
National Credit Union Administration (NCUA) - www.ncua.gov
Federal Reserve System (Fed) - www.federalreserve.gov
Office of Thrift Supervision (OTS) www.ots.treas.gov

U, S. Trustee (UST) - www.usdoj.gov/ust
U.S. Securities and Exchange Commission (SEC) - www.sec.gov
U.S, Postal Inspection Service (USPIS) -postalinspectors.uspis.gov/
Federal Communications Commission www.fcc.gov
Federal Communications Commission - Email your questions to: fccinfo@fcc.gov

Internal Revenue Service (IRS) - www.treas.gov/irs/ci
National Fraud Information Center - www.fraud.org
The Office Privacy Protection www.privacy.ca.gov

http://www.idtheftcenter.org/artman2/publish/c_resources/ITRC_Document_Catalogue.shtml Follow this link for a listing of Publications available from
The Identity Theft Resource Center


[Top]

6D. Opting Out

There are three different organizations you will want to contact to get on their Do No Call list. The three organizations are the National Credit Reporting Agencies, The Federal government's Do Not Call website and the Direct Marketing Association’s (DMA) Mail Preference Service

First, the National Credit Reporting Agencies (CRAs) are required by law to provide a toll-free numbers that you can call to request your name not be sold for purpose of credit solicitation – (pre-approved lines of credit) . 888 5OPOUT Or (888) 567-8688.

Secondly The National Do Not Call Registry gives you a choice about whether to receive telemarketing calls at home. Most telemarketers should not call your number once it has been on the registry for 31 days. If they do, you can file a complaint at this Website. You can register your home or mobile phone for free.Your registration will not expire. Telephone numbers placed on the National Do Not Call Registry will remain on it permanently due to the Do-Not-Call Improvement Act of 2007, which became law in February 2008. Go to ww.donotcall.gov, this in the National Do Not Call Website

The Do-Not-Call registry does not prevent all unwanted calls. It does not cover the following:
* calls from organizations with which you have established a business relationship
* calls for which you have given prior written permission
* calls which are not commercial or do not include unsolicited advertisements
* calls by or on behalf of tax-exempt nonprofit organizations

The National Do-Not-Call list protects home voice or personal wireless phone numbers only. While you may be able to register a business number, your registration will not make telephone solicitations to that number unlawful. Similarly, registering either a home or business fax number will not make sending a fax advertisement to that number unlawful, but the FCC has separate rules that prohibit unsolicited fax advertisements under most circumstance

And thirdly, stop the selling of your information, (your personal identifiers) to junk mail brokerages.The Direct Marketing Association’s (DMA) Mail Preference Service lets you opt out of receiving unsolicited commercial mail from many national companies for five years. When you register with this service (for a $1 fee), your name will be put on a “delete” file and made available to direct-mail marketers. However, your registration will not stop mailings from organizations that do not use the DMA’s Mail Preference Service. To register with DMA’s Mail Preference Service, go to www.dmachoice.org. or call them at:212.768.7277 or write them at the address listed below:
    Direct Marketing Association,
    Mail Preference Service,
    P.O. Box 643,
    Carmel, NY 10512

Note: since the federal government began maintaining a National Do Not Call list, some states have discontinued their list.

If you do not want county assessor selling your property information along with other personal information, email or call these two organizations:
     (877) 774-2094 for Acxion
     (877) 970-9171 this is the opt out number for a company called Datquick

 

[Top]

6E. While on the Internet

Strengthen your computer’s log-in security, use a password with both letters and numbers

Your passwords are the keys to unlock the door to your identity, guard them!

Don’t give your password to anyone, not even your dog!

Tell your Internet service provider that your personal data is not for sale.!

Don’t register when visiting web sites on the Internet, unless you are certain it’s not a hoax site.

Don’t display your personal or family information on the Internet (this means web pages) - EVER

Remind your children, to never put personal information about themselves or of their family on the Internet.
 
Set limits for your children’s usage of the internet. You are the parent here! www.safekids.com

Be cautious with peer-to-peer file sharing (p-2-pe., sharing music files, 1) Do not set it up or allow it on your computer - EVER
 
Don’t trust love interests you meet online, unless You are looking for trouble. Why? People on the web can pass themselves off as just about anyone and you have no way of knowing if they are who they say they are

Remain anonymous and use a nickname for your screen name.

Erase your name from Internet online directories. Most online directories provide (opt-out opportunities) www.bigfoot.com, www.Four11.com, www.InfoSpace.com, ..www.Switchboard.com, www.whowhere.com

Opt out of “lookup” companies’ like www.lexis-nexis.com

Make sure you are on the web site of the company that you really think you’re doing business with. If the URL in the address section of that web page doesn’t exactly match the site you think it is, go on the front page of the actual site (i.e. ebay.com, PayPal.com, ..Best Buy.com, AOL.com)

If you must buy, use your credit card to order, it’s safer than sending a check or cash.

When you use a credit card, if you haven’t received the product by the time your credit card statement arrives, you can let the credit card company know that you have not received the product, and you can dispute the charge until the merchandise arrives or put the payment in suspension pending an investigation

Consider using a one-time credit card for shopping online and or consider using one-time use credit cards on the internet.
 
Junk e-mail.: Microsoft, Outlook, Eudora for the PC, Entourage for Macintosh, AOL, and Hotmail all have junk mail filters - Learn to use them.

Protect yourself when you are “always on” the Internet, with connections like DSL and cable networks by using your firewall products and virus checking software. Make sure you use a router and firewall protection too.
 
While in public places and online look over your shoulder occasionally.

[Top]

6F. Everyday Computer Use

  • Set up a password to get into your computer, use the one built into the Windows screen saver.
  • Do not use personal information in your password.
  • Do not use real words in your password
  • Mix character types by using upper and lower case
  • Include a special character in your password “ %, &, #, @”
  • Longer is better
  • Phrases are easier to remember
  • Don’t write down your passwords, especially not on your computer.
  • If you do store them on your computer, use encryption
  • Change passwords on a regular basis
  • Use different passwords on different accounts
  • Do not type passwords on computers you do not control



Install a good, reliable firewall, I recommend Peter Norton's / Symantec www.symantec.com.

Install, use, and continually update anti-virus software. Virus software that is out of date in just that -out of date and useless.

Don’t just give your computer away when you purchase a new one. Erase the hard drives with the appraise wipe disk product.

Go to http://www.whitecanyon.com/wipedrive-erase-hard-drive.php?source=google+wipe&gclid=COStqv2Jw5cCFQkiagodIwhyRw or use hard drive eraser software from: www.east-tec.com before giving away your computer.

Secure your laptop while traveling on airplanes and maintain a visual line of sight on it where and when possible

If your laptop is stolen on your trip, you may be able to get another computer at your destination and download your important files – at least you’ll have all your data on a CD instead of the laptop's harddrive

Did you know your can trace a stolen laptop’s location?

Tracing programs include zTrace (www.ztrace.com), and Computrace Plus ..(www.computrace.com).

When traveling, make sure that you place your other bags on first, so that you’ll have time to get through the screening before someone steals your laptop.

Encrypt your confidential data before you leave on a trip.

Programs such as Pretty Good Privacy (www.pgp.com) make the job easy, and if you have Windows XP, you already have the tools needed.

Back up your data before you leave for you trip. Make a CD or 2 to leave locked up at home.

Don’t store financial or sensitive information on your laptop. Keep it on a separate CD.

Look around to see who’s watching you when you go online at work or at a friend’s house or at Starbuck’s. People around you can watch what you’re doing. Never let anyone see you input a password on your computer. Use your hand to shield the keyboard so no one can see the letters that you’re inputting.

Never use a public computer, such as an Internet café, a library, or airport computer to access your sensitive financial information. Just don't do it.

Fraudsters love to access these public computers. They download key logging software or attach key logging hardware that records every key typed in and every web site accessed. You have no idea that your keystrokes are captured. When the fraudster returns (after you’re gone), he accesses the hidden key log and has all the information you had input. If you typed in passwords and confidential information, he can steal your identity and transfer money out of your accounts!

Use a reliable pay service such as PayPal.com or Escrow.com .

Complain at the FBI’s web site for fraud.

It’s pretty easy these days to be defrauded, so if you become a victim, make a complaint at the FBI web site at www.IFCCFBI.gov along with your report to your local law enforcement. If it is Identity Theft you will want to report it to the FTC as well, they maintain a national databases accessible to law enforcement and civilian agencies.

If you download any file that you don’t recognize, for heaven sakes do not open it.

Download all patches for your programs.

Get on an e-mail notification service (like Microsoft) so that you know to download all new patches in Windows and other programs you use.

Delete cookies or use anti-cookie software. Cookies can often capture you user ID and password.

Protect yourself from spyware. Use Peter Norton's Symantec Anti Virus and firewall products. www.symantec.com

In fact, both good and bad guys collect data about us when we’re online.

To rid your PC of spyware and popup adware, download free software called Spybot. You can get this at www.download.com at no cost. There is also Spy Cop (www.spycop.com), which will alert you if you’re being watched or if key-logging programs are on your computer.

Rid yourself of pop-ups or adware by going to this site and install their popup blocker. www.ada-ware.com Also check with your ISP for a popup blocker.

If your e-mail is used for you business, of course you’re going to want to put your contact information so people can do business with you. But you should not be putting your home address, home phone number, personal (private email) and other personal data in a signature file or on a non-business related web page.

I repeat, Don’t put your personal e-mail address on your web site.

Don’t get hooked by a “phishing” expedition.

In April 2004, a survey conducted by the Gartner technology research firm estimated that 52 million American adults had received phishing emails within the past year. Of those surveyed who received such emails, 3 percent, (representing about 1.8 million individuals), said they disclosed personal or financial information. That is a pretty good return on investment. A good direct mail campaign yields only a 4% response. Never answer any emails that asks either directly, indirectly, or through a web site for any of your personal identifying information.

Make a copy of the questionable web site’s URL and forward it to the legitimate business and ask if the request is legitimate.

Don’t be gullible.

Be cautious of scam letters. If it sounds to good to be true, then it is!

To find out about more of these financial scams, go to the United States Secret Service web site at www.secretservice.gov. If you receive any of these letters, forward them on to the Secret Service, the FBI, or the Federal Trade Commission, but do not ever reply to the sender. Forward this and other types of spam to Spam@uce.gov.

Think of your private email address as having public access. Don’t put confidential or controversial information in your emails.

Be cautious when participating in instant messaging.

Don’t trust any stranger online, and if you are corresponding with a good friend, don’t share secrets online.

Take extra precautions to hide on the Internet. How? Use the products found at www.annonymiser.com.  Anonymous surfing enables anonymous web browsing which hides your IP address so online snoops are unable to track the sites you visit and build profiles on your internet activities.

Consider using a temporary e-mail address at Hotmail, Yahoo, or Google, then after while if you’re not comfortable or you feel that you’re being harassed, or your identity is in danger, you can close that account and get a new one.

Visit an internet safety organization such as Cyber Angels (www.cyberangels.org) or the Federal Trade Commission (www.FTC.gov), for additional precautions.

Anonymous Internet connections are available for a price You may wish to use Anonymiser software. Go to www.annonymiser.com.

Order your credit reports at least twice a year and shoot for 3 times per year.

Don't forget to shred your computer generated, paper personal and confidential information before discarding it.

Be leery of anyone you have met exclusively on the web or Internet. Why. Because they may not be who the say they are and you have limited abilities to verify this information. I could throw up a web site and pretend to be just anyone and how would you know to contrary?


[Top]

 

6G. When Traveling

The goal here is to safekeep your identity outside of your home.

Remember, a little paranoia with regard to protecting your identity is NOT a bad idea.

Defend yourself when traveling!

HOW: Never leave your purse, wallet, or identification in your car even if it’s locked. Keep it with you (on your body or in your purse/fanny pack.

HOW: It’s better to use traveler’s checks or credit cards when traveling, rather than using your checks. Think of all that information on one of your personal checks, so leave that check book and unnecessary credit cards at home.

In any country, use you ATM card only for taking out cash when traveling. Make sure that you don’t use an ATM debit card that has a Visa/MasterCard logo on it, because if that’s stolen, it can be used to take the money directly out of your account. Remember, you are no longer going to use debit cards.
 
Remove unnecessary documents and extra credit cards from your wallet before traveling. Thin down and lighten up that wallet or purse.
 
Business Travelers Beware. Tags on suitcases: Use you name but write in an old address.

If you travel for business, make sure that the personal and private information on your laptop is password protected and contained in encrypted files. Or better yet, let's not put that data on your laptops harddrive to begin with.

It’s best to utilize the hotel safe while you’re out of the room or take the highly sensitive documents with you. (meaning a CD-ROM) . Just don not leave them on a laptop you leave in your room for a bite to eat. Someone can be in and out within minutes downloading files or sending them over the internet using FTP. The same method you use to transfer HTML files to and from your website.

Exercise caution when your are traveling and someone tries to distract you. Raise you hand, and/or step back a few feet and STOP the action. Say "Hold on a minute buster" and put your radar in gear - size up the situation - remember your new skill - situational awareness.

Don’t stop your mail when you’re going out of town. Not only do we hear of victims who’ve had their mail stolen from post office boxes but also numerous victims say that they thought the safest thing to do was to stop their mail when they left for vacation. Instead, it is far safer to get a trusted family member or, a very trusted neighbor that you’ve known for a long time, and have that neighbor get you mail when they pick up their own, and bring it into their house.

Don’t stop delivery of your newspaper either. Have your trusted neighbor pick it up daily.

Obviously, you don’t want to have a pile of papers thrown on your doorstep. However, police tell us that insiders working for newspapers will let the bad guys know when you’ve gone on vacation.

Guard your information (Personal Identifiers) in public places as if it were cold hard cash, because for someone else they can translate that information into cash

If at all possible, protect your privacy and identity when dealing with professionals.

[Top]

Section III


7. What to do if You do Become a Victim of Identity Theft

First buy Mari Frank's other book if you have been the victim of Identity Theft. It will provide you with a step by step process for recovering your good name and credit while erasing the damage done to your credit history. Remember, a credit report is just a snapshot of your history - your ability to use credit and pay it back in a timely manner as well as utility bills and other installment debt. Think of this second book as a "Lawyer in a Box" where you have access to $10,000 plus worth of an attorney's time for forty bucks.

PORPOISE PRESS, INC. (800) 725-0807 or Visit www.identitytheft.org


PORPOISE PRESS, INC. (800) 725-0807 or Visit www.identitytheft.org

And Secondly, call all three Credit Bureaus and place a fraud alert on your credit reports. The first credit agency to receive your call will notify the other two credit agencies, but do you want to rely on them

Equifax: 800 685-1111, www.equifax.com; P.O. Box 740241, Atlanta, GA 30374-0241 - Call them first
Experian: 888 397-3742, www.experian.com; P.O. Box 532, Allen, TX 75013
TransUnion:310 973-0161,www.transunion.com; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA 92834-6790

Thirdly, Close out all your credit accounts involved and have new credit cards issued with new account numbers. Call and speak with someone in the security or fraud department of each company. Follow up in writing, and include copies (NOT originals) of supporting documents. It’s important to notify credit card companies and banks in writing. Send your letters by certified mail, return receipt requested, so that you can document what the company received and when. And needless to say, keep a file of your correspondence and enclosures.

It is import to note that Mari Frank leaves no stone unturned. She will organize you, prioritize your work, she will have you mailing the right letter at the right time to the right people. She effectively holds your hand through this entire ordeal, from beginning to end. Because everyone's personal situation of identity theft will be different, the application of Mari Frank's second book will be a little different for each and everyone of you.

And finally, call your Local Law Enforcement and tell them you need to file an Identity Theft Report. If the ID Theft took place in another state then contact that State's Attorney General's Office. I would also Google the geographic area in which you believe the theft took place and contact the region's local law enforcement.

And let's not forget to visit the FTC at or call them at 877 438-4338 or by mail at:
  Identity Theft Clearing House
  Federal Trade Commission
  Washington, DC 20580)

The Federal Trade Commission maintains a national database accessible to law enforcement and civilian agencies.

If your social security number has been compromised, you will want to report your situation to the the Social Security Administration, and , If your impostor got arrested and or convicted of a crime, you will want to notify the California State Department of Justice to register in their ID Theft database . Contact them if your name has some how become "mistakenly associated with the record of a criminal" activity.

After you have contacted the Credit Reporting Agencies, ordered a copy of your credit history, called your local law enforcement, and maybe the FTC you also might want to do the following depending on your specific situation:

* Contact all creditors, by phone and in writing, where fraudulent use has occurred.
* Check with your bank in the event your checks are stolen, also ask them about fraudulent accounts- accounts that you yourself did not open.
* Notify your utilities companies especially if any new accounts open or have been opened in your name.
* If your driver's license or ID is stolen contact DMV.
* After trying to resolve the problem and if you do not have established credit, call the social security administration to inquire about getting a new SSN    issued (restrictions apply). A new SSN does not ensure a new credit record and the absence of credit can make it hard to have credit so review what is    best for your situation.
* If you suspect your mail has been stolen, call the post office and inquire if a change of address was filed.
* Back everything up in writing.
* Make sure all stolen credit cards and checks are canceled.
* Call your other credit issuers and have your accounts password protected.

[Top]

 

7A. Let's Talk a Little More About Fraud Alerts

As you should know by now, to place a Fraud Alert on your credit history, you need to pick up the telephone and call one of the three CRA's found here . These are the telephone numbers for the Fraud Victims department at each of the CRA's. Remember, you only need to contact one of them, as the CRA will automatically contact the other two for you.

There are two types of fraud alerts: an initial alert, and an extended alert. An initial alert stays on your credit report for at least 90 days. An initial alert is appropriate if your wallet has been stolen or if you’ve been taken in by a “phishing” scam on the internet

When you place an initial fraud alert on your credit report, you’re entitled to one free credit report from each of the three nationwide consumer reporting companies. You can have an extended alert placed on your credit report if you’ve actually been a victim of identity theft and you provide the consumer reporting agency with an “identity theft report" from you local law enforcement agency.

When you place an extended alert on your credit report, you’re entitled to two free credit reports within 12 months from each of the three nationwide consumer reporting companies. You may have to remind them of their obligations. In addition, the consumer reporting agencies will remove your name from marketing lists for prescreened offers of credit for five years – unless you ask them to put your name back on the list before the 5 years expires. These offers would be unsolicited offers of credit you receive in the mail.

To place either of these alerts on your credit report, you will be required to provide appropriate proof of your identity, which may include your SSN, name, address and other personal information requested by the consumer reporting agency. To remove the fraud alert, you will need a copy of an identity theft report and proof of your identity.

Your initial or first fraud alert is good for only (3) three months, remember an extended alert is good for seven (7) years. An extended alert stays on your credit report for (7) seven years.

When a business sees the alert on your credit report, they must take reasonable efforts to verify your identity before issuing you credit or at least they are supposed too. A file with a fraud alert on it should be a big red flag to the big three credit reporting agencies. As a part of this verification process, the business may try to contact you directly. This may cause some delays if you’re trying to obtain credit. To compensate for possible delays, you may wish to include a cell phone number, where you can be reached easily, in your alert. Remember to keep all contact information in your alert current and up-to-date.

When you open new accounts, use new Personal Identification Numbers (PINs) and passwords. Avoid using easily available information like your mother’s maiden name, your birth date, the last four digits of your SSN or your phone number, or a series of consecutive numbers.

If the identity thief has made charges or debits on your accounts, or on faudulently opened accounts, ask the company for the forms to dispute those transactions. For charges and debits on existing accounts, ask the representative to send you the company’s fraud dispute forms. If the company doesn’t have special forms, use the sample letter (see hand out) to dispute the fraudulent charges or debits. In either case, write to the company at the address given for billing inquiries,” NOT the address for sending your payments.

For new unauthorized accounts, ask if the company accepts the ID Theft Affidavit. The ID Theft Affidavit can be found in Mari Franks books. If the do not accept this form, ask the representative to send you the company’s fraud dispute forms. Once you have resolved your identity theft dispute with the company, ask for a letter stating that the company has closed the disputed accounts and has discharged the fraudulent debts. This letter is your best proof if errors relating to this account reappear on your credit report or you are contacted again about the fraudulent debt.

So while you are waiting for your book to arrive you can review the websites listed in this course & read the handouts and government publications for the first time. Mari Franks “From Victim to Victor”, is a comprehensive , step by step guide to ending the nightmare of identity theft. By following Mari Frank’s detailed instructions you will reverse all the damage done to your good name & credit history. A credit report is simply a snapshot in time of your history of borrowing and a history of making payments. A history of your use of credit that has been extended to you by your various creditors.

Examining the appendix of Mari Frank’s second book, “Victim to Victor” will show you all the lawerly correspondence she has prepared for you to use. All of these letters are found on the accompanying CD-ROM. Already typed and waiting to be completed and mailed by you.

Mari shows you which letters to send to whom and when and why and what type of response to expect. She includes necessary log sheets, affidavits and housekeeping paperwork and logs to track your progress.

In excruciating detail Mari holds your hand and even shows you how to guard against mental issues during this stressful time in your life. And it is stressful! This second book answers the questions: Where do I start?, What do I need to start. What do I send to whom and when and how. What do I ask for?, What do I demand in writing. What do I do with the Sheriff’s report. How long should I expect to wait for replies to my correspondences. What to save, what to through out.

The appendix of her book looks something like this:

Appendix A (Letters, Affidavits, and Logs)
Letter 1 A: Dealing with Credit Reporting Agencies (Initial Letter)
B: Dealing with Credit Reporting Agencies (Follow-up Letter)
Letter 2 A: Dealing with Credit Grantors – With Fraud ;or Creditors, Banks, Department Stores, Phone Cards, Etc.) ..
B: Dealing with Credit Grantors (Collection Agencies)
C: Dealing with Credit Grantors – Non-Fraud
D: Dealing with Stolen Checks, Etc.
E: Dealing with Credit Grantors – Other Non-Fraud (For Bank Accounts, Investment Accounts, and Utility Companies) Letter 3 A: Dealing with Law Enforcement (Police Report) B: Dealing with Law Enforcement (Response to Refusal to Provide Police Report) C: Follow-up with Law Enforcement Police Report - After Credit Reports Received
1: Addendum to the Police
Letter 3 A : Dealing with Law Enforcement and Prosecutors Regarding Criminal Identity Theft (Where Perpetrator Commits Other Crimes In the Victim’s Name)
Letter 4 : Dealing with Postal Authorities (For Local Postmasters Where Fraudulent cards Were Sent)
Letter 5 A: Dealing with The Social Security Administration
Letter 5 B: Dealing with IRS/State Tax Board
Letter 6 A: Dealing with Department Of Motor Vehicles : Dealing with Insurance Providers (Auto, Healthcare, or other Insurance Policy if Necessary)
Letter 7 : Dealing with U.S. Passport Agency
Letter 8 A: Dealing with Civil Legal Actions Against You (Or Bankruptcy in Your Name)
Letter 8 B: Dealing with a Judge (after an Arrest of an Impersonator) - Victim Impact Statement
Letter 9 : Dealing with licensing Agencies

All of the above letters and logs can be found on the accompanying CD-ROM ready for your use.

Copies of completed applications at the businesses your impostor stole your identity may also prove that you are a victim. For example, you may be able to show that the signature on an application is not yours. These documents may contain information about the identity thief stole your identity and will be valuable to law enforcement. Remember, by law, companies must give you a copy of the application or other business transaction records relating to your identity theft -if you submit your request in writing. Be sure to ask the company representative where you should mail your request. Companies must provide these records at no charge to you within 30 days of receipt of your request and your supporting documents. This is one of your rights as a victim.

What Constitutes Proof of Your identity.

This may be a photocopy of a government-issued ID card, the same type of information the identity thief used to open or access the account with. Or, it may be the type of information the company usually requests from applicants or customers, and police reports including a completed affidavit which can be found in both of Mari Franks books.

You may find that most federal and state agencies, and some local police or sheriff departments, offer only "automated" reports - a report that does not require a face-to-face meeting with a law enforcement officer. Automated reports may be submitted online, or by telephone or mail. If you have a choice, do not use an automated report. Why? It's more difficult for the consumer reporting company or information provider to verify the information. Unless you are asking a consumer reporting company to place an extended fraud alert on your credit report, you will probably have to provide additional information or documentation when you use an automated report.

Accurate and complete records will help you to resolve your identity theft quicker than sloppy incomplete record keeping. Follow Mari Franks instructions, keep a telephone log, buy enough three ring binders etc.

With Mari's guidance you will have a plan when you contact each company. Don't assume that the person you talking to will give you all the information or help you need. Prepare a list of questions to ask the representative, as well as information about your identity theft. Don't end the call until you're sure you understand everything you've been told. If you need more help, ask to speak to a supervisor. Write down the name of everyone you talk to, what he or she tells you, and the date the conversation occurred. Take detailed notes on every telephone conversation.

Follow up in writing with all contacts you've made on the phone or in person. This sounds redundant but do it! Use certified mail, return receipt requested, so you can document when the company received your letter. Keep copies of all correspondence or forms you send. Keep the originals of supporting documents, like police reports and letters to and from creditors, send copies only. Set up a filing system for easy access to your paperwork. Don't worry, Mari will show you how. Keep old files even if you believe your case is closed. Once resolved, most cases stay resolved, but problems can crop up. Like a really stubborn weed in your yard.

[Top]

7B. How to Dispute Credit Report Errors

The FTC works for the consumer to prevent fraudulent, deceptive, and unfair business practices in the marketplace and to provide information to help consumers spot, stop, and avoid them. To file a complaint or to get free information on consumer issues, visit ftc.gov or call toll-free, 1-877-FTC-HELP
(1-877-382-4357); TTY: 1-866-653-4261. The FTC enters consumer complaints into the Consumer Sentinel Network, a secure online database and investigative tool used by hundreds of civil and law enforcement agencies in the U.S. and abroad.

Your credit report contains information about where you live, how you pay your bills, and whether you’ve been sued or arrested, or have filed for bankruptcy. Consumer reporting companies sell this information in your report to creditors, insurers, employers, and other businesses that use it to evaluate your applications for credit, insurance, employment, or renting a home. The federal Fair Credit Reporting Act (FCRA) promotes the accuracy and privacy of information in the files of the nation’s consumer reporting companies.

Make sure the information is accurate, complete, and up-to-date before you apply for a loan for a major purchase like a house or car, buy insurance, or apply for a job. That is why we should review ours every 4 months for free. Because the information in it affects whether you can get a loan — and how much you will have to pay to borrow money. Identity thieves may use your information to open a new credit card account in your name. Then, when they don’t pay the bills, the delinquent account is reported on your credit report not theirs.

Circumstances that entitle you to a FREE report

There are certain situations that if they arise, you are entitled to a FREE credit report outside the normal one per year from each of the Big 3 credit reporting companies

First of all, an adverse action automatically generates a FREE credit report. What is an adverse action? Someone denies your application for:
credit, insurance or employment based on information found in your credit report. Of course this only works is the entity your dealing with tells you based on something they found in your credit file, they are denying your application.

There are three other circumstances when you qualify for a free credit report, That is to say, one of the circumstances is present and for that reason you wish to review your credit history. 1) If your are unemployed and plan to look for a job, it might be a good idea to check your credit file. 2) If you are on welfare, you can order a free copy of your credit report, and finally, If your report is simply inaccurate due to fraud. And as you have learned Identity Theft is a form of fraud.

We have also learned that there are 3 ways to obtain a FREE credit reports, rather that paying the $10.50 or more some website charge for one.

Through there official website www.annualcreditreport.com or
By Calling 877-322-8228 or
By mailing in the completed Annual Credit Report Request Form to:

    Annual Credit Report Request
    P.O. Box 105281
    Atlanta, GA 30348-5281

Do not contact the three nationwide consumer reporting companies individually. They are providing free annual credit reports only through annualcreditreport.com, 1-877.322.8228, and Annual Credit Report Request Service, P.O. Box 105281, Atlanta, GA 30348.5281. Got It?

Under federal law, you’re also entitled to a free report if a company takes adverse action against you, such as denying your application for credit, insurance, or employment, based on information in your report. You must ask for your report within 60 days of receiving notice of the adverse action.

Remember, you’re also entitled to one free report a year if you’re unemployed and plan to look for a job within 60 days; if you’re on welfare; or if your report is inaccurate because of fraud, which includes identity theft.

Under the FCRA, both the consumer reporting company (CRA) and the information provider (that is, the person, company, or organization that provides information about you to a consumer reporting company) are responsible for correcting inaccurate or incomplete information in your report. To take advantage of all your rights under this law, contact both the consumer reporting company and the information provider.

Consumer reporting companies must investigate the items in question — usually within 30 days — unless they consider your dispute frivolous. They also must forward all the relevant data you provide about the inaccuracy to the organization that provided the information.

=============================== SAMPLE LETTER ===============================

Sample Dispute Letter

Date
Your Address
Your Address,
City, State, Zip Code


Complaint Department
Name of Company
Address
City, State, Zip Code


Dear Sir or Madam:

I am writing to dispute the following information in my file. I have circled the items I dispute on the attached copy of the report I received.

This item (identify item(s) disputed by name of source, such as creditors or tax court, and identify type of item, such as credit account, judgment, etc.) is (inaccurate or incomplete) because (describe what is inaccurate or incomplete and why). I am requesting that the item be removed (or request another specific change) to correct the information.

Enclosed are copies of (use this sentence if applicable and describe any enclosed documentation, such as payment records and court documents) supporting my position. Please reinvestigate this (these) matter(s) and (delete or correct) the disputed item(s) as soon as possible.

Sincerely,

Your name


Enclosures: (List what you are enclosing.)

See this link to an MS Word file format of the above letter

=================================================================================

When the investigation is complete, the consumer reporting company must give you the results in writing and a free copy of your report if the dispute results in a change. This free report does not count as your annual free report. If an item is changed or deleted, the consumer reporting company cannot put the disputed information back in your file unless the information provider verifies that it is accurate and complete.

If you ask, the consumer reporting company must send notices of any corrections to anyone who received your report in the past six months. And you can have a corrected copy of your report sent to anyone who received a copy during the past two years for employment purposes.

If an investigation doesn’t resolve your dispute with the consumer reporting company, you can ask that a statement of the dispute be included in your file and in future reports. You also can ask the consumer reporting company to provide your statement to anyone who received a copy of your report in the recent past. You can expect to pay a fee for this service.

Tell the creditor or other information provider, in writing, that you dispute an item. Be sure to include copies (NOT originals) of documents that support your position. Many providers specify an address for disputes. If the provider reports the item to a consumer reporting company, it must include a notice of your dispute. And if you are correct — that is, if the information is found to be inaccurate — the information provider may not report it again.

Not all creditors supply information to consumer reporting companies: some local retailers, credit unions, and travel, entertainment, and gasoline card companies are among the creditors that don’t.

If you’ve been told that you were denied credit because of an “insufficient credit file” or “no credit file” and you have accounts with creditors that don’t appear in your credit file, ask the consumer reporting companies to add this information to future reports. Although they are not required to do so, many consumer reporting companies will add verifiable accounts for a fee. However, understand that if these creditors do not report to the consumer reporting company on a regular basis, the added items will not be updated in your file.

When negative information in your report is accurate, only the passage of time can assure its removal. A consumer reporting company can report most accurate negative information for seven years.


Let’s talk a little about handling the different kinds of identity theft or fraud

The following material is taken directly from U.S. Government publications

Everyone has the right to file a report with their local law enforcement organization. The Department of Justice (State) is mandated to keep a database of victims who suffer from ID theft which is to include your fingerprints. Access in general to this database will be limited to victims, criminal justice agencies and any individuals or agencies authorized by you the victim. And finally the Department of Justice will maintain a Toll free number to the administrator of this database. (To have mistakes in data entry corrected)

Different laws determine your legal remedies based on the type of bank fraud. For example, state laws protect you against fraud committed by a thief using paper documents, like stolen or counterfeit checks. But if the thief used an electronic fund transfer, federal law applies. Many transactions may seem to be processed electronically but are still considered "paper" transactions. If you're not sure what type of transaction the thief used to commit the fraud, ask the financial institution that processed the transaction.

8. Fraudulent Electronic Withdrawals

The Electronic Fund Transfer Act provides consumer protections for transactions involving an ATM or debit card, or any another electronic way to debit or credit an account. It also limits your liability for unauthorized electronic fund transfers. You have 60 days from the date your bank account statement is sent to you to report in writing any money withdrawn from your account without your permission. This includes instances when your ATM or debit card is "skimmed" - that is, when a thief captures your account number and PIN without taking actual possession of your card.

If your ATM or debit card is lost or stolen, report it immediately because the amount you can be held responsible for depends on how quickly you report the loss.

If you report the loss or theft within two business days of discovery, your losses are limited to $50.

If you report the loss or theft after two business days, but within 60 days after the unauthorized electronic fund transfer appears on your statement, you    could lose up to $500 of what the thief withdraws.

If you wait more than 60 days to report the loss or theft, you could lose all the money that was taken from your account after the end of the 60 days.

Note: In real life, most card issuers have voluntarily agreed to limit or waive consumers' liability for unauthorized use of their debit cards, no matter how much time has elapsed since the discovery of the loss or theft of the card. But don't count on this and get lazy. Contact your card issuer for more information.

The best way to protect yourself in the event of an error or fraudulent transaction is to call the financial institution and follow up in writing - by certified letter, return receipt requested - so you can prove when the institution received your letter. Keep a copy of the letter you send for your records. After receiving your notification about an error on your statement, the institution generally has 10 business days to investigate.

The institution must tell you the results of its investigation within 3 business days after completing it and must correct an error within one business day after determining that it occurred. If the institution needs more time, it may take up to 45 days to complete the investigation - but only if the money in dispute is returned to your account and you are notified promptly of the credit. At the end of the investigation, if no error has been found, the institution may take the money back if it sends you a written explanation. For more information, see Electronic Banking and Credit, ATM and Debit Cards: What To Do If They're Lost or Stolen at http://www.ftc.gov/bcp/edu/microsites/idtheft/. Fair Credit Billing

[Top]



9. Fraudulent Checks & Other "Paper" Transactions

In general, if an identity thief steals your checks or counterfeits your checks from your existing bank account, 1)stop payment, close the account, 2)ask your bank to notify the Chex Systems, Inc., or the check verification service it uses. That way, retailers can be notified not to accept these checks. While no federal law limits your losses if someone uses your checks with a forged signature, or uses another type of "paper" transaction such as a demand draft, state laws may protect you. Most states hold the bank responsible for losses from such transactions. At the same time, most states require you to take reasonable care of your account. For example, you may be held responsible for the forgery if you fail to notify the bank in a timely manner that a check was lost or stolen. Contact your state banking or consumer protection agency for more information.

You can contact major check verification companies directly for the following services:

To request that they notify retailers who use their databases not to accept your checks, call the following check clearing companies:

    TeleCheck at 1-800-710-9898 or 1-800-927-0188
    Certegy, Inc. (previously Equifax Check Systems) at 1-800-437-5120
     SCAN: 1-800-262-7771
    Chex Systems, Inc. 800 428-9263: www.chexhelp.com , FAX 602 659-2197,
     Attn: Consumer Relations, 7805 Hudson Road, Suite 100, Woodbury, MN 55125
    Global Payments: (800) 766-2748
    ChexSystem: (800) 428-9623
    TeleCheck: (800) 710-9898
    Cross Check: (800) 843-0760
    International Check:(800) 526-5380


If your checks are rejected by a merchant, it may be because an identity thief is using the Magnetic Information Character Recognition (MICR) code (the numbers at the bottom of checks), your driver's license number, or another identification number. The merchant who rejects your check should give you its check verification company contact information so you can find out what information the thief is using. If you find that the thief is using your MICR code, ask your bank to close your checking account, and open a new one.

If you discover that the thief is using your driver's license number or some other identification number, work with your DMV or other identification issuing agency to get new identification with new numbers. Once you have taken the appropriate steps, your checks should be accepted.

Note:

The check verification company may or may not remove the information about the MICR code or the driver's license/identification number from its database because this information may help prevent the thief from continuing to commit fraud.

If the checks are being passed on a new account, contact the bank to close the account. Also contact the check verification companies listed above to review your consumer report to make sure that no other bank accounts have been opened in your name.

Dispute any bad checks passed in your name with merchants so they don't start any collections actions against you. [Top]



10. Fraudulent New Accounts

If you have trouble opening a new checking account, it may be because an identity thief has been opening accounts in your name. Chex Systems, Inc., (800) 428-9623, produces consumer reports specifically about checking accounts, and as a consumer reporting company, is subject to the Fair Credit Reporting Act. You can request a free copy of your consumer report by contacting Chex Systems, Inc. If you find inaccurate information on your consumer report, follow the procedures under Correcting Credit Reports, chapter 13 to dispute it. Contact each of the banks where account inquiries were made, too. This will help ensure that any fraudulently opened accounts are closed.

Chex Systems, Inc.:
800-428-9623
Fax: 602-659-2197
www.chexhelp.com
Chex Systems, Inc.
Attn: Consumer Relations
7805 Hudson Road, Suite 100
Woodbury, MN 55125

Where to Find Help

If you have trouble getting a financial institution to help you resolve your banking-related identity theft problems, including problems with bank-issued credit cards, contact the agency that oversees your bank (see list below). If you're not sure which of these agencies is the right one, call your bank
or visit the National Information Center of the Federal Reserve System at www.ffiec.gov/nic/ and click on "Institution Search."

Federal Deposit Insurance Corporation (FDIC) - www.fdic.gov
The FDIC supervises state-chartered banks that are not members of the Federal Reserve System, and insures deposits at banks and savings and loans.

Call the FDIC Consumer Call Center toll-free: 1-800-934-3342; or write:
Federal Deposit Insurance Corporation
Division of Compliance and Consumer Affairs
550 17th Street, NW
Washington, DC 20429.

Your Wallet: A Loser's Manual
 

[Top]





11. The Federal Reserve System

The United States Federal Reserve can be found at- www.federalreserve.gov. The Fed supervises state-chartered banks that are members of the Federal Reserve System.

Call: 202-452-3693; or write:

Division of Consumer and Community Affairs
Mail Stop 801
Federal Reserve Board
Washington, DC 20551

or contact the Federal Reserve Bank in your area. The Reserve Banks are located in Boston, New York, Philadelphia, Cleveland, Richmond, Atlanta, Chicago, St. Louis, Minneapolis, Kansas City, Dallas, and San Francisco.

National Credit Union Administration (NCUA) - www.ncua.gov

The NCUA charters and supervises federal credit unions and insures deposits at federal credit unions and many state credit unions.

Call: 703-518-6360; or write:

Compliance Officer
National Credit Union Administration
1775 Duke Street
Alexandria, VA 22314.

Office of the Comptroller of the Currency (OCC) - www.occ.treas.gov
The OCC charters and supervises national banks. If the word "national" appears in the name of a bank, or the initials "N.A." follow its name, the OCC oversees its operations. Call toll-free: 1-800-613-6743 (business days 9:00 a.m. to 4:00 p.m. CST); fax: 713-336-4301; or write:

Customer Assistance Group
1301 McKinney Street, Suite 3710
Houston, TX 77010.

OCC publications:

Check Fraud: A Guide to Avoiding Losses

How to Avoid Becoming a Victim of Identity Theft

Identity Theft and Pretext Calling Advisory Letter 2001-4

Office of Thrift Supervision (OTS)

The OTS is the primary regulator of all federal, and many state-chartered, thrift institutions, including savings banks and savings and loan institutions.
Call: 202-906-6000; or write:

Office of Thrift Supervision
1700 G Street
NW, Washington
DC 20552

[Top]


12. Bankruptcy Fraud

U, S. Trustee (UST) - www.usdoj.gov/ust
If you believe someone has filed for bankruptcy in your name, write to the U.S. Trustee in the region where the bankruptcy was filed. A list of the U.S. Trustee Programs' Regional Offices is available on the UST website, or check the Blue Pages of your phone book under U.S. Government Bankruptcy Administration.

In your letter, describe the situation and provide proof of your identity. The U.S. Trustee will make a criminal referral to law enforcement authorities if you provide appropriate documentation to substantiate your claim. You also may want to file a complaint with the U.S. Attorney and/or the FBI in the city where the bankruptcy was filed. The U.S. Trustee does not provide legal representation, legal advice, or referrals to lawyers.

That means you may need to hire an attorney to help convince the bankruptcy court that the filing is fraudulent. When you or your attorney ask the bankruptcy court to dismiss the fraudulently filed bankruptcy case, you also should request that the bankruptcy court include in its order of dismissal facts that will help you repair your credit, including a statement that you did not file this bankruptcy case and that the case was filed by an impostor as the result of identity theft. Ask the bankruptcy court to send a copy of the dismissal order to each consumer reporting company; if the court will not do so, you should send the order to the consumer reporting companies yourself. Some courts will even provide you with several official copies of the order at no charge so that you can send them to creditors or use them in case of future problems. The U.S. Trustee does not provide consumers with copies of court documents. You can get them from the bankruptcy clerk's office for a fee [Top]


13. Correcting Fraudulent Information in Credit Reports

The Fair Credit Reporting Act (FCRA) establishes procedures for correcting fraudulent information on your credit report and requires that your report be made available only for certain legitimate business needs.

Under the FCRA, both the consumer reporting company and the information provider (the business that sent the information to the consumer reporting company), such as a bank or credit card company, are responsible for correcting fraudulent information in your report. To protect your rights under the law, contact both the consumer reporting company and the information provider.

Consumer Reporting Company Obligations
Consumer reporting companies will block fraudulent information from appearing on your credit report if you take the following steps: Send them a copy of an identity theft report and a letter telling them what information is fraudulent. The letter also should state that the information does not relate to any transaction that you made or authorized. In addition, provide proof of your identity that may include your SSN, name, address, and other personal information requested by the consumer reporting company.

The consumer reporting company has four business days to block the fraudulent information after accepting your identity theft report. It also must tell the information provider that it has blocked the information. The consumer reporting company may refuse to block the information or remove the block if, for example, you have not told the truth about your identity theft. If the consumer reporting company removes the block or refuses to place the block, it must let you know.

The blocking process is only one way for identity theft victims to deal with fraudulent information. There's also the "reinvestigation process," which was designed to help all consumers dispute errors or inaccuracies on their credit reports. For more information on this process, see How to Dispute Credit Report Errors and Your Access to Free Credit Reports, two publications from the FTC at www.consumer.gov/idtheft.

Sample Blocking Letter to a Consumer Reporting Agency - MS Word 2003 format

===================================================================================

Sample Blocking Letter Consumer Reporting Company


Date
Your Name
Your Address
Your City, State, Zip Code

Complaint Department
Name of Consumer Reporting Company
Address
City, State, Zip Code

Dear Sir or Madam:

I am a victim of identity theft. I am writing to request that you block the following fraudulent information in my file. This information does not relate to any transaction that I have made. The items also are circled on the attached copy of the report I received. (Identify item(s) to be blocked by name of source, such as creditors or tax court, and identify type of item, such as credit account, judgment, etc.)

Enclosed is a copy of the law enforcement report regarding my identity theft. Please let me know if you need any other information from me to block this information on my credit report.

Sincerely,
Your name

Enclosures: (List what you are enclosing.)

=============================================================================

Information Provider Obligations

Information providers stop reporting fraudulent information to the consumer reporting companies once you send them an identity theft report and a letter explaining that the information they're reporting resulted from identity theft. But you must send your identity theft report and letter to the address specified by the information provider. Note that the information provider may continue to report the information if it later learns that the information does not result from identity theft.


If a consumer reporting company tells an information provider that it has blocked fraudulent information in your credit report, the information provider may not continue to report that information to the consumer reporting company. The information provider also may not hire someone to collect the debt that relates to the fraudulent account, or sell that debt to anyone else who would try to collect it. [Top]

14. Credit Cards

The Fair Credit Billing Act establishes procedures for resolving billing errors on your credit card accounts, including fraudulent charges on your accounts. The law also limits your liability for unauthorized credit card charges to $50 per card. To take advantage of the law's consumer protections, you must:

Write to the creditor at the address given for "billing inquiries," NOT the address for sending your payments. Include your name, address, account number, and a description of the billing error, including the amount and date of the error. A sample Blocking letter, see previous link .

Send your letter so that it reaches the creditor within 60 days after the first bill containing the error was mailed to you. If an identity thief changed the address on your account and you didn't receive the bill, your dispute letter still must reach the creditor within 60 days of when the creditor would have mailed the bill. This is one reason it's essential to keep track of your billing statements, and follow up quickly if your bills don't arrive on time.

You should send your letter by certified mail, and request a return receipt. It becomes your proof of the date the creditor received the letter. Include copies (NOT originals) of your police report or other documents that support your position. Keep a copy of your dispute letter.

The creditor must acknowledge your complaint in writing within 30 days after receiving it, unless the problem has been resolved. The creditor must resolve the dispute within two billing cycles (but not more than 90 days) after receiving your letter.

For more information, see Fair Credit Billing and Avoiding Credit and Charge Card Fraud, two publications from the FTC at Credit, ATM, and Debit Cards: What To Do If They’re Lost or Stolen.

The Credit Card Act of 2009

Bills must be mailed 21 days before the due dates versus the current 14 days.

Banks must provide 45 days notice before making “significant” changes to their rates or fees.

New rules bar banks from increasing fees or rates without warning when a consumer misses a payment or exceeds a credit limit.

Consumers also will be allowed to avoid future interest-rate increases and pay off any outstanding balance over time under the original rate terms.

The bulk of the legislation’s key provisions will take effect in February 2010,
Including limits on interest-rate increases

“The cost of borrowing also will rise companies say, since they will have to be more careful about giving credit”

[Top]


15. Criminal Violations

Procedures to correct your record within criminal justice databases can vary from state to state, and even from county to county. Some states have enacted laws with special procedures for identity theft victims to follow to clear their names. You should check with the office of your state Attorney General, but you can use the following information as a general guide.

If wrongful criminal violations are attributed to your name, contact the police or sheriff's department that originally arrested the person using your identity, or the court agency that issued the warrant for the arrest. File an impersonation report with the police/sheriff's department or the court, and confirm your identity: Ask the police department to take a full set of your fingerprints, photograph you, and make a copies of your photo identification documents, like your driver's license, passport, or travel visa. To establish your innocence, ask the police to compare the prints and photographs with those of the impostor.

If the arrest warrant is from a state or county other than where you live, ask your local police department to send the impersonation report to the police department in the jurisdiction where the arrest warrant, traffic citation, or criminal conviction originated.

The law enforcement agency should then recall any warrants and issue a "clearance letter" or "certificate of release" (if you were arrested/booked). You'll need to keep this document with you at all times in case you're wrongly arrested again. Ask the law enforcement agency to file the record of the follow-up investigation establishing your innocence with the district attorney's (D.A.) office and/or court where the crime took place. This will result in an amended complaint. Once your name is recorded in a criminal database, it's unlikely that it will be completely removed from the official record. Ask that the "key name" or "primary name" be changed from your name to the impostor's name (or to "John Doe" if the impostor's true identity is not known), with your name noted as an alias.

You'll also want to clear your name in the court records. To do so, you'll need to determine which state law(s) will help you with this and how. If your state has no formal procedure for clearing your record, contact the DA's office in the county where the case was originally prosecuted. Ask the DA's office for the appropriate court records needed to clear your name. You may need to hire a criminal defense attorney to help you clear your name. Contact Legal Services in your state or your local bar association for help in finding an attorney. Finally, contact your state Department of Motor Vehicles (DMV) to find out if your driver's license is being used by the identity thief. Ask that your files be flagged for possible fraud. Certificate of Innocence

[Top]



16. Debt Collectors

The Fair Debt Collection Practices Act prohibits debt collectors from using unfair or deceptive practices to collect overdue bills that a creditor has forwarded for collection, even if those bills don't result from identity theft.

You can stop a debt collector from contacting you in two ways

Write a letter to the collection agency telling them to stop. Once the debt collector receives your letter, the company may not contact you again - with two exceptions: They can tell you there will be no further contact, and they can tell you that the debt collector or the creditor intends to take some specific action.

Send a letter to the collection agency, within 30 days after you received written notice of the debt, telling them that you do not owe the money. Include copies of documents that support your position. Including a copy (NOT original) of your police report may be useful. In this case, a collector can renew collection activities only if it sends you proof of the debt.

If you don't have documentation to support your position, be as specific as possible about why the debt collector is mistaken. The debt collector is responsible for sending you proof that you're wrong. For example, if the debt you're disputing originates from a credit card you never applied for, ask for a copy
of the application with the applicant's signature. Then, you can prove that it's not your signature.

If you tell the debt collector that you are a victim of identity theft and it is collecting the debt for another company, the debt collector must tell that company that you may be a victim of identity theft.

http://www.calcollectors.net/ California Association of Collectors

Identity Theft It's Not Fair...It's Not My Debt!

Someone has stolen your identity and used it to purchase and accumulate debt. The creditors and debt collectors are contacting you. What should you do? How can the collection agency help? It Can Happen To You.

From the above mentioned website

[Top]


17. Driver's License

If you think your name or SSN is being used by an identity thief to get a driver's license or a non-driver's ID card, contact your state DMV. If your state uses your SSN as your driver's license number, ask to substitute another number.

The California Department of Motor Vehicles or

CA DMV Fraud Department Phone

Local: 866-658-5758
Phone / Out of State: 916-657-2274
Website: www.dmv.ca.gov
Email: DLFraud@DMV.CA.gov

How to apply for a duplicate (replace lost or stolen) driver license or identification (ID) card

To apply for a duplicate license or ID card, you will need to:

   • Make an Appointment(s) to visit a DMV office
   • Complete a Driver License or Identification Card Application form DL 44 or DL 44C. (An original DL 44 or 44C form must be submitted. Copies will not       be   accepted.) For a duplicate driver license, minors must have parents’ or guardians’ signatures on the DL 44
   • Pay the application fee
   • Give a thumb print
   • Have your picture taken
  
To ensure your identity is secure, the DMV will validate your photograph, social security number, and your personal information.

Parents’ or guardians’ signatures - accepting liability for a minor a minor’s application for a driver license must have the signatures of:

•Both parents, if the parents are California residents and have joint custody, or
•Both parents, if divorced, with joint custody, or
•One parent, if that parent has custody, or
•Guardians of the minor, if neither parent is living or has custody, or
•The person(s) having actual full and complete custody, if no legal guardian is appointed.
NOTE: Nonresident parents cannot sign the application form and cannot accept liability for a minor in California. Nonresident military parents stationed and living in California can sign the application form and accept liability for a minor.

When parents or guardians sign for a minor to get a driver license, they are stating that they will accept financial responsibility for that minor. Financial responsibility in California requires that drivers and vehicle owners carry the following minimum monetary limits:

•$15,000 for injury or death of 1 person per accident
•$30,000 for injury or death of 2 or more persons per accident
•$5,000 for any property damage per accident
Evidence of financial responsibility must be carried at all times in the vehicle. Most Californians maintain financial responsibility through insurance companies, which provide the policy holder with an identification card to be used as evidence of coverage. The card must state the insurance company’s name and address, the period of coverage, and policy number.

You will be issued an interim license valid for 60 days and/or a receipt for your ID card until you receive your new photo license and/or photo ID card in the mail. Check your address before you leave DMV and tell the DMV representative if your address is incorrect. Your new license and/or ID card will be mailed to you within 60 days. If you have not received your license and/or ID card after 60 days, call 1-800-777-0133 to check the status. Have your interim license and/or ID card receipt with you to provide information when requested.

 


18. Investment Fraud

The SEC's Office of Investor Education and Assistance serves investors who complain to the SEC about investment fraud or the mishandling of their investments by securities professionals. If you believe that an identity thief has tampered with your securities investments or a brokerage account, immediately report it to your broker or account manager and to the SEC. You can file a complaint with the SEC's Complaint Center at www.sec.gov/complaint.shtml. Include as much detail as possible. If you don't have Internet access, write to the SEC at: SEC Office of Investor Education and Assistance, 100 F Street, NE, Washington, DC 20549. For answers to general questions, call 202-551-6551.

How does the SEC handle complaints




19. Mail Theft

U.S, Postal Inspection Service (USPIS) -http://postalinspectors.uspis.gov/

The USPIS is the law enforcement arm of the U.S. Postal Service, and investigates cases of identity theft. The USPIS has primary jurisdiction in all matters infringing on the integrity of the U.S. Mail. If an identity thief has stolen your mail to get new credit cards, bank or credit card statements, prescreened credit offers, or tax information, or has falsified change-of-address forms or obtained your personal information through a fraud conducted by mail, report it to your local postal inspector.

You can locate the USPIS district office nearest you by calling your local post office, checking the Blue Pages of your telephone directory, or visiting http://postalinspectors.uspis.gov/. Hotline Phone Number 888 877-7644, Fax: (866) 756-6741, email @ hotline@uspsoig.gov






20. Passport Fraud

United States Department of State (USDS) go to this webpage -http://travel.state.gov/passport/lost/lost_849.html or their main page The United States Department of State, http://travel.state.gov/

If you've lost your passport, or believe it was stolen or is being used fraudulently, contact the USDS through their website, or call a local USDS field office. Local field offices are listed in the Blue Pages of your telephone directory. Generally speaking passports reported lost or stolen are invalidated and can no longer be used for travel.

To Report a Lost or Stolen Passport: Complete Statement Regarding Lost or Stolen Passport,
Form DS-64 Web page at the USDS, Lost or Stolen Passport

   1. Fill in as much of the passport information as you can.
   2. Answer all the other questions in detail.
   3. Sign and submit above Form DS-64, Statement Regarding a Lost or Stolen Passport, to:

    U.S. Department of State Passport Services Consular Lost/Stolen
    Passport Section
    1111 19th Street, NW, Suite 500
    Washington, DC 20036

This Agency now issues the US Passport Card on-site!
Federal Building 11000 Wilshire Blvd. Suite 1000
Los Angeles, CA 90024-3615

Hours: 7:00 a.m.- 3:00 p.m.,local time
Monday through Friday

Call and find out if the DS-11 and DS-64 forms should be mailed to the local office in Los Angeles or the address in Washington DC

Follow this Link to register for an appointment

Los Angeles Office of the United States Department of State (310) 235-6292

How to Report and Replace a Lost or Stolen Passport in the U.S.

There are two steps required to get a new passport. First, you must report your valid passport lost or stolen immediately. This is required of anyone who loses or has a passport stolen. The second step is to replace your passport. Both steps and forms required are described below.

In order to protect yourself from identity fraud it is important to report a lost or stolen valid passport immediately!

Do not mail your new passport application to this address. In order to obtain a new passport you must appear in person at a Passport Agency or Acceptance Facility as outlined below.

IMPORTANT NOTICES

* If your still valid passport was lost or stolen, please submit the DS-64 form with the DS-11 application when you apply for a replacement at a Passport Agency or    Acceptance Facility. NOTE: You must appear in person.
* The information you provide on the DS-64, Statement Regarding a Lost or Stolen Passport will be entered in our Consular Lost/Stolen Passport System.
* Passports reported lost or stolen are invalidated and can no longer be used for travel.
* If you recover the passport after you have reported it lost or stolen, please submit it to the address listed above. When you submit it, if requested - we will cancel    it    and return it to you. If not requested, it will be destroyed.
* Once a passport is reported lost or stolen, it cannot be revalidated.

Regarding the completion of form DS11 Application for a new Passport:Complete the following bland application for Passport, Form DS-11 or you may also complete the form on-line at the United States Department of State webpage

YOU MUST SUBMIT FORM DS-11 IF ANY OF THE FOLLOWING ARE TRUE:

     * You have never been issued a U.S. Passport or
     *You are under age 16 or
     * You were under age 16 when your previous passport was issued or
     * Your most recent U.S. Passport was issued more than 15 years ago or
     * Your most recent U.S. Passport was lost or stolen or
     * Your name has changed since your previous U.S. Passport was issued and you are unable to legally document your name change

You must appear in person at a Passport Agency or Acceptance Facility.

Complete Question #18 as follows:

     * Write your name as it appeared in your passport.
     * Write the approximate date of issue.
     * Include the passport number if known.
     * Under "DISPOSITION", mark the appropriate box.
     * If your passport was expired, write "EXPIRED" next to the "OTHER" box.

Submit your form: To a passport acceptance facility. You will also need photos, documentation and fees. See How to Apply in Person.

NOTE: If you travel extensively, you may request a larger, 48-page passport at no additional cost. To do so, please attach a signed request for a 48-page passport to your application.

Form DS-64: Statement Regarding a Lost or Stolen Passport

STEPS TO SUBMITTING COMPLETED FORM DS-64:

Read and understand Steps 1-3 before leaving this page. Passports reported lost or stolen are invalidated and can no longer be used for travel. See Important Notes for more information.

STEP 1: Print and Complete Form

When completing Form DS-64, do so legibly and in black ink. Answer all questions completely. If you do not know the answer in detail, be as exact as possible.

NOTE: Form DS-64 can also be obtained from any Acceptance Facility or Passport Agency.

STEP 2: Sign and Date

You must sign and date Form DS-64 on page 1 of the form.

STEP 3: Submit Form DS-64 + Completed Form DS-11

To replace your lost or stolen U.S. Passport, submit Form DS-64 with completed Form DS-11 to an Acceptance Facility or Passport Agency.

If you are not applying for a replacement passport at this time, but wish to report the loss or theft of your U.S. Passport, submit Form DS-64 to:

U.S. Department of State
Passport Services
Consular Lost/Stolen Passport Section
1111 19th Street, NW, Suite 500
Washington, DC 20036

IMPORTANT NOTES:

* The information you provide on Form DS-64: Statement Regarding a Lost or Stolen Passport will be entered in our Consular Lost/Stolen Passport System.
* If you recover the passport after you have reported it lost or stolen, please submit it to the address listed above. When you submit it, if requested - we will cancel it    and return it to you. If not requested, it will be destroyed.

NEED A U.S. PASSPORT IMMEDIATELY?

You should make an appointment to be seen at a Regional Passport Agency only if:

* The U.S. Passport is needed in less than 2 weeks for international travel
* The U.S. Passport is needed within 4 weeks to obtain a foreign visa

Contact the National Passport Information Center to make an appointment or locate a Passport Agency

[Top]




21. Phone Fraud

If an identity thief has established phone service in your name, is making unauthorized calls that seem to come from - and are billed to - your cellular phone, or is using your calling card and PIN, contact your service provider immediately to cancel the account and/ or calling card. Open new accounts and choose new PINs. If you're having trouble getting fraudulent phone charges removed from your account or getting an unauthorized account closed, contact the appropriate agency below.

For local service, contact your state Public Utility Commission .

For cellular phones and long distance, contact the Federal Communications Commission (FCC) at www.fcc.gov. The FCC regulates interstate and international communications by radio, television, wire, satellite, and cable. Call: 1-888-CALL-FCC; TTY: 1-888-TELL-FCC; or write: Federal Communications Commission, Consumer Information Bureau, 445 12th Street, SW, Room 5A863, Washington, DC 20554. You can file complaints online at www.fcc.gov, or e-mail your questions to fccinfo@fcc.gov. [Top]



22. Social Security Number Misuse

What is your Social Security Statement? Your Social Security Statement is a concise, easy-to-read personal record of the earnings on which you have paid Social Security taxes during your working years and a summary of the estimated benefits you and your family may receive as a result of those earnings. Follow the above link to learn more.

" Even though we are sending out Statements automatically, you may request one at any time. You can send your request by Internet, download a paper version of the request form to mail in, or call our toll-free telephone number 1-800-772-1213 and ask to have a paper request form mailed to you. The forms are also available at our local Social Security offices."

If you have specific information of SSN misuse that involves the buying or selling of Social Security cards, may be related to terrorist activity, or is designed to obtain Social Security benefits, contact the SSA Office of the Inspector General. You may file a complaint online at www.socialsecurity.gov/oig, call toll-free: 1-800-269-0271, fax: 410-597-0118, or write: SSA Fraud Hotline, P.O. Box 17768, Baltimore, MD 21235.

You also may call SSA toll-free at 1-800-772-1213 to verify the accuracy of the earnings reported on your SSN, request a copy of your Social Security Statement, or get a replacement SSN card if yours is lost or stolen. Follow up in writing.

SSA publications:

SSA Fraud Hotline for Reporting Fraud www.ssa.gov/oig/guideline.htm

Social Security: Your Number and Card, Hint: Click on"Open it with Default application", option SSA Pub. No. 05-10002)

Identity Theft And Your Social Security Number, Hint: Click on"Open it with Default application",option (SSA Pub. No. 05-10064)

[Top]




23. Student Loans

Contact the school or program that opened the student loan to close the loan. At the same time, report the fraudulent loan to the U.S. Department of Education. Call the Inspector General's Hotline toll-free at 1-800-MIS-USED; visit www.ed.gov/about/offices/list/oig/hotline.html?src=rt; or write: Office of Inspector General, U.S. Department of Education, 400 Maryland Avenue, SW, Washington, DC 20202-1510. [Top]



24. Tax Fraud

The IRS is responsible for administering and enforcing tax laws. Identity fraud may occur as it relates directly to your tax records. Visit www.irs.gov and type in the IRS key word "Identity Theft" for more information.

If you have an unresolved issue related to identity theft, or you have suffered or are about to suffer a significant hardship as a result of the administration of the tax laws, visit the IRS Taxpayer Advocate Service website www.irs.gov/advocate or call toll-free: 1-877-777-4778.

If you suspect or know of an individual or company that is not complying with the tax law, report it to the Internal Revenue Service Criminal Investigation Informant Hotline by calling toll-free: 1-800-829-0433 or visit www.irs.gov and type in the IRS key word "Tax Fraud."

Here are ten thing the IRS wants you to know regarding Identity Theft

1. If you receive a letter or notice from the IRS which leads you to believe someone may have fraudulently used your Social Security Number, respond immediately to the name and address or phone number printed on the IRS notice

2. If you receive a letter from the IRS that indicates more than one tax return was filed for you, this may be a sign that your SSN was used fraudulently.

3. Another sign that you may be the target of identity theft is an IRS letter indicating you received wages from an employer unknown to you.

4. The IRS has a department which deals specifically with identity theft issues. The IRS Identity Protection Specialized Unit is available if you have been in contact with the IRS about an identity theft issue and have not achieved a resolution.

5. You can contact the IRS Identity Protection Specialized Unit by calling the Identity Theft Hotline at 800-908-4490 Monday through Friday from 8:00 am to 8:00 PM local time (Alaska and Hawaii follow Pacific Standard Time).

6. The IRS Identity Protection Specialized Unit is also available if you believe your identity may be at risk of being stolen due to a lost or stolen purse or wallet or due to questionable activity on your credit card or your credit report.

8. The IRS has many more resources available to help inform taxpayers about identity theft on the IRS Web site at IRS.gov. On IRS.gov you can access information on how to report scams and bogus IRS Web sites. You can also visit the IRS Identity Theft Resource Page, which you can find by typing Identity Theft Resource Page in the search box on the IRS.gov home page.

9. The Federal Trade Commission is also available to assist taxpayers with identity theft issues. You can reach them at 877-ID-THEFT (877-438-4338).

10. Visit OnGuardOnline.gov for protection tips from the federal government and the technology industry.

. The IRS never initiates communication with taxpayers about their tax account through emails. If you receive an e-mail or find a Web site you think is pretending to be the IRS, forward the e-mail or Web site URL to the IRS at phishing@irs.gov.

IRS Publications

Identity Theft and Your Tax Records

Ten Things the IRS Wants You to Know About Identity Theft

Phishing, Identity Theft and Scams

Suspicious emails and Identity

Theft Alert on Identity Theft




25. FCRA, The Fair Credit Reporting Act

What does the Fair Credit Reporting Act mean for You?

1. You are entitled to a free copy of your credit profile from each of the Big 3 credit reporting agencies every year.

2. You are also entitled to review your noncredit information, such as criminal activity, renting history, check writing habits, insurance claims and employment history. These reports are available from one of the Nationwide Specialty Consumer Reporting Agencies.

3. You have the right to be told about any information that is used against you.

4. You also have the right to dispute any bad information in your files.

5. Out dated information may not be reported. Generally this is information about your history from 7 to 10 years ago.

6. And most importantly, your employer or your prospective employer cannot access you files without prior written authorization/permission from you!

 


25A Fair Credit Billing Act (FCBA) and the Electronic Funds Transfer Act (EFTA)

Every year more and more of us use the internet to shop, bank and invest online. We are using either a credit card or debit cards. Debit card transactions usually require a PIN number, expert not always. However as we have learned, debit cards offer you impostor the opportunity to avail himself of the entire contents of that account - which is why expert tell to cut those cards up.

Furthermore, your liability for unauthorized use is different than regular credit cards. With the growth of the internet theses cards have on-line and off-line purchasing features while others can be reloaded with additional value. We now have "e-wallets", which are an example of stored value cards that are usually recharged or reload with either a debit or credit card.

You can increase the safety of on-line purchases by ensuring your web browser is using the latest updates available. If your browser is at a secured website featuring encryption you will see the padlock icon at the bottom of your screen. Examine the URL. If the "http" has been replaced with a "https" rest assured your are a a website protecting your transaction with encryption.

The FTC encourages people to examine the privacy policy provided by a website. If you are not comfortable with how they handle your personal identifiers go to another website. The same goes for the shipping and refund policies. A reliable company usually emails you an invoice and notice when your order ships. Print these documents and store them with your other bills. It makes life easier if you want a exchange or refund.

Along with the Fair Credit Reporting Act (FCRA) there is legislation called the Fair Credit Billing Act (FCBA) and the Electronic Funds Transfer Act (EFTA)

Under the FCBA, your liability for lost or stolen credit cards is $50. If the loss involves only your credit card number and not the card itself, you have no liability. What does this mean for us. Our liability is limited to $50 for the following circumstances:
   - unauthorized credit charges
   - charges for goods or services you did not except or were not delivered as agreed
   - charges that are incorrectly identified, or have the wrong amount or date or math errors
   - a failure to properly reflect payments or credits
   - not mailing or delivering credit bill statements to your current address, along as the address was received by the creditor in writing in the last 20
      days before the billing period ended and "the charges for which you request an explanation or documentation because of a possible error.

Your responsibility: write to the address given for billing inquires within 60 days after the first bill containing the error was mailed to you. Take advantage of the USPS's certified mail, return receipt requested

Your creditor has 30 days from the receipt of your letter to acknowledge your letter. The creditor get two billing cycles or 90 days, which ever is longer to correct the mistake or explain why they think the bill is correct. Of course as leverage you have withheld payment on the questionable transaction.

The Electronic Funds Transfer Act (EFTA) covers electronic fund transfers, transactions involving automated teller machines (ATMs), debit cards and other point of sale debit transactions and other transactions that result in a withdrawal of cash from your bank

Lost or stolen debit cards
You can lose from $50 to $500 if someone uses your debit card or makes electronic fund transfers with your permission depending on how soon you report the loss. Report the loss within two business days and you limit your loss to $50. Report the loss after 2 days and before 60 days of receiving your statement and you could loose up to $500. If you wait more that 60 days to report the loss and you stand to loose all the money you had in the account

Electronic Funds Transfer (EFTs) specifies how errors are handled. With regard to:
     - electronic fund transfers you did not make 
     - incorrect electronic fund transfers
     - omitted electronic fund transfers
     - a failure to properly reflect electronic fund transfers  
     - electronic fund transfers for which you request an explanation or documentation, because of possible error

You have 60 days after the receipt of the statement containing the error(s) to call them and also follow up it writing. This gives the financial institution 10 days to conduct and investigation and 3 days to notify of their results. If it was an error on behalf of the financial institution, they have 1 day in which to correct their mistake, however after they have returned to monies to your account they may take up to 60 days to conduct their investigation.

The FCBA & the EFTA may not cover situations involving a "store value card" that is lost or stolen. Before buying "stored valued cards" the FTC says buyer beware, ask about the terms of the card, does it expire, are there fees for "reloading" them with more funds and what is the issuing organization regarding lost or stolen cards.

One of the charters of the Federal Trade Commission is to work with consumers to prevent fraudulent, deceptive and unfair business practices. File a complaint with the FTC at (877) 382-4357 or visit www.ftc.gov. The FTC maintains a database on internet, telemarketing, identity theft and other fraud related activity


National Specialty Consumer Reporting Firms - for noncredit information, such medical, employment, renting, check writing, home owner and car insurance claims

25 B Nationwide Specialty Consumer Reporting Agencies

The Medical Information:

   The Medical Information Bureau , (866) 692-690, MIB, Inc. 50 Braintree Hill Park Suite 400 Braintree, MA 02184-8734
   Ingenix (888) 206-0335, 12125 Technology Drive, Eden, Prairie, MN 55344
   IntelliScript, Milliman IntelliScript 15800 Bluemound Road, Suite 400, Brookfield, WI 53005

Rental History or tenant history and evictions::


    ChoicePoint, (877) 448-5732  ,1000 Alderman Drive, Alpharetta, GA 30005
    Choice Trust,  ,1000 Alderman Drive Alpharetta, GA 30005
    First Advantage Safe-Rent, 888) 333-2413, Consumer Relations, Department 7300, Westmore Rd., Suite 3, Rockville, MD 20850-5223
    Accufax, (800) 256-8898,
    American Tenant Screen, (800) 888-1287 ,
    ChoicePoint Tenant History Reports, (877) 448-5732,
    National Tenant Network, (800) 228-0989 ,
    Tenant Data Services, (800) 228-1837 ,
    Tenant Screening Credit, (800) 388-2335,
    UD Registry, (818) 785-3905,
    Mortgage Finance History, Innovis, (800) 540-2505

Check writing history:

   Global Payments, (800) 766-2748
   ChexSystems, (800) 428-9623,
   Cross Check, 888.YES-2-CHX ,(800) 843-0760, 6119 State Farm Drive, Rohnert Park, CA 94928
   TeleCheck at 1-800-710-9898 or 1-800-927-0188
   Certegy, Inc. (previously Equifax Check Systems) at 1-800-437-5120, 100 2nd Ave. South, Ste. 1100S St. Petersburg, FL 33701
   
SCAN: 1-800-262-7771
   Chex Systems, Inc. 800 428-9263: , FAX 602 659-2197, Consumer Relations, 7805 Hudson Road, Suite 100, Woodbury, MN 55125
   International Check acquired http://www.telecheck.com/:(800) 526-5380


***This is the end of classroom Presentation ***


Appendix

How to Read Your Credit Report
Sample Credit Report

   How to read a TransUnion Credit Report
   How to read a EquifaxCredit Report
   How to read a Experian Credit Report

Personal Identifiers
ID Theft Affidavit
Annual Credit Report Request
Sample letter to freeze your credit report
Sample Dispute Letter - Big 3 Credit Reporting Agencies
Sample Blocking Letter - Consumer Reporting Company

_________________________________________________________________________________________


Download Adobe Reader By Clicking on This LINK

How do you read a credit report? Link 1   Link 2

Glossary of Terms

How do Your Read a Credit Report

[Top]

=================================End of Class Notes============================

Bibliography

"Black's Law Dictionary", Deluxe Eighth Edition, Bryan A. Garter, Editor in Chief, West Publishing Company

California Penal Code, Standard California Codes, By Matthew Bender & Company Inc., a member of the Lexis Nexis Group

"Safeguard Your Identity - Protect Yourself with a Personal Privacy Audit", By Mari Frank, Esq., 2003 ISBN 1-8912126-06-0, Porpoise Press, Inc., 28202 Cabot Road, Suite 300, Laguna Niguel, CA 92677, 800 725-0807

"From Victim to Victor: A Step-by-step Guide for Ending the Nightmare of Identity Theft", Br Mari Frank Esq., ISBN 1-892126-04-4, Porpoise Press, Inc., 28202 Cabot Road, Suite 300, Laguna Niguel, CA 92677, 800 725-0807

United State Government Printing Office, Pueblo Colorado, FTC, FCC, SEC and other publications

Scientific American, December 2008, Page 104 - 110. "Can Phishing be Foiled?" By Lorrie Faith Cranor

The following websites:

  1. www.identitytheft.org
  2. www.privacyrights.org http://www.idtheftcenter.org
  3. The Identity Theft Resource Center
  4. http://dca.lacounty.gov/ The Los Angeles County Department of Consumer Affairs
  5. Social Security Administration (SSA) -www.ssa.gov
  6. Office of the Comptroller of the Currency (OCC) - www.occ.treas.gov
  7. National Credit Union Administration (NCUA) - www.ncua.gov
  8. Federal Reserve System (Fed) - www.federalreserve.gov
  9. Office of Thrift Supervision (OTS) www.ots.treas.gov
  10. U, S. Trustee (UST) - www.usdoj.gov/ust
  11. U.S. Securities and Exchange Commission (SEC) - www.sec.gov
  12. U.S, Postal Inspection Service (USPIS) - postalinspectors.uspis.gov/
  13. Federal Communications Commission www.fcc.gov
  14. Federal Communications Commission - Email your questions to: fccinfo@fcc.gov
  15. Internal Revenue Service (IRS) - www.treas.gov/irs/ci
  16. Form Letters available on the Web at the Identity Theft Recource Center

  17. Claim of Fraudulent Account – To a Collection Agency and/or Merchant