This information was obtained from www.ftc.com
What are the steps I should take if I'm a victim of identity theft?
1. Place a fraud alert on your credit reports, and review your credit reports.
Once you place the in your file, you're entitled to order one free copy of your credit report from each of the three consumer reporting companies, and, if you ask, only the last four digits of your Social Security number will appear on your credit reports. Once you get your credit reports, review them carefully. Look for inquiries from companies you haven't contacted, accounts you didn't open, and fraud alerts on your accounts that you can't explain. Check that information, like your Social Security number, address(es), name or initials, and employers are correct. If you find fraudulent or inaccurate information, get it removed. When you correct your credit report, use an Identity Theft Report with a cover letter explaining your request, to get the fastest and most complete results. Continue to check your credit reports periodically, especially for the first year after you discover the identity theft, to make sure no new fraudulent activity has occurred.
2. Close the accounts that you know, or believe, have been tampered with or opened fraudulently.
3. File a complaint with the Federal Trade Commission.
4. File a report with your local police or the police in the community where the identity theft took place.
As mentioned, depending on the type of fraud alert you place, potential creditors must either contact you or take reasonable steps to verify your identity. This may cause some delays if you're trying to obtain credit. To compensate for possible delays, you may wish to include a cell phone number, where you can be reached easily, in your alert. Remember to keep all contact information in your alert current.
What does a fraud alert not do?
While a fraud alert can help keep an identity thief from opening new accounts in your name, it's not a solution to all types of identity theft. It will not protect you from an identity thief using your existing credit cards or other accounts. It also will not protect you from an identity thief opening new accounts in your name that do not require a credit check – such as a telephone, wireless, or bank account. And, if there's identity theft already going on when you place the fraud alert, the fraud alert alone won't stop it. A fraud alert, however, can be extremely useful in stopping identity theft that involves opening a new line of credit.
What is a credit freeze?
Many states have laws that let consumers "freeze" their credit – in other words, letting a consumer restrict access to his or her credit report. If you place a credit freeze, potential creditors and other third parties will not be able to get access to your credit report unless you temporarily lift the freeze. This means that it's unlikely that an identity thief would be able to open a new account in your name. Placing a credit freeze does not affect your credit score – nor does it keep you from getting your free annual credit report, or from buying your credit report or score. Credit freeze laws vary from state to state. In some states, anyone can freeze their credit file, while in other states, only identity theft victims can. The cost of placing, temporarily lifting, and removing a credit freeze also varies. Many states make credit freezes free for identity theft victims, while other consumers pay a fee – typically $10. It's also important to know that these costs are for each of the credit reporting agencies. If you want to freeze your credit, it would mean placing the freeze with each of three credit reporting agencies, and paying the fee to each one.
Who can access my credit report if I place a credit freeze?
If you place a credit freeze, you will continue to have access to your free annual credit report. You'll also be able to buy your credit report and credit score even after placing a credit freeze. Companies that you do business with will still have access to your credit report – for example, your mortgage, credit card, or cell phone company – as would collection agencies that are working for one of those companies. Companies will also still be able to offer you prescreened credit. Those are the credit offers you receive in the mail that you have not applied for. Additionally, in some states, potential employers, insurance companies, landlords, and other non-creditors can still get access to your credit report with a credit freeze in place.
Can I temporarily lift my credit freeze if I need to let someone check my credit report?
If you want to apply for a loan or credit card, or otherwise need to give someone access to your credit report and that person is not covered by an exception to the credit freeze law, you would need to temporarily lift the credit freeze. You would do that by using a PIN that each credit reporting agency would send once you placed the credit freeze. In most states, you'd have to pay a fee to lift the credit freeze. Most states currently give the credit reporting agencies three days to lift the credit freeze. This might keep you from getting "instant" credit, which may be something to weigh when considering a credit freeze.
What does a credit freeze not do?
While a credit freeze can help keep an identity thief from opening most new accounts in your name, it's not a solution to all types of identity theft. It will not protect you, for example, from an identity thief who uses your existing credit cards or other accounts. There are also new accounts, such as telephone, wireless, and bank accounts, which an ID thief could open without a credit check. In addition, some creditors might open an account without first getting your credit report. And, if there's identity theft already going on when you place the credit freeze, the freeze itself won't be able to stop it. While a credit freeze may not protect you in these kinds of cases, it can protect you from the vast majority of identity theft that involves opening a new line of credit.
What's the difference between a credit freeze and a fraud alert?
A fraud alert is another tool for people who've had their ID stolen – or who suspect it may have been stolen. With a fraud alert in place, businesses may still check your credit report. Depending on whether you place an initial 90-day fraud alert or an extended fraud alert, potential creditors must either contact you or use what the law refers to as "reasonable policies and procedures" to verify your identity before issuing credit in your name. However, the steps potential creditors take to verify your identity may not always alert them that the applicant is not you. A credit freeze, on the other hand, will prevent potential creditors and other third parties from accessing your credit report at all, unless you lift the freeze or already have a relationship with the company. Some consumers use credit freezes because they feel they give more protection. As with credit freezes, fraud alerts are mainly effective against new credit accounts being opened in your name, but will likely not stop thieves from using your existing accounts, or opening new accounts such as new telephone or wireless accounts, where credit is often not checked. Also, only people who've had their ID stolen – or who suspect it may have been stolen, may place fraud alerts. In some states, anyone can place a credit freeze.
What is an Identity Theft Report?
An Identity Theft Report is a police report with more than the usual amount of detail. The Identity Theft Report includes enough detail about the crime for the credit reporting companies and the businesses involved to verify that you are a victim—and to know which accounts and inaccurate information came from identity theft. Normal police reports often don't have many details about the accounts that were opened or misused by identity thieves. The printed copy of your ID Theft Complaint Form can provide additional details for the police report. The police are not legally required to use the FTC's ID Theft Complaint Form as part of their report. Your police department may have another way to incorporate the details of your crime. In these cases, the police report by itself may serve as an Identity Theft Report. When you file your Identity Theft Report, the credit reporting companies will permanently block fraudulent information from appearing on your credit report. Filing an Identity Theft Report with the credit reporting companies or with the companies where the thief used your information should ensure that these debts do not reappear on your credit report. An Identity Theft Report can prevent a company from continuing to try to collect debts that result from identity theft, or sell those debts to others for collection. It also allows you to place an extended fraud alert on your credit report. The credit reporting companies may decline your Identity Theft Report if it does not contain enough detail for them to verify that you are a victim of identity theft. In that case, the credit reporting companies have certain timeframes for responding to your Identity Theft Report with requests for additional information. Creating and using an Identity Theft Report may require two steps:
Step One begins with filing your report with a local, state, or federal law enforcement agency. These agencies may include your local police department, your State Attorney General, the FBI, the U.S. Secret Service, the FTC, or the U.S. Postal Inspection Service. Some state laws require local police departments to take reports, but there is no law requiring federal agencies to take a report. In your report, you should give as much information as you can about the crime, including anything you know about the dates of the identity theft, the fraudulent accounts opened and the alleged identity thief. It may help you give the necessary level of detail if you file an online complaint with the FTC, and then ask your local police department to incorporate a copy of the printed ID Theft Complaint into its police report.
Step Two begins when you send the businesses involved and the credit reporting companies a copy of your Identity Theft Report, which you should do by certified mail, return receipt requested. The companies may ask you to give them more information or documentation to help them verify your identity theft. They have to make their request within 15 days of receiving your Identity Theft Report. The credit reporting company or business then has 15 more days to work with you to make sure your Identity Theft Report contains everything they need. They are also entitled to five days to review any information you give them. For example, if you give them information 11 days after they request it, they have until day 16 to make a final decision.
How do I get an Identity Theft Report?
The officer taking your police report can attach or incorporate your ID Theft Complaint into their police report to add more detail. Ask the officer to give you a copy of the official police report that incorporates or attaches your ID Theft Complaint. In some places the officer will not be able to give you a copy of the official police report, but should be able to sign a copy of your ID Theft Complaint and write the police report number in the "Law Enforcement Report" section. Be sure to keep a copy of the police report number. The police are not legally required to use the FTC's ID Theft Complaint Form as part of their report. Your police department may have another way to include all the details of your identity theft information in their police report. In these cases, the police report by itself may serve as an Identity Theft Report. Because the detailed Identity Theft Report is required for you to get many important protections, you may wish to use the Law Enforcement Cover Letter to explain to the police department how important it is for you to get a police report – as well as the legal protections that a detailed Identity Theft Report gives you.
How do I submit my Identity Theft Report to the credit reporting companies, or to businesses where the thief used my information?
When you send a copy of your Identity Theft Report to the fraud departments of the three major credit reporting companies, include a copy of the credit reporting company cover letter, along with copies of your supporting documentation. Send your information by certified mail with return receipt requested. The mailing addresses for sending Identity Theft Reports to the three major credit reporting companies are on the cover letter. When writing to the fraud departments of each of the companies where the identity thief has committed fraud using your personal information, include copies of the Identity Theft Report, your supporting documentation, and the appropriate cover letter: for fraud on your existing accounts, or for fraud on new accounts. Always send this information by certified mail, with a return receipt requested. The credit reporting companies have certain timeframes for responding to your Identity Theft Report with requests for additional information.
What do I do if the police only take reports about identity theft over the Internet or telephone?
The FTC ID Theft Complaint has a special section for police reports that are not filed face-to-face, to help you use it to supplement an automated police report. If you file a police report online or over the phone, complete the "Automated Report Information" block of the ID Theft Complaint. Attach a copy of any filing confirmation received from the police. If you have a choice, however, you should file your police report in person and not use an automated report. It is more difficult for the consumer reporting company and information provider to verify the information in an automated report, and they will likely require additional information and/or documentation.
What do I do if the local police won't take a report?
There are efforts at the federal, state and local level to ensure that local law enforcement agencies understand identity theft, its impact on victims, and the importance of taking a police report. However, we still hear that some departments are not taking reports. The following tips may help you to get a report if you're having difficulties:
How do I prove that I'm an identity theft victim?
Applications or other transaction records related to the theft of your identity may help you prove that you are a victim. For example, you may be able to show that the signature on an application is not yours. These documents also may contain information about the identity thief that is valuable to law enforcement. By law, companies must give you a copy of the application or other business transaction records relating to your identity theft if you submit your request in writing, accompanied by a police report. Read more about getting information from businesses, and use this model letter to request this information.
Should I apply for a new Social Security number?
Under certain circumstances, the Social Security Administration may issue you a new Social Security number - at your request - if, after trying to resolve the problems brought on by identity theft, you continue to experience problems. Consider this option carefully. A new Social Security number may not resolve your identity theft problems, and may actually create new problems. For example, a new Social Security number does not necessarily ensure a new credit record because credit bureaus may combine the credit records from your old Social Security number with those from your new Social Security number. Even when the old credit information is not associated with your new Social Security number, the absence of any credit history under your new Social Security number may make it more difficult for you to get credit. And finally, there's no guarantee that a new Social Security number wouldn't also be misused by an identity thief.
How can you make your password more secure?
Your online banking password is the key to your personal and financial information. If criminals know your password, they can use it to steal from you or pose as you in online transactions. Below are tips to make your online banking experience safer.
Install a reputable antivirus software program on all computers and keep them current. This is an important thing you can do to protect your information.
Make your password as long and complex as possible.
Make it easy to remember, but hard to guess. Use a combination of letters and number that you know, but that wouldn't make sense to others. Combine initials, important numbers, or special characters such as @, #, $, &, or *. A good password could be 17dg*wm4.
Use more than one password. Use a generic password for low-risk situations such as a newspaper website where there is little risk to you if someone figures it out. Not every website warrants the same level of protection as your online banking website. To make your ever-growing list of passwords more manageable , consider using a general-purpose password for websites that do not contain personal or financial information, and creating a unique, secure password for each website that does, such as online banking.
Use trustworthy computers. Shared public computers like those in airport lounges, Internet cafes, public libraries, and hotel lobbies could be connected to keystroke loggers or infected with password-stealing viruses. DO NOT use them to access online banking or other websites containing confidential information about you.
Never e-mail your password or respond to an e-mailed request for your password or other confidential information. We will never ask you to submit confidential information in an e-mail. Only you should know your password. Requests for your passwords via e-mail are most assuredly scams.
Do not include your login name in your password. Similarly, any part of your login name is a poor choice for a password.
Avoid predictable sequences of characters, such as "1234" or "abcd", in your password. Automated password crackers often start by guessing predictable sequences such as these.
The callers, who may not give information of who they are calling with, have alleged that the call recipient is delinquent in payment of a loan or debit card transaction. The account or transaction may not exist. The caller attempts to authenticate the claim by providing or asking you to verify sensitive personal information, such as name, Social Security number, and date of birth. Callers may sound aggressive or threatening.
These suspicious telephone calls are fraudulent. Recipients should consider them as an attempt to steal money or collect personal identifying information. The bank generally does not initiate unsolicited telephone calls to consumers and is not involved with the collection of debts on behalf of operating lenders and financial institutions.
If a caller demonstrates that he or she has the recipient's sensitive personal information, the recipient may be the victim of identity theft and should review his or her credit reports for signs of possible fraud. The individual should also consider placing a "fraud alert" on his or her credit report. This can be done by contacting one of the three consumer reporting companies listed below. That company is required to contact the other two, which will place an alert on their versions of the report.
Below is information on an email fraudulently sent on behalf of NACHA NACHA does not process nor touch the ACH transactions that flow to and from organizations and financial institutions. NACHA does not send communications to persons or organizations about individual ACH transactions that they originate or receive.
If you receive an email appearing to come from NACHA:
DO NOT open attachments or follow Web links in unsolicited emails from unknown parties or from parties with whom they do not normally communicate, or that appear to be known but are suspicious or otherwise unusual. Forward suspected fraudulent emails appearing to come from NACHA to firstname.lastname@example.org to aid in the efforts with security experts and law enforcement officials to pursue the perpetrators.
https://public.shazam.net/cardholders_atm_safety.html and https://public.shazam.net/cardholders_fraud_education.html
Approaching the ATM
Hundreds of people are affected by social engineering scams every day. In the last half of 2008 alone, more than 150,000 phishing messages were detected by the Anti-Phishing Working Group (APWG) with that number expected to increase annually. According to the Consumer Sentinel Network, in 2008 it received more than 640,000 fraud complaints from consumers, totaling more than $1.8 billion!
Industry wide, cyber criminals and fraudsters are stealing people's banking account information and identity. This goes beyond simply taking money. Cyber crime, like most types of crime, has a long-term effect on those who have been victimized. Feelings of paranoia, distrust, insecurity, and the loss of control stay with victims for a long time after the crime has taken place. It is time to take a stand.
The SHAZAM network, along with our participating financial institutions, is pleased to present a comprehensive, interactive guide to educating yourself about social engineering scams and ways to combat these types of fraud.
Social engineering is a term coined to describe the techniques used by cyber criminals that trick people into revealing passwords or other information, compromising the security of your personal information. Common scams include:
While our list is far from the complete list, since there are hundreds of different types of cyber scams and they are constantly evolving, we cover the major scams with tips and guides on how to recognize these scams, what you can do to protect yourself, and who to contact to report it.
The Key is Prevention
Protecting your information is the greatest weapon you have in preventing fraudsters from stealing your account information or identity. Simple things like shredding your old information or not clicking links in unsolicited e-mails will keep your information secure and drastically lower the chance of having your identity or account information compromised.
According to the Federal Trade Commission (FTC), by following the tips below you can safeguard your information and help prevent social engineering scams from impacting you.
SHAZAM also provides direct contact information to report lost or stolen ATM or debit cards, as well as telephone numbers to report fraud.
The best way to protect your Internet Banking Account is by protecting your PC. You should protect your own home computer by installing reputable Anti-Virus & Anti-Spyware/Malware programs… and by ensuring that these programs are receiving frequent and possibly daily updates. You should also ensure that you install security patch updates on your PC for applications such as Microsoft Office and Internet Explorer, and for operating systems such as Windows and Apple OS. ?
In addition, you should never share passwords unless you trust the person you are sharing with to access and use everything protected by that password. Plus, you should avoid performing Internet Banking or shopping transactions on a PC that you are unfamiliar with that may not be protected as described above. This could include restaurants, hotels, malls, airports, etc.). These are just a few tips that will go a long way towards protecting your personal accounts and other sensitive information. By following these precautions, you will greatly reduce the chance of thieves stealing personal information from your home computer.
Q: Do I have to buy expensive software to clean viruses from my computer?
A: There are reputable programs available for free on the internet that may meet your needs. Be sure to do your homework prior to installing any software. Verify the software's reputation using software review websites such as Cnet.com, prior to installing the software. Some examples of free anti-virus protection and malware removal are:
Avast! Home Edition/ www.avast.com
Microsoft Security Essentials/ www.microssoft.com/Security_Essentials
Note: We cannot endorse or recommend any of the above programs. They are listed here only to show examples of what is available.
Q: Is one anti-virus software program better than another?
A: Marketing hype aside, all reputable antivirus software does pretty much the same job. Some may be better than others in regards to a particular feature, but any one of them is better than no antivirus software at all. However, there are a number of disreputable antivirus programs that actually do more harm than good. Be wary of any antivirus software that advertises itself via unsolicited e-mail (spam) or pop-up windows.
Q: How do I know if my PC is infected?
A: Infected PCs may exhibit suspicious behavior, such as running more slowly than normal, locking up often, crashing and restarting frequently, or displaying unusual error messages. Or they may exhibit no symptoms at all. Also, the suspicious behavior often shown by infected PCs may be caused by a number of other factors. So while a poorly performing computer should make you suspect that it may be infected, you won't know for sure unless you frequently scan your PC with an antivirus tool.
Q: Are certain sites more prone to these threats?
A: Your PC could be infected from a number of sources. Viruses can be transferred from PC to PC through the use of a shared USB Flash Drive. There are many instances where a nationally recognized company's website has been compromised and visitors to their site have been infected with malware. The best way to protect yourself is to protect your PC.
Q: What do I need to do to protect my PC?
A: While there is no solution that will protect you from every risk, if you take the following precautions, you can significantly reduce your exposure:
Limit your available personal information
Be wary of making too much personal information available online. Online banking and e-commerce sites frequently use "challenge questions" to help you recover a forgotten password, or for other security purposes. Often, your online profile will contain enough information to answer these questions. If a hacker has access to this information, he may be able to break into your online banking account. In fact, some online quizzes are nothing more than veiled attempts to gather answers to challenge questions.
Use privacy settings to restrict who can access your information…
Most social networking websites provide a way to limit what information is available and who can see it. Familiarize yourself with how the privacy settings work, and set them to limit your exposure as much as possible. If your social networking website has no privacy settings, consider taking your online socializing elsewhere.
… But don't rely on them
E-commerce websites are held to a higher security standard than most other websites. Social networking sites have a spotty track record when it comes to protecting personal information. Even if your favorite website provides privacy settings, it may not enforce them as well as advertized.
Vary your password
Use a password for social networking websites that is different from the ones for your e-mail, e-commerce and financial websites. Ideally, you should use a different password on each website.
Know who you are "friending"
Consider refusing friend requests from people you don't know. They may be interested in more than your friendship.
Beware of following links
Links sent in messages sometimes lead to websites that distribute malware. Consider the source of the message: is it from someone who never sends you messages? Does the message sound like something your friend would send? If it looks suspicious, ask your friend if they really sent it. If they didn't, their computer may be infected with malware which actually sent you the message.
Talk to your kids about security
If you have children, talk to them frequently about how to remain safe online:
Malware is a general term for software that is meant to cause harm. Computer viruses, spyware, adware, and Trojan horses are all examples of malware. Computer security experts like to compare malware with human diseases (which is why computer viruses are called "viruses" in the first place). The purpose of malware can be something as seemingly harmless (yet annoying) as popping up a window to show you unwanted advertising, or as dangerous as snooping on the keystrokes as you type your internet banking password.
How do computers get malware?
Computers become infected with malware through a number of mechanisms – sharing files on jump drives or floppy disks, opening suspicious e-mail attachments, or visiting websites that are themselves infected with malware. Additionally, malware can arrive via downloaded files, such as music or videos from a peer-to-peer file sharing networks (such as Kazaa or BitTorrent), or simply by visiting a website that has been hacked and infected. No longer is it a matter of staying away from "bad" websites. Unfortunately any website that is not properly secured can be hacked and infected with malware that could infect your PCWhy Should You Be Afraid of Malware?
How do you avoid getting malware?
The single most important step that you can take to protect your PC is to install and use well-known anti-virus software. Update the virus definitions regularly and scan your computer regularly. Most anti-virus scanners will provide tools to automate these tasks so that they take place when you are not using your computer. This software will help you when you visit a site that has been hacked and infected.
If you have a Mac, your chances of being infected with malware are lower than if you are running Windows, although the incidence of Mac malware is on the rise. It is possible that malware will make its existence known through pop-up windows or messages on your screen. If your computer exhibits this sort of behavior, your computer is certainly infected. Otherwise, you should look for the following symptoms.
Programs running slowly, crashing: many types of malware like to piggy-back on other applications, like web browsers, to monitor what they are doing. This can use a lot of your computer's resources, causing it to slow down considerably. On the other hand, some malware is just badly written and can slow down your computer or even crash other applications.
Suspicious network traffic; slow internet connection: If you are running Windows, press the CTRL, ALT and Delete keys at the same time, then select "Task Manager" from the resulting window. When Task manager opens, click on the Network tab and see if your PC is using the internet network connection, if it shows more than a few percent usage then this could be evidence of something using your internet connection without your knowledge.
Anti-virus warnings: Antivirus software cannot be expected to find all malware, but it does detect about 75%. Some malware will attempt to download other malware to do more damage. Antivirus software may detect one of these applications but not both. An anti-virus warning, combined with other signs, is a good indication of an infection, especially if you're not currently browsing the web or copying files.
What should I do if my computer is infected?
First, stop banking, shopping, or other online activities that involve sensitive information. Confirm that your anti-virus software is enabled and up-to-date. Scan your computer for viruses. Allow the anti-virus software to do its job, cleaning up and deleting viruses. Some malware is very sophisticated and can be difficult to remove even with the tools mentioned here. If you suspect that your computer is still infected, you may want to contact a professional. Many of the stores that sell computers also have services to repair them; this may be a good place to find assistance. There are some helpful, legitimate (and free) resources that can aid in getting your computer healthy again:
|Website powered by ProfitStars / ©2010 Peoples Bank of Moniteau County. All rights reserved.|
|Peoples Bank of Moniteau County
Other Services | About Us | Community Resources | Check Reorder
MasterCard SecureCode | Customer Information Security | Contact Us
|NOTICE: Peoples Bank of Moniteau County is not responsible for and has no control over the subject matter, content, information, or graphics of the web sites that have links here. The portal and news features are being provided by an outside source - The bank is not responsible for the content. Please contact us with any concerns or comments.|