Loading...
HomeMy WebLinkAbout2019 , If- o�lu�s of al s�ca rn. - - - --- =. - �'� r,�_ _ ... �If�you-spot a scarri,.�report7it�at�- -, -�� - -_- - _- ' Your reports help things you the FTC and other -- - T h e n t,ejGh t'h e :FTC law enforcement can do to investigate scams and bring crooks � � - _ to justice. -ftc.g; lv/cgM.p aint-, R&U 1-877!FT:C-HELP ' (1-877-382=43�5.7)� r FEDERAL TRADE'COMMISSION August 2018 Spot imposters. Don't pay upfront for a promise. Hang up on robocalls. Scammers often pretend 4Someone might ask you to pay 71f you answer the phone and to be someone you trust, like a in advance for things like debt relief, hear a recorded sales pitch, hang up government official, a family member, credit and loan offers, mortgage and report it to the FTC. These calls a charity, or a company you do assistance, or a job. They might are illegal, and often the products are business with. Don't send money even say you've won a prize, but bogus. Don't press 1 to speak to a or give out personal information in first you have to pay taxes or fees. If person or to be taken off the list. That response to an unexpected request you do, they will probably take the could lead to more calls. -whether it comes as a text, a money and disappear. phone call or an email. Learn where to get real Be skeptical about free trial offers. help with these issues at Some companies use free trials to Do online searches. consumerftc.gov. sign you up for products and bill you Type a company or product every month until you cancel. Before name into your favorite search Consider how you pay. you agree to a free trial, research the engine with words like "review," 5 Credit cards have significant company and read the cancellation "complaint" or "scam." fraud protection built in, but some policy. And always review your Or search for a phrase 77 payment methods don't. Wiring money monthly statements for charges that describes your :,' f` . R through services like Western Union you don't recognize. situation, like "IRS call." or MoneyGram is risky because it's You can even search , _,'; nearly impossible to get your money Don't deposit a check and wire for phone numbers to back. That's also true for reloadable money back. see if other people have -=f' cards (like MoneyPak or Reloadit) By law, banks must make funds from reported them as scams. ,,�-, and gift cards (like iTunes or Google deposited checks available within Play). Government offices and honest days, but uncovering a fake check Don't believe your companies won't require you to use can take weeks. If a check you caller ID. Technology makes these payment methods. deposit turns out to be a fake, you're it easy for scammers to fake caller responsible for repaying the bank. ID information, so the name and Talk to someone. number you see aren't always real. If Before you give up your moneySign up for free scam alerts someone calls asking for money or or personal information, talk to ' from the FTC at ftc.gov/scams. personal information, hang up. If you someone you trust. Con artists want Get the latest tips and advice about think the caller might be telling the you to make decisions in a hurry.-They scams sent right to your inbox, truth, call back to a number you know might even threaten you. Slow down, is genuine. check out the story, do an online search, consult an expert--'or just-tell - - a friend. - r=;— - 1 I r k4rwe "a Identity Theft HEARD b Here's how it works; Someone gets your personal information and runs up bills in your name. They might use your Social Security or Medicare number, your credit card, or your medical insurance — along with your good name. How would you know? You could g-et bills for things you didn't buy or services you didn't get. Your bank account might have withdrawals you didn't make. You might not get bills you expect. Or, you could check your credit report and find accounts you never knew about. Here's what you can o: �e Protect your information. Put yourself in another person's shoes. Where would they find your credit card or Social Security number? Protect your personal information by shredding documents before you throw them out, by giving your Social Security number only when you must, and by using strong passwords online. Read your monthly statements and check your credit. When you get your account statements and explanations of benefits, read them for accuracy. You should recognize what's there. Once a year, get your credit report for free from Ann ualCreditReport.com or 1-877-322-8228. The law entitles you to one free report each year from each credit reporting company. If you see something you don't recognize, you will be able to deal with it. f $ 4 Grandkid Scams HEARD .j 56L:—.9j Here's how they work: You get a call: "Grandma, I need money for bail." Or money for a medical bill. Or some other kind of trouble. The caller says it's urgent — and tells you to keep it a secret. But is the caller who you think it is? Scammers are good at pretending to be someone they're not. They can be convincing: sometimes using information from social networking sites, or hacking into your loved one's email account, to make it seem more real. And they'll pressure you to send money before you have time to think. Here's what you can do: �w Stop. Check it out. Look up your grandkid's phone number yourself, or call another family member. ® Pass this information on to a friend. You may not have gotten one of these calls, but chances are you know someone who will get one — if they haven't already. i'�gni;_Yid,• I C "You 've Won" Scams . . • Here's how they work: You get a card, a call, or an email telling you that you won! Maybe it's a trip or a prize, a lottery or a sweepstakes. The person calling is so excited and can't wait for you to get your winnings. But here's what happens next: they tell you there's a fee, some taxes, or customs duties to pay. And then they ask for your credit card number or bank account information, or they ask you to wire money. Either way, you lose money instead of winning it. You don't ever get that big prize. Instead, you get more requests for money, and more promises that you won big. Here's what you can do-O Ido Keep your money — and your information — to yourself. Never share your financial information with someone who contacts you and claims to need it. And never wire money to anyone who asks you to. �® Pass this information on to a friend. You probably throw away these kinds of scams or hang up when you get these calls. But you probably know someone who could use a friendly reminder. t r r I Tech Support Scams HEARD . . . Here's how they work: You get a call from someone who says he's a computer technician. He might say he's from a well-known company like Microsoft, or maybe your internet service provider. He tells you there are viruses or other malware on your computer. He says you'll have to give him remote access to your computer or buy new software to fix it. But is the caller who he says he is? Judging by the complaints to the Federal Trade Commission, no. These scammers might want to sell you useless services, steal your credit card number, or get access to your computer to install malware, which could then let them see everything on your computer. Here's what you can dQ Hang up. Never give control of your computer or your credit card information to someone who calls you out of the blue. �Q Pass this information on to a friend. You might know these calls are fakes, but chances are you know someone who doesn't. i -rr l _ IRS I Scams HEARDabout— j"d 56L: --.A Here's how they or : You get a call from someone who says she's from the IRS. She says that you owe back taxes. She threatens to sue you, arrest or deport you, or revoke your license if you don't pay right away. She tells you to put money on a prepaid debit card and give her the card numbers. The caller may know some of your Social Security number. And your caller ID might show a Washington, DC area code. But is it really the IRS calling? No. The real IRS won't ask you to pay with prepaid debit cards or wire transfers. They also won't ask for a credit card over the phone. And when the IRS first contacts you about unpaid taxes, they do it by mail, not by phone. And caller IDs can be faked. Here's what you can do. �4 Stop. Don't wire money or pay with a prepaid debit card. Once you send it, the money is gone. If you have tax questions, go to irs.gov or call the IRS at 800-829-1040. 4 Pass this information on to a friend. You may not have gotten one of these calls, but the chances are you know someone who has. r Health Care Scams Here's how they ®Irk: You see an ad on TV, telling you about a new law that requires you to get a new health care card. Maybe you get a call offering you big discounts on health insurance. Or maybe someone says they're from the government, and she needs your Medicare number to issue you a new card. Scammers follow the headlines. When it's Medicare open season, or when health care is in the news, they go to work with a new script. Their goal? To get your Social Security number, financial information, or insurance number. So take a minute to think before you talk: Do you really have to get a new health care card? Is that discounted insurance a good deal? Is that "government official" really from the government? The answer to all three is almost always: No. Hare's what you can doo �o Stop. Check it out. Before you share your information, call Medicare (1-800-MEDICARE), do some research, and check with someone you trust. What's the real story? �o Pass this information on to a friend. You probably saw through the requests. But chances are you know someone who could use a friendly reminder. i PayingToo Much . • • Here's how ft works-0 Everyone pays all kinds of bills. Some are higher than you think they should be. Sometimes, unexpected charges appear on your bill — or sometimes, you might see a fee for a service you don't recall ordering. Are you paying more than you should? You are your own best advocate. How often does a company figure out that you've overpaid — and refund your money? It could happen — but you're more likely to get money back if you spot the error and point it out. It means keeping track of what you normally pay, and what the charges are for. You also can ask for a better deal: call to see if there's a promotion you qualify for and how long it will last, or if they can lower your interest rate. They might say no — but if you don't ask, you don't get. HeTe's what you can do-O �o Read every statement, every time. Does something look wrong or unfamiliar? Call the company and ask. If you don't like the response you get, ask for a supervisor. And keep written records of your calls. �o Pass this information on to a friend. Not paying more than you need to might come easily to you. But you probably know someone who could use some friendly encouragement. - Charity Fraud Here's how Oft works: Someone contacts you asking for a donation to their charity. It sounds like a group you've heard of, it seems real, and you want to help. How can you tell what charity is legitimate and what's a scam? Scammers want your money quickly. Charity scammers often pressure you to donate right away. They might ask for cash, and might even offer to send a courier or ask you to wire money. Scammers often refuse to send you information about the charity, give you details, or tell you how the money will be used. They might even thank you for a pledge you don't remember making. Haas's what you can do.- Take omTake your time. Tell callers to send you information by mail. For requests you get in the mail, do your research. Is it a real group? What percentage of your donation goes to the charity? Is your donation tax- deductible? How do they want you to pay? Rule out anyone who asks you to send cash or wire money. Chances are, that's a scam. �® Pass this information on to a friend. It's likely that nearly everyone you know gets charity solicitations. This information could help someone else spot a possible scam. 1 -I Online Dating Scams HEARD . • • Here's how they work: You meet someone special on a dating website. Soon he wants to move off the dating site to email or phone calls. He tells you he loves you, but he lives far away — maybe for business, or because he's in the military. Then he asks for money. He might say it's for a plane ticket to visit you. Or emergency surgery. Or something else urgent. Scammers, both male and female, make fake dating profiles, sometimes using photos of other people — even stolen pictures of real military personnel. They build relationships — some even fake wedding plans — before they disappear with your money. Here's what you can do: 1. Stop. Don't send money. Never wire money, put money on a prepaid debit card, or send cash to an online love interest. You won't get it back. Pass this information on to a friend. You may not have gotten one of these calls, but chances are you know someone who will get one — if they haven't already. .-• - - - - - - -- ., _. ; - -• , _-_ -- - :-- _ --. - .- _- -- - -. _ - _ -�,,"`"' -- _- _ ice} s��,��.:7 ,�., Want to know more? Sign up for vie]ilk 0 scam alerts at ftc.gov/subscribe. r`y Please Report Scams If you spot a scam, please report it to the Federal ' Trade Commission. Call the FTC at 1-877-FTC-HELP (1-877-382-4357) or TTY 1-866-653-4261 Go online: ftc.gov/complaint Your complaint can help protect other people. By filing a complaint, you can help the FTC's I investigators identify the imposters and stop them before they can get someone's hard-earned money. It really makes a difference. Federal"Trade Commi"scion I ftc;gov/PaslfiQn NEW YORK STATE SE .CURITY M' 14 A, . Helping you to prevent Identity Theft Identity Theft occurs when someone uses your name or personal information to open an unauthorized new account, make unauthorized changes, secure services or benefits or borrow money. This crime continues to be the most common consumer fraud complaint,affecting approximately 8 to 15 million Americans each year. It is of particular concern in New York,which has one of the sixth highest per-capita rates of Identity Theft in the country. New Yorkers have a tool to use against Identity Theft...The New York State Security Freeze Law. Security Freeze Law As of November 1, 2006, New York residents can initiate a Security Freeze on their credit bureau information.The new Security Freeze Law is designed to help prevent Identity Theft and should be considered a major weapon in the war against identity thieves. How a Security Freeze Works At your request, a Security Freeze is placed on your credit file,which is sometimes called your"credit history." The Security Freeze prevents most potential creditors and others from accessing your credit report for review prior to granting a new line of credit. With a Security Freeze in place,the lender will not be able to get a copy of your credit history and, as a result, most lenders will refuse to grant credit or loans. The Security Freeze will, in most cases,prevent someone from opening a new account or borrowing money using your name or personal information because your credit file cannot be accessed. There is no charge for a New York State resident to place a Security Freeze on their credit report if you are the victim of Identity Theft or if you are making this request for the first time. For second or subsequent requests for a Security Freeze,you may be charged up to$5.00 for that service.There may also be a$5.00 fee to temporarily lift or remove a Security Freeze. There is also a$5.00 for a replacement PIN (Personal Identification Number) or Password. C-71 �<<' �Securi Freeze�ma •be`' articularh 'beneficiaTfor consumers who = _ �_ -;', � KA'A li'een th'e victim of Identi ';Theft+domestic violence:stalkin or - ' wlio lieTiee,ther„pzersorial information lias,be'en compromised: v Benefits and Risks of a Security Freeze Not everyone will want to place a Security Freeze on their credit file. With a Security Freeze in place,you won't be able to borrow money, obtain instant credit or get a new credit card until you temporarily lift or permanently remove the Security Freeze. The same is true of new insurance coverage and background checks that might be required by a new employer. Additionally, it can impede renting an apartment or other housing opportunities., How to obtain a Security Freeze To obtain a Security Freeze, contact each of the three (3) major credit reporting agencies (CRA): Trans Union, Experian and Equifax. The Security Freeze should be in place five (5) days after the reporting agency receives your request. Within ten (10) days,the agencies must mail-you-a-letter-conta-i-rring your PIN or Password and a confirmation that the Security Freeze is in place. Additionally, each CRA is - required to have a secure website and a dedicated toll free number to place a Security Freeze. Requests for a Security Freeze must contain personal information that will be specified by each credit bureau. This information may include your name, addresses during past five years and Social Security number. Credit bureaus need this information to verify your identity and process your request. If you choose to use the mail and write a letter,the Consumer Protection Board (CPB) website (nysconsumer.gov) contains information on the requirements of each credit bureau, along with sample letters that can be used to initiate your request for a Security Freeze. If you are victim of Identity Theft you will need to provide a valid copy of a police report or a Federal Trade Commission Identity Theft Affidavit. Each letter should be sent certified mail with confirmation of delivery. How to Remove or Lift the Security Freeze Each consumer credit reporting bureau has its own instructions for temporarily lifting or removing the Security Freeze. Generally the information required would include the PIN or Password issued when placing the freeze with proper identification. The name of the party the information should be released to or the period of time the information should be available to requestors. REMEMBER! If you are applying for credit,insurance coverage or a new job and a check of your credit history is required they will not be able to do so unless you lift the Security Freeze. Requests for a temporary or permanent removal of the Security Freeze must be accompanied by proper identification and payment of applicable fee. CRA's must lift the freeze within 15 minutes of a request received by telephone orsecure electronic mechanism such as via the Internet. r FREQUENTLY ASKED QUESTIONS Can I order my own credit report if my credit file is frozen? Yes. To obtain a free copy of your credit report (a free copy is available from each of the three (3) credit bureaus every twelve (12) months).See the Resource page for information on obtaining the free annual credit report. Can some companies still review my credit history even with a Security Freeze in place? Yes. Some private companies,government agencies and courts can still access your credit files with a Security Freeze in place.These include companies with which you're currently doing business, companies to which you owe money and collection agencies. Credit card companies and other lenders can also access this information in order to offer you credit cards and related services. You have the option of "opting out" for five (S) years or permanently. "Opting out" only affects credit offers that use the reporting agencies for information. Will a Security Freeze lower my credit score? No. Does one Security Freeze cover everyone in my household? No.All adults have to freeze their separate credit files,via separate letters requesting the freeze, in order to obtain the benefit of a Security Freeze. What is the difference between a Fraud Alert and a Security Freeze? A Fraud Alert is indicated on the credit report that the credit issuer receives when checking and reviewing a consumer's credit rating. It tells the credit issuer that there may be fraud involved on that account. It does not limit or prevent access to your credit file. An initial Fraud Alert can make it harder for an identity thief to open more accounts in your name,but does not entirely prevent it. A Fraud Alert is limited to 90 days.You can renew it after 90 days. A Security Freeze means that your credit file cannot v be accessed by potential creditor, insurance companies or employers doing background checks-unless you give your personal consent or authorization. A Security Freeze remains in place until you authorize it to be lifted or removed.1 Where can I obtain more information regarding Identity Theft? The NYS Consumer Protection Board has prepared information on how to avoid becoming a victim of Identity Theft and what to do if your identity is stolen. That information is available at www.nysconsumer.gov under"Publications". For your convenience we have enclosed sample security freeze letters specific to each of the three (3) credit reporting agencies. They are located after the Resource Page. For additional information,visit www.suffolkpd.org f Y RESOURCE PAGE NOTE: Always use the addresses,phone numbers and website addresses on these pages. 1. To receive your annual credit report once each year: Click on the website www.annualcreditreport.com and fill out a request. Call: 1-877-322-8228 TDD: 1-877-730-4104 Print out annual credit report request form at www.ftc.gov/credit and mail to Annual Credit Report Request Service, PO Box 105281,Atlanta, GA 30348-5281 If you discover an error in a report,write to the reporting company to explain the situation. 2. Credit Reporting Agencies Experian Equifax TranUnion www.experian.com www.equifax.com www.transunion.com PO Box 9701 PO Box 740241 Fraud Victim Assistance Dept. Allen,TX 75013-0949 Atlanta, GA 30374-0241 PO Box 2000 Chester, PA 19016 To place a Fraud Alert by To place a Fraud Alert by To place a Fraud Alert by phone: phone: phone: 1-888-397-3742 1-800-525-6285 1-800-680-7289 To place a Security Freeze To place a Security Freeze by To place a Security Freeze by phone: phone: by phone: 1-888-397-3742 option 2, 1-800-349-9960 1-888-909-8872 option 2 Call the NYS consumer Protection Board for all consumer-related assistance or to file a complaint NYS Consumer Protection Board Advocating for and Empowering NY Consumers 1-800-697-1220 www.nysconsumer.gov A product of the NYS Protection Board's Identity Theft Prevention and Mitigation Program Y. Security Freeze request to Equifax,Inc. NOTE: If this is your first time placing a security freeze,there is no fee. Upon removal or temporary lifting of the Security Freeze, a fee of$5.00 will be charged to restore the Security Freeze. There is an exception if you are a victim of Identity Theft.You will not be charged this fee if you submit a copy of a police report or a signed copy of a Federal Trade Commission ID Theft victim affidavit. You must send this letter to Equifax by either certified mail or overnight mail through the US Postal Service to: Equifax Security Freeze PO Box 105788 Atlanta, GA 30348 Date: Dear Equifax: I would like to place a Security Freeze on my credit file. My full.name (with middle initial and generation,such as Jr. or Sr.) is: My complete current address is: My date of birth is: , My Social Security number is: I am also enclosing a copy of a document(such as utility bill) for verification of my current mailing address. Yours truly, Security Freeze request to Experian,Inc J Information required by Experian Make sure that each copy of your personal information is legible (enlarge if necessary) and it displays your name and current mailing address, as well as the date of when the document was issued. The date(s) on these documents must be recent. • Experian will NOT accept credit card statements,voided checks,lease agreements, magazine subscriptions or postal service forwarding orders as proof. • To protect your personal information, Experian does not return correspondence mailed to them. Do not send original documents. Send Experian copies of necessary documentation. • If this is your first time placing a security freeze,there is no fee. Upon removal or temporary lifting of the Security Freeze, a fee of$5.00 will be charged to restore the Security Freeze. • There is an exception if you are a victim of Identity Theft.You will not be charged this fee if you submit a copy of a police report or a signed copy of a Federal Trade Commission ID Theft victim affidavit. You must send this letter to Experian by either certified mail or overnight mail through the US Postal service to: Experian Security Freeze PO Box 9554 Allen,TX 75013 Date: Dear Experian: I would like to place a Security Freeze on my credit file. My full name(with middle initial and generation, such as Jr, or Sr.) is: My Social Security number is: My date of birth is: My complete current address is: Below is a list of my addresses for the past two years: I am also enclosing one copy of(a government issued identification card,such as driver's license,state ID card, military ID card, etc.) To verify my current address, I am also enclosing one copy of(utility bill, bank or insurance statement, etc.) Enclosed are copies of for proof that I am a victim of Identity Theft or a victim of domestic abuse. Yours truly, Security Freeze request to TransUnion,Inc. NOTE: If this is your first time placing a security freeze,there is no fee. Upon removal or temporary lifting of the Security Freeze, a fee of$5.00 will be charged to restore the Security Freeze. There is an exception if you are a victim of Identity Theft.You will not be charged this fee if you submit a copy of a police report or a signed copy of a Federal Trade Commission ID Theft victim affidavit. TransUnion reserves the right to ask for further proof of identity should the information provided is not complete or if security warrants it. Additional information required to verify may include: The following can be used as proof of address and Social Security number: copies of current driver's license,bank or credit union statement, Medicaid or Medicare card,paycheck stub, state ID card,W2 form. TransUnion will accept letters by regular mail, certified mail or overnight mail from the US Postal Service at this address: TransUnion Consumer Solutions PO Box 2000 Chester, PA 19016-2000 Date: Dear TransUnion: -I would-like to place a Security Freeze-on-my-credit file: - My full name (with middle initial and generation,such as Jr. or Sr.) is: My complete current address is: My previous address is (if you have other addresses in the previous five(5)years): My home phone number is: My Social Security number is: My date of birth is: My driver's license number is: Yours truly, SUFFOLK COUNTY FFIll POLICE DEPARTMENT IDENTITY THEFT UNIT ry F-111 CD -IV-Ej VT-ITY �I-E--s L BTS T PR A C TICTS U Ll liffr--T Ll Fl, LEO L ULU TABLE OF CONTENTS I. What is Identity Theft? A. How Are Identities Compromised? B. Prevention Tips C. Your Computer and Identity Theft II. What To Do if You Become a Victim of Identity Theft A. The Security Freeze B. The Identity Theft Affidavit III. Sample Freeze Letters IV. Sample Dispute Letters V. The FACTA Law and a Summary of Your Rights VI. Resource Pages Suffolk County Police 'Department Identity Theft Chit 30 Yaphank Avenue Yaphank, NY 11980 Phone: 631-852-6821 E-mail: Identity.Theft@suffolkcountyny.gov As a part of its community outreach program, the Identity Theft Unit provides - speakers for presentations to the public about-the dangers of identity crimes and tips on how to avoid becoming a victim. If your organization is interested in hosting such an event, please contact the section'at 631-852-6821. WHAT IS IDENTITY THEFT? Identity theft occurs when someone uses your: ❖ Name ❖ Social Security Number ❖ Date of Birth ❖ Maiden Name ❖ Other personal identifying information to commit a crime or a fraud. Most folks only consider identity crime as being financial, but a n imposter can ju st as easily identify himself as you when he is arrested for non-financial crimes, such as driving while under the influence. Some criminals may also use your personal identifying information to o btain passports or drivers licenses in your name, an aspect that may have national security aspects if the criminal(s)are connected to terrorism. WHAT THEY DO WITH YOUR IDENTITY ❖ Open New Accounts ❖ Obtain loans o bank accounts o home mortgages o credit/debit card accounts o equity lines o cell phone and utility o auto financing ❖ Take over your existing accounts. ❖ Counterfeit your checks. ❖ Clone your credit and debit cards ❖ Commit crimes in your name PREVENTION An important aspect to remember about the theft of identities, while large scale data breaches of merchant and financial institution computer databases is a reality, an im portant aspect to remember about the theft of identities is that, in most cases, the identity thief employs more traditional, low-tech methods to steal your information. This kn owledge places the ability to prevent identity theft in the hands of the potential victim, who can make informed decisions about the security of his or her personal information. So it is very impo rtant that you know how identity thieves can obtain your personal identifying information. HOW ARE IDENTITIES COMPROMISED? ❖ Victim assisted: The victim divulges personal information to a nyone who asks for it wh ether or not the information is required even during cash transactions, or through scams designed to encourage the victim to give out personal data. o Pretext phone calls ■ These are phone calls made by criminals meant to trick the intended victim into divulging personal information. ■ Often the caller leads the victim to believe he represents a lottery or a fina ncial institution and needs your personal information so you can claim a prize or to update personal account data at your bank. o Store clerks/office receptionists ■ Often request personal i nformation from a cu stomer or a pati ent when not required to deliver the service or merchandise. ❖ Theft or loss of: o Wallets and pocketbooks o Mail o Trash containing personal information ❖ Burglary of residence or business where personal information may be stored - 1 - ❖ Skimming o An identity thief can obtain a victim's credit card number by just copying down a victim's credit card number or more advanced methods such as using a small electronic device (skimmer) to swipe and store hundreds of victims' credit card numbers. Common scenarios for skimming are restaurants or bars where the skimmer has possession of the victim's credit card out of their immediate view. Skimming may also involve place a device over the card slot of an ATM (A utomated Teller Machine), which reads the magnetic strip as the user unknowingly passes their card through it. A pinhole camera or fake keypad may be utilized to record the user's PIN at the same time. ❖ Internet o "Phishing" ■ "Phishing" is an e-mail message that appears to be sent by a legitimate institution designed to trick con sumers into divulging personal information —such as their credit or debit account numbers, checking account information, Social Security numbers or banking account passwords — by directing the recipient to a fake website or prompting a reply e-mail. o Unsecured wireless networks ■ As more people install wireless routers on their home networks they fail to utilize the security features on their wireless routers or firewall software. Criminal's can gain access to a victims unsecured internet connection and use it to commit crime and frauds. o Unsecured laptops using "hotspots" ■ Criminals can gain access to your laptop while you use a public "hotspot" and obtain personal or important information stored in files on the laptop's hard drive o Fake websites ■ Fake websites mimic the sites of established - R —= companies to trick prospective customers into 0- revealing revealing credit card information. - ■ Look forth a security indicators on your web browser ps such as, the Padlock symbol and "https" in the MK2 address box. =80- , PREVENTION TIPS _ o Vigilance= Protection! o You Decide When and What Information You Want To Give Out Ask a m erchant or service provider requesting your Social Security number or personal information: ■ Why do they need it? ■ What will they do with it? ■ Where will it be kept? ■ Will you still get the merchandi se or service if you do not provid a them with your personal information? ■ Can you substitute passwords or identifiers of your choosing? o DO NOT give out personal information over the phone or Internet unless you initiate the call to a known person or business. o DO NOT TRUST caller id's to identify the caller. The advent of Voice Over Internet Protocol (VOIP) Phone S ervice allows the cr iminal to "spoof' or fake the displayed number. Financial institutions will not call you to ask for personal information. - 2 - o Wallet or Pocketbook ■ Only carry the personal information you need daily in your wallet or purse. ■ Leave your Social Security Card in a safe place at home. ■ Reduce the number of credit'cards you carry—bette r yet, only take a credit card with you when you expect to use it. Secure extra credit cards in a safe place at home. ■ DO NOT keep copies of Social Security numbers, Account numbers, PINS or other identifying information in your wallet. ■ You must carry your driver's license and in many cases business or school identification as well a s health insu rance cards. Such do cuments may contain your Social Security number. If possibl e, replace your Social Security number,with a different identifying number or password. o Protect your mail ■ Locking mail boxes. ■ Vacation hold. ■ Outgoing mail should only be placed in U.S. Postal Service collection boxes. ■ Opt Out of re ceiving pre-screened,credit offers. (See the resource page for information on Mail Solicitations.) ■ Know your billing cycles. o Trash: Shred documents containing personal information before placing in the trash. IF IN DOUBT, SHRED IT! o DO NOT CARRY Passwords for credit, debit cards, bank and phone accounts in your wallet, pocketbook or day planner. Do not write the PIN on your credit/debit cards. o Secure Your Information ■ At home—burgla r proof by storing personal information and valued items in secure areas. ■ Know who has access to your i nformation such as family, friends and home assistants. Take action to secure your information from those who you do not want to have access. o Order your Credit Bureau Reports ■ Check your credit reports carefully for credit cards and loans you may not have opened or applied, for. (See the en closed Resource Page fo r information on the three (3) major Credit,Reporting Agencies.) YOUR COMPUTER AND IDENTITY THEFT Computers with access to the internet can be found in almost every household and business in Suffolk County. The to chnology offers g rowing opportunities to communicate, educate, and conduct business from homes and businesses in a way that was beyond our imaginations just a short time ago. The speed of technological advances in the area of home and office computing often surpasses the user's ability to comprehend and fully use all th a computer's features especially when it comes to security. As users become more involved in on-line banking, commercial purchases and other e- businesses, the risks for the loss or theft of personal information has become a matter of concern. There are many stories by the news media about the theft of cu 'stomer or client information through huge corporate data breaches but, you should not forget that you r personal computer may also be the target of attack by identity thieves. The follo wing tips a re offered to get you thinking about secure computing and on-line habits. - 3 - Social Networking Sites Social Networking sites such as My Space, Facebook, You Tube and Twitter, as well as others, are on-line communities that offer ne w and exciting venues for,users to meet new p eople or maintain communication with off-line friend s or g roups. Your inf ormation can be entered as a user profile, or dialogue in bulletins or blogs. As in any real world community, the criminal element has found a way to lurk in th a shadows to exploit the unwitting or careless for their benefit or to cause harm. Users should be mindful that the personal information they list on their on-lin a profile in these communities may be open for everyone in the community to see. Though you may feel that the information by itself cannot be used to harm you, it should be considered in the context of all the information you slowly provide over time through blogging and bulletins. ❑ Consider limiting the information listed on the site's profile page. The comp romise of personal information is a very real issue when using social networking sites. ❑ Learn to use the networking site's security features such as Facebook's "Friends List" that limits who can access your page. ❑ Carefully consider what photo's you wi sh to post, n of only for memori alizing potentially embarrassing incidents but what information a criminal can learn about you from the background, such as school banners, or the room's furnishings. ❑ Networking(sites may be a source for computer viruses, Trojan Horses and Spyware ❑ Networking sites have been used to spread "phishing" e-mails or change site content without your authorization. ❑ Do not take for granted that the networking site's security features work. Online Safety: o Computer Security ■ Use antivirus software. ■ Use or enable firewall software. Keep your Operating System and virus software updated. ■ Beware of e-mail attachments from those you don't know. ■ Turn the computer off when not in use. ■ Use a strong password containing both upper and lower case I etters and numbers. ■ If using a router, keep security firmware updated. o Wireless Networks ■ Wireless networks, either in the home or in a business, present computer safety issues most users do not encount er while using their"wired " internet connections. One of these dangers may include what is commonly called "war driving", where criminals and hackers may gain access to your intern et connection because it is broadcasted outside your home. Thieves may not only gain access to the internet but to y our computers' hard d rive where you may have stored important personal identifying information. Criminals can use you r internet connection to commit crimes on the internet which can be traced back to your home address. ■ Make sure you change the default password after installation. ■ Change the default SSID (Service Set Identifier; it is referred to as a network name because it essentially is a name that identifies a wireless network) — change it frequently. ■ Disable SSID Broadcast. ■ Enable Wireless Security(WEP or WAP). ■ Keep the wireless router firmware updated. - 4 - o Laptop Computers ■ If possible DO NOT store personal data on a laptop. ■ Consider Physical Security. ❑ Locks ❑r Security cables ■ Use bios and sign on Passwords. ■ Enable document encryption. _ o Public Wireless Connections ■ 'Be aware of Evil Twin Access Points that look like the friendly access point that you are trying to utilize in such Wi-Fi Hot Spots as in airports, cafes, hotels and libraries. The rogue access point can be used to"sniff' o r "eavesdrop"on wireless communications. ■ Keep software updated. ■ Enable Operating Systems and other software firewalls. ■ Enable encryption which prevents "sniffing". Browser sniffing is a common technique used in websites and web applications in order to determine the web browser a visitor is using. "Sniffing" is a form of wire-tap applied to computer networks. This means that traffic on a segment passes by all hosts attached to that seg ment. Filters on the network prevent the host machine from seeing traffic addressed to other stations. Sniffing programs turn off the filter, and thus hackers can see everyone's traffic. ■ Never ❑ Send confidential info by a-mail ❑ Send user Id's or passwords ❑ View online bank statements o Computer Hard Drives ■ Do Not discard old hard drives in the trash without first: ❑ Using specialized disk wiping software to clear data from the hard drive, or better ❑ Destroy the hard drive if no longer needed. WHAT TO DO IF YOU BECOME A VICTIM OF IDENTITY THEFT IMMEDIATELY! o Call the Police ■ Go to your local precinct or call to have a police officer come to your h ome. (631)852-COPS (2677) ■ Providing the credit reporting agencies with a copy of your police report will allow them to extend the fraud alert on your information to seven years. Contact the three major Credit Reporting Bureaus. ■ Place a fraud alert on your Credit Bureau information. ■ Request your credit bureau reports. ■ Check your repo rts carefully, make sure you can identify every entry reported, close any accounts you did not open or authorize. ■ The Resource Page co ntains information on the three (3) major Credit Reporting Agencies. o Call the creditors involved. ■ Advise them that you are the victim of Identity Theft. ■ Close the affected accounts. o Correct the address for any ma ilings in your name being sent to the wrong location by contacting the U.S. Posta I Inspection Service (See the end osed Resource Page for information on the U.S. Postal Inspection Service.). - 5 - o Contact the Federal Trade Commission Identity Theft Hotli ne (See the enclosed Resource Page for information on the Federal Trade Commission.) o Consider placing a "Se curity Freeze" on y our Credit Burea u Information. See the Resource Page for more information. Social Security Number Fraud If you believe som eone has been using your social security number to o btain benefits or employment you should also report your complaint to the Social Security Administration. (Se e the Resource Page for information on the Social Security Administration.) Internal Revenue Service Fraud If you believe that you have been the victim of fraudulent filing of documents with the Department of Treasury Internal Revenue Service please report your complaint to the I nternal Revenue Service. (See the en closed Resource Page fo r information on contacting the Department of Treasury— Internal Revenue Service.) Take Control! Here are a few guidelines to regain control of your life and your financial well being by`proving to financial institutions that you are the victim and not the perpetrator. o Gather all th a information you po ssess regarding the theft and use of your perso nal identifiers. o Chart a timel ine as to the sequence of events as you un derstand them. Correct the timeline as you gather more information. o Keep a diary and document phone calls regarding your problem; record the date, time and the names of persons you called and what information was discussed. Get dire ct phone numbers of those contacted as well a s addresses for future correspondence. Refer to the New York State Consumer Protection Website for a sample diary. Th e website information is on the enclosed Resource Page for your convenience. o Follow up all phone conversations with a written correspondence confirming the details of your conversation. Send all correspondence certified mail with a return receipt through the U.S. Postal Service. o Keep hard copies as well as computer copies of all correspondence, bills and charges either sent or received. o Keep track of expenses related to correcting your personal identifiers or credit information for the possibility of future restitution. Refer to the New York State Consumer Protection Website for information about victim restit ution. T he website i nformation is on the Resource Page for your convenience. o Stay organized, that may be difficult in such stressful circumstances so you may need to enlist a family member or close friend to assist you in the effort. THE SECURITY FREEZE Identity Theft, when someone uses your name or personal information to open an unauthorized new account or borrow money, or make unauthorized charges, continues to be the most common consumer fraud complaint, affecting approximately 8 to 15 million Americans each year. It i s of particular concern in New York, which has the sixth highest per-capita incidence of Identity Theft in the country. New Yorkers h ave a weapo n to use against Identity Theft: the New York S tate Security Freeze Law. - 6 - How a Security Freeze works At your request, a Security Freeze is placed on your credit file, which is sometimes called your "credit history." The Security Freeze prevents lenders and others from gaining access to your credit report for review. With a Security Freeze in place, the lender will not be able to get a copy of your credit history and, as a result, most lenders will refuse to open a new credit account. The Security Freeze will, in most cases, block someone from opening a new account or borrowing money using your name or person al information. There i s no cha rge for New York State residents, to place a Security Freeze on their credit report if they are the victim of Identity Theft or they are making this request for the first time. Benefits and risks of a Security Freeze Not everyone will want to place a Security Freeze on their credit file. With a S ecurity Freeze i n place, you won't be able to borrow money, obtain instant credit or get a new credit card until you temporarily lift or permanently remove the Security Freeze. The same is true of new insurance coverage and background checks that might be required by a new employer. Additionally, it can impede renting an apartment or other housing. How to obtain a Security Freeze To obtain a Security Freeze, contact each of the three (3) major credit reporting agencies (CRA): TransUnion, Experian and Equifax. By law, the three credit bureaus will have three business days from the date they receive your request to place a Security Freeze on your credit file (in 2010 it decreases to one business day).Additionally, each CRA is required to have a secure website and a dedicated toll-free number to place a Security Freeze. Requests for a Secu rity Freeze must contain personal information that will be specified by each credit bureau. This information may include your name, addresses during the p ast five years and Social Security number. Credit bureaus need this information to verify your identity and process your request. If you wish to use the mail and write a letter, the Consumer Protection Board's (CPB)website (nysconsumer.gov) contains information on the requirements of each credit bureau, along with sample letters that can be used to initiate our request for a Security Freeze. Each letter must be sent with confirmation of delivery. What happens next? The credit bureaus (all of which are private companies) will write back to you within fiv a (5) business days of placing the freeze, confirming that it has been activated. These letters will also contain a password or a Personal Identification Number (PIN). When you want to temporarily lift or permanently remove your Security Free ze, you will use thi s password or PIN to identify yourself when calling the credit bureaus. Each reporting agency will give you a different password or identification number. The PIN can not be a So cial Security number or a sequential portion thereof. How to remove the Security Freeze Consumers may request that the Secu rity Freeze be lifted temporarily, or permanently on their credit report, and sho uld follow the in structions provided by ea ch credit re porting agency. To obtain a temporary lift of the Security Freeze, consumers must inform the credit reporting agency of the name of the party to whom the report should be made available or the period of time when the report should be av ailable to all requestors. Requests for a tempora ry or a perm anent removal of the Security Freeze must be accompanied by proper identification and payment of the applicable fee. Credit re porting agencies must comply with su ch requests within th ree (3) business days of receipt. As of Septe mber 1, 2009, credit reporting agencies must comply with this request within 15 mi nutes-of the reque st being received by telepho ne or secure electronic mechanism (e.g., Internet). Fees associated with the Security Freeze You can be charged up to$5 to place a second or subsequent freeze on your report or to remove the Security Freeze. If you are a victim of Identity Theft, there is no charge for restoring a - 7 - Security Freeze as long as you provide a copy of an ID theft report from a law enforcement agency or an ID Theft Victim Affidavit from the Federal Trade Commission. FREQUENTLY ASKED QUESTIONS Can I order my own credit report if my file is frozen? Yes. To obtain a free copy of your credit report (a copy is available from each of the three credit bureaus every 12 months). (See the Resource Page for information on obtaining the free annual credit report.) Can some companies still review my credit history even with a Security Freeze in place? Yes. Some private companies, government agencies and courts can still access your credit files with a Security Free ze in place. These include companies with which you're currently d oing business; companies to which you owe money; and collection agencies. Credit card companies and other lenders can also access this information in order to offer you credit cards and related services. You have the option of"opting-out" for five (5) years or permanently. "Opting-out" only affects credit offers that use the reporting agencies for information. (See the Resource Page for information on the Opt Out options.) Will a Security Freeze lower my credit score? No. Does one Security Freeze cover everyone in my household? No.All adults have to freeze their separate credit files,via separate letters requesting the freeze, in order to obtain the benefit of a Security Freeze. What is the difference between a Security Freeze and Fraud Alert? A fraud alert is a special message on the credit report that a credit issuer receives when checking a consumer's credit rating. It tells the credit i ssuer that th ere may be fraud involved in the account. It does not limit access to your file. A fraud alert can help protect you against identity theft, but it can al so slow down your ability to get new credit. It should not st op you from using your existing credit cards or other accounts. A Security Freeze means that your,credit file cannot be accessed by potential creditors, insurance companies, or employers doing background checks -unless you give your personal consent or authorization. Where can I obtain more information regarding Identity Theft? The NYS Consumer Protection Board has prepared information on how to avoid becoming a victim of Identity Theft and what to do i f your identity is stolen. T hat information is available at www.nysconsumer.gov, under"Publications." For your convenience we have enclosed sample security freeze letters specific to each of the three (3)credit reporting agencies. They are located after the Resource Page. See the Resource Page for the telephone numbers, online website addresses and location addresses of the three credit reporting agencies. THE IDENTITY THEFT AFFIDAVIT To make certain that you do not be come responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts were opened in your name that you didn't create the debt. The ID T heft Affidavit was developed by a gro up of credit grantors, consumer advocates, and attorneys at the Federal Trade Commission (FTC) for this purpose. Importantly, this affidavit i s only fo r use where a n ew account was opened in your name. If someone made unauthorized charges to any existing account, call the company for instructions. - 8 - While many companies accept this affidavit, others require that you submit more or different forms. Contact each company to find out if th ey accept it. If they do not accept the ID Theft Affidavit, ask them what information and/or documentation they require. You may not need the I D Theft Affidavit to absolve you of debt resulting from identity theft if you obtain an Identity Theft Report. We suggest you consider obtaining an Identity Theft Report (Police Report)where a new account was opened in your name. An Identity Theft Report can be used to (1) permanently block fraudulent information from appearing on your credit report; (2) ensure that debts do not reappear on your credit reports; (3) prevent a company from continuing to collect debts or selling the debt to others for collection; and (4)=obtain an extended fraud alert. The ID Theft Affidavit may be required by a comp any in order for you to obtain appli cations or other transaction records related to the theft of your identity. These records may help you prove that you are a victim. For example, you may be able to show that the signature on an application is not yo urs. The se documents also may contain information about the i dentity thief that is valuable to law enforcement. Complete this affidavit as soon as possible. Many creditors ask that you send it within two weeks. This affidavit has two parts: ■ Part One—The ID Theft Affidavit—is where you report general information about yourself and the theft. ■ Part Two— The Fraudulent Account Statement -is whe re you describe the fraudulent account(s) opened in yo ur name. Use a separate Fraudulent Account Statement for each company you need to write to. When you send the affid avit to the compani es, attach COPIES (NOT ORIGINALS) of any supporting documents (for example, driver's license or police re port). When you have finishe d completing the affidavit, mail a co py to each creditor, bank, or company that provided the thief with the unauthorized credit, goods, or services yo u describe. Attach a co py of the Fraud ulent Account Statement with information only on accounts opened at the institution to which you are sending the packet, as well as any other supporting documentation you are able to provide. Send the appropriate documents to each company by-certified mail, return receipt requested, so you can prove th at it wa s received. Th a companies will review your claim and se nd you a written response telling you the outcome of their investigation. Keep a copy of everything you submit. If you are unable to complete the affidavit, a legal guardian or someone with power of attorney may complete it for you. For your convenience we have enclosed two (2) sample dispute letters. O ne is for a newly opened account in your name; the other is for an existing account that has been compromised. - 9 - Name: Suffolk County P.D. Central Complaint#: WFORMA TION 1. My full legal name is (First) (Middle) (Last) (Jr., Sr., III) 2. (If different from above)When the events described in this affidavit took place, I was known as: (First) (Middle) (Last) (Jr., Sr., III) 3. My date of birth is: (Day/MonthNear) 4. My Social Security Number is: 5. My driver's license or identification card state and number is: 6. My current address is: City: State: Zip Code: 7. 1 have lived at this address since: (MonthNear) 8. (If different from above) When the events described in this affidavit took place, my address was: City: State: Zip Code: 9. 1 lived at the address in Item 8 from to (MonthNear) (MonthNear) 10. My daytime telephone number is: �) - My evening telephone number is: �) - IHOW THE FRAUD OCCURRED CHECK ALL THAT APPLY FOR ITEMS 11 - 17 11. _ I did not authorize anyone to use my name or personal information to seek the money, creditjoans, goods or services described in this report. - 10 - Name: Suffolk County P.D. Central Complaint#: 12. _ 1 did not receive a ny benefit, money, goods or services as a result of the events described in this report. 13. _ My identification documents (for example, credit card s; birth ce rtificates; driver's license; Social Security Card, etc)were: stolen lost on or about (day/month/year) 14. _ To the best of my knowl edge and belief, the following person(s) used my information, (for example, my name, addre ss, date of birth, existing accou nt numbers, Social Security Number, mother's maiden name, etc.) or identification documents to get money, credit, loans, goods or services without my knowledge or authorization: Name (If known) Name (If known) Address (If known) Address (If known) Phone Number(s) (If known) Phone Number(s) (If known) Additional Information Additional Information 15. _ 1 do NOT kn ow who used my information or identification documents to get money, credit, loans, goods or services without my knowledge or authorization 16. Additional comments: (Fo r example, description of the fraud, whi ch documents or information were used or how the identity thief gained access to your information) Attach additional pages as necessary - 11 - Name: Suffolk County P.D. Central Complaint#: VICTIM'S LAW ENFORCEMENT ACTIONS 17. (Check only one) _ lam — I am not willing to assist in the prosecution of the person(s)who committed this fraud. - 18. (Check only one) _ I am — I am not authorizing the release of this information to law enforce ment for the purposes of assisting them in the investigation and prosecution of the person(s) who committed this fraud. 19. (Check all that apply): I _ have _have not reported the events described in this affidavit to the police or other law enforcement agency. The police_did_did not write a report. In the event you have contacted the police or other law enforcement agency please complete the following information: Agency#1 Officer/Agency personnel taking report Date of Report Report Number(if any) Phone Number Email Address (if any) Agency#2 Officer/Agency personnel taking report Date of Report Report Number(if any) Phone Number Email Address (if any) DOCUMENTATION Please indicate the supporting documentation you are able to provide to the companies you plan to notify. Attach copies (NOT originals)to the affidavit before sending it to the companies. 20. _ A copy of a valid governm ent-issued photo-identification card (for example, your driver's license, state-issued ID card, or your passport.) If you are u nder 16 and don't have a p hoto-ID, you may submit a copy of your birth certificate or a cop y of your official scho of records showing your enrollment and place of residence. 21. _ Proof of resi dency during the time the disputed bill occurred, the loan was made o r the other eve nt took pla ce (fo r example, a rental/lease agreement in your name, a copy of a utility bill or a copy of an insurance bill). 22. _ A copy of the report filed with the police or sheriffs department. If you are unable to obtain a report or a repo rt number from the p olice, please indicate that in Ite m 19. Some companies only need the report number, not a copy o f the repo rt. You may want to the ck with each company. - 12 - Name: Suffolk County P.D. Central Complaint M SIGNATURE I certify that, to the best of my knowledge and belief, all the information on and attached to this affidavit is true, correct, and complete and made in good faith. I also understand this affidavit ` or the information it contains may be made available to fe deral, state, and/or local law enforcement agencies for su ch action within thei r jurisdiction as they d eem appropriate. I understand that knowingly making any false or fraudulent statement or representation to the government may constitute a violation of 18 U.S.C. 1001 or other federal, state or local cri mina) statutes, and may result in imposition of a fine or imprisonment or both. Signature Date Signed Notary Check with each company. Creditors sometimes require notarization. If they do not, please have one witness (non-relative) sign below that you completed and signed this affidavit. Witness: Signature Printed Name Date Telephone Number - 13 - Name: Suffolk County P.D. Central Complaint#: FRAUDULENT ACCOUNT STATEMENT Completing the Statement ■ Make as many copies of this page as you need. Complete a separate page for each company you're notifying and only send it to that company. Include a copy of your signed affidavit. ■ List only the account(s) you're disputing with the company receiving this form. See th e example below. ■ If a collection agency sent you a statement, letter or notice about the fraudulent account, attach a copy of that document(Not the original). I declare (check all that apply): As a result of the event(s) described in the ID Theft Affidavit, the following account(s) was/were opened at your company in my name without my knowledge, permission or authorization using my personal information or identifying documents. Creditor Account. Type of Unauthorized Date Amount/Value Name/Address Number Credit/Goods/Services .Issued or Provided Provided by Creditor Opened - (The pened -(The company that (If known) (The amount charged opened the account or provided the goods (If known) or the cost or services} good or services) of the Example 01234567-89 Auto Loan 01/05/2002 $25.500.00 Example National Bank 22 Main Street Columbus, OH 22722 During the time of the accounts described above, I had the following account open with your company: Billing Name: Billing Address: _ Account Number: - 14 - Security Freeze (Sample) letter request to Equifax, Inc. Note: If thi s is your first time placing a security freeze, there is no fee for requestin g a Security Freeze. Once you remove or tem porarily lift the Security Freeze, you will be charged up to $5 to restore the Security Freez e. There is an exception, however, if you are the victim of Identity Theft. You will not be charged this fee if you submit a copy of the police r eport or a signed copy of a Federal Trade Commission ID Theft Victim Affidavit. You must send this letter to Equifax by either certified mail or overnight mail through the U.S. Postal Service to: Equifax Security Freeze PO Box 105788 Atlanta, GA 30348 Date: Dear Equifax: I would like to place a security freeze on my credit file. My full name (with middle initial and generation, such as Jr. or Sr.) is: My complete current address is: My date of birth is: My Social Security Number is: I am also enclosing a copy of a document (such as a utility bill) that verifies my current mailing address. Yours truly, - 15 - Security Freeze (Sample) Request to Experian Inc. Information on what to send to Experian: Make sure that each copy of your personal information is legible (enlarge if necessary) and it displays your name and curre nt mailing address, as well as the date of when the document was issued. The date(s) on these documents must be recent. Experian will NOT accept credit car d statements, voided checks, lease agreements, magazine subscriptions or postal service forwarding orders such as proof. To protect your personal information, Experian d oes not return correspondence sent to them. So keep your original documents and only send copies to Experian. Note: If this is your first time placing a security freeze, there is no fee for requestin g a Security Freeze. Once you remove or tem porarily lift the Security Freeze, you will be charged up to $5 to restore the Security Freez e. There is an exception, however, if you are the victim of Identity Theft. You will not be charged this fee if you submit a copy of the police r eport or a signed copy of a Federal Trade Commission ID Theft Victim Affidavit. You must send this letter to Experian by either certified mail or overnight mail thr ough the U.S. Postal Service to: Experian Security Freeze PO Box 9554 Allen, TX 75013 Date: Dear Experian: I would like to place a security freeze on my credit file. My full name (with middle initial and generation, such as Jr. or Sr.) is: My Social Security Number is: My date of birth is: My complete current address is: Below is a list of my addresses for the past two years: I am enclosing one copy of a go vernment-issued identification card, such as a driver's license, state ID card, military ID card, etc. To help verify my current address, I am also enclosing one copy of a utility bill, bank or insurance statement, etc. Yours truly, ` - 16 - Security Freeze (Sample) Request to TransUnion Inc. Note: If this is your first time placing a security freeze, there is no fee for requestin g a Security Freeze. Once you remove or tem porarily lift the Security Freeze, you will be charged up to $5 to restore the Security Freez e. There is an exception, however, if you are the victim of Identity Theft. You will not be charged this fee if you submit a copy of the police r eport or a signed copy of a Federal Trade Commission ID Theft Victim Affidavit. TransUnion reserves the right to ask for further proof of id entity should the information you provide not be co mplete or if security warrants it. T he following can be used as proof of address and Social Security number: co pies of current driver's license, ban k or credit union statement, Medicaid or Medicare c ard, paycheck stub, state ID card, W2 form. TransUnion will accept I etters by regular mail, certified mail or overnight mail from the U.S. Postal Service at this address: TransUnion Fraud Victim Assistance Department PO Box 6790 Fullerton, CA 92834 Date: Dear TransUnion; I would like to place a security freeze on my credit file. My name is: Other name(s) used: My current address is: My previous address is (if you have other addresses in the previous five (5) years): My home phone is: My Social Security Number is: My date of birth is: My driver's license# is: Yours truly, - 17 - Sample Dispute Letter Date Your Name Your Address Your City, State, Zip Code Complaint Department Company Name Address City, State, Zip Code Dear Sir or Madam: I am writing to dispute th a following information in my file. I have circled the items I am disputing on the attached copy of the report I received. This item (identify the item(s) disputed by name of source, such as creditors or tax court, and identify type of item, such as credit account, judgment, etc.) is (inaccurate or incomplete) because (describe what is inaccurate or incomplete and why). I am requesting that the item be remove d (or request another specific change) to correct the information. Enclosed are copies of (use this sentence if applicable and describe any enclosed documentation, such as a police report, Identity Theft Affidavit, payment records, court documents) supporting my position. Please reinvestigate this (these) matter(s) and (delete or correct) the disputed item(s) as soon as possible. In addition, pursuant t o FACTA Public Law 1 08, as a victim of ide ntity theft, I am requesting that you pro vide me with copies of any and al I applications and busin ess transaction records related to the fraudulent account(s). The copies of the records can be (mailed to me at the above address or faxe d to me at this telephone number: (xxx) xxx-xxxx). In addition, please make these records available to the Suffolk County Police Department upon their request. Sincerely, Your name. Enclosures (list below what is enclosed) - 18 - Sample Dispute Letter for Existing Accounts Date Your Name Your Address Your City, State, Zip Code Your Account Number Name of Creditor Billing Inquiries Address City, State, Zip Code Dear Sir or Madam: I am writing to dispute a fraudulent (charge or debit) on my account in the amou nt of $ . I am a victim of identity theft, and I did not make this (charge or debit). I am requesting that the (charge be removed or the debit be reinstated), that any fina nce and/or other charges related to the fraudulent amount be credited, as well, and that I receive an accurate statement. Enclosed are copies of (use this statement to described any enclosed information, such as a police report or ID Theft Affidavit) supporting my position. Please investigat a this matter and correct the fraudulent (charge or debit) as soon as possible. In addition, pursuant t o FACTA Public Law 1 08, as a victim of ide ntity theft, I am requesting that you provide me with copies of any and al I applications and busin ess transaction records related to the fraudulent account(s). The copies of the records can be (mailed to me at the above address or faxed to this telephone number. (xxx) xxx- xxxx). In addition, please make these records available to the Suffolk County Police Department upon their request. Sincerely, Your Name Enclosures (list below what is enclosed) - 19 - FAIR AND ACCURATE CREDIT TRANSACTIONS ACT OF 2003 PUBLIC LAW 108-159, DECEMBER 4, 2003 SEC. 151. SUMMARY OF RIGHTS OF IDENTITY THEFT VICTIMS a) IN GENERAL— 1) SUMMARY - Section 6 09 of the F air Credit Reporting Act (15 U.S.C. 16818) is amended by adding at the end of the following: d) SUMMARY OF RIGHTS OF IDENTITY THEFT VICTIMS— 1) IN GENERAL - The Commission, in consultation with the Federal banking agencies and the National Credit Union Administration, shall prepare a model summary of the rights of consumers under this title with respect to the procedures for remedying the effects of fraud or identity theft involving credit, an electronic fund transfer, or an account or transaction at or with a financial institution or other creditor. 2) SUMMARY OF RIGHTS AND CONTACT INFORMATION - Be ginning 60 days after the date on wh ich the model summary of rights is p rescribed in final form by the Commission pursuant to paragraph 1), if any consumer contacts a consume r reporting agency and exp resses a belief that the consumer is a victim of fraud or id entity theft involving credit, an electronic fund transfer, or an account or transaction at or with a financial institution or other creditor, the consumer reporting agency shall, in addition to any other action that the agency may take, provide the consumer with a summary of rights that contains all of the information required by the Commission under paragraph 1), and information on how to contact the Commission to obtain more detailed information. e) INFORMATION AVAILABLE TO VICTIMS— 1) IN GENERAL - Fo r the purpose of documenting fraudulent transactions resulting from identity theft, not later than 30 days after the date of receipt of a request from a victim in accordance with paragraph 3), a nd subject to verification of the identity of the vict im and the claim of identity theft in accordance with paragraph 2) a business entity that has provided credit to, provided for consideration products, goods, or services to, accepted Payment from, or oth erwise entered into a commercial transaction for consideration with, a person who has allegedly made unauthorized use of the means of identification of the victim, shall provide a copy of application and business identification of the victim, shall provide a copy of application and business transaction records in the control of the busi ness entity, whether maintained by the business entity or by another person on behalf of the business entity, evidencing any transactio n alleged to be a result of identity theft to— a. The victim b. Any Federal, State or Lo cal government law enforcement agency or officer specified by the victim in such a request; or c. Any law enf orcement agency investigating the ide ntity theft an d authorized by the victim to take receipt of records provided under this subsection. 2) VERIFICATION OF IDENTITY AND CLAIM - Before a business entity provides any information under paragraph 1), unless the business entity, at its discretion, otherwise has a high degree of confidence that it knows the identity of the victim makin g a request under paragraph 1), the vi ctim shall provide to the business entity- - 20 - a. as proof of positive identification of the victim, at the electio n of the business entity— i). the presentation of a government-issued identification card; ii). perso nally identifying information of the same type as was provided to the business entity by the unauthorized person; or iii). Person ally identifying informati on that the business entity typically requests from new applicants or for new transactions at the time of the victim's reque st for informatio n, including any documentation described in clauses i)and ii); and b. as proof of a claim of ide ntity theft, at the electio n of the busi ness entity– i). A copy o f a police re port evidencing the claim of the victim of identity theft; and ii). a properly completed– I. copy of a standardized affidavit of identity theft developed and made available by the Commission; or II. an affidavit of fact that is acceptable to the bu siness entity for that purpose. 3). PROCEDURES–The request of a victim under paragraph 1) shall– a. be in writing b. be mailed to an address specified by the business entity, if any; and c. if asked by the business entity, include relevant information about any transaction alleged to be a result of identity theft to facilitate compliance with this section including– L if known by the victim (or if readily obtainable by th a victim), the date of the application or transaction; and ii. if known 'by the victim (or if readily obtainable by the victim), any other.identifying information such as an account or transaction number 4). NO CHARGE TO VICTM–Information required to be provided under;paragraph 1)shall be so provided without charge. 5). AUTHORITY TO DECLINE TO PROVIDE INFORMATION–A business entity may decline to provide information under paragraph 1) if, in the exercise of good faith, the business entity determines that– this subsection does not require disclosure of this information; a. after reviewing the information provided pursuant to paragraph 2), the business entity does not have a hi gh degree of confidence in knowing the true identity of th a individual requesting the information; b. the request for the i nformation is based on a misrepresentation of fact by th a individual requesting the information relevant to the request for information; or c. the information requested is Internet navigational data or similar information about a person's visit to a website or online service. - 21 - A Summary of Your Rights Under the Fair Credit Reporting Act (Para informacion en espanol,visite www.ftc.gov/credit o escnbe a la FTC Consumer Response Center, Room 130-A 600 Pennsylvania Ave N.W.,Washington, D.C.20580.) The Federal Fair Credit Reporting Act(FCRA)promotes the accuracy,fairness,and privacy of information in the files of consumer reporting agencies. There are many types of consumer reporting agencies, including credit bureaus that gather and sell information about your creditworthiness to creditors, employers, landlords, and other businesses. The FCRA gives you specific rights, which are summarized below. You may have additional rights under state law. For more information, go to www.ftc.gov/credit, or write to Consumer Response Center, Federal Trade Commission,600 Pennsylvania Ave N.W.,Washington, D.C.20580. You must be told if information in your file has been used against you. Anyone who uses information from a consumer reporting agency to deny your application for credit, insurance, or employment—or take another adverse action against you—must tell you and give you the name,address,and phone number of the agency that provided the information. You can find out what is in your file.At any time,you may request and obtain your report from a consumer reporting agency.You will be asked to provide proper identification, which may include your Social Security number. In many cases the report will be free.You are entitled to free reports if a person has taken adverse action against you because of information-in a report; if you are the victim of identify theft; if you are the victim of fraud; if you are on public assistance, or if you are unemployed but expect to apply for employment within 60 days. In addition, you are entitled to one free report every twelve months from each of the nationwide credit bureaus and from some specialized consumer reporting agencies.See www.ftc.gov/credit for details about how to obtain your free report. You have a right to know your credit score. Credit scores are numerical summaries of a consumer's creditworthiness based on information from consumer reports. For a fee, you may get your credit score. For more information: click on www.ftc.gov/credit. In some mortgage transactions,you will get credit score information without charge. You can dispute inaccurate information with the consumer reporting agency. If you tell a consumer reporting agency that your file has inaccurate information,the agency must take certain steps to investigate unless your dispute is frivolous. For an explanation of dispute procedures,go to www.ftc.gov/credit. Inaccurate information must be corrected or deleted. A consumer reporting agency or furnisher must remove or correct information verified as inaccurate, usually within 30 days after you dispute it. However, a consumer reporting agency may continue to report negative data that it verifies as being accurate. Outdated negative information may not be reported. In most cases, a consumer reporting agency may not report negative information that is more than seven years old,or bankruptcies that are more than 10 years old. Access to your file is limited. A consumer reporting agency may provide information about you only to people with a valid need as determined by the FCRA--usually to consider an application with a creditor, insurer,employer, landlord,or other business. Your consent is required for reports that are provided to employers.A consumer reporting agency may not give out information about you to your employer,or potential employer,without your written consent. Blanket consent may be given at the time of employment or later. You may choose to remove your name from consumer reporting agency lists for unsolicited credit and insurance offers. These offers must include a toll-free phone number you can call if you choose to take your name and address off lists in the future You may opt- out at the major credit bureaus by calling 1-888-50PTOUT. You may seek damages from violators. If a consumer reporti ng agency, a user of consum er reports, or, in some cases,a furnisher of information to a consumer reporting agency violates the FCRA,you may sue them in state or federal court Identity theft victims and active duty military personnel have additional rights. Victims of identity theft have new rights under the FCRA.Active-duty military personnel who are away from their regular duty station may file"active duty"alerts to help prevent identity theft. For more information,visit www.ftc.gov/credit. The FCRA gives several federal agencies authority to enforce the FCRA: TO COMPLAIN AND FOR INFORMATION: PLEASE CONTACT: Consumer reporting agencies, creditors and others not listed Federal Trade Commission Consumer Response Center- below FCRA Washington, DC 20580 1-877-382-4367 (Toll-Free) National banks, federal branches/agencies of forei gn banks Office of th a Comptroller of the Currency Compliance (word "National" or i nitials "N.A."app ear in or after bank's Management, Mail Stop 6-6 Washington, DC 20219 800- name) 613-6743 Federal Reserve System member banks (except national Federal Reserve Board Division of Con sumer & banks, and federal branches/agencies of foreign banks) Community Affairs Washington, DC 20551 202-452-3693 Savings associations and federally chartered savings banks Office of Thrift Supervision .Consumer Programs (word "Federal" or initials "F.S.B."appea r in federal Washington, DC 20552 800-842-6929 institution's name) Federal credit unions (words "Federal Credit Union" appear in National Credit Union Administration 1775 Duke Street institution's name) Alexandria, VA 22314 703-518-6360 State-chartered banks that are n of members of th a Federal Federal Deposit Insurance Corporation Division of Reserve System Compliance & Consumer Affairs Washington, DC 20429 800-934-FDIC Air, surface, or rail common carriers regulated by former Civil Department of Tra nsportation Office of Fi nancial Aeronautics Board or Interstate Commerce Commission Management Washington, DC 20590 202-366-1306 Activities subject to the Packers and Stockyards Act, 1921 Department of Agriculture Office of Dep uty Administrator- GIPSA Washington, DC 20250 202-720-7051 ` 2/11/2015 Enhanced Security and Automated Bank Deposits Gloria Fried,Receiver of Taxes,Town of Ossining gloria fried@townofossming com (914)762-8790 Gene Handy,Branch Manager,Cummins Allison Corporation handyg@cumminsalllson com ((203)948-3390) Fiduciary Responsibilities of a Receiver of Taxes • Town Tax and Special Districts —Town General —Separate Unincorporated Area Taxes —Special Districts •Ambulance,Water,Sewer,Fire Protection,Lighting, Refuse • Municipal entities beyond the Town —County Tax and Special Districts • County General Tax,Sewer Districts,Solid Waste District —School Districts •School Tax and Library Surety Bond • The Receiver must file an Undertaking with the Clerk's Office in the form of a Surety Bond • "Such Surety shall be a lien on all the real estate held by the collector or his sureties in the county at the time of the filing and shall continue to be such lien,until its condition,together with all costs and charges which may accrue by prosecution thereof shall be fully satisfied."Art.3§35 • The bond protects the municipality in the case of a default by the Receiver but the Receiver is Personally liable. 1 t 2/11/2015 Lost or Stolen Funds • Deposits of Town Tax monies must be made within 24 hours after receipt. IS Op State Comp 18,1959 • NY State Law: (13)Lost or Stolen Funds. A town receiver of taxes is personally responsible for taxes collected by him which are lost or misplaced,and the town could not release him from liability for loss of such moneys unless the loss was caused by an Act of God or the public enemy..." Const Art,8,§1.Op State Compt 79-217 See also Op,State Compt.78-270 • A receiver of taxes is the only elected official who is Personally responsible and whose real estate is collateral for losses incurred. SECURITY REVIEW in 2011 Identified four security issues 1. Counting Cash At the counter At the end of the day 2. Copying Checks 3. Catching Counterfeits 4. Courier Costs Security Issue 1: Counting Cash • Counting Cash at the Tax Office Counter —Total cash payments in 2012: $656,469.46 —Cash was received on 85 of the 250 days the tax office was open. —Each Cash payment must be counted twice in front of the taxpayer when accepted at the counter. —Lines of waiting Taxpayers grew while cash was double counted and they watched. 2 2/11/2015 Security Issue 1: Counting Cash • Counting Cash at the end of the Day —End of day--recounting the total cash for deposit preparation —Total amount of cash varies each day and must be totaled twice by different people when prepared for the deposit bag. —The deposit bag required a tally of each denomination of bills Security Issue 2: Copying Checks • Check Processing--2012 Totals —17,131 checks —$83,038,359.29 in total check deposits —Multiple Batches daily with 50 or fewer checks in each. —165 days with checks but no cash • Additional Deposits —Wires from Tax Service Agencies —Internet payments—ACH transfers and Credit Card Security Issue 2: Copying Checks • 'Bonded"Courier Service-provided by our bank • Their bond only insures the cost of reconstructing the deposit. —It does not insure the face value of the deposit. —We are required by their contract to have a copy of each check. • Must Identify:The maker of the check, •the dollar amount,and the • routing number and account number on the check. 3 2/11/2015 Security Issue 3: Catching Counterfeits • Counterfeits at the Tax Office Counter —The average tax payment consisted of 35 to 40 bills. —Each bill must be checked in front of the taxpayer —Lines of waiting Taxpayers grew while bills were checked INDIVIDUALLY —A$100 counterfeit bill slipped past on the last day of January. Security Issue 4: Courier Costs • The Courier comes each day—250 days —The bank assumes the cost at$24 per day —$,6000.00 per year —"Relationship Interest Rate" —For each bank service we use,we lose points on our interest rate —Over$130 million was deposited in 2012. —Courier savings for bank= higher interest for Town. How to Solve Security Issues ? 1. Counting Cash At the counter At the end of the day 2. Copying Checks 3. Catching Counterfeits 4. Courier Costs 4 2/11/2015 Currency Counter/Counterfeit Detector Check Scanner/Deposit Manager Cummins -• a `� J ETSCAN I FX N4j�" 17T-7/ - - r Cummins JetScan 1FX Currency Counter and Check Scanner The Receipt Printer is located on the shelf beneath the JetScan iFX V" I Security Issue 1: Counting Cash • Counting Cash-at the Counter —Extremely fast — Eliminates taxpayers waiting in lines while currency is counted — Minimizes exposure to security issues —Taxpayers watch their currency being counted. —Easy to count each payment multiple times —Doesn't require a second person to do a double count. 5 :. ,. .�..� 2/11/2015 Security Issue 1: Counting Cash • End of Day Tallies — Verifiesthe total currency collected for the day's deposit. — Rapidly counts the totals multiple times, eliminates need for a second person to do a double count. — Don't need to separate bill types — Prints receipt with tally of each bill type for bank deposit. Security Issue 2: Catching Counterfeits Counterfeit detection is turned on by pressing the CF key on the screen of the Jetscan iFX — The software in the Jetscan iFX can be upgraded to recognize the new bills. — When a bill is rejected,it can be further verified by another method of detection — We were able to catch a sophisticated counterfeit bill from Peru Security Issue 3: Copying Checks • IMS—Image Management System —Software that enables the currency machine to scan each check and manage the'images in a computer file. —Retains the information required by Courier Services —Scans checks as quickly as it scans currency. —Can scan and copy over 400 checks per minute. —Reduces exposure to adverse security issues. —Scans and copies multiple sized checks in same batch. 6 • 2/11/2015 Jetscan WX vrs. manual check copying • Jetscan WX —53 checks in 7 seconds--450 checks per minute —Can scan entire year of 17,131 checks in 38 minutes —No paper costs—No personnel costs • Manual —53 checks in 3.5 minutes (15 checks per minute) —17,131 checks take 19 hours to copy one year's checks —9 reams of legal paper per year--$34.00 —Salary of one deputy--19 hours @$24.24=$498.56 —Security issue: copier is in the public area of the office Cummins r� JetScan iFX Security Issue 4: Courier Charges Cummins DBM—Deposit Balancing Manager Software —Enables the Jetscan iFX currency machine to review scanned images of each check and create an ICL(Image Cash Letter)compatible with the Fisery Banking System —Sorts checks by Confidence Level •Red—Low Confidence—requires review and intervention •.Orange—Medium Confidence—Requires review and possible intervention •Green—High confidence—Generally acceptable if the total deposit is green and matches. —Reduces exposure to adverse security issues —Saves time--automatically endorses the back of the check image with the Tax Office Account Info. • 2/11/2015 Justification for Cummins Check Scanning • Security —Checks never leave the Tax Office • Accuracy - -We can identify the image of the check because we know what the amount is supposed to be from the tax bill • Speed —No need to endorse checks because the Software does it for us —Deposits made within 24 hours as proscribed by law. • Save Money — No paper costs or personnel costs on manual copying checks • Applicability —Can be used for other Town Functions or deposits. • Portability —Can be used with other banks if we find better terms In-House Scanning vrs. Bank Supplied Systems • Works with our existing equipment. • Ten times faster than bank proprietary systems (500 checks per minute instead of 50 checks per minute) • No"Relationship Interest Rate" Expenses —Able to negotiate a higher interest rate because of the lower courier charges to the bank Benefits • Meet State requirement for 24 hour deposit • Extra Interest from Day of posting ($867.53 at.27%) —At least one extra day's interest for each deposit —Three extra days for each Friday deposit —Four Extra days for Friday deposits with Holiday Mondays —Five extra days for Thanksgiving Wednesday deposit —Two extra days interest for other holidays • Saves Time—Preparing deposits and endorsing checks. • Courier Savings —Only 85 days with cash deposits in 2012 out of 250. —Save$24 per day for 165 days=$3,960.00 • Potential"Relationship based Interest Rate"increase — Possible $ 1,389.26 or$ 2,778.51 • Additional Security(priceless) 8