Identity Theft: Everything You Need to Know to Protect Yourself
-
Upload
gavin-mills -
Category
Documents
-
view
214 -
download
0
Transcript of Identity Theft: Everything You Need to Know to Protect Yourself
![Page 1: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/1.jpg)
![Page 2: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/2.jpg)
IDENTITY THEFT
Copyright © Summersdale Publishers Ltd 2007
Text by Gavin Mills
All rights reserved.
Condition of SaleThis book is sold subject to the condition that it shall not, by way of trade or otherwise, be lent, re-sold, hired out or otherwise circulated in any form of binding or cover other than that in which it is published and without a similar condition including this condition being imposed on the subsequent publisher.
Summersdale Publishers Ltd46 West StreetChichesterWest SussexPO19 1RPUK
www.summersdale.com
Printed and bound in Great Britain
ISBN: 1-84024-577-8ISBN 13: 978-1-84024-577-6
Cover image © Shutterstock
Identity Theft_INSIDESnew90x120.2 2Identity Theft_INSIDESnew90x120.2 2 22/03/2007 10:05:0222/03/2007 10:05:02
![Page 3: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/3.jpg)
identitytheft
Everything you need to knowto protect yourself
Gavin Mills
Identity Theft_INSIDESnew90x120.3 3Identity Theft_INSIDESnew90x120.3 3 22/03/2007 10:05:0322/03/2007 10:05:03
![Page 4: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/4.jpg)
Identity Theft_INSIDESnew90x120.4 4Identity Theft_INSIDESnew90x120.4 4 22/03/2007 10:05:0322/03/2007 10:05:03
![Page 5: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/5.jpg)
Contents
Introduction:What is identity theft and how does it work?.................7
Part One: What makes up our identity?...............................................13
Part Two: How can I protect myself?......................................................31
Part Three: How do I know if I am a victim of identity theft?.........95
Contact Information...........................................................117
Identity Theft_INSIDESnew90x120.5 5Identity Theft_INSIDESnew90x120.5 5 22/03/2007 10:05:0422/03/2007 10:05:04
![Page 6: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/6.jpg)
Identity Theft_INSIDESnew90x120.Sec1:6 Sec1:6Identity Theft_INSIDESnew90x120.Sec1:6 Sec1:6 22/03/2007 10:05:0422/03/2007 10:05:04
![Page 7: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/7.jpg)
7
Introduction
What is identity theft and how does it work?
Identity Theft_INSIDESnew90x120.Sec1:7 Sec1:7Identity Theft_INSIDESnew90x120.Sec1:7 Sec1:7 22/03/2007 10:05:0422/03/2007 10:05:04
![Page 8: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/8.jpg)
8
Identity Theft
Identity theft has been around in one form or another for many years but today’s technology is providing new ways for people to steal our personal information. Identity theft is one of the fastest growing crimes in the UK and a recent Home Offi ce quote put the overall cost of identity fraud to the UK economy at a staggering £1.72 billion. The Credit Industry Fraud Avoidance System (CIFAS), the UK’s fraud prevention service, estimates that identity fraud accounts for criminal cash fl ow of £10 million per day.
Identity Theft_INSIDESnew90x120.Sec1:8 Sec1:8Identity Theft_INSIDESnew90x120.Sec1:8 Sec1:8 22/03/2007 10:05:0622/03/2007 10:05:06
![Page 9: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/9.jpg)
Introduction
9
Estimates from The Association for Payment Clearing Services (APACS), the body that deals with fraud relating to bank and credit cards, reveal that all credit card crime has grown from £95 million in 1998 to £504 million in 2005. It is estimated that benefit fraud costs UK tax payers £3 billion a year, and identity fraud is a significant portion of this. Estimates from CIFAS suggest that in 2006 the number of victims of impersonation was up 19.1 per cent when compared with 2005.
Identity Theft_INSIDESnew90x120.Sec1:9 Sec1:9Identity Theft_INSIDESnew90x120.Sec1:9 Sec1:9 22/03/2007 10:05:0622/03/2007 10:05:06
![Page 10: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/10.jpg)
10
Identity Theft
These figures suggest that the criminals are one step ahead of the agencies and companies whose job it is to protect our data. Initiatives are being introduced rapidly to combat this new kind of crime but it’s clear this is a problem that is not going away.
If your details are stolen and purchases are made in your name you are not liable for the debts incurred. However, apart from the headache which accompanies having to prove to the creditor the fact that it was not
Identity Theft_INSIDESnew90x120.Sec1:10 Sec1:10Identity Theft_INSIDESnew90x120.Sec1:10 Sec1:10 22/03/2007 10:05:0622/03/2007 10:05:06
![Page 11: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/11.jpg)
Introduction
11
you who ran up these debts, lending institutions don’t take these hits on the chin and chalk them up to the cost of doing business – they recoup their loses by increasing insurance premiums and interest rates, and raising service charges and the general cost of their products. Knowing how to protect yourself is vital to avoid the distress and inconvenience that comes with being the victim of identity theft.
Identity Theft_INSIDESnew90x120.Sec1:11 Sec1:11Identity Theft_INSIDESnew90x120.Sec1:11 Sec1:11 22/03/2007 10:05:0722/03/2007 10:05:07
![Page 12: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/12.jpg)
Identity Theft_INSIDESnew90x120.Sec1:12 Sec1:12Identity Theft_INSIDESnew90x120.Sec1:12 Sec1:12 22/03/2007 10:05:0722/03/2007 10:05:07
![Page 13: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/13.jpg)
13
Part One
What makes up our identity?
Identity Theft_INSIDESnew90x120.Sec1:13 Sec1:13Identity Theft_INSIDESnew90x120.Sec1:13 Sec1:13 22/03/2007 10:05:0722/03/2007 10:05:07
![Page 14: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/14.jpg)
Identity Theft
14
There are three basic elements to our identities:
Biometric identity
These are the physical attributes that are unique to an individual, i.e. fi ngerprints, voice, retina, facial structure, DNA profi le, hand geometry, heat radiation, etc. Despite how much is made of the supposed infallibility of biometric identifying technology, the truth is that it is far from foolproof. In any case, at present this kind of technology is not in widespread use as a means of determining identity; it
Identity Theft_INSIDESnew90x120.Sec1:14 Sec1:14Identity Theft_INSIDESnew90x120.Sec1:14 Sec1:14 22/03/2007 10:05:0822/03/2007 10:05:08
![Page 15: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/15.jpg)
Part One
15
is really only of interest to governments and private industries concerned with protecting their research or worried about industrial espionage, as the equipment required is very expensive.
Attributed identity
This includes the components of a
person’s identity that are acquired at
birth, including their full name, date
and place of birth, and parents’ names.
Persons carrying out this kind of identity
theft tend to be interested in the birth
records of children who died in infancy.
Identity Theft_INSIDESnew90x120.Sec1:15 Sec1:15Identity Theft_INSIDESnew90x120.Sec1:15 Sec1:15 22/03/2007 10:05:0922/03/2007 10:05:09
![Page 16: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/16.jpg)
Identity Theft
16
Such situations are sometimes referred to as ‘Day of the Jackal’ identity theft, after Fredrick Forsyth’s novel. However, determined thieves may not only target the records of children who die in infancy – there is nothing to stop a would-be identity thief from getting hold of your birth certifi cate as such documents are readily available from the Family Record Centre for a small fee. It is a public document so it requires no identifi cation and the registrar cannot refuse a copy. These are known within the counter-fraud community as
Identity Theft_INSIDESnew90x120.Sec1:16 Sec1:16Identity Theft_INSIDESnew90x120.Sec1:16 Sec1:16 22/03/2007 10:05:1022/03/2007 10:05:10
![Page 17: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/17.jpg)
Part One
17
‘breeder’ documents. Armed with such a document the thief can build on this foundation and apply for further forms of identifi cation, as many institutions will use it to process an application – despite the fact that UK birth certifi cates contain the words ‘a certifi cate is not evidence of identity’. Again, although popular in fi ction and of great concern to the government since career criminals and terrorists might hijack identities and go untraced, this kind of identity theft is comparatively rare when seen alongside biographical identity theft.
Identity Theft_INSIDESnew90x120.Sec1:17 Sec1:17Identity Theft_INSIDESnew90x120.Sec1:17 Sec1:17 22/03/2007 10:05:1022/03/2007 10:05:10
![Page 18: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/18.jpg)
Identity Theft
18
Biographical identity
This type includes elements of identity which have built up over time. Identity theft of this kind is the most prevalent and causes the most diffi culty and disruption to the victim. It will also be the focus of the bulk of this book. Biographical identity covers life events and how a person engages with structured society, i.e: registration of birth;
details of education/qualifi cations;
Identity Theft_INSIDESnew90x120.Sec1:18 Sec1:18Identity Theft_INSIDESnew90x120.Sec1:18 Sec1:18 22/03/2007 10:05:1122/03/2007 10:05:11
![Page 19: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/19.jpg)
Part One
19
electoral register
entries;
details of benefi ts claimed/
taxes paid;
employment history;
registration of marriage;
mortgage account
information/property
ownership;
insurance policies;
Identity Theft_INSIDESnew90x120.Sec1:19 Sec1:19Identity Theft_INSIDESnew90x120.Sec1:19 Sec1:19 22/03/2007 10:05:1122/03/2007 10:05:11
![Page 20: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/20.jpg)
Identity Theft
20
history of interaction with organisations such as banks, creditors, utilities and public authorities.
Following legislation to combat money laundering in the UK, banks are now required to verify the name and address of new customers before opening an account. They achieve this by requiring the prospective customer to present two of the aforementioned documents as proof of identity and domicile. This leads to what the credit industry calls ‘function creep’: the function of certain
Identity Theft_INSIDESnew90x120.Sec1:20 Sec1:20Identity Theft_INSIDESnew90x120.Sec1:20 Sec1:20 22/03/2007 10:05:1122/03/2007 10:05:11
![Page 21: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/21.jpg)
Part One
21
documents ‘creeps’ into other areas. For instance, the function of utility bills is merely to tell you how much to pay your service provider, they are not identifi cation documents, but in certain situations they are treated as bona fi de credentials.
What do identity thieves do with the information?
Understanding how these criminals
operate will help you to identify when
you are most at risk and need to take
extra precautions.
Identity Theft_INSIDESnew90x120.Sec1:21 Sec1:21Identity Theft_INSIDESnew90x120.Sec1:21 Sec1:21 22/03/2007 10:05:1222/03/2007 10:05:12
![Page 22: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/22.jpg)
Identity Theft
22
Identity fraud spans the criminal spectrum: from the opportunist who steals your credit card number and buys an iPod with it, to the running of sophisticated networks of illegal immigration, money laundering and drugs smuggling. It also encompasses frauds against the public sector by way of benefit fraud and individuals using false identities to avoid paying fines to the authorities. All of these criminals have something in common: they are attempting to
Identity Theft_INSIDESnew90x120.Sec1:22 Sec1:22Identity Theft_INSIDESnew90x120.Sec1:22 Sec1:22 22/03/2007 10:05:1222/03/2007 10:05:12
![Page 23: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/23.jpg)
Part One
23
hide their identity, their activities and their assets.
As stated earlier, biographical identity is by far the easiest to hijack. It is generally done by getting genuine government documents issued on the basis of false information (i.e. an identity thief may apply for a genuine driving licence using documents he has stolen from you) or by stealing genuine documents and forging the details contained on them.
Identity Theft_INSIDESnew90x120.Sec1:23 Sec1:23Identity Theft_INSIDESnew90x120.Sec1:23 Sec1:23 22/03/2007 10:05:1222/03/2007 10:05:12
![Page 24: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/24.jpg)
Identity Theft
24
Once an identity thief manages to acquire your information there are many ways by which he can carry out fraudulent activity. With just one piece of your identity he can obtain further identity documents which enable him to, for example:
apply for a mobile phone contract in your name;
apply for a credit card in your name;
Identity Theft_INSIDESnew90x120.Sec1:24 Sec1:24Identity Theft_INSIDESnew90x120.Sec1:24 Sec1:24 22/03/2007 10:05:1322/03/2007 10:05:13
![Page 25: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/25.jpg)
Part One
25
open a bank or building society account in your name;
apply for other fi nancial services in your name;
apply for any benefi ts in your name (e.g. housing benefi t, new tax credits, income support, job seeker’s allowance, child benefi t);
apply for a driving licence in your name;
Identity Theft_INSIDESnew90x120.Sec1:25 Sec1:25Identity Theft_INSIDESnew90x120.Sec1:25 Sec1:25 22/03/2007 10:05:1322/03/2007 10:05:13
![Page 26: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/26.jpg)
Identity Theft
26
register a vehicle in your name; or
apply for a passport in your name.
Obviously, once these items are in the thief ’s possession, he or she can run up huge debts using a credit or debit card in your name to make expensive purchases, or obtaining a loan with your details.
It may be hard to imagine a thief could wreak so much havoc with such little information as a starting
Identity Theft_INSIDESnew90x120.Sec1:26 Sec1:26Identity Theft_INSIDESnew90x120.Sec1:26 Sec1:26 22/03/2007 10:05:1422/03/2007 10:05:14
![Page 27: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/27.jpg)
Part One
27
point but, worryingly, this is not as
impossible as you might think. For
example, the UK Driver and Vehicle
Licensing Agency (DVLA) will accept
UK/EU/EEA passports (including
travel documents issued by the Home
Offi ce) and EU/EEA national identity
cards as means of identifi cation for the
purposes of obtaining a driving licence.
Birth certifi cates (including adoption
certifi cates) and foreign passports can
be used but they must be accompanied
by a photograph endorsed by a
countersignatory – a non-relative who
Identity Theft_INSIDESnew90x120.Sec1:27 Sec1:27Identity Theft_INSIDESnew90x120.Sec1:27 Sec1:27 22/03/2007 10:05:1422/03/2007 10:05:14
![Page 28: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/28.jpg)
Identity Theft
28
lives in the UK and has known the applicant for over two years. UK birth certificates state that ‘a certifi cate is not evidence of identity’ and the DVLA say that they may require further evidence. The reality, however, is that the DVLA only check a proportion of the countersignatories as the driving licence system is required by law to be self-fi nancing. The DVLA is under pressure to keep cost increases to a minimum.
With a false driving licence in your name a car could be obtained on hire-
Identity Theft_INSIDESnew90x120.Sec1:28 Sec1:28Identity Theft_INSIDESnew90x120.Sec1:28 Sec1:28 22/03/2007 10:05:1422/03/2007 10:05:14
![Page 29: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/29.jpg)
Part One
29
purchase, as the signature on the card would match the one on the purchase agreement, and with an approved credit check the criminal could drive off in the car and, in an extreme scenario, sell it to you the next day. Thankfully, you will not be liable for the criminal off ence of handling stolen goods, as you accepted them in good faith; however, this won’t save you from the car being repossessed by the fi nance company.
The good news is that most identity theft can be prevented
Identity Theft_INSIDESnew90x120.Sec1:29 Sec1:29Identity Theft_INSIDESnew90x120.Sec1:29 Sec1:29 22/03/2007 10:05:1522/03/2007 10:05:15
![Page 30: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/30.jpg)
Identity Theft
30
with a little care in your daily routine. The following section will explain when you are most at risk and outline simple steps to prevent becoming a victim.
Identity Theft_INSIDESnew90x120.Sec1:30 Sec1:30Identity Theft_INSIDESnew90x120.Sec1:30 Sec1:30 22/03/2007 10:05:1522/03/2007 10:05:15
![Page 31: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/31.jpg)
31
Part Two
How can Iprotect myself?
Identity Theft_INSIDESnew90x120.Sec1:31 Sec1:31Identity Theft_INSIDESnew90x120.Sec1:31 Sec1:31 22/03/2007 10:05:1522/03/2007 10:05:15
![Page 32: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/32.jpg)
Identity Theft
32
Identity theft is subject to the old adage ‘an ounce of prevention is worth a pound of cure’. A minor change in how you manage your personal information could save you many sleepless nights and distressing phone calls and letters. Minimising your exposure to potential identity thieves does not have to involve fi tting an impenetrable safe in the wall behind the family portrait, nor wiping your fi ngerprints off glassware in restaurants; it does, however, require certain extra steps to be introduced into your day-to-day life.
Identity Theft_INSIDESnew90x120.Sec1:32 Sec1:32Identity Theft_INSIDESnew90x120.Sec1:32 Sec1:32 22/03/2007 10:05:1622/03/2007 10:05:16
![Page 33: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/33.jpg)
Part Two
33
There are times in life when we are more vulnerable to identity thieves than others – it is on these occasions that a little extra vigilance will go a long way.
Theft of credit/debit cards
Situations under this heading comprise
the most common types of identity
fraud. Someone might steal your wallet,
or even just one card from your wallet
so you won’t immediately know it is
missing, and then use it posing as you. The
Identity Theft_INSIDESnew90x120.Sec1:33 Sec1:33Identity Theft_INSIDESnew90x120.Sec1:33 Sec1:33 22/03/2007 10:05:1722/03/2007 10:05:17
![Page 34: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/34.jpg)
Identity Theft
34
chip and pin technology which is now in eff ect across the UK has had a signifi cant impact on this type of fraud; however, if the fraudster already has your card they don’t need your PIN to purchase goods online or over the phone as they are also in possession of your security code (the three digit number on the back of the card by the signature strip) for so-called ‘card not present’ transactions.
If you haven’t noticed that your card
is missing, the criminal is unlikely to be
caught until the card reaches its limit
and is declined. Even after the limit has
Identity Theft_INSIDESnew90x120.Sec1:34 Sec1:34Identity Theft_INSIDESnew90x120.Sec1:34 Sec1:34 22/03/2007 10:05:1722/03/2007 10:05:17
![Page 35: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/35.jpg)
Part Two
35
been exceeded, the card can still be used for some time for smaller amounts which are beneath the ‘fl oor limit’ of shops, whereby no automatic check is made with the card company for the transaction. Then comes the phone call to you from the credit company.
To minimise the risk of this all too common occurrence, here are some simple safeguards:
If you have cards you don’t carry, keep them in a secure place and periodically check that they remain there
Identity Theft_INSIDESnew90x120.Sec1:35 Sec1:35Identity Theft_INSIDESnew90x120.Sec1:35 Sec1:35 22/03/2007 10:05:1722/03/2007 10:05:17
![Page 36: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/36.jpg)
Identity Theft
36
Cancel cards that you no longer use: if the account is still active there is available credit to be stolen
Keep your cheque book and cheque guarantee card in separate places
If you have a high credit limit that you never use, consider requesting to have it reduced
Examine your signature – if it is very easy to
Identity Theft_INSIDESnew90x120.Sec1:36 Sec1:36Identity Theft_INSIDESnew90x120.Sec1:36 Sec1:36 22/03/2007 10:05:1822/03/2007 10:05:18
![Page 37: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/37.jpg)
Part Two
37
forge you may want to consider changing it
Don’t choose an obvious PIN or store it somewhere it can be accessed by others
Never let anyone see your PIN
Identity Theft_INSIDESnew90x120.Sec1:37 Sec1:37Identity Theft_INSIDESnew90x120.Sec1:37 Sec1:37 22/03/2007 10:05:1822/03/2007 10:05:18
![Page 38: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/38.jpg)
Identity Theft
38
All these tips apply both to
credit and debit cards, but
debit cards put you at greater
risk as they often have your
account number and sort
code printed on the face of the
card.
There is also the danger of your card details being stolen when you use your card in the normal way. This is called
Identity Theft_INSIDESnew90x120.Sec1:38 Sec1:38Identity Theft_INSIDESnew90x120.Sec1:38 Sec1:38 22/03/2007 10:05:1822/03/2007 10:05:18
![Page 39: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/39.jpg)
Part Two
39
‘skimming’. It occurs where an employee processes your transaction but makes a copy of your details which they might use themselves for making purchases or sell on to a third party involved in fraud on a larger scale. That information can then be used in ‘card not present’ transactions, or might also be used to construct a fake credit card using your details.
Your funds can also be at risk even
without your card ever passing into
someone else’s hands. Sophisticated
thieves install equipment on the
Identity Theft_INSIDESnew90x120.Sec1:39 Sec1:39Identity Theft_INSIDESnew90x120.Sec1:39 Sec1:39 22/03/2007 10:05:1922/03/2007 10:05:19
![Page 40: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/40.jpg)
Identity Theft
40
front of the card slot on an ATM which captures your credit/debit card number as you put it into the machine. Hidden above the machine is a miniature digital camera which captures the key strokes of you entering your PIN. All this information is then wirelessly transmitted to the thief ’s computer nearby. A card can now be created using all your data, thus enabling them to access your account.
More crude, but also very effective, is the use of the so-called ‘Lebanese
Identity Theft_INSIDESnew90x120.Sec1:40 Sec1:40Identity Theft_INSIDESnew90x120.Sec1:40 Sec1:40 22/03/2007 10:05:1922/03/2007 10:05:19
![Page 41: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/41.jpg)
Part Two
41
loop’. These are little slivers of film which are placed in the card slot, which trap your card when you insert it. Once it is stuck, a stranger approaches asking if you need help and more than likely telling you that their card got stuck the other day. They will probably suggest a series of steps for you to take, which will inevitably include you entering your PIN. Nothing you do will get the card back and once you leave in frustration, hoping to return during business hours to get your card from
Identity Theft_INSIDESnew90x120.Sec1:41 Sec1:41Identity Theft_INSIDESnew90x120.Sec1:41 Sec1:41 22/03/2007 10:05:1922/03/2007 10:05:19
![Page 42: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/42.jpg)
Identity Theft
42
the bank, they pull out the Lebanese
loop with your card in it and, having
witnessed you entering your PIN,
they now have all they need to
access your account.
Credit card companies regularly
monitor card usage and are likely
to spot something that is out of
the ordinary, the simplest example
being recent transactions that are
physically impossible: you purchase
goods at your local supermarket and
within minutes your account is being
used to make a purchase in the USA
Identity Theft_INSIDESnew90x120.Sec1:42 Sec1:42Identity Theft_INSIDESnew90x120.Sec1:42 Sec1:42 22/03/2007 10:05:2022/03/2007 10:05:20
![Page 43: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/43.jpg)
Part Two
43
– this could be a case of ‘skimming’ and your card issuer should contact you to check. You won’t be liable for the fraudulent purchase, but it will necessitate cancelling the card – this could be a real problem if you were travelling and unable to have a replacement card sent to you.
There are a few precautions which can reduce the risk of this type of scam:
Be wary of how your credit card is being processed (suspicious
Identity Theft_INSIDESnew90x120.Sec1:43 Sec1:43Identity Theft_INSIDESnew90x120.Sec1:43 Sec1:43 22/03/2007 10:05:2022/03/2007 10:05:20
![Page 44: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/44.jpg)
Identity Theft
44
delays, processing the card in another room). If you have a concern it is probably best not to challenge the vendor but instead contact your card issuer with your concerns right away.
Regularly check your credit card/bank statements for anything suspicious – report any concerns to your card issuer immediately.
If you must have multiple cards, consider designating
Identity Theft_INSIDESnew90x120.Sec1:44 Sec1:44Identity Theft_INSIDESnew90x120.Sec1:44 Sec1:44 22/03/2007 10:05:2022/03/2007 10:05:20
![Page 45: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/45.jpg)
Part Two
45
different cards for different types of purchases. This will help you identify any suspicious transactions.
Notify your card issuer if you are travelling abroad – some specify that you must do this, but even if they don’t, it’s a wise move.
For information and tips on using your credit/debit cards safely see the Card Watch website at http://www.cardwatch.org.uk.
Identity Theft_INSIDESnew90x120.Sec1:45 Sec1:45Identity Theft_INSIDESnew90x120.Sec1:45 Sec1:45 22/03/2007 10:05:2022/03/2007 10:05:20
![Page 46: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/46.jpg)
Identity Theft
46
Moving house
Relocating is stressful and difficult at the best of times; there is no reason to add to your worries by making yourself an easy target for identity thieves. It is important that you inform all credit companies with whom you have a relationship of your change of address to minimise the risk of any sensitive information falling into the wrong hands. The Royal Mail offers a free service by which they take care of informing all your creditors and service providers
Identity Theft_INSIDESnew90x120.Sec1:46 Sec1:46Identity Theft_INSIDESnew90x120.Sec1:46 Sec1:46 22/03/2007 10:05:2122/03/2007 10:05:21
![Page 47: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/47.jpg)
Part Two
47
of your change of address and
over 1,000 companies participate
in the scheme. If you would prefer
to contact the companies directly,
Royal Mail also offers a mail redirect
service which will catch any that you
forgot to inform of your new address
and sent mail to your old one. Many
people use this service for a short
time to cover the transition period.
See http://www.royalmail.com and
follow the link for Customer Service.
This service is definitely a good idea
but it is not foolproof.
Identity Theft_INSIDESnew90x120.Sec1:47 Sec1:47Identity Theft_INSIDESnew90x120.Sec1:47 Sec1:47 22/03/2007 10:05:2222/03/2007 10:05:22
![Page 48: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/48.jpg)
Identity Theft
48
Your bank and credit card companies may know of your change of address, but offers of pre-approved credit cards or loans from companies unaware that you no longer live there may go out to your old address long after you have moved. An identity thief may accept such offers and incur debt in your name, or use the official documents received to authenticate other applications for credit.
To minimise your exposure to this type of fraud you should regularly
Identity Theft_INSIDESnew90x120.Sec1:48 Sec1:48Identity Theft_INSIDESnew90x120.Sec1:48 Sec1:48 22/03/2007 10:05:2222/03/2007 10:05:22
![Page 49: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/49.jpg)
Part Two
49
check your credit fi le (see p. 96) as this will show all accounts still active at your previous address. You may also want to consider using the redirection service for up to a year and ensure that when you receive a piece of redirected mail, you contact the sender with your new address.
Extra vigilance should also be exercised if you live in somewhere which uses pigeon holes for holding your post – where others can have unfettered access to your
Identity Theft_INSIDESnew90x120.Sec1:49 Sec1:49Identity Theft_INSIDESnew90x120.Sec1:49 Sec1:49 22/03/2007 10:05:2222/03/2007 10:05:22
![Page 50: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/50.jpg)
Identity Theft
50
correspondence it is imperative that you stay on top of things. If correspondence goes missing or you suspect it has been tampered with, get a copy of your credit report to see if there has been any unusual activity.
Travel
Travel poses its own risks to the security of our information. For instance, a discarded boarding-pass stub is a potential gold mine of personal information. If
Identity Theft_INSIDESnew90x120.Sec1:50 Sec1:50Identity Theft_INSIDESnew90x120.Sec1:50 Sec1:50 22/03/2007 10:05:2322/03/2007 10:05:23
![Page 51: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/51.jpg)
Part Two
51
the boarding pass belonged to a frequent flyer club member it is likely that data can be gleaned from it. For instance, if the ticket was purchased with the relevant airline in the person’s name using the frequent flyer number on the boarding pass, personal data such as passport number, nationality and date of birth would then be accessible. Armed with this information the savvy identity thief could then access public websites to find the person’s address, which
Identity Theft_INSIDESnew90x120.Sec1:51 Sec1:51Identity Theft_INSIDESnew90x120.Sec1:51 Sec1:51 22/03/2007 10:05:2322/03/2007 10:05:23
![Page 52: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/52.jpg)
Identity Theft
52
can then be used to source further documents. Care should always be taken when disposing of this kind of material: take it home with you and shred it before throwing it out.
Unfortunately, some disclosure of information is inevitable when you are travelling. Checking into a hotel provides a great deal of information about you: your address, telephone number, length of your absence from home, together with the credit card details which are often taken when checking in. Consider
Identity Theft_INSIDESnew90x120.Sec1:52 Sec1:52Identity Theft_INSIDESnew90x120.Sec1:52 Sec1:52 22/03/2007 10:05:2322/03/2007 10:05:23
![Page 53: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/53.jpg)
Part Two
53
using your work address if such information is required when you register. It is also recommended that you use the room safe, if provided, or a safe provided by the registration desk, to keep your passport and other valuables safe during your stay. Granted this will not protect you from an unscrupulous hotel employee but it will save you headache should your room be burgled – your suitcase is not a secure place for these items. Similarly, if you are abroad and using
Identity Theft_INSIDESnew90x120.Sec1:53 Sec1:53Identity Theft_INSIDESnew90x120.Sec1:53 Sec1:53 22/03/2007 10:05:2422/03/2007 10:05:24
![Page 54: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/54.jpg)
Identity Theft
54
a rental car you should be sure not to leave any valuables in the car when it is parked, especially identification and financial information.
As well as providing information on issues of concern in specifi c destinations, the Foreign and Commonwealth Offi ce provides travel advice and tips for keeping your documents and money safe whilst travelling. See the ‘know before you go’ section at: http://www.fco.gov.uk/knowbeforeyougo.
Identity Theft_INSIDESnew90x120.Sec1:54 Sec1:54Identity Theft_INSIDESnew90x120.Sec1:54 Sec1:54 22/03/2007 10:05:2422/03/2007 10:05:24
![Page 55: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/55.jpg)
Part Two
55
Telephone calls
Identity thieves are a canny bunch and you may fall victim to their con by unknowingly giving your information away. People often ask for valuable information on the phone and they are not necessarily identity thieves – private investigators, sales people, pollsters and even police offi cers are all guilty of it. The identity thief goes a step further by taking that information and using it for wholly illegal purposes. It goes without saying that you should never give out sensitive information over the
Identity Theft_INSIDESnew90x120.Sec1:55 Sec1:55Identity Theft_INSIDESnew90x120.Sec1:55 Sec1:55 22/03/2007 10:05:2422/03/2007 10:05:24
![Page 56: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/56.jpg)
Identity Theft
56
phone unless you are sure of whom you are talking to. But the fact remains that these are shrewd operators who use a number of very deceptive techniques to get what they want.
Seldom will an identity thief ask you for your banking details directly. More often than not they already have most pieces in the puzzle and are seeking the last one to give them access to credit in your name. The caller may already have your account number, sort code, address and date of birth and be able to cite them to you. Under the guise of
Identity Theft_INSIDESnew90x120.Sec1:56 Sec1:56Identity Theft_INSIDESnew90x120.Sec1:56 Sec1:56 22/03/2007 10:05:2522/03/2007 10:05:25
![Page 57: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/57.jpg)
Part Two
57
a bank employee claiming a problem with your debit card, for instance, you are asked for the security code. Why would you suspect anything when the caller is already in possession of all that other information?
The rule of thumb here is to limit the amount of information you give out over the phone. All reputable creditors will go through a security check with you before asking for any sensitive information, which should go beyond just checking your address. You will generally be asked to give a specifi c
Identity Theft_INSIDESnew90x120.Sec1:57 Sec1:57Identity Theft_INSIDESnew90x120.Sec1:57 Sec1:57 22/03/2007 10:05:2522/03/2007 10:05:25
![Page 58: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/58.jpg)
Identity Theft
58
digit in your password or PIN – NOT the whole thing – or a specifi c letter in your mother’s maiden name – NOT the whole name. When in doubt, do not divulge any information and simply tell the caller that you will call back on the offi cial number to go through the details.
A particularly audacious take on this con is when someone calls pretending to be from the bank and off ers to sell you identity theft insurance. They will most likely already have the number of the credit/debit card that they are
Identity Theft_INSIDESnew90x120.Sec1:58 Sec1:58Identity Theft_INSIDESnew90x120.Sec1:58 Sec1:58 22/03/2007 10:05:2522/03/2007 10:05:25
![Page 59: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/59.jpg)
Part Two
59
pretending to insure and only need the security code to give them unfettered access to your money. Once again, tell the caller that you will call back on the offi cial number to go through the details. Your security code should only be divulged if you have made the call and you are absolutely certain of whom you are talking to.
You should be similarly wary of street canvassers – you may be stopped in the street by bogus canvassers and asked to take part in a ‘survey’ which involves divulging your personal details. Do
Identity Theft_INSIDESnew90x120.Sec1:59 Sec1:59Identity Theft_INSIDESnew90x120.Sec1:59 Sec1:59 22/03/2007 10:05:2622/03/2007 10:05:26
![Page 60: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/60.jpg)
Identity Theft
60
not respond to their request for your details unless you are certain that they are legitimate, and even then be wary of giving more than one piece of information. For instance, don’t give your address and your date of birth – most surveys will ask for you to give them an age range (i.e. are you between the ages of 18–25?) rather than an actual date of birth.
Bin bag theft
Debt collectors and private investigators have for a long time stolen bin bags
Identity Theft_INSIDESnew90x120.Sec1:60 Sec1:60Identity Theft_INSIDESnew90x120.Sec1:60 Sec1:60 22/03/2007 10:05:2622/03/2007 10:05:26
![Page 61: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/61.jpg)
Part Two
61
that have been left out for collection in an eff ort to identify assets that can be seized by creditors. For identity thieves in the UK, this method of information collection is still in its infancy, but it is growing.
It is known as bin raiding in the UK and dumpster diving in the US. Typically these people are looking for documents or information that will enable them to piece together an identity: phone bills, utility bills, bank statements, credit/debit card receipts, employment and tax records.
Identity Theft_INSIDESnew90x120.Sec1:61 Sec1:61Identity Theft_INSIDESnew90x120.Sec1:61 Sec1:61 22/03/2007 10:05:2622/03/2007 10:05:26
![Page 62: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/62.jpg)
Identity Theft
62
Using stolen documents
to obtain credit is certainly
illegal, but stealing bin bags
might not be deemed as theft
if the thief could establish
that he believed that it was
abandoned property – even
if the bag is in your rubbish
bin he will have a defence
to a charge of theft if he can
show that he believed you
had dumped the bag never
intending to take it back.
Identity Theft_INSIDESnew90x120.Sec1:62 Sec1:62Identity Theft_INSIDESnew90x120.Sec1:62 Sec1:62 22/03/2007 10:05:2622/03/2007 10:05:26
![Page 63: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/63.jpg)
Part Two
63
The importance of shredding such
documents cannot be overstated.
Even seemingly safe information
can be dangerous when taken in
combination with other details. For
instance, most credit/debit card
receipts carry a line to show the
card that made the purchase, but all
numbers except for four are marked
by an ‘X’. The trouble is that not every
system shows only the last four
digits so it may in fact be possible to
piece together your 16 digit number
from various receipts.
Identity Theft_INSIDESnew90x120.Sec1:63 Sec1:63Identity Theft_INSIDESnew90x120.Sec1:63 Sec1:63 22/03/2007 10:05:2722/03/2007 10:05:27
![Page 64: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/64.jpg)
Identity Theft
64
Shred all documents containing personal information before placing them in the bin/recycling box.
Consider disposing of some of the shredded paper at home and some at work.
Unfortunately, it is not only the rubbish from your home which is at risk of being raided – our employers possess all manner of sensitive information about us and it is vital that they take the responsibilities
Identity Theft_INSIDESnew90x120.Sec1:64 Sec1:64Identity Theft_INSIDESnew90x120.Sec1:64 Sec1:64 22/03/2007 10:05:2722/03/2007 10:05:27
![Page 65: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/65.jpg)
Part Two
65
in respect of that data seriously.
Companies which hold personal
data have a duty of care under Data
protection legislation to protect
that information. You may wish to
ask your employer what systems
they have in place for disposing
of confidential information such
as payroll data, National Insurance
numbers and tax information.
Sophisticated identity thieves
no longer simply target the paper
contents of your rubbish bin.
The hard drive of any discarded
Identity Theft_INSIDESnew90x120.Sec1:65 Sec1:65Identity Theft_INSIDESnew90x120.Sec1:65 Sec1:65 22/03/2007 10:05:2822/03/2007 10:05:28
![Page 66: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/66.jpg)
Identity Theft
66
computer is a potential source of information for the technically proficient identity thief. Deleting fi les on your hard disc is not suffi cient to protect yourself – tools exist to recover files on a hard drive that has not been properly formatted. These programs are designed to assist us when disaster strikes our computer and we lose all our data. However, they can easily be turned against us. There are many programs that can help format your hard disc to reduce the chances of anyone
Identity Theft_INSIDESnew90x120.Sec1:66 Sec1:66Identity Theft_INSIDESnew90x120.Sec1:66 Sec1:66 22/03/2007 10:05:2822/03/2007 10:05:28
![Page 67: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/67.jpg)
Part Two
67
lifting any data off it – consider the free program Eraser available at http://www.heidi.ie/eraser. However, it should be noted that none of the companies that produce such software guarantee that it is 100 per cent reliable. There are a few other options open to you:
Find a local company, such as a machine shop, that will melt your hard drive – this method is secure but will probably incur a charge.
Identity Theft_INSIDESnew90x120.Sec1:67 Sec1:67Identity Theft_INSIDESnew90x120.Sec1:67 Sec1:67 22/03/2007 10:05:2822/03/2007 10:05:28
![Page 68: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/68.jpg)
Identity Theft
68
Find a local company that will use a degaussing machine in order to eradicate your hard drive – the data is erased by generating a magnetic fi eld which will make the contents of the drive impossible to reconstruct; it is a secure method but it will cost you.
Use one of the programs mentioned above to format your drive, but run the program three to fi ve times even if it states it’s not necessary – this is
Identity Theft_INSIDESnew90x120.Sec1:68 Sec1:68Identity Theft_INSIDESnew90x120.Sec1:68 Sec1:68 22/03/2007 10:05:2922/03/2007 10:05:29
![Page 69: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/69.jpg)
Part Two
69
99.9 per cent secure but it still remains possible to recover data.
Deceased identity theft
CIFAS reports that impersonation of
the dead is the fastest growing form
of identity theft in Britain with a
year on year increase of 60 per cent.
Suffering the loss of someone close
to you is difficult enough without
having to deal with irate creditors
looking for money from your
departed dear one. Following these
Identity Theft_INSIDESnew90x120.Sec1:69 Sec1:69Identity Theft_INSIDESnew90x120.Sec1:69 Sec1:69 22/03/2007 10:05:2922/03/2007 10:05:29
![Page 70: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/70.jpg)
Identity Theft
70
simple steps should make a diffi cult time a little easier:
Don’t include the date of birth or address of the deceased in any advertisement announcing the funeral
Notify government departments (Department for Work and Pensions, HM Revenue) and return any pension or allowance books by registered post
Notify any of the deceased’s creditors of the death
Identity Theft_INSIDESnew90x120.Sec1:70 Sec1:70Identity Theft_INSIDESnew90x120.Sec1:70 Sec1:70 22/03/2007 10:05:3022/03/2007 10:05:30
![Page 71: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/71.jpg)
Part Two
71
When sorting through clothing to be donated be sure there are no documents containing sensitive information
Don’t dispose of any documents containing sensitive information without shredding them fi rst
Contact the Royal Mail to ensure that no one has set up a mail redirection service that you don’t know about – this is especially important if the deceased’s property is now empty
Identity Theft_INSIDESnew90x120.Sec1:71 Sec1:71Identity Theft_INSIDESnew90x120.Sec1:71 Sec1:71 22/03/2007 10:05:3022/03/2007 10:05:30
![Page 72: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/72.jpg)
Identity Theft
72
Have a mail redirection service set up to forward post to your address – this is safer than collecting the post yourself
If creditors do contact you regarding
debts in the deceased’s name which
were not theirs, explain the situation
and also report the matter to the police
and get a crime reference number.
You should also contact CIFAS and get
a protective registration against the
deceased person’s address – this can
be done by a relative or executor of the
Identity Theft_INSIDESnew90x120.Sec1:72 Sec1:72Identity Theft_INSIDESnew90x120.Sec1:72 Sec1:72 22/03/2007 10:05:3122/03/2007 10:05:31
![Page 73: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/73.jpg)
Part Two
73
deceased’s estate – which will red-fl ag that address in case a credit application is made using it. For further information see http://www.cifas.org.uk. You can also register with the Deceased Preference Service, a free service which will remove the details of the deceased from the mailing list of many companies. For further information see http://www.deceasedpreferenceservice.co.uk.
Internet
The Internet has changed the way we communicate and opened up the world
Identity Theft_INSIDESnew90x120.Sec1:73 Sec1:73Identity Theft_INSIDESnew90x120.Sec1:73 Sec1:73 22/03/2007 10:05:3122/03/2007 10:05:31
![Page 74: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/74.jpg)
Identity Theft
74
to us at the click of a mouse. However, like most technology it is a double-edged sword. It wasn’t long before identity thieves struck upon the idea of using it as a tool to hijack our precious data. Extra caution is needed when communicating sensitive information over the net and an awareness of certain scams that have been in operation should help protect you from falling victim to them yourself.
If you are making any purchases online or doing any online banking it is imperative that you have an
Identity Theft_INSIDESnew90x120.Sec1:74 Sec1:74Identity Theft_INSIDESnew90x120.Sec1:74 Sec1:74 22/03/2007 10:05:3222/03/2007 10:05:32
![Page 75: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/75.jpg)
Part Two
75
anti-virus programme and update it on a regular basis. It is also a good idea to install a firewall. These can be either software or hardware based (the home variety normally being software based) and operate to control and filter unwanted traffic going in and out of different zones, i.e. between your computer and the Internet. Once installed it runs constantly in the background so you don’t have to set it up again. A firewall will ask for your permission to allow an application
Identity Theft_INSIDESnew90x120.Sec1:75 Sec1:75Identity Theft_INSIDESnew90x120.Sec1:75 Sec1:75 22/03/2007 10:05:3222/03/2007 10:05:32
![Page 76: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/76.jpg)
Identity Theft
76
to access an outer network. You can deny this access if you don’t want to send particular information over the network – this becomes very useful if your computer has been infected with a Trojan virus that will connect to other hosts and show them your keystrokes, giving them sensitive passwords or, worse yet, allowing them to take control of your computer remotely. In addition to these steps it’s a good idea to download the latest security updates for your web browser and operating system.
Identity Theft_INSIDESnew90x120.Sec1:76 Sec1:76Identity Theft_INSIDESnew90x120.Sec1:76 Sec1:76 22/03/2007 10:05:3222/03/2007 10:05:32
![Page 77: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/77.jpg)
Part Two
77
Many websites require you to register your details with them so that when you return to make future purchases you don’t have to re-enter you credit/debit card details. Ensure that in these circumstances you don’t use an obvious password and be careful to logout properly when you have completed the transaction. When making purchases online it is important to ensure that you are giving your fi nancial details over a secure webpage. Secured websites use encryption programmes to scramble your information as it is transmitted
Identity Theft_INSIDESnew90x120.Sec1:77 Sec1:77Identity Theft_INSIDESnew90x120.Sec1:77 Sec1:77 22/03/2007 10:05:3322/03/2007 10:05:33
![Page 78: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/78.jpg)
Identity Theft
78
over the Internet. If the site is secure,
the prefi x to the domain address will be
https://www. This can be found in the
address bar.
Look also for a yellow closed
padlock or an unbroken key icon at
the bottom of your web browser.
Identity Theft_INSIDESnew90x120.Sec1:78 Sec1:78Identity Theft_INSIDESnew90x120.Sec1:78 Sec1:78 22/03/2007 10:05:3322/03/2007 10:05:33
![Page 79: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/79.jpg)
Part Two
79
If neither of these are present, consider discontinuing the transaction or enquire about alternative methods of ordering such as by telephone. It should also be noted that even if these secure indicators are present you should never use a public computer, such as one in an Internet café, to access sensitive financial information. For further information and advice on how to stay safe online see: http://www.banksafeonline.org.uk.
Identity Theft_INSIDESnew90x120.Sec1:79 Sec1:79Identity Theft_INSIDESnew90x120.Sec1:79 Sec1:79 22/03/2007 10:05:3422/03/2007 10:05:34
![Page 80: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/80.jpg)
Identity Theft
80
Phishing
A common technique utilised by the
scammer is to send e-mails which when
opened appear to be the website of
your bank. They prompt you to enter
your account number and password
under the pretext that there is a problem
with your account. The more advanced
phishing pages will actually bring you
to your bank’s homepage once you
have clicked ‘login’ after entering your
information. By that point it is too late
and they have your details. You may
think that you would never fall for such
Identity Theft_INSIDESnew90x120.Sec1:80 Sec1:80Identity Theft_INSIDESnew90x120.Sec1:80 Sec1:80 22/03/2007 10:05:3422/03/2007 10:05:34
![Page 81: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/81.jpg)
Part Two
81
a scam. Think again. In 2003 UK police estimated that phishing scams cost £60 million in the UK alone.
If you receive an e-mail that
tells you there is a problem
with your bank account and
you must enter your details,
delete the e-mail and contact
your bank using a telephone
number or website which you
know to be genuine.
Identity Theft_INSIDESnew90x120.Sec1:81 Sec1:81Identity Theft_INSIDESnew90x120.Sec1:81 Sec1:81 22/03/2007 10:05:3522/03/2007 10:05:35
![Page 82: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/82.jpg)
Identity Theft
82
A notorious e-mail scam is the story
of the wife of the late Nigerian head
of state, General Sanni Abacha. The e-
mail states that she has received $45
million dollars from a Russian contact
which she needs to move out of the
country and is willing to pay a 20
per cent commission to anyone who
kindly provides their banking details
for the transfer to take place. Targets
have included companies, charities,
churches and individuals. It may be
obvious to you that it is a scam but it
wasn’t to the Brazilian bank manager
Identity Theft_INSIDESnew90x120.Sec1:82 Sec1:82Identity Theft_INSIDESnew90x120.Sec1:82 Sec1:82 22/03/2007 10:05:3522/03/2007 10:05:35
![Page 83: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/83.jpg)
Part Two
83
who was hoodwinked out of $242 million. So widespread has this e-mail scam become that it has had a negative eff ect on foreign investment in Nigeria and they have passed criminal legislation specifi cally to combat it.
Suspicious unsolicited e-mails of this kind should be deleted immediately.
Never give your personal fi nancial details to anyone by e-mail. Reputable companies would not request that you do this
Identity Theft_INSIDESnew90x120.Sec1:83 Sec1:83Identity Theft_INSIDESnew90x120.Sec1:83 Sec1:83 22/03/2007 10:05:3522/03/2007 10:05:35
![Page 84: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/84.jpg)
Identity Theft
84
as they understand that it is not a secure method of communication.
For regularly updated information on fi nance-related scams and swindles, see the following website created by the Financial Services Authority: http://www.moneymadeclear.fsa.gov.uk/scams.
Wireless surfi ng
The advent of wireless technology has allowed us to untie ourselves from our phone cables and surf the Internet anywhere with a hotspot. Wireless
Identity Theft_INSIDESnew90x120.Sec1:84 Sec1:84Identity Theft_INSIDESnew90x120.Sec1:84 Sec1:84 22/03/2007 10:05:3622/03/2007 10:05:36
![Page 85: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/85.jpg)
Part Two
85
Internet access is also becoming very popular in the home, allowing people to roam from room to room or numerous users to share the same network. Although very convenient, it does present certain security concerns that we should be aware of. An unsecured network makes it easier for hackers to access your computer. The following are some simple steps which should be taken to secure your wireless access:
Every wireless router has a default username (a Service Set Identifi er, or
Identity Theft_INSIDESnew90x120.Sec1:85 Sec1:85Identity Theft_INSIDESnew90x120.Sec1:85 Sec1:85 22/03/2007 10:05:3622/03/2007 10:05:36
![Page 86: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/86.jpg)
Identity Theft
86
SSID). Hackers interested in your personal information know what these are and with them can hack into your system. Your router’s set-up instructions will tell you how to change the SSID to a different name.
Enable Wired Equivalent Privacy (WEP) on your computer. WEP is designed to provide a level of security similar to that of a wired network. It aims to provide security by encrypting data over
Identity Theft_INSIDESnew90x120.Sec1:86 Sec1:86Identity Theft_INSIDESnew90x120.Sec1:86 Sec1:86 22/03/2007 10:05:3722/03/2007 10:05:37
![Page 87: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/87.jpg)
Part Two
87
radio waves so that it is protected as it is transmitted from one end point to another. Windows XP is WEP enabled: you can set it to turn on automatically and it will prevent anyone snooping on your wireless broadband signal. For earlier versions of Windows, the WEP software should be included with your wireless network card/router.
Identity Theft_INSIDESnew90x120.Sec1:87 Sec1:87Identity Theft_INSIDESnew90x120.Sec1:87 Sec1:87 22/03/2007 10:05:3722/03/2007 10:05:37
![Page 88: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/88.jpg)
Identity Theft
88
When purchasing a wireless device, you might want to check that it is Wi-Fi Protected Access (WPA) enabled. This is a more advanced form of encryption than WEP and if your device has it you can simply turn it on by ticking ‘Use WPA encryption instead of WEP’ in the Wireless Network Setup Wizard.
These precautions should suffice for most homes; however, if you are handy with computers you
Identity Theft_INSIDESnew90x120.Sec1:88 Sec1:88Identity Theft_INSIDESnew90x120.Sec1:88 Sec1:88 22/03/2007 10:05:3722/03/2007 10:05:37
![Page 89: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/89.jpg)
Part Two
89
could also consider more advanced
security measures which will reduce
even further the possibility of being
hacked. Every wireless device has a
Media Access Code, or MAC; this is
a serial number that can be found
on the outer casing of the device.
You can enter the MAC address on
each computer on your network
and that will ensure that only those
computers can access your wireless
network. Your computer also has a
MAC code, which you will need to
get so that you can finish setting
Identity Theft_INSIDESnew90x120.Sec1:89 Sec1:89Identity Theft_INSIDESnew90x120.Sec1:89 Sec1:89 22/03/2007 10:05:3822/03/2007 10:05:38
![Page 90: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/90.jpg)
Identity Theft
90
up the security measure. To find this, in Windows NT and later versions follow these steps:
Click Start, Run then type command in the box and click OK. A new window will appear with a black background.
Type ipconfi g/all and press the Enter key. A list of information should appear in the window. Look for the line called Physical address – that’s your computer’s MAC address.
Identity Theft_INSIDESnew90x120.Sec1:90 Sec1:90Identity Theft_INSIDESnew90x120.Sec1:90 Sec1:90 22/03/2007 10:05:3822/03/2007 10:05:38
![Page 91: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/91.jpg)
Part Two
91
You will now need to input the MAC address to confi gure your router. Follow these steps:
Click on Start, then Control Panel and then Network Connections
In Network Connections right click on your wireless router icon and then click Properties
Under General tab, click on the Confi gure button, then click on Advanced tab
Identity Theft_INSIDESnew90x120.Sec1:91 Sec1:91Identity Theft_INSIDESnew90x120.Sec1:91 Sec1:91 22/03/2007 10:05:3822/03/2007 10:05:38
![Page 92: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/92.jpg)
Identity Theft
92
Under Property section, you will see Network Address or Locally Administered Address, click on it
On the right side, under Value, type in the New MAC address you want to assign to your router
Click Start, Run then type command in the box and click OK. A new window will appear with a black background
Type ipconfi g/all or net confi g rdr to verify the changes
Identity Theft_INSIDESnew90x120.Sec1:92 Sec1:92Identity Theft_INSIDESnew90x120.Sec1:92 Sec1:92 22/03/2007 10:05:3922/03/2007 10:05:39
![Page 93: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/93.jpg)
Part Two
93
Restart your computer
These steps initiate ‘MAC address filtering’ which means that your home wireless network will only work with devices that have the correct MAC codes.
Due to its very nature, wireless networking is not as secure as using a hard line to access the Internet. Nevertheless, these steps will increase the security of your network immeasurably and allow you to take advantage of the freedom which a Wi-Fi connection aff ords.
Identity Theft_INSIDESnew90x120.Sec1:93 Sec1:93Identity Theft_INSIDESnew90x120.Sec1:93 Sec1:93 22/03/2007 10:05:3922/03/2007 10:05:39
![Page 94: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/94.jpg)
Identity Theft_INSIDESnew90x120.Sec1:94 Sec1:94Identity Theft_INSIDESnew90x120.Sec1:94 Sec1:94 22/03/2007 10:05:4022/03/2007 10:05:40
![Page 95: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/95.jpg)
95
Part Three
How do I know if I am a victim of identity theft?
Identity Theft_INSIDESnew90x120.Sec1:95 Sec1:95Identity Theft_INSIDESnew90x120.Sec1:95 Sec1:95 22/03/2007 10:05:4022/03/2007 10:05:40
![Page 96: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/96.jpg)
Identity Theft
96
The importance of your credit report
If you want to ensure that you do not become a victim of identity theft it is vital that you become familiar with your credit report. Your credit report is a document which scores your credit rating so that lending institutions or service providers can decide if they are going to offer you credit or not. It contains the name of anyone you share a financial relationship with and also shows when you, or
Identity Theft_INSIDESnew90x120.Sec1:96 Sec1:96Identity Theft_INSIDESnew90x120.Sec1:96 Sec1:96 22/03/2007 10:05:4122/03/2007 10:05:41
![Page 97: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/97.jpg)
Part Three
97
someone claiming to be you, have applied for credit and a lender has checked your file. Your report also contains linked addresses. A linked address is created when a lender changes the address on a credit account or when they receive a credit application from an address – if credit has been applied for in your name your report will contain all the addresses from which the application has been made. It is a good idea to order a copy and review what information lenders
Identity Theft_INSIDESnew90x120.Sec1:97 Sec1:97Identity Theft_INSIDESnew90x120.Sec1:97 Sec1:97 22/03/2007 10:05:4222/03/2007 10:05:42
![Page 98: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/98.jpg)
Identity Theft
98
are seeing when you apply for credit.
Ordering a copy from one of the
credit agencies is simple and costs £2.
By law, the credit agencies (contact
details are listed at the end of this book)
are required to provide you with your
report within seven working days of
receipt of your request and payment.
If you are concerned that you might be
the victim of identity theft, you should
request your report; however, more
immediate action (contacting a lender
or the police) may be necessary in
Identity Theft_INSIDESnew90x120.Sec1:98 Sec1:98Identity Theft_INSIDESnew90x120.Sec1:98 Sec1:98 22/03/2007 10:05:4222/03/2007 10:05:42
![Page 99: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/99.jpg)
Part Three
99
extreme cases. The following are some signs to look out for:
You have been unexpectedly denied credit even though you’re sure that you’re credit worthy
Your credit/debit card statement includes charges which you don’t recognise
Your bank statements have not been delivered or you notice some other mail is missing
Identity Theft_INSIDESnew90x120.Sec1:99 Sec1:99Identity Theft_INSIDESnew90x120.Sec1:99 Sec1:99 22/03/2007 10:05:4222/03/2007 10:05:42
![Page 100: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/100.jpg)
Identity Theft
100
A debt collection agency contacts you regarding a debt for goods you never purchased or credit you never took
You are told that you are approved or denied credit for applications that you know nothing about
If you have ordered your report you
should look for the following:
Accounts in your name which you do not hold
Identity Theft_INSIDESnew90x120.Sec1:100 Sec1:100Identity Theft_INSIDESnew90x120.Sec1:100 Sec1:100 22/03/2007 10:05:4322/03/2007 10:05:43
![Page 101: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/101.jpg)
Part Three
101
Credit applications made in your name which you did not make
Searches of your report made by companies which you never contacted
Linked addresses with which you have no connection
If you are concerned that some of the information held on your credit report is incorrect you can make an application to have the record amended. You can contact the
Identity Theft_INSIDESnew90x120.Sec1:101 Sec1:101Identity Theft_INSIDESnew90x120.Sec1:101 Sec1:101 22/03/2007 10:05:4322/03/2007 10:05:43
![Page 102: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/102.jpg)
Identity Theft
102
credit agency who will then contact the lender who mistakenly appears on your report. Any amendments will be entered when the lender replies and take the form of a ‘Notice of Correction’ which can be viewed by anyone who has accessed your report in the past six months and it may infl uence their decision. If the information on the report suggests that you are the victim of identity theft, contact the relevant creditors immediately and explain your situation.
Identity Theft_INSIDESnew90x120.Sec1:102 Sec1:102Identity Theft_INSIDESnew90x120.Sec1:102 Sec1:102 22/03/2007 10:05:4422/03/2007 10:05:44
![Page 103: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/103.jpg)
Part Three
103
What to do in the event of identity theft
The most important thing to remember is that the problem will not go away if you do not take action and it will become harder to solve as time goes on. Do not ignore it. As previously stated, if you suspect your identity has been stolen be sure to order a copy of your credit report. If the report confi rms your suspicions you should take the following steps:
Contact one of the credit agencies listed at the back of this book and inform them
Identity Theft_INSIDESnew90x120.Sec1:103 Sec1:103Identity Theft_INSIDESnew90x120.Sec1:103 Sec1:103 22/03/2007 10:05:4422/03/2007 10:05:44
![Page 104: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/104.jpg)
Identity Theft
104
of the problem. They can help you liaise with the lenders involved and make sure that you are not affected by the fraud. If the fraudster is still active they will place security features on your credit report.
Contact the CIFAS Protective Registration Service. Once you have registered, CIFAS members such as lenders and banks will carry out extra checks whenever anyone, including you, applies for a fi nancial service using your address.
Identity Theft_INSIDESnew90x120.Sec1:104 Sec1:104Identity Theft_INSIDESnew90x120.Sec1:104 Sec1:104 22/03/2007 10:05:4422/03/2007 10:05:44
![Page 105: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/105.jpg)
Part Three
105
Report the incident immediately to the police and obtain a crime reference number or some other documentation as a record of the incident – for details on how to report crime see http://www.crimestoppers-uk.org/.
When contacting your own lenders and the lender who was defrauded be sure to keep a record of communication – record who you spoke to and when and keep copies of letters sent and received.
Identity Theft_INSIDESnew90x120.Sec1:105 Sec1:105Identity Theft_INSIDESnew90x120.Sec1:105 Sec1:105 22/03/2007 10:05:4522/03/2007 10:05:45
![Page 106: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/106.jpg)
Identity Theft
106
Other steps to take: If your driving licence has
been lost or stolen report it as soon as you discover it missing. For advice on what to do if your driving licence has been lost or stolen see: http://www.dvla.gov.uk/drivers.aspx.
If your passport is lost or stolen report it as soon as you discover it missing. The Home Offi ce has set up specifi c procedures to be followed in the event of lost or stolen passports. For further information consult
Identity Theft_INSIDESnew90x120.Sec1:106 Sec1:106Identity Theft_INSIDESnew90x120.Sec1:106 Sec1:106 22/03/2007 10:05:4522/03/2007 10:05:45
![Page 107: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/107.jpg)
Part Three
107
the website at http://www.ips.gov.uk or call 0870 521 0410.
Report all lost or stolen cheques, credit/debit cards to the issuers and request new ones. It is a good idea to follow up any telephone conversations you have with written confi rmation. Once your new cards arrive you should immediately change your PIN – DO NOT continue to use a compromised PIN.
If you suspect that your mail has been stolen or
Identity Theft_INSIDESnew90x120.Sec1:107 Sec1:107Identity Theft_INSIDESnew90x120.Sec1:107 Sec1:107 22/03/2007 10:05:4522/03/2007 10:05:45
![Page 108: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/108.jpg)
Identity Theft
108
a redirection has been fraudulently set up in your name, contact the Royal Mail and inform them of your concerns.
Your liability for the debt and how to deal with creditors
If you have been the victim of identity theft and purchases were made or credit advanced in your name it is important to remember that the debt is not yours. Most lending institutions limit your liability in the event of fraud to
Identity Theft_INSIDESnew90x120.Sec1:108 Sec1:108Identity Theft_INSIDESnew90x120.Sec1:108 Sec1:108 22/03/2007 10:05:4622/03/2007 10:05:46
![Page 109: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/109.jpg)
Part Three
109
£50 and even then it is common practice to waive such a fee.
There may be times, however, when
you are contacted for an old fraudulent
debt, about which you know nothing.
A loan may have been advanced in
your name some time ago and the
creditor is now seeking repayment
because the identity thief has made
off with the money. They may be
persistent as they are no doubt used
to people denying their debts every
day, but make sure that you are fi rm
with them.
Identity Theft_INSIDESnew90x120.Sec1:109 Sec1:109Identity Theft_INSIDESnew90x120.Sec1:109 Sec1:109 22/03/2007 10:05:4622/03/2007 10:05:46
![Page 110: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/110.jpg)
Identity Theft
110
The process of collection will
usually begin with a series of letters
and then move on to phone calls
– they probably won’t turn up on
your doorstep in the first instance.
It will assist your case greatly if you
are able to provide evidence of
communication with the police and
credit agencies to the effect that you
have been a victim of identity theft.
Sometimes, as with old debts, this
might be impossible since the call
from the debt collector is the first
you will hear of the debt.
Identity Theft_INSIDESnew90x120.Sec1:110 Sec1:110Identity Theft_INSIDESnew90x120.Sec1:110 Sec1:110 22/03/2007 10:05:4722/03/2007 10:05:47
![Page 111: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/111.jpg)
Part Three
111
Remember: you have rights, so exercise them. If you find that the collection agency is acting unfairly then you should contact the lending institution which has retained them and inform them of the unfair practices. Guidance from the Office of Fair Trading makes it clear that lenders must not ignore the unfair practices of debt collectors acting on their behalf, whether in-house or external. Lenders should take care in the selection of third parties, investigate complaints and take
Identity Theft_INSIDESnew90x120.Sec1:111 Sec1:111Identity Theft_INSIDESnew90x120.Sec1:111 Sec1:111 22/03/2007 10:05:4722/03/2007 10:05:47
![Page 112: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/112.jpg)
Identity Theft
112
action where appropriate. Failure
to do so will call into question
their own fitness to hold a credit
licence. If a collector harasses
you, you should contact your
local council’s trading standards
department. If they threaten you
physically, contact the police. If
you start getting final demands
for things you haven’t bought, you
can save yourself a lot of trouble
by responding to them rather than
ignoring them. Let the agency
know that it’s not your problem.
Identity Theft_INSIDESnew90x120.Sec1:112 Sec1:112Identity Theft_INSIDESnew90x120.Sec1:112 Sec1:112 22/03/2007 10:05:4722/03/2007 10:05:47
![Page 113: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/113.jpg)
Part Three
113
In the unlikely event that the process goes all the way to the bailiffs turning up at your door unannounced, there are some things you should remember:
Bailiffs cannot enter your property by force unless they have been let in on a previous visit to collect the same debt. They can, however, make a peaceful entry which means they can enter through an open window or closed but unlocked door. You should always refuse to let the bailiff into your
Identity Theft_INSIDESnew90x120.Sec1:113 Sec1:113Identity Theft_INSIDESnew90x120.Sec1:113 Sec1:113 22/03/2007 10:05:4822/03/2007 10:05:48
![Page 114: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/114.jpg)
Identity Theft
114
home as this will ensure that they cannot force entry if they visit again.
Bailiffs cannot seize your basic household goods, clothing, bedding and tools of a trade. They are not allowed to seize goods belonging to a person other than the debtor but can normally seize jointly owned goods. The proceeds of any sale of jointly owned goods would have to be divided between the lender and the other owner.
Identity Theft_INSIDESnew90x120.Sec1:114 Sec1:114Identity Theft_INSIDESnew90x120.Sec1:114 Sec1:114 22/03/2007 10:05:4822/03/2007 10:05:48
![Page 115: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/115.jpg)
Part Three
115
Can I really make a difference in the fi ght against identity theft?
As illustrated by the figures at the beginning of this book, identity theft is on the rise. However, with a little extra vigilance on our part we can have a profound impact on those statistics and, indirectly, on the fees we pay to cover the cost of such fraud. Lending institutions and the government also have a role to play, but it is imperative that we act responsibly when it
Identity Theft_INSIDESnew90x120.Sec1:115 Sec1:115Identity Theft_INSIDESnew90x120.Sec1:115 Sec1:115 22/03/2007 10:05:4822/03/2007 10:05:48
![Page 116: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/116.jpg)
Identity Theft
116
comes to controlling our personal information – we don’t want to make it any easier for fraudsters to succeed. Identity theft is probably going to exist in one form or another for years to come; however, with a little effort you should be able to prevent yourself from becoming just another statistic in the fight against fraud.
Identity Theft_INSIDESnew90x120.Sec1:116 Sec1:116Identity Theft_INSIDESnew90x120.Sec1:116 Sec1:116 22/03/2007 10:05:4922/03/2007 10:05:49
![Page 117: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/117.jpg)
Contact Information
117
Contact Information
Obtaining your credit report
You can obtain a copy of your credit report from the following organisations. Some also offer secure online access to your credit record for a small fee. Consult their websites for further details.
CallcreditConsumer ServicesCall Credit LimitedPO Box 491LeedsLS3 1WZTel: 0870 060 1414http://www.callcredit.co.uk
Identity Theft_INSIDESnew90x120.Sec1:117 Sec1:117Identity Theft_INSIDESnew90x120.Sec1:117 Sec1:117 22/03/2007 10:05:4922/03/2007 10:05:49
![Page 118: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/118.jpg)
118
Identity Theft
Equifax Equifax Credit File Advice CentrePO Box 1140BradfordBD1 5US0870 514 3700http://www.equifax.co.uk
ExperianTalbot House Talbot Street Nottingham NG80 1THUnited Kingdom0870 241 6212
http://www.experian.co.uk
Identity Theft_INSIDESnew90x120.Sec1:118 Sec1:118Identity Theft_INSIDESnew90x120.Sec1:118 Sec1:118 22/03/2007 10:05:5022/03/2007 10:05:50
![Page 119: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/119.jpg)
Other titles available from Summersdale
Identity Theft_INSIDESnew90x120.Sec1:119 Sec1:119Identity Theft_INSIDESnew90x120.Sec1:119 Sec1:119 22/03/2007 10:05:5022/03/2007 10:05:50
![Page 120: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/120.jpg)
Identity Theft_INSIDESnew90x120.Sec1:120 Sec1:120Identity Theft_INSIDESnew90x120.Sec1:120 Sec1:120 22/03/2007 10:05:5022/03/2007 10:05:50
![Page 121: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/121.jpg)
Stress Buster
How to Stop Stress from Killing You
Geoff Thompson
£7.99 P/B
ISBN: 1-84024-509-3
ISBN 13: 978-1-84024-509-7
In our increasingly hectic society we are under constant pressure to get the best results, the top job, a better car or a bigger house. For many reasons, stress can become a major problem affecting our relationships and even our health. Stress can ruin lives, and most people don’t know how to cope with it – or how they can use it as an energy force.
If you’re always getting angry in the car, at home or at work, if you constantly feel out of balance, then this book is for you. It will help you identify the causes of stress in your life, and shows you how to deal with them in a practical way. With true-life examples, clear explanations and relevant advice, it’s indispensable aid to overcoming stress.
This book may save your life.
Identity Theft_INSIDESnew90x120.Sec1:121 Sec1:121Identity Theft_INSIDESnew90x120.Sec1:121 Sec1:121 22/03/2007 10:05:5222/03/2007 10:05:52
![Page 122: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/122.jpg)
Identity Theft_INSIDESnew90x120.Sec1:122 Sec1:122Identity Theft_INSIDESnew90x120.Sec1:122 Sec1:122 22/03/2007 10:05:5222/03/2007 10:05:52
![Page 123: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/123.jpg)
It’s Easy Being Green
101 Ways to Save the Planet
Mark Mann
£3.99 P/B
ISBN: 1-84024-576-X
ISBN 13: 978-1-84024-576-9
This one-stop-shop of green tips on how to reduce, re-use and recycle will help make saving the planet easier. If you care about the environment and want to make a difference, these 101 tips will show you how.
Mark Mann is the author of The Good Alternative Travel Guide and edits and maintains environmental websites www.ecoshop.com.au and www.planetarkdirect.com.
Identity Theft_INSIDESnew90x120.Sec1:123 Sec1:123Identity Theft_INSIDESnew90x120.Sec1:123 Sec1:123 22/03/2007 10:05:5422/03/2007 10:05:54
![Page 124: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/124.jpg)
Identity Theft_INSIDESnew90x120.Sec1:124 Sec1:124Identity Theft_INSIDESnew90x120.Sec1:124 Sec1:124 22/03/2007 10:05:5422/03/2007 10:05:54
![Page 125: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/125.jpg)
The Beginner’s Guide to Broadband and Wireless Internet
Peter Burns
£5.99 P/B
ISBN: 1-84024-499-2
ISBN 13: 978-1-84024-499-1
If you’re lost in cyberspace and need direction, this invaluable handbook includes all the information you’ll need to get the most out of broadband. It guides you through the decisions you’ll need to make, from choosing the right anti-virus software to setting up a wireless network in your home.
Learn how to make the most of your high-speed connection, with chapters on instant messaging, downloading music, making phone calls from your computer and fi nding the best broadband websites on the net. It’s the book everyone with broadband needs next to their PC.
Peter Burns is the marketing manager (Internet and eCommerce) for retailer Waitrose and manages waitrose.com broadband, the UK’s only broadband service to give all its profi ts to charity. He has also worked for Singapore Airlines, Virgin Atlantic and international news broadcaster ITN.
Identity Theft_INSIDESnew90x120.Sec1:125 Sec1:125Identity Theft_INSIDESnew90x120.Sec1:125 Sec1:125 22/03/2007 10:05:5522/03/2007 10:05:55
![Page 126: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/126.jpg)
Identity Theft_INSIDESnew90x120.Sec1:126 Sec1:126Identity Theft_INSIDESnew90x120.Sec1:126 Sec1:126 22/03/2007 10:05:5522/03/2007 10:05:55
![Page 127: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/127.jpg)
Flying? No Fear!Conquer Your Fear of Flying
Captain Adrian Akers-Douglas and Dr George Georgiou
£5.99 P/B
ISBN: 1-84024-527-1
ISBN 13: 978-1-84024-527-1
Written by an airline pilot and a clinical psychologist, this combination of practical explanation and self-help techniques is the defi nitive guide to help anyone overcome their fear of fl ying.
Sometimes unnecessary anxiety is caused by events which airline crews may take for granted, including aspects of fl ights that are mystifying and even alarming to less frequent fl yers.
This new edition incorporates the recent advances in technology within the aviation industry, as well as the increased security checks as a result of 9/11.
Adrian Akers-Douglas started his career in the RAF, then fl ew for Cyprus Airways and Eurocypria Airlines for 30 years. Since 2003 he has been a check and training captain with Airbus, based in Toulouse. Dr George Georgiou is a clinical psychologist.
‘a must for people who are frightened of fl ying’
Easyjet Infl ight Magazine
Identity Theft_INSIDESnew90x120.Sec1:127 Sec1:127Identity Theft_INSIDESnew90x120.Sec1:127 Sec1:127 22/03/2007 10:05:5722/03/2007 10:05:57
![Page 128: Identity Theft: Everything You Need to Know to Protect Yourself](https://reader036.fdocuments.in/reader036/viewer/2022080117/57ade2ea1a28abbe3a9b436d/html5/thumbnails/128.jpg)
www.summersdale.com
Identity Theft_INSIDESnew90x120.Sec1:128 Sec1:128Identity Theft_INSIDESnew90x120.Sec1:128 Sec1:128 22/03/2007 10:05:5722/03/2007 10:05:57