Anonymous

Difference between revisions of "Identity Theft"

From Clicklaw Wikibooks
578 bytes added ,  06:31, 11 April 2013
no edit summary
m (35 revisions)
 
Line 8: Line 8:


Once they steal information, identity thieves invade your personal and financial life. Using this information, they may:
Once they steal information, identity thieves invade your personal and financial life. Using this information, they may:
* drain your bank accounts, transfer bank balances or open new accounts,
* drain your bank accounts, <span class="noglossary">transfer</span> bank balances or open new accounts,
* run up credit card debts or apply for new credit cards,
* run up credit card debts or apply for new credit cards,
* apply for loans and other services or benefits,
* apply for loans and other services or benefits,
Line 21: Line 21:
* Pose as a credible person (e.g., government official, bank employee, landlord, employer, creditor, service provider) to obtain your personal or financial information from you or from confidential sources.
* Pose as a credible person (e.g., government official, bank employee, landlord, employer, creditor, service provider) to obtain your personal or financial information from you or from confidential sources.
* Remove mail from your mailbox or redirect your mail.
* Remove mail from your mailbox or redirect your mail.
* Tamper with automated teller machines (ATMs) and point-of-sale debit machines so they can read your debit or credit card number and personal identification number (PIN).
* Tamper with automated teller machines (ATMs) and point-of-<span class="noglossary">sale</span> debit machines so they can read your debit or credit card number and personal identification number (PIN).
* Retrieve personal information from garbage or recycling.
* Retrieve personal information from garbage or recycling.
* Buy the information from someone who works where personal and/or financial information is stored.
* Buy the information from someone who works where personal and/or financial information is stored.
* Use online search engines, social media networks, newspapers, phone books, and public records to obtain your information.
* Use online search engines, social media networks, newspapers, phone books, and public records to obtain your information.
* Place bogus advertisements for employment in order to obtain your information.
* Place bogus advertisements for employment in <span class="noglossary">order</span> to obtain your information.
* Pretend they need your personal details to send you “winnings”.
* Pretend they need your personal details to send you “winnings”.


Line 44: Line 44:
===Online===
===Online===
* Use passwords that do not contain easily available information.  
* Use passwords that do not contain easily available information.  
* Don’t download applications unless you can verify the source. Never give personal information to “unlock” a feature or application.  
* Don’t download applications unless you can verify the source. Never give personal information to “unlock” a feature or <span class="noglossary">application</span>.  
* Have the most recent updates installed for spam filters, anti-virus and anti-spyware software, and a secure firewall. Use the most up-to-date versions of your web browser to offer further protection.
* Have the most recent updates installed for spam filters, anti-virus and anti-spyware software, and a secure firewall. Use the most up-to-date versions of your web browser to offer further protection.
* On a social networking site, don’t post more personal information than necessary. Set your privacy settings as high as possible. Do not accept friend requests from people you don’t know.  
* On a social networking site, don’t post more personal information than necessary. Set your privacy settings as high as possible. Do not accept friend requests from people you don’t know.  
* Never follow links in emails, even to log in to Facebook or Twitter. Go to the site directly and log in there.
* Never follow links in emails, even to log in to Facebook or Twitter. Go to the site directly and log in there.
* If you use secure sites for financial transactions, follow all of the instructions for security when you enter and exit the site.
* If you use secure sites for financial transactions, follow all of the <span class="noglossary">instructions</span> for security when you enter and exit the site.
* Don't send personal and financial information by email unless you know the service is secure.
* Don't send personal and financial information by email unless you know the service is secure.
* Make sure personal information is deleted before you sell, recycle or discard your computer. You may have deleted files from folders but the information may still be on the computer’s hard drive.
* Make sure personal information is deleted before you sell, recycle or discard your computer. You may have deleted files from folders but the information may still be on the computer’s hard drive.
Line 54: Line 54:
===On your mobile devices===
===On your mobile devices===
* Password protect your smartphone and lock the keypad when you're not using it. Ensure you enable the password or PIN to all your voice mail accounts.
* Password protect your smartphone and lock the keypad when you're not using it. Ensure you enable the password or PIN to all your voice mail accounts.
* Don't share any important information, account numbers or passwords via text message. Text messages are relatively easy to intercept.
* Don't share any important information, <span class="noglossary">account</span> numbers or passwords via text message. Text messages are relatively easy to intercept.
* Carry only the information you need on your phone. Just because you can list contacts in a smartphone application doesn't mean you should do it.
* Carry only the information you need on your phone. Just because you can list contacts in a smartphone <span class="noglossary">application</span> doesn't mean you should do it.
* If you carry important information on your smartphone, consider using software that can remotely lock your phone or remove your information.
* If you carry important information on your smartphone, consider using software that can remotely lock your phone or remove your information.


Line 67: Line 67:
* Sign your credit and debit cards as soon as you get them. Cut up expired and unused cards.  
* Sign your credit and debit cards as soon as you get them. Cut up expired and unused cards.  
* Keep key documents such as your birth certificate, passport and social insurance card in a safe place when you’re not using them. Also keep other important documents such as tax returns, will, marriage certificate, diplomas and degrees in a safe place.
* Keep key documents such as your birth certificate, passport and social insurance card in a safe place when you’re not using them. Also keep other important documents such as tax returns, will, marriage certificate, diplomas and degrees in a safe place.
* Make a list of the names, account numbers and expiration dates of your cards in a secure place. Store this list somewhere secure. This will help you if you need to alert your credit grantors about a lost or stolen card.
* Make a list of the names, account numbers and expiration dates of your cards in a secure place. Store this list somewhere secure. This <span class="noglossary">will</span> help you if you need to alert your credit grantors about a lost or stolen card.
* Know when your credit card and financial statements and utility bills are due. Pay attention to credit card expiry dates. Match credit cards and debit cards to your statements.
* Know when your credit card and financial statements and utility bills are due. Pay attention to credit card expiry dates. Match credit cards and debit cards to your statements.
* Do not put more than your name and address on your personal cheques.
* Do not put more than your name and address on your personal cheques.
Line 75: Line 75:
Dealing with identity theft is time-consuming. You need support and information. This section suggests actions you can take to stop the thief and regain control of your identity documents.
Dealing with identity theft is time-consuming. You need support and information. This section suggests actions you can take to stop the thief and regain control of your identity documents.


If you suspect you have become a victim, you need to contact financial institutions, credit issuers, other companies and credit reporting agencies. Keep a log of dates, person(s) that you speak with or write to, what they say, and how to contact them again if you have more questions.
If you suspect you have become a victim, you need to <span class="noglossary">contact</span> financial institutions, credit issuers, other companies and credit reporting agencies. Keep a log of dates, person(s) that you speak with or write to, what they say, and how to <span class="noglossary">contact</span> them again if you have more questions.


# Report the incident to the Canadian Anti-Fraud Centre (CAFC) at 1-888-495-8501 or [http://www.antifraudcentre-centreantifraude.ca www.antifraudcentre-centreantifraude.ca]. The CAFC has an Identity Theft Statement you can use to send to financial institutions, credit issuers, other companies and credit reporting agencies. You can download it from the website and make copies.
# Report the incident to the Canadian Anti-Fraud Centre (CAFC) at 1-888-495-8501 or [http://www.antifraudcentre-centreantifraude.ca www.antifraudcentre-centreantifraude.ca]. The CAFC has an Identity Theft Statement you can use to send to financial institutions, credit issuers, other companies and credit reporting agencies. You can download it from the website and make copies.
# Contact your financial institutions, credit issuers, and other companies. Tell them what has happened and ask them to investigate. Cancel any cards that were affected and close any affected accounts. Find out if the company requires written documentation to begin investigating your claim of identity theft. Send the company the documentation they require as soon as possible.
# <span class="noglossary">Contact</span> your financial institutions, credit issuers, and other companies. Tell them what has happened and ask them to investigate. Cancel any cards that were affected and close any affected accounts. Find out if the company requires written documentation to begin investigating your claim of identity theft. Send the company the documentation they require as soon as possible.
# Contact Canada’s two major credit reporting agencies. Ask each agency to send you a copy of your credit report. The credit report may show if there are other companies where the identity thief has opened accounts or incurred debt in your name. Discuss with the credit reporting agency whether to have a “fraud alert” placed on your file. A fraud alert means that creditors call you before opening any new accounts or changing your existing accounts. The two major credit reporting agencies are:  
# <span class="noglossary">Contact</span> Canada’s two major credit reporting agencies. Ask each agency to send you a copy of your credit report. The credit report may show if there are other companies where the identity thief has opened accounts or incurred debt in your name. Discuss with the credit reporting agency whether to have a “fraud alert” placed on your file. A fraud alert means that creditors call you before opening any new accounts or changing your existing accounts. The two major credit reporting agencies are:  
##Equifax: Phone toll-free at 1-800-465-7166 or visit their website at [http://www.equifax.com/ www.equifax.com].
##Equifax: Phone toll-free at 1-800-465-7166 or visit their website at [http://www.equifax.com/ www.equifax.com].
##TransUnion Canada: Phone toll-free at 1-800-663-9980 or visit their website at [http://www.transunion.ca www.transunion.ca].
##TransUnion Canada: Phone toll-free at 1-800-663-9980 or visit their website at [http://www.transunion.ca www.transunion.ca].
# If your government-issued documents were lost or stolen, contact the department or ministry, explain what happened, and request new documents.
# If your government-issued documents were lost or stolen, <span class="noglossary">contact</span> the department or ministry, explain what happened, and request new documents.
# If you think your mail is being stolen or re-directed, contact Canada Post.
# If you think your mail is being stolen or re-directed, <span class="noglossary">contact</span> Canada Post.
# Report the incident to your local police department. Ask the police to take a report, if possible. If a police report is available, include it in all your correspondence about the identity theft with financial institutions, credit issuers, other companies and credit reporting agencies.
# Report the incident to your local police department. Ask the police to take a report, if possible. If a police report is available, include it in all your correspondence about the identity theft with financial institutions, credit issuers, other companies and credit reporting agencies.
{{REVIEWED | reviewer = [[People's Law School]], 2013}}


{{Consumer Law Wikibook Navbox}}
{{Consumer Law Wikibook Navbox}}
{{Creative Commons for PLS
|title = Consumer Law Wikibook
|author =
}}
9,075

edits