If You
Are A                                  The
  Victim                                 FDIC
If you find out you are a victim of      The FDIC is is a United States Gov-
identity theft the first thing you       ernment Corporation providing de-
should do is file a police report with   posit insurance to depositors in US
your local police department. Next,      banks. The FDIC is related to iden-
you should contact all your credi-
tors. They should place fraud alerts
                                         tity theft since they insure all
                                         banks. An identity thief will target
                                                                                Identity
on all your accounts, but you should
also keep track of your accounts.
                                         your bank accounts and if the get
                                         your money it will be upon the FDIC
                                                                                Theft
Keep tracking making sure the thief      to return it if it is insured. Make
cannot get any money and allow           sure you have all your bank ac-
the police to find the perpetrator.      counts in an insurable limit.
                                         Federal Laws:
                                         Fair and Accurate Credit Transac-
                                         tions of 2003
                                         Free Annual Credit Reports
                                         National Fraud Hotline
                                         Business Required to hide certain
                                         info
                                          SG Banks
                                          Locations:
                                          Atlanta
                                          Los Angeles
                                                                                SG Banks
                                          New York City                         Giving your money a home
                                          Phone: 123-456-7890
                                          Fax: 555-555-5555
                                                                                Tel:
                                          E-mail: sgbanks@gmail.com
                                                                                                             person or organization. Spyware has many
                                                       Types of Identity Theft
                                                                                                             forms and can be placed on any device. Spy-
                                                                                                             ware can see what you are doing on the com-
                                                       Phishing:     This method is when a scammer acts
                                                                                                             puter, what keys you are pressing, and it can
                                                       as a representative of a bank, member of the IRS,
                                                                                                             even link to a webcam if you have one. This
                                                       or a person from another organization . They will
                                                                                                             can allow someone to find all of your pass-
                                                       then send you an email, letter, or call you and ask
                                                                                                             words to sites that may contain your personal
                                                       for personal information.
                                                                                                             information and allow them to steal your iden-
                                                       Skimming: Skimming is when a person steals            tity. Find out more information about spyware
                                                       your credit or debit card numbers by using a scan-    from an associate or online.
                                                       ning device from a distance or on the card ma-
                                                       chine as you swipe your card.                         Protect Yourself
                                                                                                             There are many easy ways to prevent you
                                                       Pretexting: This is when the identity thief uses
                                                                                                             from having your identity stolen. These in-
                                                       false information to gather personal data from
                                                                                                             clude padlocking your credit file, never using
                                                       financial institutes, telephone companies, and
                                                                                                             you SSN as identification, checking your credit
                                                       other sources. They will then use the information
                                                                                                             report annually if not more often, never giving
                                                       to attack you or sell it for others to use.
                                                                                                             out personal information on calls unless self
                                                       Other Methods: There are many other ways for          initiated, only shop online on secure websites,
                                                                                                             not having your SSN printed on checks, and
What is Identity Theft                                 identity theft to occur including people changing
                                                       you address, hacking your computer, stealing mail,    only sharing your personal information with
                                                       and dumpster diving.                                  people and organizations your trust. There are
Identity theft is the stealing of someones personal
                                                                                                             many more steps that you can do to protect
information in order to exploit that persons money
                                                                                                             you even further. If you follow these steps
and identity. Identity theft is one of the most, if    Spyware
                                                                                                             you should be as safe as possible from the
not the most common crime taking place today.
                                                       Spyware is a software that anyone can download        crime of identity theft.
Many hackers around to world take advantage of
                                                       and is used in order to gather information on a
the carelessness of people who are not educated
on how to protect their personal information.
Identity theft occurs by hackers and other people
finding information such as names, credit card
numbers, and social security numbers. They then
use the information they have to make forged
documents. The documents can be shown to any-
one to make them believe they are the person of
whom the identity was stolen. They can then
make purchases, withdraw money, or commit
crimes in someone else's name.