If You
Are A The
Victim FDIC
If you find out you are a victim of The FDIC is is a United States Gov-
identity theft the first thing you ernment Corporation providing de-
should do is file a police report with posit insurance to depositors in US
your local police department. Next, banks. The FDIC is related to iden-
you should contact all your credi-
tors. They should place fraud alerts
tity theft since they insure all
banks. An identity thief will target
Identity
on all your accounts, but you should
also keep track of your accounts.
your bank accounts and if the get
your money it will be upon the FDIC
Theft
Keep tracking making sure the thief to return it if it is insured. Make
cannot get any money and allow sure you have all your bank ac-
the police to find the perpetrator. counts in an insurable limit.
Federal Laws:
Fair and Accurate Credit Transac-
tions of 2003
Free Annual Credit Reports
National Fraud Hotline
Business Required to hide certain
info
SG Banks
Locations:
Atlanta
Los Angeles
SG Banks
New York City Giving your money a home
Phone: 123-456-7890
Fax: 555-555-5555
Tel:
E-mail: sgbanks@gmail.com
person or organization. Spyware has many
Types of Identity Theft
forms and can be placed on any device. Spy-
ware can see what you are doing on the com-
Phishing: This method is when a scammer acts
puter, what keys you are pressing, and it can
as a representative of a bank, member of the IRS,
even link to a webcam if you have one. This
or a person from another organization . They will
can allow someone to find all of your pass-
then send you an email, letter, or call you and ask
words to sites that may contain your personal
for personal information.
information and allow them to steal your iden-
Skimming: Skimming is when a person steals tity. Find out more information about spyware
your credit or debit card numbers by using a scan- from an associate or online.
ning device from a distance or on the card ma-
chine as you swipe your card. Protect Yourself
There are many easy ways to prevent you
Pretexting: This is when the identity thief uses
from having your identity stolen. These in-
false information to gather personal data from
clude padlocking your credit file, never using
financial institutes, telephone companies, and
you SSN as identification, checking your credit
other sources. They will then use the information
report annually if not more often, never giving
to attack you or sell it for others to use.
out personal information on calls unless self
Other Methods: There are many other ways for initiated, only shop online on secure websites,
not having your SSN printed on checks, and
What is Identity Theft identity theft to occur including people changing
you address, hacking your computer, stealing mail, only sharing your personal information with
and dumpster diving. people and organizations your trust. There are
Identity theft is the stealing of someones personal
many more steps that you can do to protect
information in order to exploit that persons money
you even further. If you follow these steps
and identity. Identity theft is one of the most, if Spyware
you should be as safe as possible from the
not the most common crime taking place today.
Spyware is a software that anyone can download crime of identity theft.
Many hackers around to world take advantage of
and is used in order to gather information on a
the carelessness of people who are not educated
on how to protect their personal information.
Identity theft occurs by hackers and other people
finding information such as names, credit card
numbers, and social security numbers. They then
use the information they have to make forged
documents. The documents can be shown to any-
one to make them believe they are the person of
whom the identity was stolen. They can then
make purchases, withdraw money, or commit
crimes in someone else's name.