Tuesday, February 23, 2010

ID Theft Information For Businesses

Learn how to protect your business today!
Goto: http://tinyurl.com/y9dred8

Basic Self-Defense for Your Business.

“Personal information” is information that allows you to identify an individual customer or employee. This might include such things as the individual’s name, address, age, gender, identification numbers, income, employment, assets, liabilities, source of funds, payment records, personal references and health records.

If your business maintains people’s personal information, you must protect that information from theft or misuse. Here are some basic rules:

* If you don’t need it, don’t collect it. This seems obvious, but many businesses collect more information than they need. Here’s an example: Maybe your store wants to start emailing a newsletter to customers that have asked to receive it. So, you need each customer’s email address. But someone suggests that - since customers are filling out a form anyway - maybe you should get their name, address and phone number as well. Then someone else suggests that getting customers’ dates of birth would allow you to email a birthday card. So, instead of simply storing the information you currently need (the email address), you end up storing a lot more. The more you have, the more tempting it becomes to a thief and the more damaging it is to your customers if the information is stolen.
* If you need it once, don’t save it longer. Companies sometimes collect information that’s necessary to complete a single transaction, then compulsively file that information away (either in a paper file or in a computer file). For example, what happens to job applications for people you don’t hire? These contain all sorts of personal information, including the all-important social security number. Again, if you aren’t required by law to keep the information, and you seldom, if ever, use it, then get rid of it. If you don’t keep it, it can’t be stolen.
* If you’ve got it, but you don’t need to save it, dispose of it carefully. As we’ve pointed out in our general advice to consumers, a good deal of identity theft happens in the trash barrel or dumpster. Even the smallest business can afford an inexpensive paper shredder. Make sure you use yours to destroy customer or employee records.
* If you have to keep it, think security. First, make sure those paper records that contain personal information are kept under lock and key when they aren’t in use. Make sure computer terminals are password protected. Limit the eyeballs that have access to these records - only those who have an absolute need-to-know should have access to personal information. Don’t allow customers or others to wander around the private areas of your business.
* Don’t broadcast personal information. How often have you stood in line at an office or store behind someone who was being asked to give his/her social security number or telephone number or birth date? How many times have you watched a company’s employee pull up personal information on a computer screen that was visible to other customers? Or seen personal information on a file that was left open on a desk or counter. Instruct your employees to be sensitive to these issues. Turn computer screens so they can’t be viewed by anyone other than the operator. Instruct employees who need to have personal information to have customers jot that information down, not repeat it out loud where it can be overheard by others. Don’t put personal information like account numbers in billings or letters where that information is visible through windows in the envelope.
* Don’t use Social Security numbers as account numbers. While not common, this practice is just downright dangerous - to you and your customers.
* Don’t give out employee or customer information to anyone whose identity can’t be positively confirmed. Information thieves and stalkers tell authorities over and over how easily they were able to obtain all sorts of valuable information simply by calling small business owners or personnel departments and asking. Posing as government agencies or credit grantors or health insurance providers, these thieves have found that a well-crafted, believable story can often get past the best locking file cabinets or password-protected computers. Your organization should have very strict policies on when and how employee or customer information is shared.
* Locks and alarms are a real deterrent. If you’ve done everything we’ve suggested, you records — and your customers — will be more secure during business hours. Make sure you’re at least as secure when your business is closed. Make sure all vital records and offices are locked during non-business hours. Exterior doors should have deadbolt locks. Hinges on exterior doors should be secured to prevent removal. Exposed windows should be protected with bars, screens or shatter-proof glass. The business’ exterior should be adequately lighted from dark to dawn. Naturally, the business should be protected by an alarm system, preferably one that is monitored by the security company. Your business insurance company — or, in some cases, your local police - may be able to assist you with a security assessment.

Learn how to protect your business today!
Goto: http://tinyurl.com/y9dred8

Sunday, February 7, 2010

IRS Information Returns: An Identity Thief's Dream?

It’s a new year and you may already be thinking about filing your income tax return. Perhaps you have received your tax forms in the mail from the Internal Revenue Service (IRS). You may be in a hurry to file if you are expecting a refund. Before you file, we want you to understand about IRS “information returns”. These important documents are mailed to you not by the IRS, but by other organizations.

An “information return” is used to report certain income and financial transactions to the IRS. A copy must be mailed to the taxpayer. Most people are familiar with W-2 Forms, which employers use to report wages and tips of employees. However, there are many other types of income that must be reported on other IRS information returns. For example, there are over 30 variations of IRS Form 1099. You may receive a Form 1099 if you had non-wage income such as unemployment benefits, Social Security benefits, interest, dividends, pensions, death benefits, or consulting fees. (Read the IRS's Guide to Information Returns for a complete list.)

Issuers of information returns generally must mail copies to taxpayers by January 31, so you can expect to receive them in your mailbox by early February. Unfortunately, information returns are likely to contain your full Social Security number.

Until 2009, the IRS required that all information returns contain a full Social Security number. A voluntary IRS pilot project will allow businesses to truncate (shorten to 4 digits) Social Security numbers on some information returns. (Read the IRS's 2009/93 Notice on the pilot program.) In implementing the pilot program, the IRS notes: “A person’s identifying number is sensitive personal information. A risk exists that this information could be misappropriated from a payee statement and misused in various ways, such as to facilitate identity theft. In an effort to minimize this risk, this notice creates a pilot program allowing truncation of individual identifying numbers on certain paper payee statements.”

The IRS pilot project is permissive. Businesses are not required to truncate Social Security numbers. Furthermore, the pilot project does not include IRS Form W-2, the most commonly used information return.

Therefore you can expect to receive in your mail at least some information returns that will contain your full Social Security number. Your Social Security number is the key to identity theft. For this reason, an IRS information return can be an identity thief’s dream come true. In fact, some information returns may contain not only your full Social Security number, but your bank or other financial institution account number(s)—the perfect combination for identity theft.

So, what can you do to protect yourself from your IRS information returns falling into the wrong hands? Here are some suggestions:

* Use a mailbox that locks or consider having your mail sent to a Post Office Box.
* Try to retrieve your mail as soon as possible after it has been delivered. Never leave it in your mailbox overnight.
* If you go on vacation, have your mail held at the Post Office, or have a trusted neighbor retrieve it.
* If you have moved during the year, notify any payers of your new address. Do not rely on the Postal Service’s change of address service.
* If you share a mailbox with roommates, make sure that you (not your roommates) receive all mail that is addressed to you.

Paying taxes can be a chore. Don’t let it also be an opportunity for identity theft.

Thursday, August 13, 2009

FAA Hacked - What's Next?


"Hackers breached the network of the Federal Aviation Administration earlier this year and gained access to sensitive records, according to an aviation trade publication. The FAA breach has prompted President Obama to order an immediate review of federal cyber security."

The hackers got access to the personnel files of 45,000 FAA workers.

This is not good because now they know who these people are and can direct either financial or total identity theft at the. They now know whom to attack with hacks on their personal computers which for the most part will not be well secured like most computers in the USA.

I was just at the FAA web site. Not a word on there.

Worst case scenario?

They may now be able to "clone" the identity of some of these critical workers, duplicate their security pass information, which would give them access to the air traffic system. Moreover it will make it possible for them to forge ID cards and get past airport security as FAA employees.

why did Clinton and Bush do so little to secure cyber space?

Why are we spending hundreds of billions on hardware and airplanes when the next war will clearly be a cyber war?

Why is the mainstream media reporting so little about this? Is it because they don't understand it or because it's so frightening they'd rather go the swine flu route as a way to scare the pubic?

"The Silent Crime"

Michael McCoy author of "The Silent Crime" gives talk in Dallas, Texas.
See additional identity theft information at www.thesilentcrime.com

http://www.youtube.com/mccoymichael

What you should know about Identity Theft.

We live in an information-oriented society. Technology allows us to do business and make transactions literally in a matter of seconds. This abundance of information has given rise to a new crime - identity theft. In fact, according to a 2003 release from the Federal Trade Commission, approximately 27 million Americans have fallen prey to identity thieves since 1999. Each year that number climbs higher and higher. In 2003 alone, almost 10 million people in the United States reported being victimized by identity bandits.
So what does that mean? Someone has stolen your credit card – your credit card company can help you with that, right?
Well, according to the FTC, almost 60% of identity theft issues don’t pertain to your existing credit card accounts. Identity theft can occur as a result of new lines of credit being opened in your name either through credit cards or bank loans, as well as phone/utility fraud and even employment related fraud. Because we are susceptible through so many avenues in our daily life, we are all at risk.
What can you do? Where would you turn if you found yourself in this situation? Would you know where to start to clear your name? Well, now you don’t have to worry about what to do as we have the answer.
As you already know, Pre-Paid Legal Services, Inc. is a pioneer of the legal services industry. With more than 30 years of experience in providing legal rights protection to our members, we have now teamed with Kroll., the world’s largest risk consulting company.
For more than 30 years, Kroll has helped companies, government agencies and individuals reduce their exposure to risk and capitalize on business opportunities. Kroll is an operating unit of Marsh Inc., the risk and insurance services subsidiary of Marsh & McLennan Companies, Inc., the global professional services firm. With offices in more than 60 cities in the United States and abroad, Kroll can operate and restructure businesses; scrutinize accounting practices and financial documents; gather and filter electronic evidence for attorneys; recover lost or damaged data from computers and servers; conduct in-depth investigations; screen domestic and foreign-born job candidates; protect individuals, and enhance security systems and procedures. Over the last three years, Kroll has developed a unique solution for victims of identity theft. This new service is now available to Pre-Paid Legal members through the IDENTITY THEFT SHIELD benefit.


What does this benefit provide our members?
The Identity Theft Shield gives you easy access to the resources you need to understand your credit ratings and to fight back if an identity thief threatens your financial standing. This benefit is designed to alert you to suspicious account activity, and to restore any resulting damage to your credit history.

1. Credit Report Through Experian
Make sure your financial records are accurate.

Your credit standing is one of your most important financial assets. It not only affects your ability to get credit, it often dictates the interest rate at which you can borrow. It can also affect your ability to purchase insurance or to find employment. Some insurance companies and prospective employers use your credit rating to gauge your sense of responsibility.

Experts recommend you review your credit report regularly. The Identity Theft Shield makes it easy. Members are en- titled to an up-to-date credit report from Experian at no additional charge. Personal Credit Score and Analysis from Experian
Know your credit score . . . and how it affects your ability to borrow.
Your credit score is derived from the information in your credit report. This score is used by lenders to determine your creditworthiness. The higher the number, the better your chance of being approved for the credit you want.
A detailed analysis of your Personal Credit Score will be included with your Credit Report. You can use this analysis to evaluate your current credit standing.

2. Continuous Credit Monitoring Through Experian
Learn of suspicious activity before your credit is ruined.

A professional thief can assume your identity in just a few hours. But it can take years for you to repair your credit standing. Early detection is key to minimizing the damage caused by thieves who steal you name.
With your Identity Theft Shield membership, your credit files will be monitored through Experian daily. Suspicious activity will be brought to your attention, providing you with early detection. You’ll receive prompt notice if any new accounts are opened in your name . . . or if negative notations are added to your credit report.

3. Fraud Restoration Service
Get personal assistance and advice from experts.

Any discrepancy in your credit report should be addressed at once. Call our Customer Service Department at the designated Identity Theft Shield number and explain your concerns. If it is identity theft, our fraud investigators will assist you every step of the way. A Fraud Restoration package with complete and detailed materials, aids, and instructions will be rushed to you.

If you sign a Limited Power of Attorney, you will be entitled to Enhanced Restoration Services. Kroll will work with you to determine the extent of the fraud in your credit and regarding your identity. On your behalf, Kroll will issue fraud alerts to the three major credit repositories, the Federal Trade Commission, the Social Security Administration, and the United States Postal Service. Kroll will work with the bureaus, creditors, and collection agencies to restore your credit accuracy with regard to your identity theft issues. If necessary and reasonable, Kroll will work with law enforcement, the department of motor vehicles, and other organizations to resolve your identity theft issues.

If you decline the Limited Power of Attorney, you will receive Basic Consulting Services. Kroll will work with you to determine the extent of the fraud in your credit and regarding your identity. Kroll will provide you with contact information and procedures for the organizations you will need to work with. Kroll will provide sample letters and forms and be available to you through a toll-free phone number for assistance and advice throughout the process of restoring your identity.
Now, it is important to understand any identity theft that occurred prior to the membership enrollment or any situations relating to a business identity are not covered. Identity Restoration will not apply if the identity theft is the result of a dishonest, criminal, malicious, or fraudulent act you, your spouse, or child participated in, directed, or had knowledge of. Restoration services will not be provided for a preexisting, known stolen identity event. You must be an active, paid member to receive restoration services. Plan benefits do not cover financial losses arising from the identity theft.

Did you know, that on average, $1,200 in out-of-pocket expenses to clear their names? With Pre-Paid Legal’s IDENTITY THEFT SHIELD, the cost of combating identity theft is much less. For just $12.95 a month [$9.95 along with the Pre-Paid Legal membership], IDENTITY THEFT SHIELD members have the added security of knowing they have someone to fight the battle for them. And the best thing is, this monthly fee provides benefits to you, the member, and your spouse.

Reports on identity theft are everywhere - television, newspapers, magazines, talk shows, etc. Now that you know this benefit is available, doesn’t it make sense to have this sort of coverage? Imagine the peace of mind you would have knowing you and your spouse would have access to all of these services if you found yourself to be an identity theft statistic?

Contact Sue, Independent Associate, to sign up for your Identity Theft membership by calling 603-491-0835. Don’t wait until it is too late - do it today!