Protecting Your Identity
Identity theft occurs when someone uses another person's personally identifiable information (PII) – such as date of birth, Personal Public Service (PPS) number, or credit card numbers – to commit fraud or other crimes. In almost all cases, identity theft victims experience some type of financial loss.
How does identity theft happen?
Now that we store and transmit most of our information digitally, there are a more ways a thief can obtain PII. An organization’s computer network can be compromised to collect thousands of records at once. However, some of the easiest attacks, such as phishing emails, involve tricking individuals into giving up their PII. Since tricking an individual is often easier than tricking a firewall, these types of attacks are extremely common.
How do I protect my identity?
The longer a criminal has access to personal information, the more damage they can do. A study conducted by the Bureau of Justice Statistics* showed that nearly half of identity theft victims were not aware of any suspicious activity on their accounts until they were contacted by their financial institution.
One of the most important steps is to monitor your accounts so that you know if your identity is compromised. Take advantage of free services provided by your bank, credit card companies, and other institutions that give you notifications when transactions occur. You can also subscribe to fee-based commercial products to monitor your accounts and credit rating.
Below are some warning signs of possible identity theft according to the Federal Trade Commission.**
- You receive notice that your information was compromised by a data breach at a company where you do business or have an account
- Withdrawals from your bank account you can’t explain
- Expected bills (or other mail) are not received
- Your checks or credit cards are declined
- Debt collectors call you about debts that aren’t yours
- Unfamiliar accounts or charges appear on your credit report
The following are some recommendations for securing your identity online.
BE ALERT FOR IMPERSONATORS AND SCAMS
Verify any organization that requests your personal or financial information. If you receive an unsolicited phone call or email requesting this information, be especially wary. Call an official listed number to verify the request.
LEARN TO IDENTIFY PHISHING EMAILS
Do not open files, click links, or download programs sent by strangers or that you were not expecting. Be cautious of emails that urgently require action or request you provide your personal information or passwords. Verify the request by contacting the person or organization from which the email appears to originate.
USE BEST PRACTICES FOR PASSWORD MANAGEMENT
Create strong, unique passwords and keep them to yourself. Even the strongest passwords are vulnerable if they are shared.
DON’T OVERSHARE ON SOCIAL MEDIA
Sharing too much personal information can enable an identity thief to learn enough about you to answer security questions for your accounts. You should never share your account numbers, Kent State ID, or any part of your Social Security Number. Be especially cautious about sharing information like your address or birthday as these pieces of information are frequently used to verify your identity
What to do if you suspect identity theft
If you think you are a victim of identity theft, there are several actions you should take immediately. Listed below are the Federal Trade Commission’s recommendations.
- Contact the companies where you know fraud occurred and request that they freeze your accounts
- Place a fraud alert on your credit accounts and request a credit report
- Report the theft to the Federal Trade Commission
- File a police report with your local police department