Most Popular Fraud Schemes

Fraud Schemes
Fraud Schemes

Identity Theft

Identity theft occurs when someone assumes your identity to perform a fraud or other criminal act. Criminals can get the information they need to assume your identity from a variety of sources, including by stealing your wallet, rifling through your trash, or by compromising your credit or bank information. They may approach you in person, by telephone, or on the Internet and ask you for the information.

The sources of information about you are so numerous that you cannot prevent the theft of your identity. But you can minimize your risk of loss by following a few simple hints.

Tips for Avoiding Identity Theft:

  • Never throw away ATM receipts, credit statements, credit cards, or bank statements in a usable form.
  • Never give your credit card number over the telephone unless you make the call.
  • Reconcile your bank account monthly, and notify your bank of discrepancies immediately.
  • Keep a list of telephone numbers to call to report the loss or theft of your wallet, credit cards, etc.
  • Report unauthorized financial transactions to your bank, credit card company, and the police as soon as you detect them.
  • Review a copy of your credit report at least once each year. Notify the credit bureau in writing of any questionable entries and follow through until they are explained or removed.
  • If your identity has been assumed, ask the credit bureau to print a statement to that effect in your credit report.
  • If you know of anyone who receives mail from credit card companies or banks in the names of others, report it to local or federal law enforcement authorities.

For more information:
Identity Theft webpage

Share This Article
Follow:
FraudsWatch is а site reporting on fraud and scammers on internet, in financial services and personal. Providing a daily news service publishes articles contributed by experts; is widely reported in thе latest compliance requirements, and offers very broad coverage of thе latest online theft cases, pending investigations and threats of fraud.
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Exit mobile version