“Do you like your tan? Got plenty of sun on that Caribbean cruise. First class tickets to Florida and back! Nope, not an airline upgrade. 5 star service every time, honey! Hotels , restaurants, theme parks… Tell me! Look… I took pictures with my new cell phone! Hey, let me know when you’re free for a drive: it’s a 2005 sporty model, fully loaded! , Chad E. Charlatan, going to the top! No, no job. But I didn’t pay anything. I don’t care who Mrs. Donna Knowe-Bedter is, but it’s not my fault if she doesn’t keep an eye on her. excerpts from credit cards. Someday I’ll thank you for being so rich!”

In a perfect world, everyone is honest, with good intentions.

We do not live in a perfect world.

Identity thieves are supreme opportunists. Do you read the news? Hackers can break into corporate computer systems and steal information about clients and customers. Skimmers can be attached to credit card readers and used to store bank and credit card numbers. Identity thieves can pose as employers, landlords, or even utility company representatives to obtain your personal and financial information. Other thieves may use your employers’ authorized access to obtain credit reports or other information. Databases and other records can be stolen from employers; thieves can bribe co-workers who may have access to important data. They can steal your mail and accept offers for credit cards, tax information, and other documents. “Trash diving” involves digging through the trash to find information such as bank statements or credit card information. And there is always the old method of just stealing your wallet or purse.

New ways to steal your identity appear frequently. Phishing became prominent in 2003 and 2004: Well-designed emails and websites convince victims to provide information. The emails look legitimate, but release any information and the nightmare begins. The cost? Damage now exceeds a billion dollars per year. How’s that for a nightmare?

Thieves obtain new phone service, car loans, and credit cards using stolen information. Victims may find their mailing addresses changed and their credit ruined. Identity thieves may file for bankruptcy on behalf of victims to escape debt and empty accounts by forging checks and debit cards. They can also open bank and credit card accounts using the names of their victims.

Your name may be given to the police during an arrest. If the real thief is released and does not arrive for a short time, he may be arrested. And the out-of-pocket costs to clean up the mess can be staggering.

Be smart, capiche? Careful planning can prevent the pain of a stolen ID.

* Buy a shredder. Shred documents with your name, personal information such as social security numbers, phone numbers, addresses, dates of birth, credit applications, financial documents, and medical and insurance information. Entire documents can be used against you. The confetti can’t.

* Get your credit report. Check it out. Please handle this tool carefully and use it for your protection. It’s worth it.

* Secure your computer against online theft. Your PC is a gateway to private information. NEVER leave an online connection open if you are away from your computer. Use a firewall.

* Change passwords frequently. Use passwords with numbers and symbols that are easy for you to remember, but hard for someone else to crack.

* Some programs allow the PC to fill out forms automatically. Convenient, but your PC can be hacked for information. Disable this feature.

* Call your credit card companies and make sure there are no surprises on any of your credit cards, then ask for restrictions to be placed on each card. Example: You can apply without phone charges or limits on individual purchases. Violation of these restrictions stops the transaction. Nightmare averted.

* Secure mailbox? Stealing mail is one of the easiest ways to steal your ID. Get a USPS-approved mailbox that can be locked.

* Be extremely picky when giving out your Social Security Number. Resist giving out such personal information. See the Privacy Act of 1974. Homework: Go to http://www.faqs.org/faqs/privacy/ssn-faq/ on the web for more information.

* Other information, such as your mother’s maiden name, seems harmless; those items are often used as identity verification. Don’t give it Keep to yourself, and stay educated.

Having your ID stolen is a terrifying experience and consumes a lot of time, money and energy. For your own good, your sanity, and your safety, take a few minutes to follow the tips above. Protect yourself the next time someone says, “…and your name is…?”

Leave a Reply

Your email address will not be published. Required fields are marked *