Tuesday, February 28, 2006

Identity Theft Glossary

Click on banner to go to ID Watchdog.

Understanding the many terms related to Identity Theft can be difficult. We have put together an Identity Theft Glossary to help you understand some key terms used when talking about Identity Theft.

Account Takeover: Account takeover is what an identity thief does, using your personal information to coerce a financial institution into giving him full control over your account.

Affidavit of Factual Innocence: An Affidavit of Factual Innocence is a legal document issued by a court, stating that you’re innocent. You may need one of these if you’ve been wrongfully arrested as a result of identity theft.

Affidavit of Forgery: An Affidavit of Forgery is a legal document that states that a certain signature is not yours, but a forgery.

Butterfly Pouch Laminate: Butterfly pouch laminate is a type of plastic that identity thieves use to make a counterfeit license. This plastic allows the thieves to print a logo or official seal on it, which is then laminated onto a driver’s license.

Check Reporting Agencies: These agencies report on consumer’s check writing histories, specifically highlighting incidents of fraud and bounced checks. Lending institutions use these reports to determine whether or not to open checking accounts for individuals.

Check washing: Check washing is another method identity thieves use to steal from you. They dip your check in acetone, which washes the ink off so they can write it for a higher amount.

Consumer Statement: A consumer may add a statement to their credit report explaining certain adverse situations appearing on their credit report including ID Theft. These statements are seldom considered in financial transactions and have no effect on an individual’s credit score.

Credit reporting agency (CRA): There are three major credit reporting agencies: Experian, Equifax and TransUnion. They keep track of your credit records, and issue credit reports to those who have a legitimate reason for needing to know your credit history.

Creditworthiness: Creditworthiness is the likelihood that you’ll pay back a loan, based on your past credit history. An identity thief uses your creditworthiness as a weapon against you.

Data Encryption: The reversible transformation of data from the original (the plaintext) to a difficult-to-interpret format as a mechanism for protecting its confidentiality, integrity and sometimes its authenticity. Most web sites employ data encryption to protect your information during e-commerce.

Dumpster diving: Dumpster diving is another method identity thieves use to obtain your personal information. They go through garbage bins, looking for people’s personal information. That’s why it’s very important to always shred your important documents before throwing them out.

Fair Credit Reporting Act (FCRA): The FCRA is a U.S. federal law that gives everyone the right to see what the CRA's have on file in their credit report. It also outlines permissible purposes for obtaining a periodic free copy of a credit report. And if there are any inaccuracies found, they have the right to dispute them.

Fraud alert: A fraud alert can be put on your credit report at the CRA's if and when you become an identity theft victim. It’s intention is to let everyone know that someone may be trying to obtain new credit in your name, so the process will be very closely scrutinized. In practice, however, this safeguard accomplishes very little as it is often ignored or missed.

Identity fraud: Identity fraud differs from identity theft in that the thief uses personal information that he’s made up, rather than information he’s stolen from a real person.

Identity theft: Identity theft, one of the worst crimes in the world, occurs when a thief uses someone else’s personal information as his own, thereby creating a new identity of an existing person. The new identity then applies for any form of credit he can get. The most common things an identity thief steals are: your name and address, your Social Security (Insurance) Number, your driver’s license number, your employee ID number, your mother’s maiden name, and any account information, including bank accounts and credit accounts.

Identity Theft Passport: Identity Theft Passport programs, are available in a few states such as Ohio and Virginia. The “Passport” is a method of demonstrating to law enforcement and creditors that their identity has been stolen, and of rehabilitating their credit history and identifying any fraudulent criminal charges.

Mail fraud: Mail fraud is a method identity thieves use to obtain your personal information. They steal your mail, which may include pre-approved credit card applications or any other information that will help them get credit in your name.

Opt-out: When you opt-out, you notify a financial institution, insurance company, CRA, or any other company that sells your personal information, that you don’t want your information shared. This is your right, and it protects you from unwanted junk mail and phone calls, not to mention identity theft.

Permissible Purposes: Permissible purposes are guidelines set out in the FCRA that outline the allowable reasons for requesting a copy of a credit report. One of those reasons is if you’re a victim of identity theft.

Phishing: The act of tricking someone into giving them confidential information or tricking them into doing something that they normally wouldn’t do or shouldn’t do. For example: sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

PIN (Personal Identification Number): A PIN is your unique personal password that you punch in to an ATM to alert the machine that it’s actually you depositing or withdrawing money. Never write down your PIN where it can be stolen by an identity thief.

Consumer Sentinel Database: Consumer Sentinel is a unique investigative tool, available to law enforcement officials, that allows its members secure, online access to hundreds of thousands of consumer complaints dealing with internet, telemarketing and other types of distant selling fraud.

Shoulder Surfing: Shoulder surfing is the name given to the procedure that identity thieves use to find out your PIN. They either hang around close to the ATM, or wherever you may be entering your PIN, or they can even watch from a distance, using binoculars. Once they have your PIN, you’re in trouble.

Skimming: Skimming is another method identity thieves use to get your personal information. It’s usually done by an employee of a restaurant, a gas station, or any other place where you swipe your card. They have little swiping tools of their own, which they use to quickly swipe your card. A good way to prevent skimming is to always swipe your own card.

Terrorist Watch List: The U.S. master terror watch list is used to stop suspected terrorists from entering the country. Many terrorist groups have been known to use ID Theft as a method to elude authorities and enter the country.

Truncated Credit Card Number:
A truncated credit card number is what you see on many receipts and other papers that have your credit card number on them. All the digits, except for the last four, are x’d out. This is done to protect you from identity theft.

Street term used to describe meth-amphetamine addicts. These addicts often form ID Theft rings to finance their illegal drug habits. Tweakers are drawn to ID Theft because of its relatively low conviction rate and because of the hours they can spend falsifying documents while “on a tweak”.

Click here for Identity Theft
Articles and Resources

Identity Theft Resource Center

My Photo

Behavior Management Expert and Maximizing Your Potential Mentor™ Etienne A. Gibbs is a life-observing author, engaging talk show host, humorous speaker, and successful trainer who teaches small business owners, managers, and employees how to speak, think, and perform in ways that will help them shine. In the end, they maximize their critical thinking, speaking, and management skills.

Powered by Blogger

Blogarama - The Blog Directory

Blog Flux Directory

Copyright © 2005,
Etienne A. Gibbs, MSW.
All rights reserved.

Contents maintained by
Etienne A. Gibbs,
The Master Blog Builder