Identity Theft - Individual Identity Protection

Individual Identity Protection

The acquisition of personal identifiers is made possible through serious breaches of privacy. For consumers, this is usually a result of them naively providing their personal information or login credentials to the identity thieves as a result of being duped but identity-related documents such as credit cards, bank statements, utility bills, checkbooks etc. may also be physically stolen from vehicles, homes and offices, or directly from victims by pickpockets and bag snatchers. Guardianship of personal identifiers by consumers is the most common intervention strategy recommended by the US Federal Trade Commission, Canadian Phone Busters and most sites that address identity theft. Such organizations offer recommendations on how individuals can prevent their information falling into the wrong hands.

Identity theft can be partially mitigated by not identifying oneself unnecessarily (a form of information security control known as risk avoidance). This implies that organizations, IT systems and procedures should not demand excessive amounts of personal information or credentials for identification and authentication. Requiring, storing and processing personal identifiers (such as Social Security number, national identification number, drivers license number, credit card number, etc.) increases the risks of identity theft unless this valuable personal information is adequately secured at all times.

To protect themselves against electronic identity theft by phishing, hacking or malware, individuals are well advised to maintain computer security, for example by keeping their operating systems and web browser security fully patched against known security vulnerabilities, running antivirus software and being cautious in their use of IT.

To protect themselves against federal tax-identity theft, individuals are advised the following:

  • do not give out personal information (and the SSN in the case of the US) on the phone, fax or on social media platforms
  • use a shredder to destroy tax related documents after tax time is over and keep the necessary ones in a safe (thieves can look through the trash)
  • for taxpayers planning to e-file their tax returns, it is recommended to use a strong password. Afterwards, save the file to a CD or flash drive and keep it in a secure location. Then delete the personal return information from the computer hard drive
  • US citizens should show employers their Social Security card at the start of a job, but otherwise do not routinely carry the card or other documents that display their SSN. Additionally, it is recommended not to fill the Social Security number on medical forms and such documents (in case your wallet or pursed gets stolen)
  • only use secure websites while making online financial transactions (thieves access information you provide to an unsecured Internet site)
  • if working with an accountant, query him or her on what measures they take to protect your information

Identity thieves sometimes impersonate dead people, using personal information obtained from death notices, gravestones and other sources to exploit delays between the death and the closure of the person's accounts, the inattentiveness of grieving families and weaknesses in the processes for credit-checking. Such crimes may continue for some time until the deceased's families or the authorities notice and react to anomalies.

In recent years, commercial identity theft protection/insurance services have become available in many countries. These services purport to help protect the individual from identity theft or help detect that identity theft has occurred in exchange for a monthly or annual membership fee or premium. The services typically work either by setting fraud alerts on the individual's credit files with the three major credit bureaus or by setting up credit report monitoring with the credit bureaux. While identity theft protection/insurance services have been heavily marketed, their value has been called into question.

Read more about this topic:  Identity Theft

Famous quotes containing the words individual, identity and/or protection:

    Gossip, then, is content, a message about people; rumor is a process. It takes a bit of gossip and reshapes it, modifies it in some way, and passes it along from individual to individual in different ways.
    Jack Levin (b. 1941)

    One of the most highly valued functions of used parents these days is to be the villains of their children’s lives, the people the child blames for any shortcomings or disappointments. But if your identity comes from your parents’ failings, then you remain forever a member of the child generation, stuck and unable to move on to an adulthood in which you identify yourself in terms of what you do, not what has been done to you.
    Frank Pittman (20th century)

    We cannot spare our children the influence of harmful values by turning off the television any more than we can keep them home forever or revamp the world before they get there. Merely keeping them in the dark is no protection and, in fact, can make them vulnerable and immature.
    Polly Berrien Berends (20th century)