<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3568910419673544419</atom:id><lastBuildDate>Fri, 25 Oct 2024 08:07:16 +0000</lastBuildDate><category>identity theft</category><category>ID theft</category><category>data breach</category><category>lifelock</category><category>identity safeguards</category><category>experian</category><category>social security number</category><category>FTC</category><category>credit freeze</category><category>credit report</category><category>debix</category><category>equifax</category><category>id experts</category><category>lost data</category><category>SSN</category><category>annualcreditreport.com</category><category>credit bureaus</category><category>debt collections</category><category>fraud alert</category><category>id safeguards</category><category>id theft protection</category><category>identity recovery</category><category>transunion</category><category>truecredit</category><category>&quot;maxed out&quot;</category><category>AARP</category><category>ATM card fraud</category><category>FOSE</category><category>FTC email scam</category><category>Fair Credit Reporting Act</category><category>Gramm-Leach-Bliley Act</category><category>HBR</category><category>Independent Risk Analysis</category><category>Kazaa</category><category>Limewire</category><category>PHI</category><category>PII</category><category>SEC</category><category>active duty alert</category><category>bogus email</category><category>check collection</category><category>clark howard</category><category>class action</category><category>collection agencies</category><category>credit card fraud</category><category>credit card reader</category><category>credit monitoring</category><category>credit report freeze</category><category>credit score</category><category>credit union scam</category><category>data  breach</category><category>degaussing</category><category>fair debt collections practices act</category><category>fdcpa</category><category>file sharing</category><category>fraud alerts</category><category>fraudstop</category><category>free credit report</category><category>free credt reports</category><category>gap security breach</category><category>hard drive replacement</category><category>iapp</category><category>id theft recovery</category><category>identity fraud</category><category>identity recovery advocate</category><category>identity theft; data breach</category><category>identity theft; dave ramsey;</category><category>information war</category><category>intersections</category><category>itunes</category><category>lawsuit</category><category>loyola university</category><category>mayor bloomberg</category><category>millitary identity theft</category><category>msn money</category><category>operational risk</category><category>opt-out</category><category>personal information</category><category>phishing</category><category>ponemon institute</category><category>privacy times</category><category>red tape chronicles</category><category>skimming</category><category>state of ohio</category><category>stolen mail</category><category>synthetic id fraud</category><category>terri cullen</category><category>todd davis</category><category>trustedid</category><category>us secret service</category><category>utica college</category><category>vishing</category><category>warranty hard drive replacement</category><title>Identity Theft Prevention &amp; Recovery</title><description></description><link>http://idsafeguards.blogspot.com/</link><managingEditor>noreply@blogger.com (Doug Pollack)</managingEditor><generator>Blogger</generator><openSearch:totalResults>52</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-5284093673047274858</guid><pubDate>Tue, 29 Apr 2008 21:08:00 +0000</pubDate><atom:updated>2008-12-09T21:11:41.349-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach</category><category domain="http://www.blogger.com/atom/ns#">id experts</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><title>Moving ...</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEQ44Ye5Wmpcsa9Y5erOj3sPeEYA5cfjzJf63ggcJLM69War3fyCwph9MPt5ak0Bv-2yHHsl8tVSsV_-4TQCDyFJ7IJQbgon85Dv5RFMDeUq7x1haOF3LXplL2o7exlAfOEGNFnoV5YWM/s1600-h/ID-Experts-logo.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEQ44Ye5Wmpcsa9Y5erOj3sPeEYA5cfjzJf63ggcJLM69War3fyCwph9MPt5ak0Bv-2yHHsl8tVSsV_-4TQCDyFJ7IJQbgon85Dv5RFMDeUq7x1haOF3LXplL2o7exlAfOEGNFnoV5YWM/s320/ID-Experts-logo.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5194777613025145474&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;by Doug Pollack&lt;br /&gt;&lt;br /&gt;Our &lt;a href=&quot;http://blog.idexpertscorp.com&quot;&gt;ID Experts blog&lt;/a&gt; is moving to a new home. Please check out the latest in identity theft and data breach news, advice and other happenings at our new address www.blog.idexperts.corp.com. &lt;br /&gt;&lt;br /&gt;We are also sponsoring a new, informational &lt;a href=&quot;http://www.databreachwatch.org&quot;&gt;data breach news site&lt;/a&gt; providing articles and news events specifically focused on data breaches. Please visit often or subscribe to this site at www.databreachwatch.org.&lt;br /&gt;&lt;br /&gt;Both sites will continue to provide you with current and helpful information in the areas of identity theft and data breaches.</description><link>http://idsafeguards.blogspot.com/2008/04/moving.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEQ44Ye5Wmpcsa9Y5erOj3sPeEYA5cfjzJf63ggcJLM69War3fyCwph9MPt5ak0Bv-2yHHsl8tVSsV_-4TQCDyFJ7IJQbgon85Dv5RFMDeUq7x1haOF3LXplL2o7exlAfOEGNFnoV5YWM/s72-c/ID-Experts-logo.jpg" height="72" width="72"/><thr:total>102</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-4174572781022883598</guid><pubDate>Fri, 04 Apr 2008 00:30:00 +0000</pubDate><atom:updated>2008-12-09T21:11:41.866-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach</category><category domain="http://www.blogger.com/atom/ns#">FOSE</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><category domain="http://www.blogger.com/atom/ns#">Independent Risk Analysis</category><category domain="http://www.blogger.com/atom/ns#">operational risk</category><title>Independent Risk Analysis Presented at FOSE Conference April 1, 2008</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEib4Mx1BXpPukpdgg76SdNCPZzczLA7XMu-9UkMja-qWAuqWILJvxlItIxGkwUgBEza8t-sEUMbmig6M8ufd15YnMTFF77QKp_d6wXfDmGEZB9lJglEWwBFAbLzJXxFfCI6NvgH95CqWRbI/s1600-h/FOSE.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEib4Mx1BXpPukpdgg76SdNCPZzczLA7XMu-9UkMja-qWAuqWILJvxlItIxGkwUgBEza8t-sEUMbmig6M8ufd15YnMTFF77QKp_d6wXfDmGEZB9lJglEWwBFAbLzJXxFfCI6NvgH95CqWRbI/s320/FOSE.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5185145258496929282&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Rick Kam&lt;br /&gt;April 3, 2008&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;This conference is one of the largest IT conferences for public agencies with attendance approaching 20,000 professionals.  Leading educators and technology solution providers focused on security, privacy, and &quot;green&quot; IT solutions. &lt;br /&gt;&lt;br /&gt;Keynote speakers from Google, Sun Microsystems and others talked  about the future of computing and how public agency IT professionals can create a more productive and secure computing environment. &lt;br /&gt;&lt;br /&gt;I presented for &lt;a href=&quot;http://idexpertscorp.com&quot;&gt;ID Experts&lt;/a&gt; on the topic of how an &quot;Independent Risk Analysis&quot; provides public agencies a more effective solution to mitigate risk when they have a data breach (i.e. when the best security measures fail, what next).  Highlights from my presentation included:&lt;br /&gt;&lt;br /&gt;1. The requirements that prompted congress to enact public law requiring independent risk analysis&lt;br /&gt;2. When an agency would implement an independent risk analysis&lt;br /&gt;3. What are the benefits of doing an independent risk analysis&lt;br /&gt;4. How to initiate an independent risk analysis&lt;br /&gt;5. How to be better prepared before an agency has a breach&lt;br /&gt;&lt;br /&gt;ID Experts was one of two companies awarded a government contract to provide Independent Risk Analysis to public agencies in the U.S.  This was a great opportunity for us to explain to public agencies how our solution helps them assess and certify the level of risk for an affected breach population and develop an effective risk mitigation plan.</description><link>http://idsafeguards.blogspot.com/2008/04/independent-risk-analysis-presented-at.html</link><author>noreply@blogger.com (Rick Kam)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEib4Mx1BXpPukpdgg76SdNCPZzczLA7XMu-9UkMja-qWAuqWILJvxlItIxGkwUgBEza8t-sEUMbmig6M8ufd15YnMTFF77QKp_d6wXfDmGEZB9lJglEWwBFAbLzJXxFfCI6NvgH95CqWRbI/s72-c/FOSE.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-6564211826142429432</guid><pubDate>Tue, 01 Apr 2008 23:59:00 +0000</pubDate><atom:updated>2008-12-09T21:11:42.123-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">class action</category><category domain="http://www.blogger.com/atom/ns#">lawsuit</category><category domain="http://www.blogger.com/atom/ns#">lifelock</category><title>LifeLock Class Action Lawsuits</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiicR4BagU4UWQk_QMuKShP4pbhO5uee0ogrVyIvmqZlcoOS2s_0Cysps3cZs_1YQXpgjBs7Uujiay49uzhIjpXwk9NuTBNYYgmY_hjQrsll45c0_g_JKkFTQDi583inWaFnHt-P-dOsU/s1600-h/Sec_Header_CNBCTV_US.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiicR4BagU4UWQk_QMuKShP4pbhO5uee0ogrVyIvmqZlcoOS2s_0Cysps3cZs_1YQXpgjBs7Uujiay49uzhIjpXwk9NuTBNYYgmY_hjQrsll45c0_g_JKkFTQDi583inWaFnHt-P-dOsU/s320/Sec_Header_CNBCTV_US.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5184424497797618834&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;This past week, there were two class action lawsuits filed against LifeLock, one in its home state of Arizona and one in New Jersey. Following on a recent lawsuit filed against LifeLock by Experian, one of three US credit bureaus, these class action lawsuits also assert that LifeLock is engaged in deceptive advertising relative to the level of protection provided by their service against identity theft. The LifeLock offering depends almost entirely upon the placement of perpetual fraud alerts as the means for protecting their subscribers from identity theft.&lt;br /&gt;&lt;br /&gt;As noted by David Paris, an attorney involved in this matter, in an article on the CNBC website titled &quot;&lt;a href=&quot;http://www.cnbc.com/id/23884961/&quot;&gt;N.J. Class Action Lawsuit Filed Against LifeLock Alleging Deceptive Marketing Regarding Limited Level of Protection Against Identity Theft&lt;/a&gt;&quot;:&lt;br /&gt;&lt;br /&gt;&quot; &#39;While fraud alerts may be effective in limited instances, they certainly cannot provide the comprehensive identity protection that LifeLock deceptively advertises,&#39; said Paris. &#39;For instance, fraud alerts cannot stop the use of existing account numbers, and contrary to LifeLock&#39;s advertisements, lenders are certainly not required to contact the subscriber before extending credit to a potential identity thief.&#39; &quot; &lt;br /&gt;&lt;br /&gt;The article and comments from Mr. Paris also address the alleged deceptive nature a severe limitations on the highly publicized $1MM LifeLock Guarantee:&lt;br /&gt;&lt;br /&gt;&quot;According to the Complaint, LifeLock also misleads subscribers by advertising its $1 million service guarantee. &#39;Potential LifeLock subscribers are enticed by the &#39;safety net&#39; of what appears to be a one-million dollar insurance policy against any losses sustained as a result of identity theft,&#39; said Paris. &#39;In actuality, once you get beyond the limitations and disclaimers, you find that the guarantee is limited to fixing failures in LifeLock&#39;s services and paying third-parties to attempt to restore subscriber losses.&#39; &quot;&lt;br /&gt;&lt;br /&gt;Hopefully these lawsuits will help bring visibility and clarity to consumers as to the differences in identity theft protection services. Most services, including those provided by the company that sponsors this blog, &lt;a href=&quot;http://www.idexpertscorp.com&quot;&gt;ID Experts&lt;/a&gt;, do not rely on fraud alerts as a primary or sole means of protection, nor do they make questionable or misleading large dollar guarantees. It is unfortunate that brash marketing tactics have made it difficult for consumers to make an informed product decision based on the facts related to differences in these services.</description><link>http://idsafeguards.blogspot.com/2008/04/lifelock-class-action-lawsuits.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiicR4BagU4UWQk_QMuKShP4pbhO5uee0ogrVyIvmqZlcoOS2s_0Cysps3cZs_1YQXpgjBs7Uujiay49uzhIjpXwk9NuTBNYYgmY_hjQrsll45c0_g_JKkFTQDi583inWaFnHt-P-dOsU/s72-c/Sec_Header_CNBCTV_US.jpg" height="72" width="72"/><thr:total>61</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-1727950652109393582</guid><pubDate>Wed, 26 Mar 2008 01:47:00 +0000</pubDate><atom:updated>2008-12-09T21:11:42.466-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data  breach</category><category domain="http://www.blogger.com/atom/ns#">iapp</category><category domain="http://www.blogger.com/atom/ns#">id experts</category><category domain="http://www.blogger.com/atom/ns#">ponemon institute</category><title>ID Experts Launches New Data Breach Services</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbLJ_PlDnRj19dClNmJyyMZSQEFFmVBpfORv8q11JxZ_QzL7Ll_cp1C0u56PlkllGPww5Qxt5iXE63AMUUUlB69Ep_v4gI0r_yqC84vEtGwwomzbtb-J4Pvp3LamR-eTUGY2ntMfNfHdo/s1600-h/SavetheDateWeb.gif&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbLJ_PlDnRj19dClNmJyyMZSQEFFmVBpfORv8q11JxZ_QzL7Ll_cp1C0u56PlkllGPww5Qxt5iXE63AMUUUlB69Ep_v4gI0r_yqC84vEtGwwomzbtb-J4Pvp3LamR-eTUGY2ntMfNfHdo/s320/SavetheDateWeb.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5181778346971716706&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Tomorrow at the International Association of Privacy Professionals (IAPP) conference in Washington, D.C., we will announce our new &lt;a href=&quot;http://www.idexpertscorp.com/Breach/&quot;&gt;ID Experts Data Breach Services&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Developed to resolve the growing consumer dissatisfaction with current breach notification and response methods, these services include &lt;a href=&quot;http://www.idexpertscorp.com/Breach/products/&quot;&gt;breach assessment, notification and communications&lt;/a&gt;, monitoring and identity theft recovery components. Tailored to meet the individual needs of the private sector and government agencies, ID Experts is delivering a comprehensive approach to responding to data breach events that alleviates legal liability, manages public perception, and protects and restores individuals’ identities from identity theft.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilql6zcusIdR74NhL7fs7KDJrm_64Anq6D4luVXWa8Sketj5EsvqZHTahYWp6MKO4Qqybi11zHsgQDZ7_YN4LfDEsbNwwJZCd1dDI6litIvF-ajTQA9T29vu5FsIVN0hyyBflMZzK3meQ/s1600-h/databreach+lifecycle.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilql6zcusIdR74NhL7fs7KDJrm_64Anq6D4luVXWa8Sketj5EsvqZHTahYWp6MKO4Qqybi11zHsgQDZ7_YN4LfDEsbNwwJZCd1dDI6litIvF-ajTQA9T29vu5FsIVN0hyyBflMZzK3meQ/s320/databreach+lifecycle.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5181778883842628722&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;We have also released a preview of the results from &lt;a href=&quot;http://www.idexpertscorp.com/Breach/ponemon-study/&quot;&gt;a study that we recently commissioned with the Ponemon Institute&lt;/a&gt;, the leading privacy and information management research firm, to be released in April 2008 .  The study delves into how consumer victims of corporate breach events are terminating their business relationships because of a lack of responsiveness.&lt;br /&gt;&lt;br /&gt;“Our research shows that consumers are growing increasingly dissatisfied with the way they are being treated following a data breach,” said Dr. Larry Ponemon, chairman and founder, Ponemon Institute. “The manner in which breach notification communications are often conducted fails to appropriately convey what the consumer needs to make an informed decision about protecting their personal information and, as such, does not succeed in being the first step in helping to repair a breakdown in trust.”&lt;br /&gt;&lt;br /&gt;You can download a pre-release copy of this Ponemon report at our website at &lt;a href=&quot;http://www.idexpertscorp.com/Breach/&quot;&gt;www.idexpertscorp.com&lt;/a&gt;.</description><link>http://idsafeguards.blogspot.com/2008/03/id-experts-launches-new-data-breach.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbLJ_PlDnRj19dClNmJyyMZSQEFFmVBpfORv8q11JxZ_QzL7Ll_cp1C0u56PlkllGPww5Qxt5iXE63AMUUUlB69Ep_v4gI0r_yqC84vEtGwwomzbtb-J4Pvp3LamR-eTUGY2ntMfNfHdo/s72-c/SavetheDateWeb.gif" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-9011447030316798770</guid><pubDate>Tue, 25 Mar 2008 17:12:00 +0000</pubDate><atom:updated>2008-04-28T17:47:32.713-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach</category><category domain="http://www.blogger.com/atom/ns#">id experts</category><category domain="http://www.blogger.com/atom/ns#">ID theft</category><category domain="http://www.blogger.com/atom/ns#">id theft protection</category><title>ID Safeguards now ID Experts(tm)</title><description>&lt;span style=&quot;font-size:85%;&quot;&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;ID Safeguards is changing its name. ID Safeguards will become &lt;a href=&quot;http://www.idexpertscorp.com/&quot;&gt;ID Experts(tm)&lt;/a&gt;.  Founded in 2003 with a mission to protect Americans from identity theft, we have grown into a leader in identity theft protection. Today, we apply best practices to protect over three million Americans from this growing problem.&lt;br /&gt;&lt;br /&gt;Our team of experts is passionate about helping victims of identity theft. We are one of the only companies in the industry that provide fully-managed recovery services, in other words we do all the work for victims of identity theft in order to restore them to pre-theft status. We are also trusted by some of our country&#39;s largest and most prominent companies to provide a &lt;a href=&quot;http://www.idexpertscorp.com/Breach/&quot;&gt;full spectrum of data breach response services&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;As our market and our services have evolved, we have found that the common thread across all aspects of our business is our people and the expertise they provide in addressing the problems associated with identity theft. For this reason, we feel that the name ID Experts expresses more clearly and appropriately who we are today.&lt;br /&gt;&lt;br /&gt;So ID Safeguards is now &lt;a href=&quot;http://www.idexpertscorp.com/&quot;&gt;ID Experts&lt;/a&gt;. But rest assured, we still provide the best in identity theft protection services for individuals and families, and we provide leading corporations and public sector organizations with the most complete and tailored data breach services.&lt;br /&gt;&lt;br /&gt;Visit us on the web at &lt;a href=&quot;http://www.idexpertscorp.com/&quot;&gt;www.idexpertscorp.com&lt;/a&gt;, and continue to visit our blog for the latest in news and advice on identity theft.</description><link>http://idsafeguards.blogspot.com/2008/03/id-safeguards-now-id-expertstm.html</link><author>noreply@blogger.com (Doug Pollack)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-2098120892829084764</guid><pubDate>Mon, 17 Mar 2008 22:20:00 +0000</pubDate><atom:updated>2008-12-09T21:11:42.707-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach</category><category domain="http://www.blogger.com/atom/ns#">information war</category><category domain="http://www.blogger.com/atom/ns#">social security number</category><category domain="http://www.blogger.com/atom/ns#">SSN</category><title>Is the U.S. Losing the Information War?</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkVhHnfceq_ZHL6JdIQ1LSEvUljAZl0KCerlzlipyW2co00wdV96Dg7MG9dckdyq6P4gMfT5VluqQhwBd1iHf-1QG8oZczk3Fvb_w93VO9rwFysi5nDJN1-Od8KPzLpLL4njB7yBm6Cx-B/s1600-h/06.08.06.FirstCasualty-X.gif&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkVhHnfceq_ZHL6JdIQ1LSEvUljAZl0KCerlzlipyW2co00wdV96Dg7MG9dckdyq6P4gMfT5VluqQhwBd1iHf-1QG8oZczk3Fvb_w93VO9rwFysi5nDJN1-Od8KPzLpLL4njB7yBm6Cx-B/s320/06.08.06.FirstCasualty-X.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5178403376684011714&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;By Rick Kam&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;In a March 13, 2008 article in &lt;a href=&quot;http://www.governmentexecutive.com/story_page.cfm?filepath=/dailyfed/0308/031308n1.htm&quot; com=&quot;&quot; articleid=&quot;39518&amp;amp;dcn=e_gvet&amp;quot;&quot;&gt;GovernmentExecutive.com&lt;/a&gt; by Gautham Nagesh titled &quot;Feds losing war on information security, senators told&quot;,&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;&quot;The federal government is losing the battle to keep its information systems secure, according to expert testimony at a Senate hearing on Wednesday.&quot;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Why?&lt;br /&gt;&lt;br /&gt;Protecting information has become a significant challenge for all organizations large or small, in pubic or private industry. The amount of personal information any organization has on its customers and employees and the many ways they are stored; both in electronic and paper form, make protecting information from thieves a daunting task.&lt;br /&gt;&lt;br /&gt;What are these organizations trying to protect?&lt;br /&gt;&lt;br /&gt;There is value in information considered personal or health related.  Your name, address, SSN, mother&#39;s maiden name, and yes, even the name of your favorite pet (if you use it as a password recovery keyword) has value to ID thieves who utilize it to access your bank accounts, set up new accounts using this information, or use you to mask their criminal past.&lt;br /&gt;&lt;br /&gt;Think about the places you have your information stored in your home like files in your kitchen or home office, boxes in the garage, utility bills, and explanation of benefits statements posted on the refrigerator awaiting payment.&lt;br /&gt;&lt;br /&gt;Now think about where you work, whether in health care, insurance, government agencies, car dealerships, accounting firms, etc.  You may see a lot of this information accessible to anyone, including ID thieves.  There in lies one of the biggest challenges.  Protected information is easily available to anyone everywhere you look!&lt;br /&gt;&lt;br /&gt;What do you do about it?&lt;br /&gt;&lt;br /&gt;In your home, secure this information in a locked file cabinet and away from people who may see it and decide to use.  At work, let your supervisor know that there is information that you think should be protected so the organization can secure it properly.&lt;br /&gt;&lt;br /&gt;Is this a losing battle?&lt;br /&gt;&lt;br /&gt;No.  We can win the information war by each of us making an effort to do our part to protect our information and alert others when we see possible exposures.  You can make a difference.</description><link>http://idsafeguards.blogspot.com/2008/03/is-us-losing-information-war.html</link><author>noreply@blogger.com (Rick Kam)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkVhHnfceq_ZHL6JdIQ1LSEvUljAZl0KCerlzlipyW2co00wdV96Dg7MG9dckdyq6P4gMfT5VluqQhwBd1iHf-1QG8oZczk3Fvb_w93VO9rwFysi5nDJN1-Od8KPzLpLL4njB7yBm6Cx-B/s72-c/06.08.06.FirstCasualty-X.gif" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-6113915075262223716</guid><pubDate>Fri, 14 Mar 2008 00:09:00 +0000</pubDate><atom:updated>2008-03-13T17:33:42.246-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach</category><category domain="http://www.blogger.com/atom/ns#">Fair Credit Reporting Act</category><category domain="http://www.blogger.com/atom/ns#">Gramm-Leach-Bliley Act</category><category domain="http://www.blogger.com/atom/ns#">SEC</category><title>SEC Proposal to Amend Data Breach Regulations</title><description>&lt;span style=&quot;font-size:85%;&quot;&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;http://www.sec.gov/&quot;&gt;Securities and Exchange Commission&lt;/a&gt; (SEC) is proposing &lt;a href=&quot;http://www.sec.gov/rules/proposed/2008/34-57427.pdf&quot;&gt;amendments&lt;/a&gt; to the Gramm-Leach-Bliley Act (GLBA) and the Fair Credit Reporting Act (FCRA) that would create more specific requirements for safeguarding information and responding to information security breaches.&lt;br /&gt;&lt;br /&gt;&quot;Under the proposed amendments, if a covered institution determined that an unauthorized person had obtained access to or used sensitive personal information, and that misuse of the information had occurred or was reasonably possible, the institution also would be required to provide notification, in a clear and conspicuous manner, to each individual identified with the information.&quot;&lt;br /&gt;&lt;br /&gt;The amendments are currently open for comment. If they go through in substantially their current form, the SEC will be requiring public companies to analyze each data breach for the risk of exposure of personal information, and then, if their determination is that the risk of unauthorized access is &quot;reasonably possible&quot;,  notify all individuals affected by the data breach.&lt;br /&gt;&lt;br /&gt;Currently, there are no federal regulations that require notification of individuals affected by a corporate data breach. There are however numerous states that have notification laws with varying provisions.&lt;br /&gt;&lt;br /&gt;It would be a very positive step for all of us if there are federal laws and regulations that would ensure that those affected by data breaches are notified on a timely basis and provided with useful, instructive information. All too often, individuals (millions of them each year) are notified of a data breach in such as way that it causes them great concern, but provides them with little help.</description><link>http://idsafeguards.blogspot.com/2008/03/sec-proposal-to-amend-data-breach.html</link><author>noreply@blogger.com (Doug Pollack)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-9100490330985674038</guid><pubDate>Thu, 13 Mar 2008 00:32:00 +0000</pubDate><atom:updated>2008-12-09T21:11:43.182-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">experian</category><category domain="http://www.blogger.com/atom/ns#">fraud alerts</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><category domain="http://www.blogger.com/atom/ns#">lifelock</category><title>More on Experian vs. Lifelock</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1uxi4hhs9ann-6aZgShkLpL-DwynMIqVPzRGA44tVJ_a4b31DDZ1RQTCCAPBj8l6CgvunHOgqvEk-UrYzARILtUS7aSoiu32XTEEVRwdi6-ZPr79OB-46RVY3Rs1KMtSoU6hE9-WmM9Y/s1600-h/head_logo.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1uxi4hhs9ann-6aZgShkLpL-DwynMIqVPzRGA44tVJ_a4b31DDZ1RQTCCAPBj8l6CgvunHOgqvEk-UrYzARILtUS7aSoiu32XTEEVRwdi6-ZPr79OB-46RVY3Rs1KMtSoU6hE9-WmM9Y/s320/head_logo.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5177019259044013698&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There is a growing amount of legal commentary emerging in the discussion surrounding the Experian vs. LifeLock lawsuit. This week, Peter Bronson from The Union.com published an article titled &quot;&lt;a href=&quot;http://www.theunion.com/article/20080311/TODAYSFEATURE/649475587/-1/NEWS&quot;&gt;Business Law Bulletin: Experian vs. LifeLock Heats Up&lt;/a&gt;&quot;.&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;body&quot;&gt;Relative to the false and misleading advertising issue, Mr. Bronson notes that:&lt;br /&gt;&lt;br /&gt;&quot;According to Experian&#39;s lawsuit, at least one Lifelock ad claims that the company&#39;s services make it virtually impossible for identity thieves to strike, but that fraud alerts are only effective against those particular types of fraud that require accessing a credit report. In other words, says Experian, Lifelock cannot protect against such forms of identity theft as an undocumented worker using someone&#39;s Social Security number to obtain a job; or against unauthorized use of a credit card.&quot;&lt;br /&gt;&lt;br /&gt;It is interesting to see a credit bureau that advertises their credit monitoring services as a means to help deter identity theft relentlessly (who hasn&#39;t seen the FreeCreditReport.com ads on TV?) make the case for the inherent limitations in this area.&lt;br /&gt;&lt;br /&gt;Mr. Bronson goes on to point out the ambiguities with LifeLock&#39;s famous $1 million guarantee:&lt;br /&gt;&lt;br /&gt;&quot;Lifelock does offer a $1 million guarantee that if a customer&#39;s identity is compromised, Lifelock will help restore the customer&#39;s credit standing and pay the cost of doing so. However, Lifelock&#39;s web site states that the guarantee comes into effect when a customer&#39;s identity is compromised &quot;due to a failure or defect in our Service&quot;, a phrase that seems open to more than one interpretation. (If the service offers protection against only certain types of identity theft, does the guarantee only cover those specific types?)&quot;&lt;br /&gt;&lt;br /&gt;This is the first instance where I&#39;ve seen someone dig into the specifics of this guarantee. The &quot;service defect&quot; provision certainly provides LifeLock with a get-out-of-jail-free card. Not to mention, given that it is the financial institutions who provide most of the financial fraud protection, how valuable really is a $1 million guarantee other than as a marketing gimic. I guess we&#39;ll all find out as this lawsuit unfolds.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://idsafeguards.blogspot.com/2008/03/more-on-experian-vs-lifelock.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1uxi4hhs9ann-6aZgShkLpL-DwynMIqVPzRGA44tVJ_a4b31DDZ1RQTCCAPBj8l6CgvunHOgqvEk-UrYzARILtUS7aSoiu32XTEEVRwdi6-ZPr79OB-46RVY3Rs1KMtSoU6hE9-WmM9Y/s72-c/head_logo.jpg" height="72" width="72"/><thr:total>18</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-5381016928551700847</guid><pubDate>Wed, 27 Feb 2008 01:41:00 +0000</pubDate><atom:updated>2008-12-09T21:11:43.359-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">debix</category><category domain="http://www.blogger.com/atom/ns#">experian</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><category domain="http://www.blogger.com/atom/ns#">lifelock</category><category domain="http://www.blogger.com/atom/ns#">trustedid</category><title>Putting LifeLock to the Test</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiakG0Q1SIvusV171b79f3skdy7rS-IMedOs0u73FyJOR0KObMLNxSVa8MTPjxTV9Vt3moS6YIcA4JFV_r70VE-eoQgcCfGXFghbW1CljN7qtkFQVFWkn_aVw3ZOB7xHA3xfoA_mvD6hyphenhyphenA/s1600-h/benemann.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiakG0Q1SIvusV171b79f3skdy7rS-IMedOs0u73FyJOR0KObMLNxSVa8MTPjxTV9Vt3moS6YIcA4JFV_r70VE-eoQgcCfGXFghbW1CljN7qtkFQVFWkn_aVw3ZOB7xHA3xfoA_mvD6hyphenhyphenA/s320/benemann.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5171469560338359554&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Right on the heels of the lawsuit filed by &lt;a href=&quot;http://experian.com&quot;&gt;Experian &lt;/a&gt;against &lt;a href=&quot;http://lifelock.com&quot;&gt;LifeLock&lt;/a&gt;, the self-proclaimed leader in identity theft protection, which asserts that LifeLock uses deceptive advertising and misleading claims in advertising their service, as well as illegal means of setting fraud alerts on behalf of their customers, now a &lt;a href=&quot;http://cbs4denver.com/consumer/credit.protection.identity.2.662760.html&quot;&gt;CBS news report &lt;/a&gt;by Jim Benemann has put LifeLock to the test, along with two other companies, &lt;a href=&quot;http://debix.com&quot;&gt;Debix &lt;/a&gt;and &lt;a href=&quot;http://trustedid.com&quot;&gt;TrustedID&lt;/a&gt;, that rely on credit bureau fraud alerts or freezes for protecting their customers.&lt;br /&gt;&lt;br /&gt;It seems that based on this test, these products do not prevent identity theft as you might be led to believe based on LifeLock&#39;s advertising. So on to the test. The first thing he did was have three of his colleagues, Tom, Jillian, and Kristine, each sign up for one of the three services. Then...&lt;br /&gt;&lt;br /&gt;&quot;With their permission, CBS4&#39;s Jim Benemann took all of Tom, Jillian and Kristine&#39;s personal information including their social security numbers and dates of birth. Using that information, Benemann applied for the same major credit card in each of their names. The only little thing he changed was the address. Benemann asked for those credit cards to be mailed to his home address. Essentially, he stole Kristine&#39;s, Tom&#39;s and Jillian&#39;s identities.&lt;br /&gt;&lt;br /&gt;The three testers weren&#39;t worried. They all figured they would get that phone call telling them that someone was applying for credit in their name and they would put a stop to it immediately. Tom waited, Jillian waited and Kristine waited close to their phones. They waited 24 hours, then 48 hours and then a week. Not one of them got a phone call from any creditor even though they had paid companies for credit protection.&quot;&lt;br /&gt;&lt;br /&gt;It is worth noting, that a fraud alert can easily be placed by an individual for free, just by contacting the credit bureau. Unfortunately services like these make the fraud alert seem like a &quot;silver bullet&quot; for preventing identity theft. As this test proves, nothing could be further from the truth. The reporter goes on to note:&lt;br /&gt;&lt;br /&gt;&quot;And remember Kristine who signed up with LifeLock? A little more than a week after Benemann applied for a credit card in her name, that card arrived, mailed to him, at his home address. And that had Kristine all the more interested in finding out about LifeLock&#39;s $1 million guarantee...Here is what LifeLock had to say:&lt;br /&gt;&lt;br /&gt;&#39;The credit card companies have a contract with the credit bureaus that say they must honor fraud alerts. The fact that they chose not to is proof that the fraud alerts are not bulletproof. The good news is that this is where the LifeLock $1 million guarantee is most effective. LifeLock is not a credit monitoring service but a protection service in the event a fraud alert proves to be ineffective.&#39; &quot;&lt;br /&gt;&lt;br /&gt;Having said that, LifeLock didn&#39;t clarify how they then provide &quot;protection&quot; for the victim of ID theft. In the past, LifeLock had outsourced victim recovery services to other companies. It would be instructive to know what they do for their victims today.</description><link>http://idsafeguards.blogspot.com/2008/02/putting-lifelock-to-test.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiakG0Q1SIvusV171b79f3skdy7rS-IMedOs0u73FyJOR0KObMLNxSVa8MTPjxTV9Vt3moS6YIcA4JFV_r70VE-eoQgcCfGXFghbW1CljN7qtkFQVFWkn_aVw3ZOB7xHA3xfoA_mvD6hyphenhyphenA/s72-c/benemann.jpg" height="72" width="72"/><thr:total>12</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-2854919536713977288</guid><pubDate>Fri, 22 Feb 2008 02:12:00 +0000</pubDate><atom:updated>2008-12-09T21:11:43.907-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">experian</category><category domain="http://www.blogger.com/atom/ns#">fraud alert</category><category domain="http://www.blogger.com/atom/ns#">lifelock</category><title>Experian vs. LifeLock Lawsuit</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAFkbuVo0jYKfKsBvkf6iJEBH4KACJga9vdefg72kjSx2Ch_KTEt4OqOkyUuWpNuUvDAltQS8-9lmXBbPjeQL07MTE1FO0ciKIum1mA0Pcce6m80SI84hkq8p1-rQPiYFcbC-R70qTt-Q/s1600-h/explogo.gif&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 217px; height: 96px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAFkbuVo0jYKfKsBvkf6iJEBH4KACJga9vdefg72kjSx2Ch_KTEt4OqOkyUuWpNuUvDAltQS8-9lmXBbPjeQL07MTE1FO0ciKIum1mA0Pcce6m80SI84hkq8p1-rQPiYFcbC-R70qTt-Q/s320/explogo.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5169561104505283762&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;VS.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWjheCMtdRNNqWXV5ncgpB0B7kTAAc0wFA2vlTK9GrxbCvAL3K9RNJhOXKTFTWhSLzMswkzhdB9g_L4pog_xlOsQ_V8vvTbt8goJYzOquEj0A5Z4UVbQ-zdcxjqYw1Njtx_yR1n2IRxws/s1600-h/lllogo.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWjheCMtdRNNqWXV5ncgpB0B7kTAAc0wFA2vlTK9GrxbCvAL3K9RNJhOXKTFTWhSLzMswkzhdB9g_L4pog_xlOsQ_V8vvTbt8goJYzOquEj0A5Z4UVbQ-zdcxjqYw1Njtx_yR1n2IRxws/s320/lllogo.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5169564158227031250&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;http://redtape.msnbc.com/2008/02/experian-sues-l.html&quot;&gt;Red Tape Chronicles &lt;/a&gt;yesterday reported on a recently-filed lawsuit by &lt;a href=&quot;http://www.experian.com/&quot;&gt;Experian&lt;/a&gt;, a major US credit bureau, against &lt;a href=&quot;http://www.lifelock.com/&quot;&gt;Lifelock&lt;/a&gt;. This lawsuit represents the first &quot;shot across the bow&quot; for vendors of credit services that rely on placing continuous fraud alerts on consumer accounts with the credit bureaus.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://idtheft.about.com/od/glossaryofterms/g/FraudAlert.htm&quot;&gt;About.com&#39;s identity theft site&lt;/a&gt; defines a fraud alert as a &quot;flag that is put on your credit report through the consumer reporting agencies. This flag establishes that as part of any credit approval process, you need to be notified.&quot;&lt;br /&gt;&lt;br /&gt;Lifelock&#39;s consumer service, which they tout as providing guaranteed protection against identity theft, relies solely on the setting of fraud alerts to provide consumers with the stated protection. The Experian lawsuit  brings into question the efficacy of fraud alerts as a means to prevent identity theft.&lt;br /&gt;&lt;br /&gt;The Red Tape Chronicles article highlights that a key assertion of the lawsuit is that LifeLock is using deceptive advertising practices and making misleading claims in order to persuade consumers to subscribe to their service. The article notes that the &quot;credit bureau Experian is suing the identity theft prevention firm LifeLock, accusing it of deception and fraud in its familiar advertising campaign, which includes a spot in which CEO Todd Davis reveals his Social Security number and then brags about the effectiveness of the company’s protections. In the lawsuit, filed in U.S. District Court on Feb. 13, Experian contends that LifeLock&#39;s advertising is misleading and that the firm is breaking federal law in the way it goes about protecting consumers.&quot;&lt;br /&gt;&lt;br /&gt;The Experian lawsuit also brings into question the legality associated with firms placing fraud alerts on behalf of consumers.  The Red Tape Chronicles article notes that &quot;Experian contends that LifeLock&#39;s chief ID theft prevention tool -- the placing of continuous fraud alerts on consumers&#39; credit files – is illegal because, under the Fair Credit Reporting Act, fraud alerts can only be requested by the individual consumer or an individual acting on behalf of the consumer.&quot;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.idsafeguards.com/&quot;&gt;ID Safeguards&lt;/a&gt; provides corporations and consumers with identity theft services. Among these services are those that assist victims of identity theft with recovery of their identities taking a &quot;fully managed&quot; approach to recovery.  Coincidentally, the company has handled identity theft recovery efforts for numerous LifeLock members who  became victims of identity theft, despite the placement of fraud alerts by LifeLock.&lt;br /&gt;&lt;br /&gt;The fact that LifeLock members do fall victim to identity theft should not be surprising. Fraud alerts do not prevent an identity thief from co-opting and using one of your credit cards. They also don&#39;t prevent someone from using your social security number to work. They further don&#39;t prevent thieves from signing up for utilities of telecommunications services using your identity. And they don&#39;t stop someone from using your personal information to get access to health care services.&lt;br /&gt;&lt;br /&gt;Fraud alerts also don&#39;t prevent inquires for credit from showing up on a victims credit report. These &quot;little dings&quot; can have a detrimental effect on an person&#39;s credit score.  Fraud alerts do have their place in dealing with a threat to your financial identity, but they are not a silver bullet and certainly are not a guarantee that individuals won&#39;t fall victim to identity theft.</description><link>http://idsafeguards.blogspot.com/2008/02/experian-vs-lifelock-lawsuit.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAFkbuVo0jYKfKsBvkf6iJEBH4KACJga9vdefg72kjSx2Ch_KTEt4OqOkyUuWpNuUvDAltQS8-9lmXBbPjeQL07MTE1FO0ciKIum1mA0Pcce6m80SI84hkq8p1-rQPiYFcbC-R70qTt-Q/s72-c/explogo.gif" height="72" width="72"/><thr:total>233</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-7917285926351304362</guid><pubDate>Mon, 11 Feb 2008 23:35:00 +0000</pubDate><atom:updated>2008-12-09T21:11:44.065-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breach</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><title>The Indirect Costs of a Data Breach</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_9NWUqh5OiZ8/R7DMmV62pKI/AAAAAAAAACQ/dVpbuJD-6Mg/s1600-h/identity-theft.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;http://2.bp.blogspot.com/_9NWUqh5OiZ8/R7DMmV62pKI/AAAAAAAAACQ/dVpbuJD-6Mg/s320/identity-theft.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5165853731685049506&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A recently published article in E-Commerce Times concerning the costs of corporate data breaches titled &lt;a href=&quot;http://www.technewsworld.com/story/The-Cost-of-ID-Theft-Part-2-Fixing-the-System-61542.html&quot;&gt;The Cost of ID Theft, Part 2: Fixing the System&lt;/a&gt; written by Andrew Burger, highlights the staggering economic impact of the increasing number of data breaches by America&#39;s corporations.&lt;br /&gt;&lt;br /&gt;The article notes a statistic from the &lt;a href=&quot;http://www.idexpertscorp.com/Breach/ponemon-study/&quot;&gt;Ponemon Institute&lt;/a&gt; that pegs the average &lt;a href=&quot;http://www.idexpertscorp.com/Breach/ponemon-study/&quot;&gt;cost of a data breach&lt;/a&gt; at $197 per record compromised.&lt;br /&gt;&lt;br /&gt;&lt;span name=&quot;intelliTxt&quot; id=&quot;intelliTxt&quot;&gt;&quot;The stakes are already quite high when it comes to data loss: According to Gartner and the Ponemon Institute, the loss of a single record -- not financial fraud -- is around (US)$197. If you take the extremely conservative estimate from the same research that said that in 2007, 127 million records were lost, you get around $25 billion in direct losses noted Uriel Maimon, senior researcher for security firm RSA.&quot;&lt;br /&gt;&lt;br /&gt;Ponemon further explores these costs, finding that around &lt;a href=&quot;http://www.idexpertscorp.com/Breach/ponemon-study/&quot;&gt;two-thirds of the cost of the data breach&lt;/a&gt; is associated with the loss of customers or reduction of corporate reputation.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span name=&quot;intelliTxt&quot; id=&quot;intelliTxt&quot;&gt;&quot;The cost of lost business is likely to be larger and more significant than actual cash losses and expenses related to remediation, however. The average customer churn for businesses surveyed that had suffered a breach was 2.67 percent, noted Kevin Bocek, director of product marketing for encryption firm &lt;a href=&quot;http://www.pgp.com/&quot; target=&quot;_blank&quot;&gt;PGP&lt;/a&gt;.&quot;&lt;/span&gt;&lt;span style=&quot;display: block;&quot; id=&quot;formatbar_Buttons&quot;&gt;&lt;span class=&quot;down&quot; style=&quot;display: block;&quot; id=&quot;formatbar_CreateLink&quot; title=&quot;Link&quot; onmouseover=&quot;ButtonHoverOn(this);&quot; onmouseout=&quot;ButtonHoverOff(this);&quot; onmouseup=&quot;&quot; onmousedown=&quot;CheckFormatting(event);FormatbarButton(&#39;richeditorframe&#39;, this, 8);ButtonMouseDown(this);&quot;&gt;&lt;img src=&quot;img/gl.link.gif&quot; alt=&quot;Link&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span name=&quot;intelliTxt&quot; id=&quot;intelliTxt&quot;&gt;&lt;br /&gt;With this in mind, companies should plan as part of their &lt;a href=&quot;http://www.idexpertscorp.com/Breach/respond/&quot;&gt;data breach response plans&lt;/a&gt; to explicitly focus on elements of their response that will engender customer goodwill. While this may seem difficult to achieve in such circumstances, every opportunity to reach out and touch your customers creates an opportunity to increase retention and brand loyalty.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.5in; text-indent: -0.25in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.5in; text-indent: -0.25in;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;;font-family:Garamond;font-size:11;&quot;  &gt;&lt;span style=&quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://idsafeguards.blogspot.com/2008/02/indirect-costs-of-data-breach.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_9NWUqh5OiZ8/R7DMmV62pKI/AAAAAAAAACQ/dVpbuJD-6Mg/s72-c/identity-theft.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-2029918690154991692</guid><pubDate>Sat, 26 Jan 2008 00:28:00 +0000</pubDate><atom:updated>2008-12-09T21:11:44.221-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">id safeguards</category><category domain="http://www.blogger.com/atom/ns#">ID theft</category><category domain="http://www.blogger.com/atom/ns#">id theft protection</category><title>Are You Well Protected?</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJIxaU7ztUhmTtP6CWRSKbp-RyavAj5PxHqeaEG7MAwMBBDqwfda6b6pFS3KY-cGWHgWwnK-An2PWMP2jSYPrZfJISCQTusLoTkOsp9mTw4A1rzuYJPNQLffSPM3u-2fLDNtRz-mAUfuI/s1600-h/1519044463_9793b677e8_m.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJIxaU7ztUhmTtP6CWRSKbp-RyavAj5PxHqeaEG7MAwMBBDqwfda6b6pFS3KY-cGWHgWwnK-An2PWMP2jSYPrZfJISCQTusLoTkOsp9mTw4A1rzuYJPNQLffSPM3u-2fLDNtRz-mAUfuI/s320/1519044463_9793b677e8_m.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5159579766991969186&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;As we look forward to what is in store for us in 2008, &lt;a href=&quot;http://www.idtheftcenter.org/&quot;&gt;The Identity Theft Resource Center&lt;/a&gt; is projecting an increase in both the number of security breaches and incidents of identity theft.&lt;br /&gt;&lt;br /&gt;With this as a backdrop, we&#39;ve developed a set of recommendations for people to protect themselves. As part of our ID Self-Defense Academy, a component of our subscription services member website, this Self-Defense Checklist includes both common sense suggestions that you are likely to be familiar with, as well as others that are new this year given the evolution in the use of the internet and computers in identity theft.&lt;br /&gt;&lt;br /&gt;Some of the items you may not have thought about include using a &quot;wipe&quot; utility on your computer hard drive to make sure all of your information is permanently erased before disposing of the computer, and checking the annual earnings statement that you receive each year from the social security administration for any discrepancies in earnings or work history.&lt;br /&gt;&lt;br /&gt;The complete checklist follows. &lt;/span&gt;&lt;br /&gt;&lt;h1&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Self-defense Checklist&lt;/span&gt;&lt;/h1&gt;  &lt;h3&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Protect Yourself At Home&lt;/span&gt;&lt;/h3&gt;  &lt;ul type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Switch to a mailbox with a      lock. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;When you&#39;re away from home,      place a hold on your mail (online at www.usps.com or with a Hold Mail form      at the post office). &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Use a cross-cut shredder to      shred documents containing financial or other personal information. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Secure important documents in      a safety deposit box or a fire-proof safe hidden at home. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Stop newspaper delivery and      garbage service if you&#39;re leaving town. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Set up lights on timers to      make your home look occupied when you&#39;re away. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Have a neighbor you trust      keep an eye on your home, and leave a number where you can be reached. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Immediately notify the post      office and anyone you do business with if you change your address. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Place outgoing mail in a post      office mail slot or hand it to a postal worker instead of leaving it at      your home mailbox for pick-up. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Review your credit card, bank      account, and cell phone statements regularly to make sure there are no      unauthorized charges.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;  &lt;h3&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; Protect Your Computer and Internet Access&lt;/span&gt;&lt;/h3&gt;  &lt;ul type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Protect your computer with a      password. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Never provide personal      information in response to an unsolicited e-mail. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Avoid viruses and other scams      by frequently updating your browser and e-mail software. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Use and regularly update your      firewall and anti-virus/anti-spyware software. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Change your passwords often,      and use letter and number combinations that are difficult to guess. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Never have your computer      remember your password. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Don&#39;t respond to instant      messaging from unfamiliar users, and avoid instant message offers. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;To ensure the authenticity of      e-mail requests for personal information, type the company&#39;s Web site URL      directly into your browser instead of clicking on a link in the e-mail.      (The real destination of the link may be different than the URL that you      see.) &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Don&#39;t ever send personal or      financial information via e-mail. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Don&#39;t open e-mail attachments      or download files from strangers. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Before doing business with      any company, ask for and verify its name, street address, and phone      number. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Choose an Internet Service      Provider and browser that use filtering software to limit spam in your      e-mail inbox. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Never respond to email asking      for your help in getting money out of a foreign country.&lt;br /&gt;    Encrypt your wireless network as soon as you set it up. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;When using Ebay, Craigslist,      or other sites linking buyers and sellers, use PayPal for transactions.      Don&#39;t ever wire money via wire service, and don&#39;t accept cashier checks or      money orders, as these can be forged. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Review your credit card, bank      account, and cell phone statements regularly to make sure there are no      unauthorized charges.&lt;/span&gt; &lt;/li&gt;&lt;/ul&gt;  &lt;h3&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; Protect Yourself On the Road&lt;/span&gt;&lt;/h3&gt;  &lt;ul type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Carry only the credit cards      and checks you absolutely need when traveling.&lt;br /&gt;    Keep identification and credit cards in a secure wallet or purse on your person      (and out of pickpockets&#39; reach) where you can keep an eye on them. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Make photocopies of the      fronts and backs of your credit cards, driver&#39;s license, and passport and      store the copies someplace other than your wallet in case of theft. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Program the toll-free numbers      for your credit card companies into your mobile phone in case of theft. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Never leave valuables,      phones, receipts, or other papers containing financial or personal      information in your car, even if it is locked (and always lock it). &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Keep receipts in a safe place      until you can cross-shred or safely store them at home. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Always keep your mobile phone      in a secure place on your person to avoid losing it. Activate the lock      feature when it&#39;s not in use so that it can&#39;t be used and any stored      information can&#39;t be accessed if it is stolen. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;If you must discuss personal      or financial information over the phone, do so in your hotel room or      another private place where you won&#39;t be overheard. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Avoid downloading attachments      from your e-mail account onto a computer other than your own. Erase your      browsing history and discard any personal files in the computer&#39;s trash or      recycling bin, then empty it before logging off. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Never enter or access      personal information from a public-access computer or one in a hotel business      center, as these can be fitted with hard-to-see key loggers that record      your information.&lt;br /&gt;    Be sure to eject any personal CDs, DVDs, or jump drives at the end of a      session on a computer that isn&#39;t your own. &lt;/span&gt;&lt;/li&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Especially after you travel,      dealing with merchants you don&#39;t know, remember to review your credit      card, bank account, and cell phone statements regularly to make sure there      are no unauthorized charges. &lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>http://idsafeguards.blogspot.com/2008/01/are-you-well-protected.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJIxaU7ztUhmTtP6CWRSKbp-RyavAj5PxHqeaEG7MAwMBBDqwfda6b6pFS3KY-cGWHgWwnK-An2PWMP2jSYPrZfJISCQTusLoTkOsp9mTw4A1rzuYJPNQLffSPM3u-2fLDNtRz-mAUfuI/s72-c/1519044463_9793b677e8_m.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-7062052945078185505</guid><pubDate>Tue, 08 Jan 2008 18:04:00 +0000</pubDate><atom:updated>2008-12-09T21:11:44.389-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">identity theft; data breach</category><title>Data Breaches Reach Record Levels in 2007</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://2.bp.blogspot.com/_9NWUqh5OiZ8/R4O7wdmnsHI/AAAAAAAAACA/vRjE6OPBJWY/s1600-h/capt.fb7293522fa442ab85bbefbe5d00b092.data_breaches_nybz124.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;http://2.bp.blogspot.com/_9NWUqh5OiZ8/R4O7wdmnsHI/AAAAAAAAACA/vRjE6OPBJWY/s320/capt.fb7293522fa442ab85bbefbe5d00b092.data_breaches_nybz124.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5153168839896707186&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;According to a December 30, 2007 &lt;a href=&quot;http://www.usatoday.com/money/industries/retail/2007-11-15-retail-hacking-study_N.htm&quot;&gt;AP article written by Mark Jewell&lt;/a&gt;, the trend in data breaches continues on the upswing. He reported that:&lt;br /&gt;&lt;br /&gt;&quot;The loss or theft of personal data such as credit card and &lt;span style=&quot;border-bottom: 1px dashed rgb(0, 102, 204); cursor: pointer;&quot; class=&quot;yshortcuts&quot; id=&quot;lw_1199052270_0&quot;&gt;Social Security numbers&lt;/span&gt; soared to unprecedented levels in 2007, and the trend isn&#39;t expected to turn around anytime soon as hackers stay a step ahead of security and laptops disappear with sensitive information.&quot;&lt;br /&gt;&lt;br /&gt;This of course is bad news for consumers who have also experienced meteoric rates of identity theft in 2007. It has been estimated that over 9MM US citizens fell victim to identity theft in 2007. If you&#39;re counting, this averages out to one every three seconds. And the growing adoption of new technologies such as wireless internet and devices by businesses and consumers, provides new ways for technically-savvy criminals to circumvent data security measures.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;lrec&quot;&gt;&lt;script language=&quot;javascript&quot;&gt;if(window.yzq_d==null)window.yzq_d=new Object(); window.yzq_d[&#39;TBRcQNGDJG4-&#39;]=&#39;&amp;U=13bbe9f5s%2fN%3dTBRcQNGDJG4-%2fC%3d619213.12054924.12500283.1442997%2fD%3dLREC%2fB%3d4919452&#39;; &lt;/script&gt;&lt;noscript&gt;&lt;/noscript&gt;&quot;With wireless data transmission more common, hackers increasingly are expected to target what many experts see as a major vulnerability. Eavesdroppers appear to be learning how to bypass security safeguards faster than ever, said Jay Tumas, the head of Harvard University&#39;s network operations, at a recent conference for information security professionals.&quot;&lt;br /&gt;&lt;br /&gt;Research Groups estimate that between 50MM and 80MM records of personal information were breached during 2007.  These breaches were caused both by hackers whose intent is to steal and exploit this personal data, as well as by unintentional human error such as in the loss or misplacement of a laptop computer with sensitive personal data residing on its hard drive.&lt;br /&gt;&lt;br /&gt;Predictions by industry groups suggest that breach numbers reported will continue to rise given a growing trend &lt;a href=&quot;http://www.idexpertscorp.com/Breach/solutions/&quot;&gt;requiring disclosure of breaches and notification&lt;/a&gt; of affected individuals by organizations that &lt;a href=&quot;http://www.idexpertscorp.com/Breach&quot;&gt;experience a data breach&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://idsafeguards.blogspot.com/2008/01/data-breaches-reach-record-levels-in.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_9NWUqh5OiZ8/R4O7wdmnsHI/AAAAAAAAACA/vRjE6OPBJWY/s72-c/capt.fb7293522fa442ab85bbefbe5d00b092.data_breaches_nybz124.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-6256357013176023367</guid><pubDate>Tue, 11 Dec 2007 18:40:00 +0000</pubDate><atom:updated>2008-12-09T21:11:44.814-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">id safeguards</category><category domain="http://www.blogger.com/atom/ns#">ID theft</category><title>ID Theft During the Holiday Season</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4TNi3uBAeLPtRlspNQVFMOIEdii_vyLLNckZ3er3gseZxAWhJLchm0FNXEgoKB0a_BuwzwpbQrdvCUl9RvvzKuhALfRqvBgfvdaFVaXpi3c9GqkKfCcdhXbuZBXmPphH3vaZZzXNmlZ8/s1600-h/2099084614_59468582cf_t.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4TNi3uBAeLPtRlspNQVFMOIEdii_vyLLNckZ3er3gseZxAWhJLchm0FNXEgoKB0a_BuwzwpbQrdvCUl9RvvzKuhALfRqvBgfvdaFVaXpi3c9GqkKfCcdhXbuZBXmPphH3vaZZzXNmlZ8/s320/2099084614_59468582cf_t.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5142788330855076050&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Unfortunately, ID thieves don&#39;t take time off during the holidays. Because people are out and shopping (or on the web and shopping) more actively during December, there is an even greater risk of identity theft.&lt;br /&gt;&lt;br /&gt;Christine Arevalo, an ID theft expert and head of data breach services at ID Safeguards, discusses ID theft during a recent edition of AM Northwest.&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/mHaf1-KdDcU&amp;amp;rel=1&quot;&gt;&lt;/param&gt;&lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/mHaf1-KdDcU&amp;amp;rel=1&quot; type=&quot;application/x-shockwave-flash&quot; wmode=&quot;transparent&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;When shopping online during the holidays, remember to look for the &quot;lock&quot; icon and &quot;https:&quot; address in your browser when entering your credit card or other personal information. Also, she suggests that you dedicate just one credit card for your online purchases in order to make it easier to keep track of the charges in January. And never use a debit card for online buying since it directly accesses your checking account funds.</description><link>http://idsafeguards.blogspot.com/2007/12/id-theft-during-holiday-season.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4TNi3uBAeLPtRlspNQVFMOIEdii_vyLLNckZ3er3gseZxAWhJLchm0FNXEgoKB0a_BuwzwpbQrdvCUl9RvvzKuhALfRqvBgfvdaFVaXpi3c9GqkKfCcdhXbuZBXmPphH3vaZZzXNmlZ8/s72-c/2099084614_59468582cf_t.jpg" height="72" width="72"/><thr:total>14</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-8948366132484849785</guid><pubDate>Tue, 04 Dec 2007 21:06:00 +0000</pubDate><atom:updated>2008-12-09T21:11:45.191-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">check collection</category><category domain="http://www.blogger.com/atom/ns#">debt collections</category><category domain="http://www.blogger.com/atom/ns#">ID theft</category><title>The Bad Check Boomerang</title><description>&lt;img id=&quot;BLOGGER_PHOTO_ID_5140228938662938994&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;http://4.bp.blogspot.com/_MOVfjLMezPI/R1XC_FEwCXI/AAAAAAAAAA0/JP8nRuQelaY/s200/check+scanner.jpg&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;By: D. Jones, Recovery Advocate&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Have you recently received a collection notice in the mail and don’t know why? Collection notices can be for outstanding balances on credit cards or for outstanding, uncollected checks. Those pesky notices are one of the main ways the average consumer discovers the theft of their identity.&lt;br /&gt;&lt;br /&gt;When a check has been written, whether a forgery (signing a name that isn’t yours) or a counterfeit check (a false check created with accurate or completely inaccurate information or a mixture of both) it goes through a few steps before its final destination.&lt;br /&gt;&lt;br /&gt;Ever notice those little machines or attachments to the register that scan your check when you present it to the merchant? Those are usually linked to larger check verification companies. The four major ones are: Telecheck, CheckRite, SCAN/ChexSystems and Certegy. The system used either denies or accepts the check and the merchant goes from there.&lt;br /&gt;&lt;br /&gt;If the check is denied, it means there is a check collection or an alert out with the particular bureau the merchant uses. The merchant will often give the consumer a card with contact info for the bureau used. However, if the check clears, either the name, driver’s license number or checking account information is not on file with the bureau as being in “negative status”. When a check is verified as “no negative status” it doesn’t mean the check is good – it means there is no record of the check being bad. Not as easy as it sounds.&lt;br /&gt;&lt;br /&gt;Back to those check collection notices in the mail – if you&#39;ve received one it means your personal information (bank info, name, driver’s license number) was used to write a check to a merchant.&lt;br /&gt;&lt;br /&gt;If the information used was your account info, you notice unauthorized debits exiting your checking account and alert the bank. If it does not belong to your bank, and here’s the frightening part, you may not know about it for a while.&lt;br /&gt;&lt;br /&gt;Once the check doesn’t clear it goes back to the merchant to collect the amount. Often they use those same verification bureaus to collect for them and record the information as “negative” which means the victim is unable to present checks validly – another way a victim discovers the theft of their identity. Enter the appearance of the check collection notice in the mail.&lt;br /&gt;&lt;br /&gt;Remember that frightening delay mentioned earlier? If incorrect address or fake address information was used the notice may not get back to you for some time, and identity thieves count on this delay to utilize the checks as long as they can.&lt;br /&gt;&lt;br /&gt;Thieves obtain our info through various illegal methods including mail theft, purse/wallet theft, dumpster diving, or corporate breach compromise and black market dealings.&lt;br /&gt;&lt;br /&gt;Sometimes the victim attempts to resolve the situation themselves but the collection notices can often be the tip of a very nasty iceberg. We’ve all heard about collection bureaus and their practices - dealing with these guys can run the gamut from irritating to abusive. So if you ever get one of those notices call the check collection bureau and ask them to provide verification of the debt – it’s your legal right!&lt;/span&gt;</description><link>http://idsafeguards.blogspot.com/2007/12/bad-check-boomerang.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_MOVfjLMezPI/R1XC_FEwCXI/AAAAAAAAAA0/JP8nRuQelaY/s72-c/check+scanner.jpg" height="72" width="72"/><thr:total>54</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-6823360887314386758</guid><pubDate>Tue, 04 Dec 2007 19:00:00 +0000</pubDate><atom:updated>2008-12-09T21:11:45.458-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">credit union scam</category><category domain="http://www.blogger.com/atom/ns#">FTC</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">vishing</category><title>Credit Union Customers Targeted with Latest Scam</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBmoqd5yukXnHUhSJvHxF3K8N38jIWm_uYh44Fz7LcCGcoTWMz2jSvs95ZPHHrluJm6igMgV50Ckvx9-BRVOsxwv0f0OHwnFypuBJ9Vc2sMS_QQCmvONqSMmhBvdWa6iRVZ0otXeYKnr-e/s1600-h/holiday+shopping.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5140197074600598002&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBmoqd5yukXnHUhSJvHxF3K8N38jIWm_uYh44Fz7LcCGcoTWMz2jSvs95ZPHHrluJm6igMgV50Ckvx9-BRVOsxwv0f0OHwnFypuBJ9Vc2sMS_QQCmvONqSMmhBvdWa6iRVZ0otXeYKnr-e/s200/holiday+shopping.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Heather Wells (Recovery Advocate)&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;What could be worse than having your bank account or good credit history hijacked around the holidays? Picture yourself at the register attempting to pay for gifts using your debit card and being told that there are insufficient funds in your account. Or imagine checking your credit reports only to discover dozens of new maxed out lines of credit that you did not know about.&lt;br /&gt;&lt;br /&gt;The identity thieves are getting increasingly clever with their scams. They have realized that consumers are becoming less willing to respond to “phishing” emails that direct them to decoy websites asking for personal banking information or a social security number. Most folks delete these sorts of emails suspecting foul play, which is the smart thing to do. The newer version of this phishing scam is known as “vishing,” or “voice phishing.”&lt;br /&gt;&lt;br /&gt;An article from consumeraffairs.com dated December 3, 2007 states that “sophisticated criminals now send emails instructing consumers to call a telephone number instead of clicking on a link. This tactic, known as ‘vishing’ can be especially effective because consumers who encounter a live person are much more likely to let down their guard.”&lt;br /&gt;&lt;br /&gt;Read more from the article and view a recently circulated vishing email &lt;a href=&quot;http://www.consumeraffairs.com/news04/2007/12/credit_union_spoof.html&quot;&gt;here.&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;Consumers who receive one of these bogus emails should contact their credit union directly by using the phone number on their monthly statement or by obtaining the number from the financial institution’s official website. It’s also a good idea to report this scam to the Federal Trade Commission at &lt;a href=&quot;http://www.ftc.gov/&quot;&gt;http://www.ftc.gov/&lt;/a&gt;. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://idsafeguards.blogspot.com/2007/12/credit-union-customers-targeted-with.html</link><author>noreply@blogger.com (Heather Wells)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBmoqd5yukXnHUhSJvHxF3K8N38jIWm_uYh44Fz7LcCGcoTWMz2jSvs95ZPHHrluJm6igMgV50Ckvx9-BRVOsxwv0f0OHwnFypuBJ9Vc2sMS_QQCmvONqSMmhBvdWa6iRVZ0otXeYKnr-e/s72-c/holiday+shopping.jpg" height="72" width="72"/><thr:total>58</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-984712156021361957</guid><pubDate>Fri, 16 Nov 2007 23:55:00 +0000</pubDate><atom:updated>2008-12-09T21:11:45.770-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">credit bureaus</category><category domain="http://www.blogger.com/atom/ns#">credit freeze</category><category domain="http://www.blogger.com/atom/ns#">id theft recovery</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><title>The Missing Ingredient in Most ID Theft Services. Personal Help.</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0-p2rrtZ9hHiXWfNIypi-vfNuWfWpdYfGVRWKEsEk-Oeu01NnypBdQPb4k_JPhpTOQN3nQl14pOHXNVnNvTTJItaoIWX8Ilv1Ep12-lkfYIhfOZaqsKQlCKqFFpwP5WunQlM9OCdmWvo/s1600-h/051026green_idtheft3_120x90.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 149px; height: 112px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0-p2rrtZ9hHiXWfNIypi-vfNuWfWpdYfGVRWKEsEk-Oeu01NnypBdQPb4k_JPhpTOQN3nQl14pOHXNVnNvTTJItaoIWX8Ilv1Ep12-lkfYIhfOZaqsKQlCKqFFpwP5WunQlM9OCdmWvo/s320/051026green_idtheft3_120x90.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5133543999600372626&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There has been a great deal of attention recently paid to the actions by credit bureaus enabling consumers to use credit freezes as a tool to avoid or deal with identity theft events.&lt;br /&gt;&lt;br /&gt;In a recent New York Times article titled &lt;a href=&quot;http://www.news.com/In-ID-theft%2C-some-victims-see-opportunity/2100-7348_3-6218887.html?tag=item&quot;&gt;&quot;In ID Theft, Some Victims See Opportunity&quot;&lt;/a&gt;, the author highlights several companies, like ours, that provide ID theft protection services.  Several of these companies see the use of credit freezes and credit fraud alerts as a panacea for eliminating the threat of identity theft. This is a position that we do not subscribe to. We believe strongly in encouraging consumers to use all appropriate best practices to avoid identity theft, and we provide a product, FraudStop, that provides broader prevention from ID theft by addressing not just credit records, but also other records including real estate, motor vehicles, utilities and the like, all of which can be used by identity thieves.&lt;br /&gt;&lt;br /&gt;&quot;Among its peers, LifeLock has attracted the most attention--much of it negative. In radio and television ads, Todd Davis, chief executive of LifeLock, gives out his Social Security number to demonstrate his faith in the service. As a result, he has been hit with repeated identity theft attacks, including one successful effort this summer in which a check-cashing firm gave out a $500 loan to a Texas fraudster without ever checking Davis&#39; credit report. Last summer, &lt;i&gt;The Phoenix New Times&lt;/i&gt;, an Arizona paper, reported that LifeLock&#39;s co-founder, Robert Maynard, had a criminal past.  Maynard later resigned.&quot;&lt;br /&gt;&lt;br /&gt;But despite the best protection, ID theft does and will occur. Which is why the consumer is best served by a company that can provide them with an expert to handle any identity theft issues. Which is what we do with our staff of personal recovery advocates. Most identity theft protection services companies do not provide recovery services. They do not have  teams of trained professionals. They do not see this as important.  We obviously do. And so do the over 2.5 million people that rely on our recovery services.&lt;br /&gt;&lt;br /&gt;Among other things, the author highlights that identity theft services whose only value is in setting fraud alerts or credit freezes for consumer, are vulnerable to potential legislation.&lt;br /&gt;&lt;br /&gt;&quot;[This] business [specifically mentioned were LifeLock, TrustedID, and Debix] is vulnerable if Congress succeeds in pressuring the three major credit agencies to make these theft-fighting measures cheaper and more accessible to consumers. Sen. Charles Schumer, Democrat of New York, criticized the credit companies last month for making identity theft freezes too cumbersome to set and lift. Each of the three credit agencies recently bowed to public pressure and made freezes available in all 50 states.&quot;&lt;br /&gt;&lt;br /&gt;But this article is silent on the consumer need for professional ID theft recovery services. It is projected that over 10MM people in the US will fall victim to identity theft in 2008. Identity theft protection services such as ours, and those provided by others in this space, will help in turning this trend. But consumers should be told the truth. There isn&#39;t a silver bullet that will guarantee that you won&#39;t become a victim of identity theft.  ID thieves are using increasingly more sophisticated means to steal from you. Which is why if you opt for an identity theft protection service, it should include expert, professional, personal recovery assistance.</description><link>http://idsafeguards.blogspot.com/2007/11/missing-ingredient-in-most-id-theft.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0-p2rrtZ9hHiXWfNIypi-vfNuWfWpdYfGVRWKEsEk-Oeu01NnypBdQPb4k_JPhpTOQN3nQl14pOHXNVnNvTTJItaoIWX8Ilv1Ep12-lkfYIhfOZaqsKQlCKqFFpwP5WunQlM9OCdmWvo/s72-c/051026green_idtheft3_120x90.jpg" height="72" width="72"/><thr:total>11</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-2003630245649992227</guid><pubDate>Tue, 13 Nov 2007 02:10:00 +0000</pubDate><atom:updated>2008-12-09T21:11:46.138-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">credit bureaus</category><category domain="http://www.blogger.com/atom/ns#">credit freeze</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><title>Experian, Equifax and TransUnion Offer Credit Freeze to All Consumers</title><description>&lt;div&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiKsTqsORm_lU2ABQj5w3N5OtHrYsIXnedeX2auBAF6tegHc5RZpS6IGxJ3MRnZgb25Oyr1Py19eRIL4kmypyDbsHnckf-khwsE1N2G3KIwYsVBBNf9MqDqV2hDeP-0gSr11ZVwPSXUtNe/s1600-h/freeze.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5131042153302596674&quot; style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiKsTqsORm_lU2ABQj5w3N5OtHrYsIXnedeX2auBAF6tegHc5RZpS6IGxJ3MRnZgb25Oyr1Py19eRIL4kmypyDbsHnckf-khwsE1N2G3KIwYsVBBNf9MqDqV2hDeP-0gSr11ZVwPSXUtNe/s200/freeze.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Heather Wells (Recovery Advocate)&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;Starting this month, &lt;strong&gt;all&lt;/strong&gt; consumers will be able to place a “security freeze” with the three major credit reporting agencies. This &lt;a href=&quot;http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=LVRJNPT.story&amp;amp;STORY=/www/story/10-31-2007/0004694328&amp;amp;EDATE=WED+Oct+31+2007,+09:28+AM&quot;&gt;press release &lt;/a&gt; sent on October 31, 2007 details who is eligible to freeze their credit files for free and which folks may need to pay fees to each of the credit bureaus for this service. These fees are for &quot;freezing&quot; and &quot;thawing&quot; your credit files. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;Before November 1st of this year, there were 39 states (and DC) that had laws on the books stating that their residents could freeze their credit files. Some other states had adopted freeze laws that applied to victims of identity theft only. With this new law, everyone is eligible, whether they are victims of identity theft or not.&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;A security freeze (a.k.a. credit freeze) prevents creditors and other entities from viewing your credit report without your express permission. When you apply for credit with a freeze in place, you must use a PIN provided by the bureaus to temporarily lift the freeze. The temporary lift lasts 2-3 days and the entire process adds a few extra days to the application process. The freeze is in place indefinitely until you decide to permanently lift it. Much has been written about the benefits and drawbacks of the freeze. If you are thinking about placing a security freeze, be sure to take into consideration all of the negative consequences as well as the positive.&lt;br /&gt;&lt;br /&gt;For example, with a freeze in place, you may be denied employment because your potential employer is unable to conduct a background check. I have personally worked with victims of identity theft who were unable to purchase a new car at a &quot;super sale&quot; rate because they did not time the &quot;thawing&quot; of their credit files just right. On the other hand, there are many id theft victims who enjoy the peace of mind that the freeze offers them, and are more than willing to put up with any potential inconveniences or out-of-pocket expenses.&lt;br /&gt;&lt;br /&gt;The three credit bureaus have more information on security freezes at their websites, www.experian.com, www.transunion.com and www.equifax.com. &lt;/div&gt;&lt;/div&gt;</description><link>http://idsafeguards.blogspot.com/2007/11/experian-equifax-and-transunion-offer.html</link><author>noreply@blogger.com (Heather Wells)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiKsTqsORm_lU2ABQj5w3N5OtHrYsIXnedeX2auBAF6tegHc5RZpS6IGxJ3MRnZgb25Oyr1Py19eRIL4kmypyDbsHnckf-khwsE1N2G3KIwYsVBBNf9MqDqV2hDeP-0gSr11ZVwPSXUtNe/s72-c/freeze.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-5334948655037224991</guid><pubDate>Wed, 31 Oct 2007 15:25:00 +0000</pubDate><atom:updated>2008-12-09T21:11:46.354-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">bogus email</category><category domain="http://www.blogger.com/atom/ns#">FTC</category><category domain="http://www.blogger.com/atom/ns#">FTC email scam</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><title>Warning: Be on High Alert for Fake FTC Email Containing Virus</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1oJIwa3p9Fo36U539hV6385txCMr7HLaLiNUgroIOowR4I9atatsx_EFbROOA9NVw9zZDBeFCKHSWEqT0XkzN0KkT5iIvADbOS6tfNwfFcSJ43Y1_wwLqFSZbpZP5aT1ass8z9XuYzssP/s1600-h/ftclogo.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5127315503950823186&quot; style=&quot;FLOAT: left; MARGIN: 0pt 10px 10px 0pt; WIDTH: 191px; CURSOR: pointer; HEIGHT: 165px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1oJIwa3p9Fo36U539hV6385txCMr7HLaLiNUgroIOowR4I9atatsx_EFbROOA9NVw9zZDBeFCKHSWEqT0XkzN0KkT5iIvADbOS6tfNwfFcSJ43Y1_wwLqFSZbpZP5aT1ass8z9XuYzssP/s200/ftclogo.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by Heather Wells (Recovery Advocate)&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;An online &lt;a href=&quot;http://www.reuters.com/article/technologyNews/idUSN2932081820071029?feedType=nl&amp;amp;feedName=ustechnology&quot;&gt;article from Reuters &lt;/a&gt;dated October 29, 2007, details the latest alarming scam aimed at the unsuspecting public. Reuters reports that an unknown number of consumers may have received a bogus email that appears as though it was sent by the Federal Trade Commission (FTC). The emails are not from the FTC and are instead designed to lure an innocent victim to click on attachments and links that could leave them vulnerable to Identity Theft.&lt;br /&gt;&lt;br /&gt;“&#39;The e-mail says it is from ‘frauddep@ftc.gov’ and has the FTC&#39;s government seal. But it was not issued by the agency and has attachments and links that will download a virus that could steal passwords and account numbers, the agency said.&lt;br /&gt;&lt;br /&gt;&#39;It&#39;s a treasure trove for identity theft,&quot; said David Torok of the FTC&#39;s Bureau of Consumer Protection. ‘We&#39;re concerned. The virus that&#39;s attached to the e-mail is particularly virulent.’”&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Unfortunately, this isn’t the first time the Federal Trade Commission has had to issue a warning regarding bogus emails. In June of 2007, consumers were also under attack from fraudulent emails that looked like legitimate correspondence from the FTC.&lt;br /&gt;&lt;br /&gt;The Federal Trade Commission is encouraging consumers to forward the email to &lt;a href=&quot;mailto:spam@uce.gov&quot;&gt;spam@uce.gov&lt;/a&gt;, an FTC database, for investigation and then to delete the email. For more official information and instructions, go to the &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://www.ftc.gov/opa/2007/10/bogus.shtm&quot;&gt;FTC website&lt;/a&gt;. &lt;/span&gt;&lt;/div&gt;</description><link>http://idsafeguards.blogspot.com/2007/10/warning-be-on-high-alert-for-fake-ftc.html</link><author>noreply@blogger.com (Heather Wells)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1oJIwa3p9Fo36U539hV6385txCMr7HLaLiNUgroIOowR4I9atatsx_EFbROOA9NVw9zZDBeFCKHSWEqT0XkzN0KkT5iIvADbOS6tfNwfFcSJ43Y1_wwLqFSZbpZP5aT1ass8z9XuYzssP/s72-c/ftclogo.jpg" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-8398370631242746475</guid><pubDate>Tue, 30 Oct 2007 23:06:00 +0000</pubDate><atom:updated>2008-12-09T21:11:46.598-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">identity theft</category><category domain="http://www.blogger.com/atom/ns#">privacy times</category><category domain="http://www.blogger.com/atom/ns#">synthetic id fraud</category><title>Synthetic ID Theft</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7sAHi8K1QHBNJbcTTjofuuyzxhPnXi_sdcqhy45bTtYVDnCVgjUCjPzQB8_1bIoE_AX_J372OpDcd-YTMamJswA9wf9BxuRrwFXlYZc71jfy9tIh1x4wLVqqJkM7WRqQHtjYDNwO8KG0/s1600-h/wsj_header_408_62.gif&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7sAHi8K1QHBNJbcTTjofuuyzxhPnXi_sdcqhy45bTtYVDnCVgjUCjPzQB8_1bIoE_AX_J372OpDcd-YTMamJswA9wf9BxuRrwFXlYZc71jfy9tIh1x4wLVqqJkM7WRqQHtjYDNwO8KG0/s320/wsj_header_408_62.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5127271391016582866&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;by Doug Pollack&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The Wall Street Journal this week published an article on synthetic identity theft titled &lt;a href=&quot;http://online.wsj.com/article/SB119362045526074445.html&quot;&gt;&quot;The Borrower Who Never Was&quot;&lt;/a&gt; (Christoper Conkey, October 29, 2007).&lt;br /&gt;&lt;br /&gt;It describes how an identity thief named James Rose would create synthetic identities, those that appear real on paper, but were actually used by him in order to trick financial institutions into making loans or issuing credit cards.&lt;br /&gt;&lt;p class=&quot;times&quot;&gt;&quot;Working with a partner, Mr. Rose tricked the guardians of the  credit system -- lenders and the three big credit bureaus -- into treating his  fake identities as if they were real, creditworthy consumers. He obtained  several hundred credit cards in the names of Mr. Gregory and as many as 500  other fake personas over two years, filching around $750,000 over a two-year  period.&quot;&lt;/p&gt;&lt;p class=&quot;times&quot;&gt;Unlike more common identity theft, synthetic identities are used primarily to defraud financial institutions without affecting individuals.  Mr. Rose noted that their goal was to &quot;make a lot of money without actually hurting people.&quot; &lt;/p&gt;&lt;p class=&quot;times&quot;&gt;Despite protestations to the contrary, some feel credit bureaus aren&#39;t doing enough to deter identity theft. In the case of synthetic identity theft, it is the knowledge of credit bureau procedures that enable criminals to create and exploit synthetic identities. Evan Hendricks, editor of Privacy Times, notes that &quot;the credit bureaus are at the epicenter of identity theft and there&#39;s no  pressure at this point to force them to make changes.&quot;&lt;/p&gt;</description><link>http://idsafeguards.blogspot.com/2007/10/synthetic-id-theft.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7sAHi8K1QHBNJbcTTjofuuyzxhPnXi_sdcqhy45bTtYVDnCVgjUCjPzQB8_1bIoE_AX_J372OpDcd-YTMamJswA9wf9BxuRrwFXlYZc71jfy9tIh1x4wLVqqJkM7WRqQHtjYDNwO8KG0/s72-c/wsj_header_408_62.gif" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-588339855642733805</guid><pubDate>Tue, 23 Oct 2007 21:45:00 +0000</pubDate><atom:updated>2008-12-09T21:11:47.024-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">identity fraud</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><category domain="http://www.blogger.com/atom/ns#">us secret service</category><category domain="http://www.blogger.com/atom/ns#">utica college</category><title>Business breaches a source of identity fraud</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiynTW8h2zvyM81p_7T0tLjX5KE9E12Q01D-x8lU516cKQ83wJu5LMiimt24cyY11NG4cscLM3kUUa17ig01iytrligVJI4jjUXhUuHHdsYEQ8VrLaQ8JIbVCZ1tAcvW951uS5gY-bXYhY/s1600-h/A1-pe-front.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 131px; height: 239px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiynTW8h2zvyM81p_7T0tLjX5KE9E12Q01D-x8lU516cKQ83wJu5LMiimt24cyY11NG4cscLM3kUUa17ig01iytrligVJI4jjUXhUuHHdsYEQ8VrLaQ8JIbVCZ1tAcvW951uS5gY-bXYhY/s320/A1-pe-front.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5124305195885096578&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;by Doug Pollack&lt;br /&gt;&lt;br /&gt;A recently federally funded study on identity fraud by Utica College&#39;s Center for Identity Management and Information Protection &quot;paints a complex portrait of the signature crime of the digital age, one that has been the top consumer fraud complaint to federal authorities for six consecutive years.&quot;&lt;br /&gt;&lt;br /&gt;As described in a recent article titled &lt;a href=&quot;http://www.latimes.com/technology/la-fi-idtheft22oct22,1,4008132.story?coll=la-headlines-technology&quot;&gt;In Many Major Cases ID Theft isn&#39;t Persona&lt;/a&gt;l (Joseph Menn, LA Times-Washington Post, 10-22-07), this study challenges a widely held perception that a majority of identity theft cases occur with people that are known to the victim.&lt;br /&gt;&lt;br /&gt;Based on 500 individuals arrested by the US Secret Service over the last several years, only 8% were relatives of or acquainted with their victims.  The most common tool for identity theft based on this study was any of a variety of technology devices, including credit card encoders, computer printers and telephones, which contributed to 37% of the cases.&lt;br /&gt;&lt;br /&gt;This study further reinforces the need for individuals to be very careful with their personal information, and how and when and to whom they disclose it, but also highlights that identity theft can occur even to those people that are consummately careful.</description><link>http://idsafeguards.blogspot.com/2007/10/business-breaches-source-of-identity.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiynTW8h2zvyM81p_7T0tLjX5KE9E12Q01D-x8lU516cKQ83wJu5LMiimt24cyY11NG4cscLM3kUUa17ig01iytrligVJI4jjUXhUuHHdsYEQ8VrLaQ8JIbVCZ1tAcvW951uS5gY-bXYhY/s72-c/A1-pe-front.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-3295839436577454789</guid><pubDate>Thu, 18 Oct 2007 16:29:00 +0000</pubDate><atom:updated>2008-12-09T21:11:47.241-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">clark howard</category><category domain="http://www.blogger.com/atom/ns#">fraudstop</category><category domain="http://www.blogger.com/atom/ns#">ID theft</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><title>Clark Howard on ID Theft Services</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEhSlVaFBe0Ah8wmUryTXv9civ5Iz-loerVsGulFRO7fyVBsAUGWRmFB_oUCZqs7E01hW_Wyqf2NbsRzTkuvUbOvo1Q__E2ek1cDp5ZBbI_fINm6NqekV2itPbL2ugZt63P5qXc7GwTZE/s1600-h/video_icon_blue1.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEhSlVaFBe0Ah8wmUryTXv9civ5Iz-loerVsGulFRO7fyVBsAUGWRmFB_oUCZqs7E01hW_Wyqf2NbsRzTkuvUbOvo1Q__E2ek1cDp5ZBbI_fINm6NqekV2itPbL2ugZt63P5qXc7GwTZE/s320/video_icon_blue1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5122715589834141298&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;by Doug Pollack&lt;br /&gt;&lt;br /&gt;I&#39;ve been a long time listener of Clark Howard. It is hard not to appreciate the solid advice on how to save money and not &quot;get ripped off&quot;.&lt;br /&gt;&lt;br /&gt;With the expansion of competing services targeted at consumers to protect from identity theft,  it can be difficult knowing who to trust or what criteria to use in selecting a service. He has commented extensively on identity theft, and provided the &lt;a href=&quot;http://clarkhoward.com/shownotes/2006/09/29/&quot;&gt;following advice&lt;/a&gt; to his listeners:&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;content&quot;&gt;&quot;Clark gets tons of calls about identity theft. It has remained a real aggravation for people, especially when they have been a victim. ...The only time he would recommend paying for a service is if a human being comes with the deal, and that person is going to clean up your credit for you. &quot;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;After 4 years in the ID theft protection business, &lt;a href=&quot;http://www.idsafeguards.com&quot;&gt;ID Safeguards&lt;/a&gt; launched a new consumer identity theft protection service earlier this week called &lt;a href=&quot;http://www.idsafeguards.com&quot;&gt;FraudStop&lt;/a&gt;. FraudStop is distinctive in that it provides exactly this kind of personal service to victims of identity theft. The company has a team of experienced &quot;recovery advocates&quot; that, if a FraudStop member falls victim to identity theft, will personally take on their case and do everything necessary on their behalf to restore them to pre-theft condition. &lt;br /&gt;&lt;br /&gt;While I realize that Clark Howard doesn&#39;t endorse products, which is part of his appeal, I am pleased that the FraudStop offering from ID Safeguards is in alignment with the advice that he gives to his listeners.</description><link>http://idsafeguards.blogspot.com/2007/10/clark-howard-on-id-theft-services.html</link><author>noreply@blogger.com (Doug Pollack)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEhSlVaFBe0Ah8wmUryTXv9civ5Iz-loerVsGulFRO7fyVBsAUGWRmFB_oUCZqs7E01hW_Wyqf2NbsRzTkuvUbOvo1Q__E2ek1cDp5ZBbI_fINm6NqekV2itPbL2ugZt63P5qXc7GwTZE/s72-c/video_icon_blue1.jpg" height="72" width="72"/><thr:total>131</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-6077382310095450064</guid><pubDate>Sat, 13 Oct 2007 15:36:00 +0000</pubDate><atom:updated>2008-12-09T21:11:47.475-08:00</atom:updated><title>ID Thieves Steal Medical Services, Cause More Pain</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP-n6RB6e9XJpDqVCgPG-s-tRGJZiSfWdz86SJGdbmGsOo151Dv4UKRHmHc5IGgt6Y82ftEaSmsDj_xIq3BdraeIdNq3F8KsHaKbP_zPqmtFUhfKa6Z94TyhTRhh2BarGDK2LBFqcX5HEa/s1600-h/images.jpeg&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP-n6RB6e9XJpDqVCgPG-s-tRGJZiSfWdz86SJGdbmGsOo151Dv4UKRHmHc5IGgt6Y82ftEaSmsDj_xIq3BdraeIdNq3F8KsHaKbP_zPqmtFUhfKa6Z94TyhTRhh2BarGDK2LBFqcX5HEa/s320/images.jpeg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5120848388833293202&quot; /&gt;&lt;/a&gt; by Rick Kam&lt;br /&gt;&lt;br /&gt;In an article written by Victoria E. Knight on October 11, 2007 in the Wall Street Journal, &lt;a href=&quot;http://online.wsj.com/article_print/SB119206024712655344.html&quot;&gt;Escalating Healthcare Costs Fuel Medical ID theft&lt;/a&gt;, Victoria explains:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style:italic;&quot;&gt;&quot;One of the biggest threats posed by medical identity theft is that victims can receive the wrong medical treatment based on the fraudulent information in their medical records. (You are allergic to penicillin, the impostor isn&#39;t.) In addition, theft can cause victims to fail pre-employment medical exams or become uninsurable.&quot;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;What is Medical ID Theft?&lt;br /&gt;&lt;br /&gt;Medical identity theft is when someone uses your name and health insurance without your knowledge or consent to obtain medical treatment, prescription drugs or goods. At least a half-million Americans have been affected, according to Pam Dixon, Executive Director of the &lt;a href=&quot;http://www.worldprivacyforum.org/medical.html#mit&quot;&gt;World Privacy Forum&lt;/a&gt;, a San Diego research group that focuses on privacy issues.&lt;br /&gt;&lt;br /&gt;What can be done to protect yourself from Medical ID theft?&lt;br /&gt;&lt;br /&gt;Like protecting yourself other forms of ID theft, we suggest being aware of potential misuse of your personal data.  Check those explanation of benefits statements you get after visiting the doctor to make sure the medical services you received are accurate, and that you were the one that received them.  &lt;br /&gt;&lt;br /&gt;There are new identity monitoring solutions in the market that detect both financial and non-financial fraud (i.e. medical ID Theft). Credit monitoring is not effective in detecting this issue or many other issues involving non-financial crimes.</description><link>http://idsafeguards.blogspot.com/2007/10/id-thieves-steal-medical-services-cause.html</link><author>noreply@blogger.com (Rick Kam)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP-n6RB6e9XJpDqVCgPG-s-tRGJZiSfWdz86SJGdbmGsOo151Dv4UKRHmHc5IGgt6Y82ftEaSmsDj_xIq3BdraeIdNq3F8KsHaKbP_zPqmtFUhfKa6Z94TyhTRhh2BarGDK2LBFqcX5HEa/s72-c/images.jpeg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-4676991533777385634</guid><pubDate>Wed, 10 Oct 2007 00:30:00 +0000</pubDate><atom:updated>2008-12-09T21:11:47.640-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">debix</category><category domain="http://www.blogger.com/atom/ns#">equifax</category><category domain="http://www.blogger.com/atom/ns#">experian</category><category domain="http://www.blogger.com/atom/ns#">ID theft</category><category domain="http://www.blogger.com/atom/ns#">intersections</category><category domain="http://www.blogger.com/atom/ns#">lifelock</category><category domain="http://www.blogger.com/atom/ns#">mayor bloomberg</category><category domain="http://www.blogger.com/atom/ns#">truecredit</category><title>Would You Notice $400,000 Missing From Your Checking Account?</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt2BmkXUkZ9B0pEgZVSdiSzgCFrgal7ox47TQPEd9saIFhTld_OXcQ-N9l9JWnLiC5tS1BDTfyOFB3GcE41Wcy0z4mzWV0etGgKW9Ol2vxL19wK99KYzFrWA7uVTRz7jtdan14tffVVk05/s1600-h/images.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt2BmkXUkZ9B0pEgZVSdiSzgCFrgal7ox47TQPEd9saIFhTld_OXcQ-N9l9JWnLiC5tS1BDTfyOFB3GcE41Wcy0z4mzWV0etGgKW9Ol2vxL19wK99KYzFrWA7uVTRz7jtdan14tffVVk05/s320/images.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5116870943823031682&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;by Rick Kam&lt;br /&gt;&lt;br /&gt;In an article published in the &lt;a href=&quot;http://cityroom.blogs.nytimes.com/2007/10/02/the-latest-victim-of-identity-fraud-mayor-bloomberg/index.html?ex=1349064000&amp;amp;en=1bf18dccb0607413&amp;amp;ei=5088%20&amp;amp;partner=rssnyt&amp;amp;emc=rss&quot;&gt;New York Times&lt;/a&gt; by Sewell Chan on October 2, 2007, Chan reports that Mayor Bloomberg fell victim to Identity Theft.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;&quot;In early June, Mr. Bostic deposited a $190,000 forged check into the Sovereign account and a $230,000 forged check into PNC account, according to prosecutors. Both of the forged checks were drawn on Mr. Bloomberg’s personal account at the Bank of America and were issued in the name of the mayor’s financial manager, Geller &amp;amp; Company.&quot;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You might ask could this happen to me?&lt;br /&gt;&lt;br /&gt;The answer is yes. There are many types of financial and non-financial ID theft.  Credit card fraud and someone withdrawing money from your checking account happens a lot.&lt;br /&gt;&lt;br /&gt;You might say, &quot;I have a service that freezes my credit or automatically sets fraud alerts to guarantee against ID theft&quot;.  The answer is, these solutions will prevent the issue that happened to Bloomberg - an ID thief stealing money being taken from his checking account.&lt;br /&gt;&lt;br /&gt;There are new services on the horizon that monitor credit, checking, and other forms of financial and non-financial personal data to detect misuse of your information and provide 360 degree protection.  You will see these new services become available in the market and be more effective, but cost roughly what consumers pay today for less effective solutions.  More on this in a future post....</description><link>http://idsafeguards.blogspot.com/2007/10/would-you-notice-400000-missing-from.html</link><author>noreply@blogger.com (Rick Kam)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt2BmkXUkZ9B0pEgZVSdiSzgCFrgal7ox47TQPEd9saIFhTld_OXcQ-N9l9JWnLiC5tS1BDTfyOFB3GcE41Wcy0z4mzWV0etGgKW9Ol2vxL19wK99KYzFrWA7uVTRz7jtdan14tffVVk05/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3568910419673544419.post-4948975183537733713</guid><pubDate>Wed, 03 Oct 2007 23:26:00 +0000</pubDate><atom:updated>2008-12-09T21:11:47.794-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">gap security breach</category><category domain="http://www.blogger.com/atom/ns#">identity theft</category><category domain="http://www.blogger.com/atom/ns#">social security number</category><title>Gap Reports Theft of Laptop Containing Personal Information</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwBXhnuDl-tPULA2zZ6FSnPCrYtHoauFORKY_VLXuUbj6DYctMGlRgd1QhfwgAJ8jEDyNMGb7WERd25iRuAPtkQHOo6teJ_drdkXCJ2BweAIiwAsXjZX5lM2irh_EXbAliCHCIzm380qu-/s1600-h/gap+3.jpg&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5116508857873721042&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwBXhnuDl-tPULA2zZ6FSnPCrYtHoauFORKY_VLXuUbj6DYctMGlRgd1QhfwgAJ8jEDyNMGb7WERd25iRuAPtkQHOo6teJ_drdkXCJ2BweAIiwAsXjZX5lM2irh_EXbAliCHCIzm380qu-/s200/gap+3.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;by Heather Wells (Recovery Advocate)&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;800,000 applicants for employment with the Gap may have had their personal information compromised, according to a September 29, 2007 article in &lt;/span&gt;&lt;a href=&quot;http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2007/09/29/BU9NSGFBK.DTL&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;SFGate.com&lt;/span&gt;&lt;/a&gt; written by Carolyn Said.&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;em&gt;&lt;em&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;em&gt;&lt;em&gt;“The San Francisco retailer on Friday reported the theft of a &lt;/em&gt;&lt;/em&gt;&lt;em&gt;&lt;em&gt;laptop containing unencrypted personal information for 800,000 job &lt;/em&gt;&lt;/em&gt;&lt;em&gt;&lt;em&gt;applicants. &lt;/em&gt;&lt;em&gt;The data, stolen from the offices of a third-party vendor, covered job seekers in the United States, Canada and Puerto Rico who applied online or by phone between July 2006 and June 2007. Most of the applicants were seeking jobs at Old Navy, although some applied for jobs at Gap, Banana Republic and Outlet stores.&quot;&lt;/em&gt;&lt;/em&gt;&lt;/span&gt;&lt;/em&gt;&lt;/em&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;A majority of people think that it’s required to put their social security number, date of birth, and other personal data on an application for employment or on a resume. This is a common misperception that makes job applicants extremely vulnerable to Identity Theft. So, what are some items that &lt;strong&gt;DO NOT&lt;/strong&gt; belong on a resume or job application?&lt;br /&gt;&lt;br /&gt;1) Your Social Security Number&lt;br /&gt;2) Date of Birth&lt;br /&gt;3) Driver’s License Number&lt;br /&gt;&lt;br /&gt;If a company requests any of this information simply write “see below” and then add a note at the bottom of the application stating that you would “be happy to give this information during the interview process.” Explain to your potential employer that you are simply protecting yourself from the threat of Identity Theft.&lt;br /&gt;&lt;br /&gt;In general, employers do not make a hiring decision based solely on looking at an application or resume and they do not need this info unless they are truly interested in hiring you. The same goes applying for a job over the phone. Explain to the person taking down your name and work experience that you don&#39;t feel comfortable giving up so many other personal details on the telephone. You never know where your information could end up, on an unsecured computer or desktop, in a trashcan, or even worse, in the hands of an id thief!&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://idsafeguards.blogspot.com/2007/09/gap-reports-theft-of-laptop-containing.html</link><author>noreply@blogger.com (Heather Wells)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwBXhnuDl-tPULA2zZ6FSnPCrYtHoauFORKY_VLXuUbj6DYctMGlRgd1QhfwgAJ8jEDyNMGb7WERd25iRuAPtkQHOo6teJ_drdkXCJ2BweAIiwAsXjZX5lM2irh_EXbAliCHCIzm380qu-/s72-c/gap+3.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>