TITLE

UNDERSTANDING IDENTITY THEFT

PUB. DATE
January 2007
SOURCE
Identity Theft Repair Kit;Jan2007, p1
SOURCE TYPE
Pamphlet
DOC. TYPE
Article
ABSTRACT
The article focuses on the protection from identity theft. It says that identity theft starts when a stranger gets hold of identifying information of someone including social security number, address and date-of-birth. It cites that use credit cards on a trusted internet site only, keep the files in a safe place, and bring credit cards that can be used only, are just one of the thousand ways to protect oneself. It notes that a victim of identity theft should contact the authority immediately.
ACCESSION #
45462982

 

Related Articles

  • Identity Theft: The Pros and Cons of Identity Scoring vs. Credit Monitoring. Collins, Jim // Business Journal (Central New York);8/1/2008, Vol. 22 Issue 31, p10 

    The article discusses identity theft. The Identity Theft Resource Center, a nonprofit organization which focuses on the understanding and prevention of identity theft, defines identity theft as a crime wherein an impostor obtains important pieces of personal identifying information, such as...

  • Other reports can tip you off to fraud.  // Consumer Reports Money Adviser;Feb2012, Vol. 9 Issue 2, p4 

    The article presents information on ways consumers can discover identity theft and fraud which includes using the public records search LexisNexis File Disclosure, reviewing annual medical benefit statements, and checking prescription drug history.

  • THE INVISIBLE AGENCY. Hay, Jacob // Saturday Evening Post;2/7/1959, Vol. 231 Issue 32, p35 

    Narrates the story of Ben Wattress, an ordinary citizen and reporter who invented the U.S. Inland Security Board. Impression of the author on Wattress' ingenuity; Factors contributing to the discovery of Wattress' fraudulent act; Evidences supporting the notion that Wattress' girlfriend connived...

  • Scam Alert.  // Guide;Jun2006, Vol. 26 Issue 6, p10 

    This article presents information on the outbreak of impersonation fraud in the U.S. Some scammers are cheating advertisers and readers of the journal "Guide." The scammers impersonate themselves as ad representatives of the journal and call a businessman who often gives advertisement to the...

  • CROSSBEAM SYSTEMS HELPS BT STRENGTHEN VIRTUAL SECURITY.  // Computer Security Update;Jul2008, Vol. 9 Issue 7, p7 

    The article reports that Affinion Security Center has increased the security and protection features of ID secure, a cornerstone of the Affinion Security Center suite. Affinion Security Center is a division of Affinion Group Inc. that provides more than five million consumers with identity theft...

  • Protecting Yourself Against IDENTITY THEFT. Exnicios, Lauren // Soldiers;Feb2008, Vol. 63 Issue 2, p36 

    The article offers tips on how to protect against identity theft. The best way to prevent identity theft is by ensuring that personal information can not be accessed by unauthorized persons. Detect unauthorized activity by monitoring financial records regularly. When an individual falls victim...

  • The ‘Criminal Investigation Unit’ Hoax.  // Consumer Reports;Nov2014, Vol. 79 Issue 11, p16 

    The article provides information on impersonation fraud scam operations in which criminals claim to be government or business officials in order to trick consumers into providing money or personal information. Topics include details of common scams involving computer technical support or overdue...

  • FDIC Details ID Theft Policy. Adler, Joe // American Banker;4/13/2007, Vol. 172 Issue 71, p3 

    The article discusses the release of a document by the Federal Deposit Insurance Corp. which lays out its supervisory policy for preventing identity theft. The document was supposed to be released in time with recommendations by the President's Identity Theft Task Force, but that announcement...

  • AVOID IDENTIFY THEFT: JUST THE FACTS, PLEASE!  // Q!;Winter2010, Vol. 5 Issue 4, p5 

    The article offers tips to avoid identity theft, highlighting eight answers that could compromise the security of one's identity information.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sign out of this library

Other Topics