Protect Your Identity

Your identity consists of many individual pieces of information; name, phone number, address, employee number, PINs, credit card numbers, bank account number, drivers license, passport, student number, ID badges, email and other accounts and credentials.

 

What is identity theft?

Identity theft is essentially the act of stealing enough of your identity information to commit fraud, purchase goods and services, or to commit other crimes in your name. The thief could apply for loans and credit cards, send and receive mail on your behalf, travel as you, change your address, sell your property, or implicate you in criminal activities. You will not be aware that debt is mounting until a collection agency or the police track you down. Identity theft can take months, and sometimes even years to detect, and it can take just as long to correct the damage.

Identity theft is not a new phenomenon; however, modern advances in telecommunications and computer processing have made it more convenient for identity thieves to exploit stolen identities

How identity thieves get your personal information?

Skilled identity thieves use a variety of methods to obtain your data, such as:

  • Stealing personal property, like wallets, purses and mail that may contain personal information
  • Rummaging through your garbage at home or work
  • Gathering information that you have posted on the Internet
  • Obtaining your financial information by masquerading as an authority figure
  • Watching over your shoulder while you enter passwords or a PIN
  • Tricking you into giving them information through well crafted email or web sites posing as trusted contacts or organizations
  • Hacking into your computer at home or work and harvesting user IDs, passwords, contact, and any other useful information

Details

Article ID: 1242
Created
Mon 5/17/21 3:37 PM
Modified
Fri 2/24/23 12:56 PM

Related Articles (1)

All of us are concerned about personal and financial information, and while TRU employs good security and technological safeguards, your help is needed to protect confidential information. Following these 10 steps is a simple and effective way to reduce the risk of theft or misuse of yours and others personal and financial information.