07.02.2015 Views

EF summer 08.indd - National Association of Professional Allstate ...

EF summer 08.indd - National Association of Professional Allstate ...

EF summer 08.indd - National Association of Professional Allstate ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

feature<br />

How Safe is Your Identity<br />

BY STACY NUTTER<br />

It wasn’t until 1997 that credit cards<br />

could be “securely” used online. Ten years<br />

later, data breaches and identity thefts<br />

are exploding in volume. How important<br />

is control <strong>of</strong> data Pretty important. Data<br />

leads to information, information leads<br />

to knowledge and knowledge is power.<br />

Power leads to cash and cash is king! You<br />

would have thought, given its importance,<br />

more attention would have been<br />

paid to preserving this asset over the<br />

past 10 years. Apparently, that’s not the<br />

case and identity theft is now the fastest<br />

growing crime in America.<br />

Probably the most common form <strong>of</strong><br />

identity theft is financial. Someone uses<br />

your name and social security number<br />

to obtain new credit to purchase cell<br />

phones, rent apartments, set up corporations<br />

and/or open new credit cards in<br />

your name – any one <strong>of</strong> which can destroy<br />

a good credit rating in an instant.<br />

Everything you have worked your entire<br />

life to build is suddenly gone. You find<br />

yourself paralyzed by the daunting task<br />

in front <strong>of</strong> you – closing accounts you<br />

didn’t open, repairing your credit report<br />

and reclaiming your identity.<br />

Consider these facts.<br />

• Identity theft takes place every 3.1<br />

seconds in the U.S. That’s 20 victims every<br />

minute. Last year alone there were 10 million<br />

victims <strong>of</strong> Identity Theft. In the first<br />

quarter <strong>of</strong> 2008, there were more than 8.3<br />

million identity breaches. People are annoyed<br />

and understandably anxious over the<br />

loss or theft <strong>of</strong> their personal information<br />

and feel that they have no control over it.<br />

• It can take approximately 300<br />

hours and $1500-$8000 to clean up the<br />

mess that identity theft leaves behind.<br />

• A good identity thief will get your<br />

information and hold it for at least a year<br />

before using or selling it.<br />

• Employers are responsible for the<br />

security <strong>of</strong> their employees’ and their customers’<br />

personal information. If there is a<br />

breach <strong>of</strong> any kind, employers are required<br />

to report it to the Federal Trade Commission<br />

(FTC) and send out letters to everyone<br />

affected. If an employee’s identity is<br />

stolen as a result <strong>of</strong> the breach, they can<br />

use company time (avg. 300 hours) to remediate<br />

their credit and cure the breach.<br />

This process cuts down on productivity<br />

and employees lose confidence in their<br />

employer’s ability to maintain secure files.<br />

• Statistics show that once a company<br />

has had a breach that could result in<br />

identity theft, nearly 1/3 <strong>of</strong> consumers or<br />

employees will terminate their relationship<br />

with the company.<br />

• Children are vulnerable because<br />

they do not use their social security<br />

numbers to obtain credit until they are<br />

18 years <strong>of</strong> age. By this time, an identity<br />

thief could have been utilizing their<br />

identity for years.<br />

• Identity theft costs everyone money.<br />

Last year TJMaxx paid out over $60<br />

million to VISA and MasterCard for a<br />

breach in the security <strong>of</strong> their customers.<br />

• The IRS now has problems securing<br />

the information on your filed return.<br />

The Treasury Inspector General for Tax<br />

Administration stated that “a hacker<br />

could gain full control because <strong>of</strong> inadequate<br />

security controls” according to a<br />

recent report. “A disgruntled employee,<br />

contractor or hacker could reconfigure<br />

routers and switches to disrupt computer<br />

operations and steal taxpayer information<br />

in a number <strong>of</strong> ways, including diverting<br />

the information to unauthorized<br />

systems” the report says. This report was<br />

printed in the first quarter <strong>of</strong> 2008!<br />

• Some retailers have decided that<br />

it is cheaper to pay the penalties rather<br />

than update the security <strong>of</strong> their credit<br />

card transaction systems. Unfortunately,<br />

that isn’t true. Remember the TJ Maxx<br />

incident This lax attitude should scare<br />

each and every one <strong>of</strong> us!<br />

• Identity thieves can access and use<br />

your medical benefits and you may not<br />

know it for years. This is particularly dangerous<br />

because the “health information” <strong>of</strong><br />

Summer 2008 Exclusivefocus — 17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!