Identity Theft
What is identity theft?
Crooks can create an illusion that they really are you. Once in that position they can transfer money from your accounts, apply for loans and credit cards, redirect mail, buy merchandise, vacations and even homes.
There are many ways someone can access your personal information:
1. Mail Theft
Superboxes and apartment boxes are more of a target than individual mailboxes for mail theft. This may include redirection of mail as well as theft of mail.
- Be vigilant and report suspicious activities around mailboxes.
- Pay attention if you do not receive mail that you had expected.
- Don’t let mail build up in your mailbox.
2. Intercepting Garbage
- Shred all documents containing personal information before discarding.
- Businesses should be especially careful to guard their client’s information.
3. Theft of Wallets and Purses
Your identification is often more valuable than the cash.
- Do not carry unnecessary identification (passports, birth certificate, Social Insurance card).
- Report stolen credit and bank cards.
4. Using Computers to Steal Personal Information
Phishing
refers to directing people to web sites which look official
but are in fact bogus sites designed to access personal information. For example, if your bank’s web site is www.mybank.ca, beware of www.mybank.com, www.my_bank.ca, or similar variations - they may be fake! Back doors
or Trojans
are programs that may be loaded onto your computer, usually by e-mail, that enable other computers to remotely access your data. The threat can be eliminated through proper use of Internet security programs or firewalls, used in conjunction with anti-virus software.
- Only share personal information on trusted and secure web sites. (secure sites begin with
https:
). - Do not open suspicious e-mail. Use anti-virus software to filter e-mail.
Wipe
your computer hard drives if you sell or dispose of an old computer.- Use a firewall or Internet Security Software to prevent hackers from accessing your data.
5. ATM Fraud
Tampering with automated teller machines (ATMs) and point of sale terminals enables thieves to read your debit or credit card number and personal identification number (PIN).
- Only share personal information on trusted and secure web sites. (secure sites begin with
https:
). - Do not open suspicious e-mail. Use anti-virus software to filter e-mail.
Wipe
your computer hard drives if you sell or dispose of an old computer.- Use a firewall or Internet Security Software to prevent hackers from accessing your data.
- Use familiar ATMs.
- ATMs with security cameras (including machines located inside businesses and in business-hours branches) are less likely to attract criminals.
- Be suspicious if your card is "eaten" by the machine and someone approaches you to say the same thing happened to them, then advises you to enter your PIN again.
- Limit your after-hours ATM use.
- Watch for "shoulder surfers" who watch you enter your PIN
- Keep a watchful eye on your monthly statement, as well as your balance
How will you know if your identity has been stolen?
- You learn of a credit application that you did not make.
- Regular statements do not appear in the mail.
- A payment is charged to you that you did not authorize.
- A collection agency informs you that you have defaulted on a payment you did not make.
What can you do if you think you are a victim?
- Notify your bank or credit card company IMMEDIATELY.
- Contact Equifax (866) 828-5961 and Trans Union (800) 663-9980 and request a
fraud alert
be placed on your credit record. - Contact your local police.
- Contact the Canadian Anti-Fraud Call Centre
- Record the dates and times of what you do and whom you speak with.
Resources
- www.rcmp.gc.ca/scams-fraudes/id-theft-vol-eng.htm
- www.antifraudcentre-centreantifraude.ca
- www.fightidentitytheft.com
- Date modified: