ÃÛÌÒÊÓƵ

Protect YOUR Identity

Identity theft occurs when someone uses another person’s personal information to take on that person’s identity in order to commit fraud or other crime. This would include personal information such as:

  • Name
  • Social security number
  • Driver’s license number
  • Credit card number
  • Other identifying information

WarningWarning Signs

Several clues that indicate someone may have stolen your identity include:

  • Phone calls from debt collectors
  • Unexplained strange withdrawals from your bank account
  • Notice by certified mail from the IRS (the IRS does not call you)
  • Unauthorized charges on your credit card

Suspect Identity Theft? Act Quickly!

 will guide you through each step.

  1. Call the companies that you know, where fraud occurred.
  2. Place a fraud alert on your credit reports.
  3. Report the Identity Theft to the FTC (Federal Trade Commission).
  4. File a report with the local police.

For more information:

Tips to Secure Your Information

  • Keep Personal Information Secure Offline
    • Use common sense. If it sounds too good to be true it’s probable fraud. Keep your financial documents, social security cards, and credit cards secure.
    • Be careful about giving money to someone who contacts you, especially if they ask for it by cash card.
    • Before you share personal information like your social security number, ask why they need it and if another form of identification can be used.
    • Shred receipts, credit offers, insurance and doctor’s statements, and bank statements that are no longer needed.
    • Destroy the labels on prescription bottles before throwing them out. Do not share your health plan information with offers of free health services.
    • If your mailbox is not secure, be careful of mail coming in and out that contains personal information. Be extremely careful when ordering new checks or getting new credit cards.
  • Keep Personal Information Secure Online

    Make sure you know who you are really dealing with. Do not give out personal or financial information on the phone, through the mail, or over the Internet unless you initiated the contact or know who you are dealing with. If a company sends you an email asking for personal information, don’t click on links in the email. Instead, go directly to their website and call their customer service number.

    Use a utility that overwrites your data before disposing of a computer, printer, copier or storage device. (Anything with a hard drive). Follow the instructions on the IT Equipment Removal Request (PDF) form to get this done if this is a ÃÛÌÒÊÓƵ University device.

    Before disposing of a mobile device, remove personal data. Check the owner’s manual or take it to the place you bought it to have it cleaned properly. Remove the memory or SIM card.

    Only enter personal information on secure Web pages that encrypt your data. These pages will begin with “https” in the URL or a padlock icon will be displayed on the browser.

    Use strong passwords. Be creative. Think of an easy-to-remember phase and replace some words with numbers or special characters. “I am at the Gulf of Mexico” could become 1a@tGoM. 

  • Keep Personal Devices Secure
    • Keep your device updated with the latest security patch available.
    • Install anti-virus software. Set your preferences to automatically update. Set your browsers to automatically update.
    • Avoid phishing emails. Be careful about clicking on links or downloading attachments from strangers.