Tuesday, September 16, 2008

The Fastest Growing Crime in America Today!

Practically anyone who is born in this day and age will have a piece of information about him kept in a database somewhere. Your birthday, address, social security, tax identification, mortgage, school records, driving citations, credit application, loan application and even your prescription. There's always some form of data or information about us kept in some database somewhere. If those sets of information are assumed by someone else besides you then someone just practically stole your whole life and everything that goes with it--credit ratings included.

We take for granted a lot of information we give away in some forms, applications or even over the phone in a public booth. It never occurred to us that those pieces of information in the wrong hands can mean someone can assume our identity and do almost anything with it like apply for a loan, use our credit, subscribe for membership in clubs, or commit crime in our name.

Identity theft is defined by the ID Theft Act (18 U.S.C. § 1028(a)(7), 1029(e)) and by FTC Rule 16 C.F.R. § 603.2, and includes the misuse or attempted misuse of any identifying information – such as the SSN, biometric data, or an existing credit card account number - to commit fraud.

According to the Federal Trade Commission in its 2006 Identity Report "approximately 8.3 million U.S. adults discovered that they were victims of some form of ID theft in 2005."

In the United States alone it was estimated that 15 million people (or 1 in 20) have their identity compromised in 2006. The University of Texas - Arlington Alumni Association in 2006 believed that 100,000,000 people have been affected by losses of personal data in the last 20 months prior to November of that year. 5 million of these are from university losses so much so that Arlington Alumni Association enrolled their 130,000 alumni throughout the U.S. in an Identity Theft Protection service provided by LifeLock.

==============================================

LifeLock® helps consumers to render their personal information useless to thieves, backing up its service with a one million-dollar service guarantee. Famous for its CEO giving out his Social Security Number in advertising and national press, the company is experiencing astounding growth. Located in a secure facility in Tempe, Arizona, LifeLock is a private company backed by Goldman Sachs, Kleiner Perkins Caufield and Byers, as well as Bessemer Venture Partners.

==============================================

Here are some relevant information from the United States Federal Trade Commission (FTC)

How do thieves steal an identity?

According to a Federal Trade Commission advisory, identity theft starts with the misuse of your personally identifying information such as your name and Social Security number, credit card numbers, or other financial account information. For identity thieves, this information is as good as gold. Skilled identity thieves may use a variety of methods to get hold of your information, including:

  1. Dumpster Diving. They rummage through trash looking for bills or other paper with your personal information on it.
  2. Skimming. They steal credit/debit card numbers by using a special storage device when processing your card.
  3. Phishing. They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information.
  4. Changing Your Address. They divert your billing statements to another location by completing a change of address form.
  5. Old-Fashioned Stealing. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access.
  6. Pretexting. They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.

What do thieves do with a stolen identity?

Once they have your personal information, identity thieves use it in a variety of ways.

Credit card fraud:

  • They may open new credit card accounts in your name. When they use the cards and don't pay the bills, the delinquent accounts appear on your credit report.
  • They may open new credit card accounts in your name. When they use the cards and don't pay the bills, the delinquent accounts appear on your credit report.
  • They may change the billing address on your credit card so that you no longer receive bills, and then run up charges on your account. Because your bills are now sent to a different address, it may be some time before you realize there's a problem.

Phone or utilities fraud:

  • They may open a new phone or wireless account in your name, or run up charges on your existing account.
  • They may use your name to get utility services like electricity, heating, or cable TV.

Bank/finance fraud:

  • They may create counterfeit checks using your name or account number.
  • They may open a bank account in your name and write bad checks.
  • They may clone your ATM or debit card and make electronic withdrawals in your name, draining your accounts.
  • They may take out a loan in your name.

Government documents fraud:

  • They may get a driver's license or official ID card issued in your name but with their picture.
  • They may use your name and Social Security number to get government benefits.
  • They may file a fraudulent tax return using your information.

Other fraud:

  • They may get a job using your Social Security number.
  • They may rent a house or get medical services using your name.
  • They may give your personal information to police during an arrest. If they don't show up for their court date, a warrant for arrest is issued in your name.

How can you find out if your identity was stolen?

The best way to find out is to monitor your accounts and bank statements each month, and check your credit report on a regular basis. If you check your credit report regularly, you may be able to limit the damage caused by identity theft.

Unfortunately, many consumers learn that their identity has been stolen after some damage has been done.

Monday, January 21, 2008

IEC: Information, Education and Communication

Not-for-Profit organizations or NFPs are oftentimes to engross with the day-to-day advocacy and challenges of implementing projects that they don't stop to communicate their intent, their activities, the impact they would like to create, and the stakeholders they need to support them. Information Education and Communication or IEC clearly show three (3) distinct components: information, education and communication.

Many times we are confronted with issues and concerns that only if we communicated earlier or more clearly would have prevented ruffled feelings, lack of coordination or even animosity among stakeholders. The problems of communication are not unique to small organizations. Communication is a very basic component of any organization. No organization or even communities can survive let alone stay together if no framework of communication exist.

Communication in an organization refers to the structures, processes, media, or channels that get a message across from the sender to the intended recipient. Of course both sender and recipient are part of the whole communication environment.

Information is the relevant content that can be use for decision-making. You have to ask yourself if what you are communicating is relevant and can the recipient use it to make tactical or strategic decision: to act or not to act.

Education comes when our communication and information is sent or delivered with the aim of changing a mindset, a behavior, or move an audience to a certain course of action.

Around the late 1980s, most international aid agencies like the WorldBank and the Asian Development Bank required programme implementers to make an IEC plan an integral component of any development plan or programme. Stakeholders are to become an important component of the IEC loop.

Our Stakeholders: Who Are We Communicating To and What Desirable Outcome Do We Want?
Our IEC program is the vehicle in which we design our message, the quality of its content and our delivery systems. For the IEC program and its projects to be effective, we must understand to whom we are delivering the message and what desired effect are we trying to achieve?
Every material, text, delivery method or media must put our audience first. We must understand "where our audience" is coming from and design our IEC projects with that in mind.

Content: What Are Our IEC Deliverables? The content of our IEC program is dependent on who is using or seeking out information about us and our activities. It is logical therefore that each corporate public or audience of the IEC campaign will have different needs in terms of content.

Channels: How Do We Deliver Our Message? The delivery system is as important as the message. It is important therefore to consider the most cost-effective delivery system for the message and the audience. Existing services and technology are already adequate for the kind of IEC campaign envisioned but it is the creative application and combination that will determine the quality and extent of the impact. The most effective approach is to apply a multi-channel delivery system which is complementary and provides synergy.

The succeeding posts will touch on the many dimensions of the IEC of a NFP. Keep posted.