<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Child Identity Theft</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/child-identity-theft/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Child identity theft: A new frontier for fraudsters</title>
		<link>http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/#comments</comments>
		<pubDate>Tue, 09 Aug 2011 19:01:15 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Child Identity Theft]]></category>
		<category><![CDATA[Credit report monitoring]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=710</guid>
		<description><![CDATA[A recent Federal Trade Commission discussion, "Stolen Futures: A Forum on Child Identity Theft,” presented a valuable opportunity to galvanize industry experts and public leaders around this increasing privacy threat.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F08%2F09%2Fchild-identity-theft-a-new-frontier-for-fraudsters%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Child+Identity+Theft,Credit+report+monitoring,Federal+Trade+Commission,Identity+Theft+Resource+Center&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/kids2-300x200.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/Children%20Safe.jpg" class="broken_link" rel="nofollow"></a> <a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/Child-Identity-Theft.jpg"><img class="aligncenter size-full wp-image-718" title="happy kids" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/Child-Identity-Theft.jpg" alt="" width="423" height="283" /></a></p>
<p>You might think you’re pretty savvy when it comes to understanding identity theft.  But what about when identity theft threatens your children?</p>
<p>A recent Federal Trade Commission discussion, &#8220;Stolen Futures: A Forum on Child Identity Theft,” presented a valuable opportunity to galvanize industry experts and public leaders around this increasing privacy threat.  Pop quiz: <a rel="”nofollow” nofollow" href="http://www.familysecure.com/PDFs/FamilySecure.com-InfoBrochure-HighRes_Final.pdf" target="_blank" class="broken_link">did you know</a>….</p>
<ul>
<li>Children are 51 times more likely to become victims of identity theft than adults, with anywhere from 140,000 to 400,000 children affected annually by this crime.</li>
<li>Criminals can easily establish fraudulent credit files in a child’s name and use them for years without detection.</li>
<li>Child identity thefts often aren’t discovered until the youngster applies for a driver’s license, summer job or college loans.</li>
<li>Thieves snatch children’s Social Security numbers and other personal information from day care centers, hospitals, schools, and even sports team applications.</li>
<li>Stolen identities can result in credit damage for years, resulting in denial of college loans, inability to rent an apartment, difficulty in getting hired for a job, confusion around medical records, and driving records attached to a criminal’s name.</li>
</ul>
<p>Children make vulnerable prey for identity thieves, with fresh, unused Social Security numbers that can easily be applied to another person’s birth date and name.  The sad truth is that these crimes are often perpetrated by the victim’s own family, making it difficult for the child (when he’s an adult) or non-offending family members to report the incident.  Foster children are particularly vulnerable since their personal information is passed around from family to family.</p>
<p>Whether the theft was committed by strangers or family, identity theft causes financial as well as emotional suffering for children, especially once they become old enough to fully understand how they were victimized.  The <a rel="”nofollow” nofollow" href="http://www.idtheftcenter.org/artman2/publish/v_fact_sheets/Fact_Sheet_120.shtml" target="_blank" class="broken_link">Identity Theft Resource Center</a> offers helpful fact sheets that explain the process of reporting and repairing credit damage as well as healing the emotional wounds from these crimes.</p>
<p>What can you do to <a rel="”nofollow” nofollow" href="http://articles.baltimoresun.com/2011-05-29/business/bs-bz-ambrose-child-identity-theft-20110529_1_identity-theft-resource-center-social-security-number-privacy-and-identity-protection" target="_blank" class="broken_link">protect your child</a>?</p>
<ul>
<li>Fiercely guard your child’s social security number, only giving it out when absolutely necessary and after you’ve been assured it will be well protected.</li>
<li>Teach your child to protect himself online by keeping his personal information private.</li>
<li>Investigate red flags like debt collectors calling for your child or mail addressed to your child from debt consolidators.</li>
<li>Enroll your child in <a href="http://www.protectmyid.com/" target="_blank" class="broken_link" rel="nofollow">credit report monitoring</a> that will immediately alert you to suspicious activity.</li>
</ul>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/&via=Experian_DBR&text=Child identity theft: A new frontier for fraudsters&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Child ID theft has serious business implications</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/16/child-id-theft-has-serious-business-implications/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/16/child-id-theft-has-serious-business-implications/#comments</comments>
		<pubDate>Thu, 16 Sep 2010 18:58:53 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[child identity monitoring]]></category>
		<category><![CDATA[Child Identity Theft]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[PII]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=131</guid>
		<description><![CDATA[Identity thieves are becoming more skilled as they focus on stealing dormant social security numbers that belong to children.  Experts point out that frequently the parents and children are not aware of the fraud and potential financial damage until the minor applies for his or her first job or student loan.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F16%2Fchild-id-theft-has-serious-business-implications%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=child+identity+monitoring,Child+Identity+Theft,Cyber+Security,Identity+Theft+Prevention,Identity+Theft+Resource+Center,PII&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Identity thieves are becoming more skilled as they focus on stealing dormant social security numbers that belong to children. According to the <span style="text-decoration: underline;"><a href="http://www.idtheftcenter.org/artman2/publish/m_press/Childs_SSN.shtml" target="_blank" class="broken_link" rel="nofollow">Identity Theft Resource Center</a></span> (ITRC) credit issuers do not have the ability to verify a SSN as belonging to an adult or minor which makes <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">detecting fraud</a> against minors more difficult. <span style="text-decoration: underline;"><a href="http://www.boston.com/community/moms/blogs/moms_are_talking_about/2010/07/i_like_to_think_my.html" target="_blank" class="broken_link" rel="nofollow">Experts</a></span> point out that frequently the parents and children are not aware of the fraud and potential financial damage until the minor applies for his or her first job or student loan.  As you can imagine, significant damage to the minor’s credit may have already occurred.</p>
<p>This nascent threat has serious implications for business, lenders, and educational institutions that make decisions based on credit reports and scores.  For example, a <span style="text-decoration: underline;"><a href="http://news.yahoo.com/s/ap/20100802/ap_on_bi_ge/us_credit_fraud_children" target="_blank" class="broken_link" rel="nofollow">recent scam</a></span> was uncovered where thieves sold dormant SSNs to people looking to rebuild their credit rating. People who buy these numbers build their credit score by linking to a dormant credit file, a process called “piggybacking.” Unfortunately, these dormant files most likely belong to minors.</p>
<p>The economic downturn and mortgage crises have resulted in tightened lending policies and a greater focus on credit profiles. Many lending decisions are made simply on a defined credit score threshold. However, with the increase in incidents of “piggybacking” on dormant accounts, a growing number of these scores will be based on fraudulent information.</p>
<p>The ITRC has <span style="text-decoration: underline;"><a href="http://www.idtheftcenter.org/artman2/publish/m_press/Childs_SSN.shtml" target="_blank" class="broken_link" rel="nofollow">proposed</a></span> creating a database that enables businesses to verify if a submitted SSN is that of a minor creating an opportunity to identify fraud.  Visit the ITRC to learn more.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/16/child-id-theft-has-serious-business-implications/&via=Experian_DBR&text=Child ID theft has serious business implications&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/16/child-id-theft-has-serious-business-implications/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>