{"id":129,"date":"2010-02-05T11:23:16","date_gmt":"2010-02-05T15:23:16","guid":{"rendered":"http:\/\/internetsafety.trendmicro.com\/?p=129"},"modified":"2010-02-05T11:23:16","modified_gmt":"2010-02-05T15:23:16","slug":"what-you-can-do-about-child-identity-theft","status":"publish","type":"post","link":"https:\/\/www.trendmicro.com\/internet-safety\/blog\/what-you-can-do-about-child-identity-theft\/","title":{"rendered":"What you can do about Child Identity Theft"},"content":{"rendered":"<p><a href=\"\/internet-safety\/wp-content\/uploads\/2010\/02\/Copy-of-iskf_Nov09update.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-134\" title=\"Copy of iskf_Nov09update\" src=\"\/internet-safety\/wp-content\/uploads\/2010\/02\/Copy-of-iskf_Nov09update.jpg\" alt=\"\" width=\"174\" height=\"119\" \/><\/a>by Lynette Owens<\/p>\n<p>Child identity theft is on the rise.<\/p>\n<p>According to the Identity Theft Resource Center, child identity theft occurs when a child\u2019s personal information is used by someone for that imposter\u2019s own gain, such as to obtain financial benefits or to clear a criminal record.\u00a0 When I first heard about child identity theft, I frankly didn\u2019t think it existed.\u00a0 Who would bother to steal money from\u00a0a 5-year old?<\/p>\n<p>Since July of 2009, the ITRC confirmed just under 4000 cases of identity theft, of which almost 10% involved the identity theft of children.\u00a0 Granted, in a world where millions of cases of identity theft happen, this might seem a relatively small number.<\/p>\n<p>But for a crime that I didn\u2019t think existed and as a parent, the number is bigger than I would have ever thought.<\/p>\n<p>Usually, child identity theft is perpetrated by an adult who has a relationship with the child victim: a parent, aunt\/uncle, cousin, family friend, etc.\u00a0 But the ITRC has noted a rise in child identity theft cases that were done by people unknown to the child or parents of the child.<\/p>\n<p>In the U.S., if you have been assigned a social security number, you can do a number of things such as open a new line of credit or apply for a job or unemployment benefits.\u00a0 Kids are usually assigned a social security number within days of birth.\u00a0 The number is printed on a card and sent home to the parents a few weeks later.<\/p>\n<p>But someone doesn\u2019t need to steal your social security number to get your social security number.\u00a0 According to Lynda Foley, co-founder of the ITRC, \u201cAll they need to know is your date of birth and place of birth, and they can figure it out from there.\u201d\u00a0<\/p>\n<p>Often times, child victims of identity theft are unaware they are victims until they are closer to adult age, when they apply for financial aid or try to open their first line of credit.\u00a0 By then, their credit history could not only have been developed by someone else, it could be ruined.<\/p>\n<p>So what can a parent, teacher, or concerned person do?\u00a0 There are lots of things both kids and adults can do to help prevent child identity theft from happening:<\/p>\n<p style=\"padding-left: 30px;\"><strong>1. Think before you post.<\/strong>\u00a0 Kids need to be guided to share only the information that they wouldn\u2019t mind sharing with strangers as well as friends, but they should also be made aware of identity theft so they think before sharing nuggets of information that might be useful to an i.d. thief.\u00a0 And how many of us grown-ups post things about our kids, our nieces\/nephews or neighbors online?\u00a0 Before you go announcing your sister\u2019s new baby on your social networking site, in email, on a blog, etc. consider the information you might be readily making available for an i.d. thief.\u00a0 (Remember: place of birth and date of birth is all they need.)<\/p>\n<p style=\"padding-left: 30px;\"><strong>2. Don\u2019t use your kids\u2019 names.<\/strong>\u00a0 Wherever possible, adults should enforce the use of code names or nick names instead of a child\u2019s real name online, such as for establishing an email address, registering your child on a kid-friendly website (to use the games, for example), or setting up a profile on a social networking site.<\/p>\n<p style=\"padding-left: 30px;\"><strong>3. Use privacy settings.<\/strong>\u00a0 For social networking fanatics, make sure only the people you know and trust can see what you\u2019re posting and doing.<\/p>\n<p style=\"padding-left: 30px;\"><strong>4. Use reputable, up-to-date security software.<\/strong>\u00a0 While identity theft can happen through offline sources as well as online, having good, updated security software will help prevent information-stealing software from getting onto your computers or smart phones in the first place.\u00a0 Use security software on <span style=\"text-decoration: underline;\">any<\/span> device that you store personal information on.<\/p>\n<p style=\"padding-left: 30px;\"><strong>5. Shred and lock.<\/strong>\u00a0 The ITRC recommends that you shred all documents that contain personal information about your kids (and yourself), and lock your mailbox if you can.\u00a0<\/p>\n<p>If you are resident of the U.S. and believe you or your child has become a victim of identity theft, contact the Identity Theft Resource Center for free assistance at:<\/p>\n<p style=\"text-align: center;\"><strong>(888) 400-5530<\/strong><\/p>\n<p>You can also find additional resources and prevention tips at <a href=\"http:\/\/www.idtheftcenter.org\">www.idtheftcenter.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Child identity theft occurs when a child\u2019s personal information is used by someone for that imposter\u2019s own gain, such as to obtain financial benefits or to clear a criminal record.  When I first heard about child identity theft, I frankly didn\u2019t think it existed.  Who would bother to steal money from a 5-year old?<\/p>\n<p>But child identity theft is on the rise.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-129","post","type-post","status-publish","format-standard","hentry","category-for-parents","category-for-teachers","wpautop"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/comments?post=129"}],"version-history":[{"count":0,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/129\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media?parent=129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/categories?post=129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/tags?post=129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}