Skip to main content Skip to main menu Skip to footer

How your data can be used by criminals

How your data can be used by criminals

Decrease Text Size Increase Text Size

Page Article

All data is continually at rest or in motion in many locations. It exists on home and mobile devices, in apps and in transit across networks, and in online repositories. All along the way, you need to protect the privacy of the data - when you set your devices up; when you download and install your apps; when you receive or send it in emails, messages, or via banking apps; and when you agree to store it with the hospitals, government agencies, and private companies you conduct your business with. The likelihood that your personal identification is in the hands of criminals increases with every new data breach.  Data breach information goes way beyond just login credentials and credit card numbers. 

Identity data (PII)

Email, SSN, name​, DOB​, mother's maiden name​, family, relatives, driver's license​, Real I.D., passport, address​, phone​, IP address, company info​, social media, biometric files, credit history, work history, and professional licenses.​
    Types of crimes committed with your data:
      • New account fraud, ACH fraud
      • Identity fraud, filing fraudulent tax returns, applying for loans, etc.
      • Create counterfeit cards, pay bills, transfer money
      • P2P, authorized push payment fraud
      • Email compromise, Wire fraud, Phishing
      • Phone porting, IP spoofing

                Financial Data

                Banking information, investments, billing accounts, and insurance.
                    Types of crimes committed with your data:
                    • Identity fraud
                    • Fraudulent tax returns
                    • Loan applications
                    • Withdraw funds, ACH fraud, create counterfeit checks, pay bills, transfer money

                    Payment Data

                      Credit card and debit card information.
                        Types of crimes committed with your data:
                        • Make fraudulent online purchases
                        • Create counterfeit cards

                          Credential Data

                          Email, phone, usernames, and passwords for online accounts.
                          • Account takeover of online banking, eCommerce, email, etc.
                          • Triangulation Fraud

                            Health Data

                            Hospital records, medical info​, health history, and medical insurance.
                            • Account takeover
                            • New account fraud
                            • Fraudulent insurance claims
                            • Buy prescription medicine
                            Data breaches may not play out for a really long time as hackers might not use stolen data right away.  The following suggestions should become habits that last well into the future.  This way if hackers are sitting on your information to use it in the future, you'll know.

                            What else you can do: Order specialty-free reports outside of the big three credit reporting agencies.  Specialty reporting companies may disclose information that can help prevent fraudulent accounts and other identity theft crimes:

                            • LexisNexis Full File Disclosure - It’s one of the more comprehensive databases out there, containing all the information LexisNexis gathers to create its various reports about you. And, like credit reports, you can order one free copy per year. 
                            • Consumer Protection Financial Bureau - The CFPB offers a list of consumer reporting companies.

                            Page Footer has no content