Protecting your identity, your privacy and your money.
The rate of identity theft-related fraud continues to rise. A recent study revealed that identity theft affected more than 12 million adults in 2012, which equates to 1 victim every 3 seconds.*
Identity theft can occur when an individual obtains personal information, such as your social security number, date of birth, address and financial account numbers. Once this information is obtained, the thieves will assume or take on your identity, allowing them to illegally purchase items or obtain credit.
Protect yourself. Don't become identity theft's next victim.
There are simple precautions that will keep your identity safe. We've provided the following information as a courtesy to help protect you from identity fraud and other criminal activities. Review the information on these pages to learn how to protect your personal and financial information.
ID Theft Information
Learn more about protecting yourself from identity theft.
Credit bureaus must provide free copies of credit reports to victims of identity theft.
ATM fraud can occur when individuals lose their card, give their card to someone else to use, or when their Personal Identification Number's confidentiality is compromised. By following these simple guidelines you can greatly reduce your exposure to ATM fraud.
In addition to the types of ATM fraud that most of us are now aware of, there are two new types of fraud that can clean out your account quickly -- card withholding and skimming.
Card withholding occurs when your card gets stuck in the ATM, you can't get it out, and you leave the card in the ATM planning to contact the financial institution the next morning. When you call you find that the card was not stuck in the ATM. What happens is that thieves put a substance into the ATM card slot which will cause your card to stick inside the ATM. They leave the ATM and wait for someone to attempt to use it. They then get in line behind you and try to watch you enter your Personal Identification Number (PIN). This is very common at drive-up ATMs where the user may not be paying attention to other people or cars nearby.
The thieves even go so far as to put up a sign on the ATM stating: "If your card gets stuck, enter your PIN three separate times to retrieve it." This gives them three tries to watch you enter your PIN. After you leave frustrated, and you're planning to contact the ATM owner the next morning, they remove your card with a pair of pliers. They can then use your card at other ATMs and Point-of-Sale (POS) terminals.
Skimming is done at businesses that offer Point-of-Sale (POS) devices for you to pay with your ATM card, such as gas stations. The thieves convince an employee to allow them to connect a lap top computer to the POS machine. The lap top is usually stored under the counter where the POS device is located. When you swipe your card in the POS device to make a payment the information on the magnetic strip on your ATM card is copied and loaded onto a disk. Thieves may also install a hidden video camera that records you entering your PIN. They then match the magnetic information to the PIN and access your accounts.
If you suspect fraud, it is important to act quickly to minimize potential damage and your own liability. It is important to keep a detailed account of conversations you have with authorities and financial institutions.
Credit Bureaus. Immediately call the fraud units of the three credit reporting companies: Experian, Equifax and TransUnion. Ask that your account include a statement referencing the possibility of fraud.
Creditors. Contact all creditors immediately with whom your name has been used fraudulently - by phone and in writing. Monitor your accounts closely for any further fraudulent activity.
Law Enforcement. Report the crime to police with jurisdiction in your case. Provide any documentation that you have collected. Get a copy of your police report. Keep the phone number of your fraud investigator handy and give it to creditors and others who require verification of your case.
Financial Institutions. If you have checks stolen or bank accounts set up fraudulently, contact the institution to report the crime. Put stop payments on appropriate outstanding checks. Close your spending and savings accounts and open new accounts. If your ATM card is stolen or compromised, get a new card and PIN. When choosing a PIN, don't use common numbers like the last four digits of your Social Security number, your date of birth, license number or street address.
U.S. Postal Service. Notify the local Postal Inspector if you suspect an identity thief has filed a change of your address with the post office or has used the mail to commit credit or bank fraud.
Social Security Administration. Call to report fraudulent use of your Social Security number.
Department of Motor Vehicles (DMV). Call to see if another license was issued in your name. Go to your local DMV to request a new number. Also, fill out the DMV's complaint form to begin the fraud investigation process. Send supporting documents with the completed form to the nearest DMV investigation office. Request a driver's license number different than your Social Security number if available in your state.
Civil Courts. If a civil judgment has been entered in your name for actions taken by your impostor, contact the court where the judgment was entered and report that you are a victim of identity theft. If you are wrongfully prosecuted for criminal charges, contact the state Department of Justice and the FBI.
This guide provides tips for protecting yourself against check cashing fraud. Check cashing fraud occurs when individuals use information taken from your checks, or the checks themselves, to access your accounts and commit fraudulent acts. By following these simple guidelines you can greatly reduce your risk of becoming a victim.
Debit and credit card fraud generally occurs when cards or card numbers are compromised. By following these simple guidelines, your potential for loss can be minimized. In addition, CU1 MasterCards® contain Smart Chip technology to protect your private information during in-store purchases!
To protect our members’ home banking experience, security questions are your “default” setting for Online Access login verification. However, you can also activate text or email codes anytime by logging in to Online Access, clicking Settings at the top of the page and then choosing the Security tab.
Please make sure your cell phone number and email address are listed correctly inside of Online Access before you take advantage of these login verification options. To update your cell phone number or email address, simply login to Online Access and click Settings at the top of the page.
As always, when logging in to Online Access from an unrecognized device or when certain transactions are conducted, you will be prompted to verify your identity before accessing your online account. With text and email options, you have the freedom to choose which authentication option you prefer – and this adds a vital layer of security to your experience!
Phishing is an internet scam in which e-mail spam or pop-up messages are used to deceive you into divulging personal or financial information over the internet. Phishers will send you an email or a pop-up message that appears to be from a company that you deal with — your credit card company, credit union or a government agency. The message usually requests that you update or validate account information and it will direct you to a website that looks just like the legitimate organization's website, but it isn't. The purpose of the bogus website is to deceive you into entering your personal information so the scammer's can steal your identity and commit crimes in your name.
With extra caution and a careful eye, you’ll spot risky situations and stay safe from fraudsters. Now go forth and share this info with your friends and family! We all deserve a fraud-free holiday season – and as always, CU1 is here to help.
Fraudsters are constantly developing new schemes to trick people into sharing private information – and unfortunately, these schemes are often hard to spot. For instance, one method that occurs regularly in Alaska (and elsewhere) is the use of a fake email message, text or phone call to convince a person that their financial account needs attention.