• Center for Problem oriented policing

previous page next page

Appendix A: Summary of Responses to Identity Theft

The table below summarizes the responses to identity theft, the mechanism by which they are intended to work, the conditions under which they ought to work best, and some factors you should consider before implementing a particular response. It is critical that you tailor responses to local circumstances, and that you can justify each response based on reliable analysis. In most cases, an effective strategy will involve implementing several different responses. Law enforcement responses alone are seldom effective in reducing or solving the problem.

Prevention
Response No.ResponseHow It WorksWorks Best If...Considerations
1Raising businesses' awareness of their responsibility to protect employee and client records You work with businesses to ensure that they follow best practices for securing personal records…you have a good working relationship with local businessesYou must overcome businesses' concerns that security practices will affect their bottom line
2Educating people about protecting their personal information You work with local schools and citizen and consumer groups to teach theft prevention techniquesyou use the wealth of information available on the Internet and provided by many federal and state agenciesThis should be made a part of your department's regular outreach activities
3Collaborating with government and other service organizations to protect private information You work with service agencies to reduce the use of social security numbers as identifiersyou have a good working relationship with the agencies, especially those that issue identification documentsYour influence may be limited, depending on your reputation for dealing with identity theft, and the size of the government bureaucracy
4Working with local banks to encourage credit card issuers to adopt improved security practices You urge banks to demand that credit card issuers develop better identity verification techniquesyou have a good working relationship with local banksCredit card issuers are often international in scope, so their security practices might be beyond the influence of local financial institutions
5Tracking delivery You work with the post office and delivery companies to monitor vacant residences and diverted deliveries of mailyou help train delivery employees to spot suspicious deliveriesThis requires considerable effort to maintain monitoring and training over time
Victim Assistance
Response No.ResponseHow It WorksWorks Best If...Considerations
6Working with the victim You adopt the victim as your partner in the investigationyou address victim concerns early and show that you care, provide the victim with a copy of the police or incident report, and direct the victim to resources outlining the self-help steps he or she needs to takeCross-jurisdictional issues may hamper your response and frustrate the victim; the number of identity theft incidents may initially appear to rise after you adopt a policy to write reports for all victims; the victim will still need to make follow-up phone calls and send follow-up documents to resolve their identity theft problems, which may prove burdensome
7Preparing a plan to prevent or minimize the harm of identity theft when large identity databases have been breached You work with local businesses and service agencies to develop a disaster plan should massive theft of personal records occuryou have a good working relationship with local agencies, so that the plan can be put into effect immediately to reduce the time the thief has to use stolen recordsThis requires coordination and cooperation between local businesses and government, and direct contact with national credit-reporting agencies
previous page next page