Model Identity Theft Policy/FACTA Compliance
An individual's identity can be stolen with nothing more than a stolen string of numbers and malicious intent. With a few pieces of personal identifying information, an identity thief can easily secure an account in someone else’s name. This information can be obtained from a variety of sources, including stolen mail, computer hacking, fraudulent address changes and other nefarious schemes.
Click on the items below to get detailed information regarding Identify Theft and FACTA Compliance.