Certified Identity Theft
Risk Management Specialist - CITRMS® XV
Table Of Contents
SUMMARY TABLE OF CONTENTS
There are NINE areas of study and testing
- Identity Theft Basics and Concepts
- Magnitude, Classifications, and Trends in Identity Theft
- What Information is Involved and Who Holds It
- How Identity Thieves Operate
- Specialized Areas of Concern
- Legal and Regulatory Responses to the Identity Theft Challenge
- Preventive and Remedial Steps for Consumers
- Risk Management for Businesses
- Identity Theft Risk Management Solutions
Appendix
The 2015 CITRMS® XV ISG includes information on public and private agencies, with points of contact and
basic applicable forms to report and follow up identity theft incidents.
ENDNOTES: Sources, Resources, and Acknowledgements
The endnotes include many hyper-links to online sources in the .pdf format, to facilitate further study.
TABLE OF CONTENTS
- General Course Overview - p11
- Section 1 Identity Theft Basics and Concepts - p13
- Basic Concepts of Identity Theft - p13
- What is protected information? - p14
- What is sensitive information? - p14
- Personally Identifiable Information ("PII") - p15
- Protected Health Information ("PHI") - p17
- Section 2. Magnitude, Classifications, and Trends in Identity Theft - p23
- Basic Statistics - p25
- Beyond the Statistics of the Federal Trade Commission/Sentinel Report - p26
- How Victims' Information is Used to Perpetrate Identity Theft - p27
- Data Breaches - p28
- Lenders/Credit Card Issuers - p38
- Medical Identity Theft - p40
- Section 3. What Information is Involved and Who Holds It - p43
- Consumers - p43
- Everyone Else - p44
- Government - Publicly Available Records - p45
- Government - Confidential or Non-Public Records - p51
- Grey Areas of Public/Non-Public Official Government - p54
- Non-Government (Private Sector) Consumer Records - p55
- PII Collected through Relationships - Business and Consumer - p67
- Section 4. How Identity Thieves Operate - p70
- "Retail" Identity Theft Against Consumers - p70
- "Wholesale" Identity Theft Against Holders of Consumer PII - p77
- Methods Identity Thieves Use to Steal Non-Public Confidential Information - p80
- Section 5. Specialized Areas of Concern - p85
- Subsection I - Technological Areas - p81
- Subsection II - Demographic and Activity Areas - p101
- Section 6. Legal and Regulatory Responses to the Identity Theft Challenge - p108
- Federal Identity Theft Laws - p109
- Federal Regulations - p112
- The Advent of the Consumer Financial Protection Bureau (CFPB) - p117
- State Actions - p127
- Section 7. Preventive and Remedial Steps for Consumers - p130
- Physical Documents in Consumer's Possession - p131
- Access to Credit Reports and Other Consumer Reports - p135
- Electronic Data and Devices - p145
- The Process of Recovery/Restoration/Remediation/Resolution - p155
- Section 8. Risk Management for Businesses - p161
- The Business as Identity Theft Victim - p161
- Businesses as Holders of Personally Identifiable Information - p167
- Risk Management Actions for Businesses - p170
- Section 9. Identity Theft Risk Management Solutions - p186
- The Identity Theft Risk Management Survey and Report - A Baseline - p186
- Features of the Identity Theft Risk Management Plans - p193
- Consumer-oriented Services (Retail) - p194
- Business or Organization-oriented Services (Wholesale) - p195
- Developments in How Identity Theft Risk Management Services are Marketed and Distributed - p198
- Decisions on Selecting an Identity Theft Risk Management Solution - p201
- APPENDIX - p202
- Sample Certificate - p213
- ENDNOTES #1-115 - p214