News Feed Item

Identities of children threatened - it all starts with the original SIN

OTTAWA, March 25, 2014 /CNW/ - Parents need to be aware that their child is vulnerable to identity theft as soon as a Social Insurance Number (SIN) is assigned.

Identity thieves want the personal information of children because they do not have credit records. By acquiring a child's SIN, a scammer can create a completely new identity and successfully apply for loans and credit cards.

Protecting children against scammers is one of many fraud prevention topics covered in a new book from the Chartered Professional Accountants of Canada (CPA Canada) titled Protecting You and Your Money: A Guide to Avoiding Identity Theft and Fraud.

The guide advises parents to always keep their child's SIN under lock and key and never store it on a computer. Children also should not reveal potentially sensitive personal information, such as their home address and birthdate, on social media.

"Child identity theft is particularly dangerous because it can take 10 to 15 years to discover the crime," explains the book's author Kelley Keehn. "By this time, the scammer's trail is cold and the damage to the victim's credit record can be devastating. It's also gut-wrenching for a parent to know someone has stolen their child's identity."

The CPA Canada guide was officially released today in Ottawa to Members of Parliament and other dignitaries as part of Fraud Prevention Month. The organization is helping Canadians gain the knowledge and confidence required to protect themselves against identity theft and fraud.

"The best defence is awareness, knowledge and the will to fight back," stresses Keehn.

Protecting You and Your Money: A Guide to Avoiding Identity Theft and Fraud can be obtained by visiting www.cpacanada.ca/fraudprevention.

An important contributor to the guide book is Jennifer Fiddian-Green, a forensic investigative accountant who has worked extensively with police forces to track down money launderers and fraudsters.

"We all are potential targets," said Fiddian-Green, a partner with Grant Thornton LLP. "Canadians need to be more mindful of the risks and better understand how to protect themselves and the people close to us."

People can report actual or suspected fraud to the Canadian Anti-Fraud Centre by visiting www.antifraudcentre.ca or calling toll free 1-888-495-8501. As the Centre notes on its website, the information may help identify a new or unique scam early on and allow prevention and awareness measures to be activated.

About CPA Canada

CPA Canada is the national organization established to support unification of the Canadian accounting profession under the Chartered Professional Accountant (CPA) designation. It was created by the Canadian Institute of Chartered Accountants (CICA) and The Society of Management Accountants of Canada (CMA Canada) to provide services to all CPA, CA, CMA and CGA accounting bodies that have unified or are committed to unification. As part of the unification effort, CPA Canada and the Certified General Accountants Association of Canada (CGA-Canada) are working toward integrating their operations this year. Unification will enhance the influence, relevance and contribution of the Canadian accounting profession both at home and internationally. www.cpacanada.ca


Image with caption: "Protecting You and Your Money: A Guide to Avoiding Identity Theft and Fraud, a new publication from the Chartered Professional Accountants of Canada (CPA Canada) was officially released, Tuesday, March 25, 2014, in Ottawa. The book can be obtained by visiting www.cpacanada.ca/fraudprevention. (CNW Group/CPA Canada)". Image available at: http://photos.newswire.ca/images/download/20140325_C6639_PHOTO_EN_38308.jpg

Image with caption: "Canadians can fight back against scammers with the help of a new guide book from Chartered Professional Accountants of Canada (CPA Canada). Kelley Keehn, author of Protecting You and Your Money: A Guide to Avoiding Identity Theft and Fraud, is shown at the official book launch, Tuesday, March 25, 2014, in Ottawa. The book can be obtained by visiting www.cpacanada.ca/fraudprevention. (CNW Group/CPA Canada) (CNW Group/CPA Canada)". Image available at: http://photos.newswire.ca/images/download/20140325_C6639_PHOTO_EN_38321.jpg

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
The IoT has the potential to create a renaissance of manufacturing in the US and elsewhere. In his session at 18th Cloud Expo, Florent Solt, CTO and chief architect of Netvibes, discussed how the expected exponential increase in the amount of data that will be processed, transported, stored, and accessed means there will be a huge demand for smart technologies to deliver it. Florent Solt is the CTO and chief architect of Netvibes. Prior to joining Netvibes in 2007, he co-founded Rift Technologi...
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
Established in 1998, Calsoft is a leading software product engineering Services Company specializing in Storage, Networking, Virtualization and Cloud business verticals. Calsoft provides End-to-End Product Development, Quality Assurance Sustenance, Solution Engineering and Professional Services expertise to assist customers in achieving their product development and business goals. The company's deep domain knowledge of Storage, Virtualization, Networking and Cloud verticals helps in delivering ...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, will discuss the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docke...
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...