An Interview With RM Tracy of the Privacy Trust Group

I recently met R. M. Tracy from the Privacy Trust Group, and found her story, and her company, quite interesting. So I decided to interview her and post the interview here.
Before we get to the interview, here is a little background information on Reggie Tracy:
As a former FBI Special Agent, Ms. Tracy investigated financial crimes, became familiar with the exploit of technology by criminals, and experienced limitations in the laws and law enforcement’s ability to help victims of financial crimes to recover. After leaving the FBI, Ms. Tracy worked as a consultant and was a founding member of a corporate security services company. As an IT security professional, Ms. Tracy worked with financial services companies, government agencies, and others, to identify and minimize weaknesses in their corporate information security systems. Now, Ms. Tracy is applying the skills and experiences from working with these organizations to helping businesses and consumers to deal with identity theft.
R. M. Tracy has also worked with the US military and DOD as a civilian giving her experience with issues affecting national security. Ms. Tracy also has a Masters of Business with a marketing focus from Purdue University.

So, without further ado, here is the interview.
Click the red play button below.

Download the MP3 Here
Transcript of this Interview
The following is a presentation of
So, let’s go ahead and get started here. R.M. Tracy is the co-founder and developer of the Privacy Trust Group Consumer Business Educational Program, as well as, consulting services and she is going to tell us a little bit more about what that is. She is also the author of Reduce Your Risk of Credit Fraud and Identity Theft, the Identity Theft Survival Guide, and other Privacy Trust Group Identity Theft and Consumer Privacy books. She is also a guest speaker and an expert on identity theft for continuing legal education programs through CLE International and has provided business education programs to the regional members of the International Executive Association and other Business Executives in Human Resource Association across the United States, western United States.
Identity Theft Secrets: So, Reggie how are you doing today?
Reggie Tracy: I am doing great, thank you.
Identity Theft Secrets: Good, good. Well, let’s get right into this. How did you get involved in working with people to help them protect their personal privacy?
Reggie Tracy: Well, when I was working at the FBI as a special agent, I worked organized crime, and a lot of that involved financial crimes, as well as drug and embezzlement, and everything else. Then I saw was that even when you would investigate and process financial crimes and sent someone to jail, often law enforcement and the laws were unable to help the victims recover. You would be doing your job and put someone in jail for having conned an individual but often restitution didn’t come for that individual. After leaving the FBI then I also helped to co-find a corporate security company and in that organization we worked an internet type of organization and government agencies to look into their business in their international securities and really work to strengthen that to protect their customers and employees information. So, I saw the hole in corporate America system sometimes. And, having seen this and the harm it can cause an individual when their information is stolen, it inspired me to start helping people to protect their information. Also, as I was leaving the FBI one of the last cases that I worked was this organized crime case and to return the favor to all of us that worked on the case after the organized ring was put in jail and convicted, he basically put a price on all of our heads in return of that favor sort as speak, for my own personal safety, just because of that, you know that really does make you think twice. It is not unusual for law enforcement officers; that is something that you should be aware of as a law enforcement officer and as I was leaving the FBI; I was aware of that as well. I did a lot of things to protect my own information to an entire level of many other individual. From that I started helping other law enforcement officers and people in the public eye to protect their information and then working with this information security company and help to find out, and then kind of one thing led to another and really began working to protect people’s information from identity thieves in the process of protecting information just as far as privacy. Did that answer the question?
Identity Theft Secrets: Definitely, and as well, it kind of inspired by having a hit man put a price on your head; more or less.
Reggie Tracy: Yeah, yeah, it makes you look at the world a little different.
Identity Theft Secrets: I would imagine so, definitely. Well, outside of that, your personal experience, what is the craziest identity theft or information breach that you have heard about or have been involved with?
Reggie Tracy: You know there are so many of them. It really is mind boggling the number of people that have been harmed with huge extend, and I’ll share just a couple of different ones of them with you. One situation that I really I thought terribly heart breaking, just recently not too long ago, in the past year or two. It was an older gentlemen who went out of town just right after his wife had died, actually passed away, unfortunately. He gone to travel and visit family and just to get out, and he had his grandson staying at his house and all of the information had been available, it had all been investigated, but sometime during that time when his grandson was house sitting, a great deal of his personal information including his social security number and some credit card numbers were stolen. Whether it was someone who came into the house invited by the grandson or something else, we may never know, he doesn’t actually want his grandson investigated because he doesn’t care to have the whole situation completely investigated, but there were $90,000.00 in credit card bills ran up over several weeks in his wife’s name, in her credit cards, that you know she was deceased. So, he actually didn’t see it immediately for what I understand. And, it really smell as someone was there, a social security number was stolen, possibly a birth certificate is missing, possibly. So, that was heart breaking that it might had been as a result of his grandson being there and the grandson carelessness at work, lack of care of who he invited into the house, it is what we assume. That was heart breaking that an older person would have that much damage against them immediately following the death of a spouse and possibly as the result a failure of a family member who was not careful.
Identity Theft Secrets: Yeah, definitely. Wow!
Reggie Tracy: Another story, and this one I have heard two different very similar stories. One of them was this young woman, and this is several years ago, and she is out of college and have a career now, but when she was going off to college; she went and tried to buy a car and found out that she had quite an extensive credit history for someone who never had credit. Basically, someone had stolen her social security number, probably years prior to that, and had bought houses and cars, I mean had lived a whole life using her social security number for several years and had caused quite a bit of damage because, of course, they had not paid the bills. If they had paid the bills she would have had a great credit history and couldn’t had done anything on it, but they never do that, do they?
Identity Theft Secrets: No, not at all. It is unfortunate.
Reggie Tracy: Basically, what she had to do, she did work with an FBI agent and several other consumer advocacy groups and others that helped. Her story was quite heart breaking. She is one of the few people that actually I have heard of that did actually obtained a new social security number. Her situation was so grievance and so within the Social Security Administration very narrow definition that allows them to reissue a new social security number. It does happen, but it is very, very rare.
Identity Theft Secrets: Let’s talk about that for a minute. I was just talking to somebody yesterday about, they actually had call me and asked, should I change my social security number? But, to be honest I had to say, I don’t recommend it for a lot of different reasons, but to be honest, I don’t know much about the process. Do you know what it takes to get a social security number change and do you recommend it for somebody?
Reggie Tracy: You know what, if it is an extremely grievance case, and in the case of this individual where they were so young and they had never had any good credit history, it had been destroyed from the start and is so into the Social Security Administration’s very narrow definition and that may change, may have changed, things like that change all the time so, I don’t know the latest definition of what it takes, but I assume that it is still a very long process. I haven’t worked with that in many years, but it is a very limited definition that they go by, it is very involved and it is a massive of grievance case and especially with a young person. If you have your own credit history for 20 years and then it is destroyed by someone else, you are better off to clean it up and then moving forward, it’s good. In this case, the person didn’t have any credit history, and that was one of the things that factored in. It’s just terribly difficult to do and the Social Security Administration just does not want to do it. You best bet really is, just what you said, not to bother doing that because it is just so difficult. The other problem that you get is that the Social Security Administration, if you do fall within their definition of identity theft victim that arises to the level that they are willing to change it, so often tried to link the two social security numbers, because if you had a credit history before, they don’t want to lose that information. You know, you’ve also worked for many years, you’ve got social security benefits and you don’t want to lose that. They basically have to link the two social security numbers; well, there you just lost any chance of clearing out any damages that was done because now the two social security numbers are linked. What this one young gal was able to do, like I said with the help of a consumer advocacy group and several others, and it took her several years to do this to, was able to get a new social security number not linked because there was no work history, there was no social security payments paid in, no benefits paid in, and it was actually easier to justified in that situation. So, maybe if you fall into that situation it might be worth it, other than that, it is extremely hard. So, if people want to do that, go ahead and look into it, but as you said, it is not recommended.
Identity Theft Secrets: Cool, alright.
Reggie Tracy: I made a short answer even longer. Sorry about that.
Identity Theft Secrets: No, no, it is perfect. It is good for people to know the answer to this stuff because I think that the average person doesn’t really know what they should be doing. I mean, we have all seen the ads that are funny, of the man talking like the truck driver, I mean, the woman talking like the big, dirty truck driver, but what it comes down to is that when you become a victim, or at least, when your information has been compromised, you do want some answers. So, I really appreciate you doing this.
Reggie Tracy: Yeah. Funny you said that. Siding from your list of questions, I wanted to say something about those advertisements.
Identity Theft Secrets: Absolutely.
Reggie Tracy: Do you have a minute to talk about them?
Identity Theft Secrets: Sure, yes, definitely.
Reggie Tracy: One of the things that I talk about with businesses a lot that they don’t often think about, when they are talking about identity theft, they are thinking about taking care of the problem, protecting against liability, or financial this, and that is all very important and that is something that really helps businesses deal with the privacy trust issue with being selective in having the information stolen and to mitigate their liability if it is stolen through policies and audits and to make sure that they do everything that they need to do and training their employees appropriately. But, one of the things that people don’t think about in the business world, that they should, is identity theft marketing. Those advertisements that you mentioned are so very powerful. They stick on our minds, they are funny, they are entertaining, they take a very difficult and sad subject and help us to laugh about that, and that is good comedy. We don’t want to make fun of somebody, but you know; that is what makes comedy funny. When you take a bad situation and find some way to kind of laugh about it, you know, not ignore it or belittle it, but to laugh about it; that’s good comedy. Identity theft marketing is very effective, and we have seen that in those types of ads. The identity theft marketing can also be serious though, and these talk about people, and talk about businesses in marketing to their existing customers to develop customer loyalty or to depend on new customers to draw in more customers its to accept to protect customer’s information and then use that in your marketing method, because we do remember those marketing ads and they are effective. I think I’m somebody who diverts for a minute there.
Identity Theft Secrets: Absolutely! No, I think that is a great point. I mean, that if you are taking steps as a company to protect your company, or the information that you company holds on people, you should be letting your customers or employees know about that.
Reggie Tracy: Yeah, and it should be funny like the Citibank credit card commercial, or it could just be a very serious notice in the every other marketing things that you do that you are taking steps and that you are concern about this and you are caring for your clients. Yeah, it’s very effective.
Identity Theft Secrets: That’s a great plan for a company. Definitely something do think about it. So, you focus a lot of attention, I guess, place a basis on Corporate America and what corporations can do to protect their employees and customers’ information. Can you give like three or four examples that are key to a business making sure that they do all that they need to do in order to protect their customers and employees? Just, I know that there is a big list of things that people can do but, can you give three or four examples?
Reggie Tracy: Sure, sure. The first thing when you talk about information security, everybody first of all thinks of IT security, your computer system and all of that. That’s very important and there are some very basic things that you must do or you open yourself up for liability. Some of the most basic things are simply if you are a business that does internet business or even has internet access must address the risk of hacking and unauthorized online access so, firewalls, that type of things. Those are very basic; those tools are available widely too many different organizations, IT security companies, or software companies, firewalls software, or hardware that stones all that. There are many magazines dedicated to that month after month, but you have to be some of those basic things. And, if you are not sure what that is within your organization, you should work with an IT security company or research it yourself or contact us, we work with IT companies. So, there are some basic things there, but then there are many other things. Two other things that I really think people should be aware of, basically across your whole company, you need to know so half the information that goes in, through, and out of your company. So, your really need to look at it throughout the company. Few of the other things that people often forget, is how your employees is handling the information, and basically you need to let them know what they need to be doing, and there is a lot of things involved with that, but the key is once you figured out what you need to do within the organization; training your employees so they comply with those requirements, because if you don’t train your employees; you are liable for their failure to protect information, but there is the importance. And then along the same lines, look at how your vendors, service providers, and anyone else who obtains information from you, how they handle that the information, and how they protect that information because that reflects again upon you. So, you need to look at what they are doing. You need to share with them your requirements for security, for information protection, and make sure they comply to an appropriate level with the information that they have access to. This is especially important if you have a billing company, or if there is a company that you have obtained clients or customers’ credit card numbers or social security numbers and then you pass that on to someone for billing purposes or something like that, or if you have a customer service, a telephone company that does your telephone customer service, or that type of thing. They all must basically comply with similar or with your policy to make sure that the information is protected or it could reflect upon you, not only just from a point of bad press but it could reflect some liability on you as well.
Identity Theft Secrets: Cool, alright.
Reggie Tracy: Does that answer your question?
Identity Theft Secrets: Yes, that’s great.
Reggie Tracy: How you manage it, and how your vendors and suppliers manage information and basically IT, although there are so many other areas that information can be sold from paper files and all of that. So, there are a lot of other areas to look at, but these are probably the two things that people forget the most.
Identity Theft Secrets: The key point out of that too, I think, maybe a lot of businesses don’t understand is that if their employee loose the information that is not really the employee necessarily who is liable, it is actually the business that is liable for the employee’s action.
Reggie Tracy: Right, right. Now, there is a way to basically share that liability and make them a responsible partner, the employee, a responsible partner in that. And, that kind of mitigates some of the businesses’ liability, and that is through policies, very clearly stated policies, and procedures, training, and then the employee must sign off that they have seen the policies, that they have been trained on them and that they will comply with them. So, that is a very important point and that can be done in many different ways, different forms, different formats, but something along that process must be addressed.
Identity Theft Secrets: Definitely good information for a business to know. So, in your book, so I’m kind of switching to the consumer side, in your book you deal with about sixty ways that individuals can really make sure that their information stays safe, and obviously, you can’t cover all those in this short interview, but can you give us like the top five ways that if I’m an individual I can protect my information? Just five things that I should be doing every day or every month or whatever, to protect my information?
Reggie Tracy: Absolutely, absolutely. And, you did mention that there are about sixty things that people can do. Many of them are very simple, straight forward, and just take a little forth thought. Very few of them, some of them could cost a little bit of money, once again, if you go into the IT point of view. If you are on the internet, you know, you should have similar firewalls, virus scanners, and spy ware blockers and internet type of things. There are some free and there some that may cost a little bit. But, there are a lot of other things in other areas that are simply just a state of mind, and just think a little bit before you share any information with another individual, another company, another person, that type of thing. I am going to start with, probably the first and foremost thing, your social security number. I think most people now realize that that is the gold standard in identity theft. That can really cause a huge amount of damage to you if an identity thief steals your social security number. And basically, what I try to impress upon people, and I give tips specifically on how to apply this, but basically you don’t want to give your social security number to anyone or any company, unless you absolutely must. And, that list is very short; the IRS tax accountant, your employer, some financial company that they are going to give you a loan, or open a bank account, that type of thing. Sometimes in situations you are given bad information, sometimes not.
Identity Theft Secrets: How do I avoid having to give that to my doctor? Like if I show up somewhere and they are requiring my social security number, how do I avoid having to give them that? I’m sorry to interrupt, the question seems; how do I avoid that if I don’t want to give that information out?
Reggie Tracy: Perfect question. Very, very good; basically, how would you know that they absolutely require it unless you ask? That’s the first step. When someone says, I need your social security number? Don’t answer them immediately and very nicely say, why do you need that information? Plain and simple; make them justify it and if they say well, I need for the form. Well, that’s not a good enough reason. Now, if the doctor says, I need it or your insurance company will not allow me to submit this to your medical insurance, they won’t pay me and you’ll have to pay me. Then you go, okay; now, why do they have to have it? Is the insurance company refusing to pay it? Or does that just make it easier for you to do your paperwork? So, if the insurance company is going to refuse to pay the doctor if the doctor doesn’t give them the social security number, then yes, you may want to give your doctor the social security number. But, the question is, does the doctor need every member of the family social security? Or, do they just need the policy holder? Like the parent who is the insurer through the employer, they only need their social security number. So, make sure you realize and you understand and ask questions, why does someone need that social security number? And, make sure it is a valid enough reason. To give you a really good example, I love this example, one kid going off, almost grown kid, going off to college and mom and dad calls me up and says hey, my kid has a chance of getting into Harvard or Yale, and I go, oh, wow! Good going, good kid, wow! They study hard, mom and dad say; do we give him our social security number? And, it is like, in a situation like that, the university probably doesn’t need the social security number. Once again, they like it for tracking, but active vast information from universities, including the kid’s social security number, and that type of thing. Do you really want to give that to them? Well, if you are applying for financial aid, the financial aid department actually must have that, so does the university. Well, my point is usually, this is Yale and Harvard, is not small junior college. How difficult do you want to make it for Yale and Harvard to accept your child? In a situation like that, I usually say, weigh the benefits and the cost and if you really want to get in there make the process easier for the university and take the risk of giving your social security number to the university, not just to the financial aid. That kind of gives you an idea, you’ve got to weigh and balance how important is it. If my kid had gone to Yale or Harvard, yes, I might just give the social security number to make it easier to try to get my kid in there. Does that make sense?
Identity Theft Secrets: Definitely makes sense.
Reggie Tracy: Alright.
Identity Theft Secrets: Cool, so kind of going back to your earlier question and thanks for answering that one. So, probably social security number is one important way, what are like three or four other ways that an individual can really do things to make sure that their information is being, or at least, being careful with their information?
Reggie Tracy: Right, right, you know; a couple of just really simple things. Your bank account, you must protect your bank account. Because of the way the laws are designed in the banking industry and the credit industry. Credit cards are actually safest to use in respect to identity theft, because the law limited liability if your credit card number is stolen and you versus if your debit card and pin number are stolen, and your bank account is wiped out. This has to do with the law; they are different kind of things. One is credit and one is an organization that is holding your money for you. So, they are very different, although people think I’m paying with a credit card, I’m paying with a debit card, it makes no difference, it is not that different, but as far as the law and identity theft; you are better protected if using a credit card. Now, credit card debt is very bad debt but credit cards are safer to use. So, I like the idea of buying things, especially in the internet, or whatever, with a credit card because there is less likelihood of identity theft coming back and being a problem for you. It is also easier to clean up if your credit card identity theft then if your bank account is wiped out. So, I like the idea of using a credit card then a check or even a debit card. One thing you can do though; is use your debit card as a credit card. Basically, you run it through and push credit and sign on the line instead of entering your pin number. Now, it still takes the money out from your bank account but you are still protected under the Visa credit card kind of rule and this is if you have a Visa or MasterCard debit card; this is where this applies. And, that is a really nice thing that most people just simply don’t know; that when they first use their debit card, push the credit button, run the card through, and then sign it, and not put your pin number in. But, you can’t do that every where so, that is another quick, simple tip. If you are going to use your debit card, at least do that. If you can use a credit card and you can make sure you pay it off at the end of the month, just like I said, credit card debt is really not good debt. You can basically use your credit card like a 28 day loan, but make sure you don’t charge more than what you have at the end of the month. Simple things like that; also, probably another big thing is Pathway. Pathway protects your financial account, your bank account; your credit card account so that when you call up, the company, they don’t ask you for your last four digit of your social security number, they ask you for your password, or your pin number, or whatever; I mean, it is not just the pin number on your debit card; I mean, put a password on your entire bank account. That is much safer because your social security, as we just talked about, can be stolen, but a password is a password that you know, and hopefully, only you know, and don’t share that with others. Protect your password. Using password to protect your bank account is something that gives you a simple extra level of protection for an account. If someone should steal your bank account number, or credit card number, or whatever; if you have a password on it, there would be less likelihood that they could change the address on the account, or completely empty the account or that type of thing. Does that make sense?
Identity Theft Secrets: Definitely. Cool.
Reggie Tracy: So, I explain it well enough?
Identity Theft Secrets: I think so, yeah. That is a really good tip and on the debit card I hadn’t really thought about that, I mean I have, but I think a lot people don’t think about well, hey you know if I’m taking my card and I’m putting in my pin code somewhere, you know, Wal-Mart or where ever they go shopping; that that could be actually a risk to them to have that set up.
Reggie Tracy: Sure, and that pin number, you know, your pin number could be some place in your debit card, but they are finding some very creative ways to steal that. Not only by looking over your shoulders, which you should always need to be careful that someone is not behind you; and this is another one of those tips, but also, they actually have little electronic thing that slides into the whole where your debit card slides in and it actually taps your card number and your pin number when you use it. Now, some of these will stop the machine from working; others will still allow the machine to work, but will tap into your information. And, how they get those in there, even in a busy location; someone will show up looking like a repair person for the ATM machine and they are actually criminals and they install that very quickly and then leave. So, if it is an ATM machine or a debit machine that is not, if it is inside the bank hopefully the bank employees are watching close enough and are checking who is in there. But, if it is somewhere else, there may be no one really watching and may give a criminal the opportunity of actually, you know, tamper with the machine; it is a legitimate machine but it may give them the opportunity to tamper with the machine and steal your information.
Identity Theft Secrets: Yeah.
Reggie Tracy: Very interesting, criminals are getting very creative.
Identity Theft Secrets: Well, it’s amazing, you know, the high tech versus low tech. I think a lot of people have the impression that it has to really be high tech information theft, you know, somebody hacking in or something. But, a lot of times, I think, a lot of, and you would know this better than I will, a lot of the theft that is happening is actually very low tech.
Reggie Tracy: Absolutely, absolutely. There aren’t that many people that know how to make or obtain those little cards to slide into the ATM, but it is very easy for them to steal information, un-shredded information out of the garbage can. So, of course, that is one of the other basic things, shred. But, if you and I had talked before about shredding; shredding is something everybody should be doing, but that is absolutely not the only thing people should be doing. If you are just shredding, that’s good, but that is not enough.
Identity Theft Secrets: That’s one out of sixty steps.
Reggie Tracy: That’s one of them, shredding is definitely, one of the sixty steps; fifty nine.
Identity Theft Secrets: Okay, cool. Well, Reggie, that’s my next question here. If I learn that my information has been compromised, what are some steps that I can take as an individual to get my information restore?
Reggie Tracy: Well, first of all, you absolutely must report, however you find out that your information has been access; if it is through the credit bureau, through a bank, or through whatever, if you know, unfortunately, hopefully, is not you are getting pulled over for a minor traffic something or other, traffic stop and getting hauled off down to jail because someone has done some criminal stuffs with your name, however it is, you must immediately notify the organization, the bank, whatever, the credit card company, whatever, and let them know that there is a problem. Allow them to investigate that and come back to you with what they feel is going on with the account possibly access. They need to verify that there was some monopolized access and not just a mistake or an error, whatever. From there, the first thing you must do is make a police report with all of the information about how you figure out that you’ve been a victim of identity theft. Whatever account or whatever has been access and you need to get all that information and give it to the police department. You must have a police report to report it to the credit bureaus, most of the credit companies, most of the other organizations and individuals. For them to take action on something, they must have a police report. So, you have to do that, and then from there, is really a matter of going through all of your financial accounts, your medical, your tuition, you’ll need to contact the DMV, if appropriate, or the Social Security Administration. It really needs to trickle down, who else has been or might have been effect by the action of this identity thief. And is really kind of a little investigation into what have they tampered with in your life. I have a book out there, The Identity Theft Survival Guide, and is available in or through Borders. Is in some of the Borders or it is available to be ordered through the other Borders across the country. There are other resources from the Federal Trade Commission, the Privacy Rights Organization, that type of thing. You can find a lot of information on line. I, of course, have my book because I wrote it. I think it is laid out pretty simple to follow but, this needs to go through the entire process of checking all of your accounts and, you know, is really identifying what was damaged, what wasn’t. It really is a very long and involved process. Is not fun to do; people can do it on their own but, it could be very expensive and costly. There are other solutions, beside my book and the stuff on the internet. There is, of course, if you are aware; prepaid legal that have actually recovery services where they do that work for you. There are other individuals, like myself, that can do that as well, but of course, prepaid legal has a definitely cost effective solution. You have to have a prepaid legal service identity field before you become a victim to really get the cost savings. So, there are different resources out there, different solutions. You must take action quickly, once you become a victim of identity theft, you must learn all the steps that you need to take, or find someone to take those for you because the problem will not go away and it will not get smaller until the steps are taken to clean everything up.
Identity Theft Secrets: That is a lot.
Reggie Tracy: Did I do good?
Identity Theft Secrets: Yeah, is there anything else you would like to share with us?
Reggie Tracy: Don’t know, what’s the latest, who has been damaged recently?
Identity Theft Secrets: You know is amazing, I’m trying to remember what company it was yesterday but there was a company, a major company; that had their data breached, as well as a school. You know you can always go to that Privacy Right Clearing House chorological of data breaches.
Reggie Tracy: Yes, it is amazing, almost every week there is something major that goes on; some organization that has their information stolen. You know, I should really explain that, why the privacy custom focus a lot of our services and energy on businesses when really, at heart, our consumer advocate group really want to help consumers to protect their information and to recover. You know, that’s why I have written these books and, you know, my first book, Futuristic Credit Fraud on Identity Theft, lays out those sixty steps to protect your information and the Identity Theft Survival Guide to recover. So, why do we actually work with businesses, because you can get my book, Futuristic Credit Fraud on Identity Theft, take those sixty steps a really reduce the likelihood of someone stealing your information from you. What you can’t control is what these businesses do with that information. What I talk in the book about, how to identify what businesses do that they need your information, like what we went through with the social security number. I actually provide lists of questions that you can ask the company, and things to keep in mind when you are setting up an account in any company to minimize the information that you give to them. But, once you give the information to them, you really have no control over it. So, what we did in the Privacy Check Group is help them in that respect as well. We help the consumer by helping businesses to better protect their client’s and their customer’s information.
Identity Theft Secrets: Awesome! So, thank you very much for taking a couple of minutes with us today, and…
Reggie Tracy: I know that I have taken more than a couple of minutes, and thank you for allowing me to share some that with you and everybody who comes to your site and listen to you talk, and all of that.
Identity Theft Secrets: Absolutely, we will definitely put up some information where people can contact you following this interview. So, thank you very much.
Reggie Tracy: You’re welcome John, thank you.
Identity Theft Secrets: Have a great day.
Reggie Tracy: I will, you too.
Identity Theft Secrets: Thanks.
Reggie Tracy: Bye, bye.
Identity Theft Secrets: Bye.
For more information on the Privacy Trust Group:
R.M. (Reggie) Tracy, President
Privacy Trust Group
P.O. Box 10
Elbert, Colorado 80106