Friday, June 1, 2007

Asset Identification through DataDots


DataDots are a very affordable, state-of-the-art, asset identification technology. The DataDots are tiny; about the size of a grain of sand. Once registered (free with purchase), DataDots can be used to identify property with its rightful owner.

Additionally, because of their size and proliferation (multiple DataDots are advised to be applied to assets in hidden and obvious locations), DataDots become an effective Theft Deterrent. For example:
  • Esso (Exxon Australia) reported an 88% decline in employee pilferage of company assets 1 year after implementing a DataDot program.
  • Subaru Australia has implemented a DataDot program which has resulted in a 93% decrease in unrecovered stolen vehicles.
  • The Australian Broadcasting Corporation (ABC) identified a need to protect computer equipment such as laptops, which are attractive and easy to steal, together with a number of highly attractive mobile broadcasting assets. Their analysis showed the cost of protecting 17,000 assets with would be recouped if they prevented the theft of – or enabled the recovery of – just eight or ten expensive assets like laptops. “In addition to providing a psychological barrier to the theft of assets, the strategy has indeed paid for itself with the return of a number of assets by the police, tracing the assets back to the ABC via the DataDot technology,” said Laurie Treloar, ABC Risk and Asset Manager. “As these assets are below insurance excess it represents an important recovery for the ABC.”
  • In a six month trial of DataDots in 40 Australian schools, school property theft was reduced by 89% - an average saving of A$6000 at every school. As a result, all schools in the state if New South Wales were then given the opportunity to use the technology. All valuable and portable school equipment including computers, VCRs, televisions, mobile phones, cameras, tools and art work were DataDotted. Even the school lawn mowers were protected. The then Minister for Education & Training, John Aquilina, was very pleased with the results. He said. “The message to would-be offenders is clear. Don’t try it, you’re being watched and you will get caught.” The system has significantly driven down the incidence and cost of theft, vandalism and arson in NSW schools.”


Interested? Contact DHI at 303-810-7368 or visit our webpage for more information.

Friday, May 4, 2007

Insurance Claims Process / Checklist

DHI recommends following this list when making an insurance claim:

  1. Report any burglary, theft or other crime to law enforcement authorities.

  2. Obtain and file the Case Number assigned by the authorities.

  3. Start a Journal in a spiral notebook or 3 ring binder.

  4. Log all contacts (name and phone number) and communications with the authorities.

  5. In the event of property damage or loss:
    Contact and report your insurance company IMMEDIATELY. Most policies have a time limit for filing claims.

  6. Log all contacts (name and phone number) and communications with your insurance company.

  7. Make a list of stolen or damaged articles (in your journal).
    View your DHI Home Inventory video at this point as a visual reminder/reference of where things are/were supposed to be.
    Your insurance company may request proof of ownership and value of your reported losses. Your Home Inventory by DHI provides this proof in the form of:
    • Video AND
    • Photographs AND
    • Receipts AND
    • Serial numbers AND
    • Appraisals

  8. Make temporary repairs to protect your property from further damage.
    • Keep all receipts from those repairs.
    • Log these repairs in your journal.

  9. If you must move out of your home temporarily
    Log and save receipts in your journal for food, lodging, new clothing, and other expenses.

  10. Questions to ask your insurance representative (journal your questions and their responses):
    • Am I covered?
    • Does thins claim exceed my deductible?
    • How long will it take to process the claim?
    • Will I need to provide estimates for repairs?




Source: www.usaa.com

Monday, April 23, 2007

What to do if your Identity is STOLEN

Please note that these guidelines are NOT an inclusive list. If your identity has been stolen, expect to spend many hours clearing your good name. It is an unfortunate reality that this process takes on average almost 200 hours of your time over a 2 year period.

DHI recommends that you be PROACTIVE in guarding your Identity. Protect your Identity BEFORE it gets stolen. Visit DHI's Identity Theft webpage for more information.

Guidelines to follow if you suspect that your identity has been stolen:

  1. Call the fraud hotlines of the three (3) major credit reporting agencies.
    Ask them to flag your account profile with a fraud alert to prevent any accounts from being opened without your approval:
    • Trans Union – (800-680-7289)
    • Equifax – (800-525-6285)
    • Experian – (888-397-3742)

  2. File a report with your local police.
    You will need a copy of the report to show creditors. In addition, you may need to contact the police department where the crime occurred. The Postal Inspector will also need to be contacted if a fraudulent change-of-address was filed.

  3. Close all false or phony accounts.
    Ask for copies of the original credit applications for your files.

  4. Close all existing accounts that have been illegally accessed.

  5. Document your calls to creditors.
    Send a certified letter reiterating your requests. Keep a log of all calls, contacts and documents. File them in a safe place and keep them indefinitely.

  6. If stolen items include anything with your Social Security Number, call the Social Security Administration to report that the number has been used fraudulently.

  7. Call the Department of Motor Vehicles to discover if a duplicate license has been issued in your name.

  8. File a complaint with the Federal Trade Commission’s (FTC’s)
    Identity Theft Hotline – (877-438-4338)


Other Resources:

Tuesday, April 17, 2007

Losing a Loved One

Home Inventories help to prepare us for when tragedy strikes. The death of a loved one certainly falls within this realm. While unable to relieve the grief experienced by survivors, a Good Home Inventory can help alleviate stress by providing a central location for the decedent's important estate documents, financial statements, insurance policies, and heir designation of personal property.

In his article "Losing a Loved One", Rande Spiegelman, VP of Financial Planning at Schwab Center for Investment Research, has written a list of important procedures to consider during this emotional time. Mr. Spiegelman urges caution in making financial decisions and to be wary of criminal predators who scan obituaries seeking empty homes to burglarize. Mr. Spiegelman also reminds us to keep our own financial and estate planning affairs in order - he cites that after a certain time period, unclaimed assets resulting from a death by law become assets of the state - New York state holds $7.2 billion in unclaimed funds and California holds $4.8 billion!

A Home Inventory by DHI can help organize all of your important documents and property.

Thursday, April 5, 2007

Thieves at Gas Stations

Actual footage of thieves working gas stations!! Summer is coming, please be aware of your surroundings and heed the recommendations of Sheriff Ken Jenne.

Sheriff Jenne says that the thieves are actually after items they can use to steal your identity. Protect yourself ... Please visit the DHI Identity Theft page to learn more.

Protect Your Valuables!!

Below is a link to a short article that overviews various ways to protect your valuables. Of note is #5 on the list which addresses a very affordable, state-of-the-art crime prevention technology called DataDots. Depending on its size, an asset can be protected with DataDots for pennies!

"6 Ways to Protect Your Valuables"

Thursday, March 22, 2007

DHI in the News

DHI has been in the news...

Check out the article on DHI and DHI advertisement in City and Mountain Views !

Also, DHI is featured in the Business Happens column in the March edition of Colorado Serenity.

Wednesday, March 14, 2007

ID Theft from your Mail Box

One of the most common practices for a thief to steal your identity is to steal your mail.

A good security step is to use a locked mailbox.

However, with Lock Bumping, the security step of using a locked mailbox provides only a minor inconvenience to a thief. Most grouped mailboxes (apartment complexes, HOA mailbox centers, etc.) use a common lock with slight differences in the key for each mailbox. A thief with a master bump key for a group of mailboxes could literally steal hundreds of pieces of mail within a matter of minutes!

What can you do? Contact your HOA or apartment management (or the like) and request that they change the locks to bump-proof locks. However, although a justified cost in your eyes, the management will probably view the current setup as sufficient and not do anything.

Another step would be proactive of your part. Prevent your identity from being stolen before a thief even tries.

How? Please visit the DHI Identity Theft page to learn more.

Monday, March 12, 2007

Technical Info on Lock Bumping

Clicking on this link will take you to a Technical Analysis of Bumping written by security.org. The analysis was written in April 2006.

Why am I posting this? The information on Lock Bumping is "out there" in Cyberspace, available to anyone. I am posting this for the same reason this document was written, "This document addresses the relevant technical issues with regard to the vulnerability of mechanical locks to bumping and the security threat that results. Law enforcement agencies, security professionals, locksmiths and the consumer need to understand the issues in order to accurately gauge individual risks."

It is technical in nature and very informative.

As I have stated previously, please take any appropriate actions you feel are necessary to protect you, your family, and your assets.

From the DHI perspective, this topic offers a reminder that a home inventory is important. Please contact us if you have any questions.

Sunday, March 11, 2007

Identity Theft

I have known a few friends and associates who have experienced this most unpleasant crime. As you probably know, it is the fastest growing and most prevalent crime in the US. Fixing your identity after the fact takes an average of 177 hours and over 2 years in time.

There are various remediation, credit monitoring, and insurance companies dedicated to identity theft services. However, all of these companies address the identity theft problem after the fact - that is, after your identity has been stolen.

Recently, DHI has become affiliated with a company that takes a proactive approach to this subject. The company is called LifeLock and my family is a client of theirs. I have included my children ... young people are more vulnerable to identity theft than adults because most have not established credit records that can be monitored.

In a nutshell, LifeLock offers a $1,000,000 Guarantee that its services will protect your identity from being stolen. The LifeLock service costs $10/month (a little less with an annual subscription.)

To learn more, please visit the DHI Identity Theft page. (Yes, DHI earns a few nickels in this manner).

However, whether you go through DHI or not, I urge you to consider this service. Additionally, please continue to keep a vigilant eye on your personal information and shred any important (and unimportant) documents containing personal information.

Lock Bumping

DHI keeps abreast of current news stories that are applicable to the Documentation, Preservation and Protection of your assets.

Please take note of Lock Bumping and how it might affect you. Take the appropriate precautions you think may be necessary to protect yourself and your assets. Additional suggestions from DHI include keeping your home inventory current and the use of DataDots, a state-of-the-art asset identification technology.

Lock Bumping is a crime technique that allows criminals to open 90% of ordinary key locks with an modified ordinary key. All the criminal needs is a file to modify a key and an object (screwdriver handle or hammer) to "bump" the key in the lock.

Please see the news report that is posted on the DHI website on this subject.

Saturday, February 10, 2007

Welcome

DHI is joining the blogging community!

Please bear with us as we learn to use blogging to share information.

As always, please feel free to comment or send us an email.