5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.

Slides:



Advertisements
Similar presentations
An Educational Partnership of Consumer Action and Chase
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Modules 9.1.  When someone knowingly deceives you for their own personal gain.  They convince you that something is true when it isn’t.  They make.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 13-1 Today’s Topics n Consumer Fraud.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Beware! Consumer Fraud Module 9.1.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Cyber Crimes.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
August 19 & 22, Objectives  Identify adequate, reliable information resources for personal and family problem solving.  Explore ways to prevent.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Computer crimes.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
 Grab your handouts and settle in  Roll Call Question: Hard or soft shell tacos???  Bell Work:  How is interest of a savings account different from.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
S CAMS AND S CHEMES. I DENTIFY T HEFT Someone unlawfully obtains and uses a person’s personal data to commit fraud or deception for financial gain Opens.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Unit 7 Day 5 Consumer Protection & Fraud. Consumer Credit What is Credit? the ability of a customer to obtain goods/services before payment, based on.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
+ 5.5 Insurance Jet ski or parasailing?. + Mental Floss 4/19/16 Objective: How to be a responsible consumer  Questions:  1) Why is car insurance.
SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Identity Theft It’s a crime!
5.5 Consumer Protection Objective: Demonstrate how to be a responsible consumer in the 21st century.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Protecting Your Credit Identity
Security in mobile technologies
Presentation transcript:

5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit

SHHHHH Quiz in Progress  When you finished, work on your budget project

Mental Floss  Objective  How to be a responsible consumer  Vocab  ID Theft  Phishing  Skimming  Credit and Debit Card Theft  Fraud Spree  Account Takeover  Application fraud  Ponzi Scheme  Pyramid Scheme  Online Fraud  Malware  Questions  1. Why would a person want a credit card?  2. What is interest in regards to a credit card?  3. How would a person protect his/her credit score?

Identity Theft  A crime in which someone wrongfully obtains and uses another person's personal data  Types:  Phishing  Skimming  Credit Card theft  video video

Phishing  attempt to acquire identity of someone by asking for sensitive information  i.e. username, password, credit card number.  Watch Out For …being asked to update personal information (password, credit card, social security number).  ** A legitimate business will always ask for the information on a secure website or in person.

Skimming  illegal copying of information from the magnetic strip of a credit or ATM card.  Watch out for… unusual devices on the ATM swipe machine

Credit and Debit Card Theft  Fraud spree: unauthorized charges on existing accounts.  Hackers can steal account information from personal computers or company computers.

2 types of Credit Card Fraud  Account takeovers  involve the criminal hijacking of an existing credit card account.  Application Fraud  opening of credit card accounts in another person's name.

Some ways thieves steal your information  lost or stolen cards  Your mailbox  Stealing your pin during a purchase  Your trash  Hacking  Over the phone  Personnel records  Employees of a business steal card info

Fraud  Deliberate deception usually for economic gain. Examples of Fraud:  Ponzi Schemes  Pyramid Schemes  Online scams

Ponzi Scheme  Named after Charles Ponzi (early 1900’s)  Convince people to invest in a fake company for great returns.  Once the scam artist feels that enough money has been collected, he disappears – with the money

How do they work? 1.Convince a few people to invest. 2.Return some money to investors 3.Convince more investors based on success… many original investors will invest again 4.Repeat steps 1 through 3 a number of times. 5.Before step 2 in one of the cycles, disappear Bernie Madoff

Pyramid Scheme  investment where each paying investor recruits two other investors. The first investor makes money from his recruits… they make money by recruiting more  People at the top make money from people on the bottom

 The main characteristic of a pyramid scheme is that participants only make money by recruiting more members. How Do Pyramid Schemes Work? Ponzi v. Pyramid

Online Fraud  Work at Home Ads  Too good to be true  Fake charity organizations  Natural disasters are popular  “Be part of one of America’s Fastest Growing Industries.  Be the Boss!  Earn thousands of dollars a month from home”

Malware  “malicious software."  It includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent.  Can be used for fraud