Identity Theft: How Vulnerable are you? Ronald J. Leach.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Where to Stash Your Cash
2.7.1.G1 © Family Economics & Financial Education – December 2005– Get Ready to Take Charge of Your Finances – Electronic Banking Bonanza – Slide 1 Funded.
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
ICT at Work Banking and Finance.
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
Module 5: financial services review
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Electronic Payment By: El Panda. What is an electronic payment? Electronic money (also known as e-currency, e-money, electronic cash, electronic currency,
Protect Yourself from Identity Theft
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Read to Learn Discuss the different types of checking accounts and how they work. Discuss other services and offerings that banks provide checking account.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Be Cautious of Identity Theft By: Sydney Langley.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Checking Accounts. What is a checking account? A bank account that allows easy access to the funds. You can use your checking account to pay bills. With.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Identity Theft The Dangers Involved and How It Affects You!
Get Smart About Credit Identity Theft. Current Statistics Between January and December 2006, the Federal Trade Commission received more than 670,000 consumer.
By: Asfa Khan and Huda Mukhtar
Interest Fixed vs. Variable. Stop and think about your options: Review your credit report and score and research what credit cards are available to someone.
Lyle Hansen, M.S., AFC University of Idaho Extension Jerome County Extension Office (208) : Credit Scores.
Jeff loses his identity! Lesson 8: Identity Theft.
Identity Theft How it happens and how to avoid it.
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Practical Math: Credit Cards Chapter 7 Notes. Vocabulary credit card: a card that allows you to buy items now and pay later monthly statement: form like.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
All Outreach Training Cards Requests will be submitted via the NEW ONLINE OUTREACH TRAINER PORTAL
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
Frauds, Scams and Slams: Credit Card and ATM Fraud Prepared by Dr. Jan Park Gerontology Specialist Oklahoma Cooperative Extension service April 2002.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Identity Theft Westerville Division of Police. What is Identity Theft? “to obtain, possess, or use any personal identifying information of any living.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Protecting Your Assets By Preventing Identity Theft
What’s a Credit Score? And how to use credit wisely.
Identity Theft It’s a crime!
Protecting Your Credit Identity
Protecting Your Identity:
Pentagon of Self-Defense
When you get caught for Identity Theft
Outreach Trainer Portal
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Your Identity
Smart Business for eGeneration Companies
Identity Theft: What if You Are a Victim?
Smart Business for eGeneration Companies
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Identity Theft: How Vulnerable are you? Ronald J. Leach

Identity Theft Use of existing accounts – easiest to fix Use of existing accounts – easiest to fix Takeovers of existing accounts – can limit your access to your money Takeovers of existing accounts – can limit your access to your money New accounts – you may not be notified New accounts – you may not be notified

Check credit reports yearly Its free, free, free! Its free, free, free! AnnualCreditReport.com AnnualCreditReport.com

Case study - “ A ” Had checkbook stolen Had checkbook stolen Took many hours to stop continued cashing of checks, even after account was closed! Took many hours to stop continued cashing of checks, even after account was closed!

Case study – “ B ” Had Medical Identity stolen Had Medical Identity stolen

Case study – ‘ B ” Card number, Social Security Number copied, given to others, possibly by a clerk Card number, Social Security Number copied, given to others, possibly by a clerk Learned about collection notices asking for a credit report before getting married Learned about collection notices asking for a credit report before getting married

Case study – ‘ B ” Many judgments Many judgments A helicopter transfer to a hospital for $19,000! A helicopter transfer to a hospital for $19,000!

Case study – “ P ” Had wallet stolen Had wallet stolen Lost checkbook Lost checkbook Lost driver ’ s license Lost driver ’ s license Lost medical cards Lost medical cards

Case study - “ SG ” Had computer account hacked Had computer account hacked Everyone in mailbox was sent multiple convincing messages Everyone in mailbox was sent multiple convincing messages

Case study - “ SG ” Others had their computer account hacked Others had their computer account hacked “ P ” “ P ” “ S ” “ S ” “ JF ” “ JF ” “ H&B ” “ H&B ” Others Others

Hackers got his information:

from a wireless connection at an Internet café Did you use a hotel ’ s wireless? Was it protected?

18

Case study – “ W ” Had mortgage placed on house Had mortgage placed on house Mortgage company began foreclosure Mortgage company began foreclosure

Case study – “ W ” His house His house

Case study – “ W ” His house – not! His house – not!

How could crooks get access to W? Land records Land records Stolen mail Stolen mail

Case study – me and a credit card Had phone message at work, asked me to call an 800 number about my card Had phone message at work, asked me to call an 800 number about my card Got an uneasy feeling Got an uneasy feeling

Case study – me and a credit card Back of card had correct number. Back of card had correct number. The telephone call had a different number The telephone call had a different number Call was spurious, so was 800 number Call was spurious, so was 800 number No problems with card No problems with card Whew! Whew!

Case study – me and broker Show me the money Show me the money –My money! Don ’ t show me his money Don ’ t show me his money

Case study – me and broker Previous user ’ s data still on screen Previous user ’ s data still on screen Poor software – didn ’ t clear screen Poor software – didn ’ t clear screen My transaction went through – I was notified by mail My transaction went through – I was notified by mail Also notified of his transactions by mail Also notified of his transactions by mail

Case study – me and broker Called broker about error – did not get confirmation by mail Called broker about error – did not get confirmation by mail Got three additional confirmation letters Got three additional confirmation letters

Case study – me and broker Called broker about error – did not get confirmation by mail Called broker about error – did not get confirmation by mail Got three additional confirmation letters on his account! Got three additional confirmation letters on his account!

Case study – me and broker Called person ’ s home phone Called person ’ s home phone The wife was unaware of his transferring funds The wife was unaware of his transferring funds The wife ’ s reaction The wife ’ s reaction

What is the most valuable item you have? Credit Card? Credit Card? Checkbook? Checkbook? Driver ’ s License? Driver ’ s License? Social Security Card? Social Security Card? Membership card? Membership card? Ship ID card? Ship ID card? Passport ? Passport ?

How long would it take you to replace the stolen item – a few days/months/years? Credit Card? Credit Card? Checkbook? Checkbook? Driver ’ s License? Driver ’ s License? Social Security Card? Social Security Card? Membership card? Membership card? Ship ID card? Ship ID card? Passport ? Passport ?

Passports can be the most difficult to replace if you are abroad

How long would it take you to replace the stolen item? 1. Passport 2. Social Security Number

How much does an annual credit report cost?

T is for Trespass

Do you read your credit card statement?

How much does an annual credit report cost? Nothing! AnnualCreditReport.com AnnualCreditReport.com

Thank you!