Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?

Slides:



Advertisements
Similar presentations
What To Do If Someone Steals Your Identity 4 Immediate Actions: 1.Close all accounts accessed 2.Place a fraud alert on credit reports 3.File a police report.
Advertisements

IDENTITY THEFT Protect Yourself and Your Good Name ITT Employees Federal Credit Union.
Banking. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Identity Theft Ta’Mar Boyd Adam Devin. What is Identity Theft  Identity theft occurs when someone uses your personally identifying information, like.
[your name, organization] Protecting Your Identity: What to Know, What to Do.
My Name is Todd Davis My Social Security # is
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do Sherry Daniels Family Living Educator Portage County UW Extension 1462 Strongs Ave., Stevens Point,
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
1 Information and Systems Security/Compliance Security Day The Information and Systems Security/Compliance Program Dave Kovarik.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Lesson 9-3 Consumer Protection Laws LEARNING GOALS -LIST AND EXPLAIN CONSUMER PROTECTION LAWS THAT ARE RELATED TO CREDIT -DISCUSS THE PROCESSES OF USING.
Data Protection Act. Lesson Objectives To understand the data protection act.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Internet Safety Dr. Steve Broskoske Misericordia University.
Identity Theft Insurance Charles P. Orlowicz November CAS Annual Meeting – Session CS04 A division of the property and casualty subsidiaries.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
2015 ANNUAL TRAINING By: Denise Goff
Scams & Schemes Common Sense Media.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Protecting Your Organization Identity Theft and Data Breach.
Identity Theft Project Erin L. Caraway Jacob Locke.
Learn how you can provide effective assistance to identity theft victims in your community.
To Your Credit. To Your Credit 2 Welcome Agenda Ground Rules Introductions.
WHO’s IN YOUR “WALLET” WHO’s IN YOUR “WALLET” YOU BETER “RECOGNIZE” YOU BETER “RECOGNIZE” STEPPING $2o0 $300 $400 $500 $400 $300 $200 $500 $400 $300.
Identity Theft Tiffany Setzer & Cassie Conkwright.
Jeff loses his identity! Lesson 8: Identity Theft.
Identity Theft How it happens and how to avoid it.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
S CAMS AND S CHEMES. I DENTIFY T HEFT Someone unlawfully obtains and uses a person’s personal data to commit fraud or deception for financial gain Opens.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Utah Office of the Attorney Genera l Kirk Torgensen.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Identity Theft: How Vulnerable are you? Ronald J. Leach.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Risky Business Week Protecting Your Identity: What to Know, What to Do Legal Division CSAA Insurance Group, a AAA Insurer.
Protecting Your Assets By Preventing Identity Theft
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
Protecting Your Identity:
Tax Identity Theft Presenter Date
When you get caught for Identity Theft
Protecting Your Identity:
Jeff loses his identity!
Identity Theft: What if You Are a Victim?
Identity Theft and Credit Safety
Presentation transcript:

Identify Theft in the Cyber Age Ronald J. Leach

What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you? How vulnerable are you? How can you protect yourself? How can you protect yourself? How to recover from identity theft How to recover from identity theft

People take ID theft seriously

How bad is Identity Theft?

Identity Theft: Not just bank accounts and credit cards Not just bank accounts and credit cards Mortgages taken out Mortgages taken out Medical Identity Theft Medical Identity Theft Loss of pensions Loss of pensions

How much money? Median loss for ID theft victims: $31,356 Median loss for ID theft victims: $31,356 Average: $5,740 Average: $5,740 (2007 data)

How Bad is Medical Identity Theft Over 250,000 Americans victims in 2007 Over 250,000 Americans victims in ,000 tax returns filed using stolen Social Security numbers in ,000 tax returns filed using stolen Social Security numbers in 2011

Protecting information

Senior discount

Pay by credit card?

Where are the records sent? Kept?

Where is your data vulnerable?

18

Can it happen?

Data breaches

Data breach notification laws: Force firms to handle costs of a breach: notification letters customer support call centers free credit monitoring

Data breach notification laws: Only 2% of data breaches lead to ID theft Approx 90% of cost born by banks, … Notices may be ignored

Data breaches

Cryptography is essential for secure data transfer What does "Setec Astronomy “ mean? What does "Setec Astronomy “ mean?

Cryptography is essential for data transfer What does "Setec Astronomy “ mean? What does "Setec Astronomy “ mean? "Too many secrets “ "Too many secrets “ from the movie SNEAKERS from the movie SNEAKERS

Cryptography is ancient, and new Shave head, write message, let it grow Shave head, write message, let it grow Encoding: 128-bit is better than 64-bit, … Encoding: 128-bit is better than 64-bit, …

Poe ’ s The Gold Bug

Navaho code talkers

German Enigma machine

WiFi, 3G, 4G, …?

RFID

Spyware

Spyware, malware are problems

PAMEIOB

How much does an annual credit report cost?

How much does an annual credit report cost? Nothing! AnnualCreditReport.com AnnualCreditReport.com

First steps if your identity is at risk Contact financial institutions or companies; tell them you ’ re a victim of ID Theft Contact the credit reporting agencies to request a fraud alert Other help from hotels, cruise lines, …

Second steps Report the crime to your local police Get a copy of police report Keep copies for resolving complaints Contact FTC for information

Thank you!